System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29832, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29832 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29832
- **State**: PUBLISHED
- **Published Date**: May 13, 2025 at 16:58 UTC
- **Last Updated**: May 29, 2025 at 22:21 UTC
- **Reserved Date**: March 11, 2025 at 22:56 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19044.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29832) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2384, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2384 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2384
- **State**: PUBLISHED
- **Published Date**: April 17, 2013 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 15:36 UTC
- **Reserved Date**: March 05, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font layout" in the International Components for Unicode (ICU) Layout Engine before 51.2.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=952709)
2. [SUSE-SU-2013:0835](http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html)
3. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml)
4. [[distro-pkg-dev] 20130417 [SECURITY] IcedTea 1.11.10 for OpenJDK 6 Released!](http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022796.html)
5. [SUSE-SU-2013:0871](http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html)
6. [RHSA-2013:0758](http://rhn.redhat.com/errata/RHSA-2013-0758.html)
7. [](http://site.icu-project.org/download/51#TOC-Known-Issues)
8. [APPLE-SA-2013-04-16-2](http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html)
9. [MDVSA-2013:145](http://www.mandriva.com/security/advisories?name=MDVSA-2013:145)
10. [TA13-107A](http://www.us-cert.gov/ncas/alerts/TA13-107A)
11. [](http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/)
12. [](http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/6784c9903db7)
13. [SSRT101252](http://marc.info/?l=bugtraq&m=137283787217316&w=2)
14. [](https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130)
15. [RHSA-2013:1455](http://rhn.redhat.com/errata/RHSA-2013-1455.html)
16. [oval:org.mitre.oval:def:19549](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19549)
17. [SSRT101305](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880)
18. [RHSA-2013:0757](http://rhn.redhat.com/errata/RHSA-2013-0757.html)
19. [HPSBUX02922](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880)
20. [](https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124)
21. [openSUSE-SU-2013:0777](http://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html)
22. [MDVSA-2013:161](http://www.mandriva.com/security/advisories?name=MDVSA-2013:161)
23. [openSUSE-SU-2013:0964](http://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html)
24. [RHSA-2013:0752](http://rhn.redhat.com/errata/RHSA-2013-0752.html)
25. [](http://bugs.icu-project.org/trac/ticket/10107)
26. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html)
27. [oval:org.mitre.oval:def:16549](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16549)
28. [USN-1806-1](http://www.ubuntu.com/usn/USN-1806-1)
29. [oval:org.mitre.oval:def:19341](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19341)
30. [59179](http://www.securityfocus.com/bid/59179)
31. [RHSA-2013:1456](http://rhn.redhat.com/errata/RHSA-2013-1456.html)
32. [SUSE-SU-2013:0814](http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html)
33. [](http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html)
34. [](http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/)
35. [SUSE-SU-2013:0934](http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html)
36. [HPSBUX02889](http://marc.info/?l=bugtraq&m=137283787217316&w=2)
37. [](http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35772, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35772 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35772
- **State**: PUBLISHED
- **Published Date**: August 09, 2022 at 19:58 UTC
- **Last Updated**: May 29, 2025 at 19:12 UTC
- **Reserved Date**: July 13, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Azure Site Recovery Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Azure Site Recovery VMWare to Azure**
Affected versions:
- 9.0 (Status: affected)
### References
1. [Azure Site Recovery Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35772) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37887, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37887 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37887
- **State**: PUBLISHED
- **Published Date**: June 14, 2024 at 15:48 UTC
- **Last Updated**: August 02, 2024 at 03:57 UTC
- **Reserved Date**: June 10, 2024 at 19:54 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Nextcloud Server is a self hosted personal cloud system. Private shared calendar events' recurrence exceptions can be read by sharees. It is recommended that the Nextcloud Server is upgraded to 27.1.10 or 28.0.6 or 29.0.1 and that the Nextcloud Enterprise Server is upgraded to 27.1.10 or 28.0.6 or 29.0.1.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**nextcloud - security-advisories**
Affected versions:
- >= 27.0.0, < 27.1.10 (Status: affected)
- >= 27.0.0, < 28.0.6 (Status: affected)
- >= 27.0.0, < 29.0.1 (Status: affected)
### References
1. [https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h4xv-cjpm-j595](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h4xv-cjpm-j595)
2. [https://github.com/nextcloud/server/pull/45309](https://github.com/nextcloud/server/pull/45309)
3. [https://hackerone.com/reports/2479325](https://hackerone.com/reports/2479325) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12263, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12263 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12263
- **State**: PUBLISHED
- **Published Date**: August 09, 2019 at 18:10 UTC
- **Last Updated**: August 04, 2024 at 23:17 UTC
- **Reserved Date**: May 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Wind River VxWorks 6.9.4 and vx7 has a Buffer Overflow in the TCP component (issue 4 of 4). There is an IPNET security vulnerability: TCP Urgent Pointer state confusion due to race condition.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support2.windriver.com/index.php?page=security-notices)
2. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009)
3. [](https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf)
4. [](https://security.netapp.com/advisory/ntap-20190802-0001/)
5. [](https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/)
6. [](https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12263)
7. [](https://support.f5.com/csp/article/K41190253)
8. [](https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf)
9. [](https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50543, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50543
- **State**: PUBLISHED
- **Published Date**: November 19, 2024 at 16:32 UTC
- **Last Updated**: November 19, 2024 at 21:08 UTC
- **Reserved Date**: October 24, 2024 at 07:27 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Amazing Team amazing neo icon font for elementor allows DOM-Based XSS.This issue affects amazing neo icon font for elementor: from n/a through 2.0.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Amazing Team - amazing neo icon font for elementor**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/amazing-neo-icon-font-for-elementor/wordpress-amazing-neo-icon-font-for-elementor-plugin-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Gab (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25028
- **State**: PUBLISHED
- **Published Date**: January 24, 2022 at 08:01 UTC
- **Last Updated**: August 03, 2024 at 19:49 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Event Tickets WordPress plugin before 5.2.2 does not validate the tribe_tickets_redirect_to parameter before redirecting the user to the given value, leading to an arbitrary redirect issue
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**Unknown - Event Tickets**
Affected versions:
- 5.2.2 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/80b0682e-2c3b-441b-9628-6462368e5fc7)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3830
- **State**: PUBLISHED
- **Published Date**: August 05, 2016 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 00:10 UTC
- **Reserved Date**: March 30, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
codecs/aacdec/SoftAAC2.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 allows remote attackers to cause a denial of service (device hang or reboot) via crafted ADTS data, aka internal bug 29153599.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2016-08-01.html)
2. [](https://android.googlesource.com/platform/frameworks/av/+/8e438e153f661e9df8db0ac41d587e940352df06)
3. [92221](http://www.securityfocus.com/bid/92221) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20643, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20643 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20643
- **State**: PUBLISHED
- **Published Date**: March 20, 2019 at 19:07 UTC
- **Last Updated**: August 05, 2024 at 12:05 UTC
- **Reserved Date**: December 31, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP Scripts Mall Entrepreneur Job Portal Script 3.0.1 has directory traversal via a direct request for a listing of an image directory such as an assets/ directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gkaim.com/cve-2018-20643-vikas-chaudhary/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6950, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6950 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6950
- **State**: PUBLISHED
- **Published Date**: March 23, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 15:49 UTC
- **Reserved Date**: March 16, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SAP GUI 7.2 through 7.5 allows remote attackers to bypass intended security policy restrictions and execute arbitrary code via a crafted ABAP code, aka SAP Security Note 2407616.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1038122](http://www.securitytracker.com/id/1038122)
2. [](https://erpscan.io/advisories/erpscan-17-011-sap-gui-versions-remote-code-execution-bypass-security-policy/)
3. [96872](http://www.securityfocus.com/bid/96872) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-17408, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-17408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-17408
- **State**: PUBLISHED
- **Published Date**: September 10, 2020 at 16:35 UTC
- **Last Updated**: August 04, 2024 at 13:53 UTC
- **Reserved Date**: August 07, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive information on affected installations of NEC ExpressCluster 4.1. Authentication is not required to exploit this vulnerability. The specific flaw exists within the clpwebmc executable. Due to the improper restriction of XML External Entity (XXE) references, a specially-crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-10801.
### Weakness Classification (CWE)
- CWE-611: Security Weakness
### Affected Products
**NEC - ExpressCluster**
Affected versions:
- 4.1 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1102/)
2. [](https://www.support.nec.co.jp/en/View.aspx?id=9510100319)
### Credits
- rgod |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2872, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2872 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2872
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 13:29 UTC
- **Last Updated**: September 27, 2024 at 19:00 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle iSupport product of Oracle E-Business Suite (component: Profile). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iSupport. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iSupport, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iSupport accessible data as well as unauthorized update, insert or delete access to some of Oracle iSupport accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### Affected Products
**Oracle Corporation - iSupport**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1563, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1563
- **State**: PUBLISHED
- **Published Date**: February 22, 2024 at 14:56 UTC
- **Last Updated**: March 27, 2025 at 15:05 UTC
- **Reserved Date**: February 15, 2024 at 19:38 UTC
- **Assigned By**: mozilla
### Vulnerability Description
An attacker could have executed unauthorized scripts on top origin sites using a JavaScript URI when opening an external URL with a custom Firefox scheme and a timeout race condition. This vulnerability affects Focus for iOS < 122.
### Affected Products
**Mozilla - Focus for iOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1863831)
2. [](https://www.mozilla.org/security/advisories/mfsa2024-09/)
### Credits
- James Lee |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28843, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28843
- **State**: PUBLISHED
- **Published Date**: June 15, 2022 at 19:25 UTC
- **Last Updated**: April 23, 2025 at 18:13 UTC
- **Reserved Date**: April 08, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Bridge version 12.0.1 (and earlier versions) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Adobe - Bridge**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/bridge/apsb22-25.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4403, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4403
- **State**: PUBLISHED
- **Published Date**: May 09, 2025 at 08:24 UTC
- **Last Updated**: May 09, 2025 at 14:44 UTC
- **Reserved Date**: May 06, 2025 at 22:02 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Drag and Drop Multiple File Upload for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads in all versions up to, and including, 1.1.6 due to accepting a user‐supplied supported_type string and the uploaded filename without enforcing real extension or MIME checks within the upload() function. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**glenwpcoder - Drag and Drop Multiple File Upload for WooCommerce**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/933dd704-5a31-42a9-9b87-bf14a9d4ffa9?source=cve)
2. [](https://wordpress.org/plugins/drag-and-drop-multiple-file-upload-for-woocommerce/#developers)
3. [](https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-for-woocommerce/tags/1.1.6/inc/class-dnd-upload-wc.php#L360)
4. [](https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-for-woocommerce/tags/1.1.6/inc/class-dnd-upload-wc.php#L158)
5. [](https://plugins.trac.wordpress.org/changeset/3289478/)
### Credits
- RIN MIYACHI |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0521, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0521 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0521
- **State**: PUBLISHED
- **Published Date**: May 03, 2012 at 17:18 UTC
- **Last Updated**: August 06, 2024 at 18:30 UTC
- **Reserved Date**: January 11, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the PeopleSoft Enterprise HCM component in Oracle PeopleSoft Products 9.1 Bundle #9 allows remote authenticated users to affect confidentiality via unknown vectors related to Human Resources.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [53091](http://www.securityfocus.com/bid/53091)
2. [1026954](http://www.securitytracker.com/id?1026954)
3. [](http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html)
4. [48877](http://secunia.com/advisories/48877)
5. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1012, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1012
- **State**: PUBLISHED
- **Published Date**: April 12, 2018 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 03:44 UTC
- **Reserved Date**: December 01, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka "Microsoft Graphics Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1010, CVE-2018-1013, CVE-2018-1015, CVE-2018-1016.
### Affected Products
**Microsoft - Windows 7**
Affected versions:
- 32-bit Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows RT 8.1**
Affected versions:
- Windows RT 8.1 (Status: affected)
**Microsoft - Windows Server 2008**
Affected versions:
- 32-bit Systems Service Pack 2 (Status: affected)
- 32-bit Systems Service Pack 2 (Server Core installation) (Status: affected)
- Itanium-Based Systems Service Pack 2 (Status: affected)
- x64-based Systems Service Pack 2 (Status: affected)
- x64-based Systems Service Pack 2 (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 32-bit systems (Status: affected)
- x64-based systems (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2008 R2**
Affected versions:
- Itanium-Based Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Server Core installation) (Status: affected)
**Microsoft - Windows 10**
Affected versions:
- 32-bit Systems (Status: affected)
- Version 1511 for 32-bit Systems (Status: affected)
- Version 1511 for x64-based Systems (Status: affected)
- Version 1607 for 32-bit Systems (Status: affected)
- Version 1607 for x64-based Systems (Status: affected)
- Version 1703 for 32-bit Systems (Status: affected)
- Version 1703 for x64-based Systems (Status: affected)
- Version 1709 for 32-bit Systems (Status: affected)
- Version 1709 for x64-based Systems (Status: affected)
- x64-based Systems (Status: affected)
**Microsoft - Windows 10 Servers**
Affected versions:
- version 1709 (Server Core Installation) (Status: affected)
### References
1. [103597](http://www.securityfocus.com/bid/103597)
2. [1040656](http://www.securitytracker.com/id/1040656)
3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1012) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48343, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48343
- **State**: PUBLISHED
- **Published Date**: January 18, 2024 at 02:44 UTC
- **Last Updated**: August 02, 2024 at 21:23 UTC
- **Reserved Date**: November 15, 2023 at 08:11 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In video decoder, there is a possible out of bounds write due to improper input validation. This could lead to local denial of service with no additional execution privileges needed
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000**
Affected versions:
- Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2688, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2688 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2688
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: February 26, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29933, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29933
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 10:13 UTC
- **Last Updated**: August 08, 2024 at 19:25 UTC
- **Reserved Date**: March 21, 2024 at 17:46 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GhozyLab, Inc. Web Icons allows Stored XSS.This issue affects Web Icons: from n/a through 1.0.0.10.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**GhozyLab, Inc. - Web Icons**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/icon/wordpress-web-icons-plugin-1-0-0-10-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35673, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35673 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35673
- **State**: PUBLISHED
- **Published Date**: September 11, 2023 at 20:09 UTC
- **Last Updated**: September 26, 2024 at 14:33 UTC
- **Reserved Date**: June 15, 2023 at 02:50 UTC
- **Assigned By**: google_android
### Vulnerability Description
In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 13 (Status: affected)
- 12L (Status: affected)
- 12 (Status: affected)
- 11 (Status: affected)
### References
1. [](https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8770c07c102c7fdc74626dc717acc8f6dd1c92cc)
2. [](https://source.android.com/security/bulletin/2023-09-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8448, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8448
- **State**: PUBLISHED
- **Published Date**: December 10, 2014 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 13:18 UTC
- **Reserved Date**: October 22, 2014 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
An unspecified JavaScript API in Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X allows attackers to obtain sensitive information via unknown vectors, a different vulnerability than CVE-2014-8451.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://helpx.adobe.com/security/products/reader/apsb14-28.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21968, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21968
- **State**: PUBLISHED
- **Published Date**: February 04, 2022 at 22:29 UTC
- **Last Updated**: April 15, 2025 at 19:10 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A file write vulnerability exists in the OTA update task functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted MQTT payload can lead to arbitrary file overwrite. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - Sealevel**
Affected versions:
- Sealevel Systems, Inc. SeaConnect 370W v1.3.34 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1395) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0832, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0832 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0832
- **State**: REJECTED
- **Published Date**: January 24, 2020 at 21:14 UTC
- **Last Updated**: January 24, 2020 at 21:14 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7170, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7170 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7170
- **State**: PUBLISHED
- **Published Date**: December 10, 2016 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 01:50 UTC
- **Reserved Date**: September 08, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92904](http://www.securityfocus.com/bid/92904)
2. [](http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=167d97a3def77ee2dbf6e908b0ecbfe2103977db)
3. [openSUSE-SU-2016:3237](http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html)
4. [[qemu-devel] 20160908 [PATCH] vmsvga: correct bitmap and pixmap size checks](https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg01764.html)
5. [[oss-security] 20160909 Re: CVE Request Qemu: vmware_vga: OOB stack memory access when processing svga command](http://www.openwall.com/lists/oss-security/2016/09/09/7)
6. [[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html)
7. [[oss-security] 20160909 CVE Request Qemu: vmware_vga: OOB stack memory access when processing svga command](http://www.openwall.com/lists/oss-security/2016/09/09/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3052, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3052 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3052
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 17:10 UTC
- **Last Updated**: September 16, 2024 at 20:02 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: palo_alto
### Vulnerability Description
A reflected cross-site scripting (XSS) vulnerability in the Palo Alto Network PAN-OS web interface enables an authenticated network-based attacker to mislead another authenticated PAN-OS administrator to click on a specially crafted link that performs arbitrary actions in the PAN-OS web interface as the targeted authenticated administrator. This issue impacts: PAN-OS 8.1 versions earlier than 8.1.20; PAN-OS 9.0 versions earlier than 9.0.14; PAN-OS 9.1 versions earlier than 9.1.10; PAN-OS 10.0 versions earlier than 10.0.2. This issue does not affect Prisma Access.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Palo Alto Networks - PAN-OS**
Affected versions:
- 10.1.* (Status: unaffected)
- 9.0 (Status: affected)
- 8.1 (Status: affected)
- 9.1 (Status: affected)
- 10.0 (Status: affected)
### References
1. [](https://security.paloaltonetworks.com/CVE-2021-3052)
### Credits
- Palo Alto Networks thanks Cristian Mocanu and Dan Marin of Deloitte for discovering and reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2010, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2010 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2010
- **State**: REJECTED
- **Published Date**: January 05, 2018 at 14:00 UTC
- **Last Updated**: January 05, 2018 at 13:57 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6132
- **State**: PUBLISHED
- **Published Date**: September 01, 2020 at 14:24 UTC
- **Last Updated**: August 04, 2024 at 08:55 UTC
- **Reserved Date**: January 07, 2020 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
SQL injection vulnerability exists in the ID parameters of OS4Ed openSIS 7.3 pages. The id parameter in the page ChooseCP.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**n/a - OS4Ed**
Affected versions:
- OS4Ed openSIS 7.3 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1077) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3931, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3931
- **State**: PUBLISHED
- **Published Date**: July 31, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 18:48 UTC
- **Reserved Date**: July 31, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the daemon function in midirecord.cc in Tuomas Airaksinen Midirecord 2.0 allows local users to execute arbitrary code via a long command line argument (filename). NOTE: This may not be a vulnerability if Midirecord is not installed setuid.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060725 [ECHO_ADV_41$2006] BufferOverflow in Midirecord2](http://www.securityfocus.com/archive/1/441204/100/0/threaded)
2. [1303](http://securityreason.com/securityalert/1303)
3. [19190](http://www.securityfocus.com/bid/19190)
4. [midirecord-filename-bo(28047)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28047)
5. [](http://advisories.echo.or.id/adv/adv41-theday-2006.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20742
- **State**: PUBLISHED
- **Published Date**: April 16, 2020 at 19:23 UTC
- **Last Updated**: August 05, 2024 at 02:53 UTC
- **Reserved Date**: April 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NETGEAR WAC510 devices before 8.0.1.3 are affected by stored XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000060981/Security-Advisory-for-Stored-Cross-Site-Scripting-on-WAC510-PSV-2018-0627) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34602, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34602 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34602
- **State**: PUBLISHED
- **Published Date**: July 08, 2024 at 06:12 UTC
- **Last Updated**: August 02, 2024 at 02:59 UTC
- **Reserved Date**: May 07, 2024 at 04:43 UTC
- **Assigned By**: SamsungMobile
### Vulnerability Description
Use of implicit intent for sensitive communication in Samsung Messages prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information. User interaction is required for triggering this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N`
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- SMR Jul-2024 Release in Android 12, 13, 14 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4073, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4073 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4073
- **State**: PUBLISHED
- **Published Date**: November 24, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 06:54 UTC
- **Reserved Date**: November 24, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The printing functionality in Microsoft Internet Explorer 8 allows remote attackers to discover a local pathname, and possibly a local username, by reading the dc:title element of a PDF document that was generated from a local web page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20091123 Millions of PDF invisibly embedded with your internal disk paths](http://www.securityfocus.com/archive/1/508010/100/0/threaded)
2. [oval:org.mitre.oval:def:12355](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12355)
3. [60504](http://osvdb.org/60504)
4. [](http://securethoughts.com/2009/11/millions-of-pdf-invisibly-embedded-with-your-internal-disk-paths/)
5. [37362](http://secunia.com/advisories/37362)
6. [](http://www.theregister.co.uk/2009/11/23/internet_explorer_file_disclosure_bug/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49332, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49332 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49332
- **State**: PUBLISHED
- **Published Date**: October 20, 2024 at 08:10 UTC
- **Last Updated**: October 21, 2024 at 19:30 UTC
- **Reserved Date**: October 14, 2024 at 10:40 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Deserialization of Untrusted Data vulnerability in Giveaway Boost allows Object Injection.This issue affects Giveaway Boost: from n/a through 2.1.4.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Giveaway Boost - Giveaway Boost**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/giveaway-boost/wordpress-giveaway-boost-plugin-2-1-4-php-object-injection-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0420, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0420 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0420
- **State**: PUBLISHED
- **Published Date**: June 11, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:49 UTC
- **Reserved Date**: June 07, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vulnerability in PureTLS before 0.9b2 related to injection attacks, which could possibly allow remote attackers to corrupt or hijack user sessions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [puretls-injection-attack(8386)](http://www.iss.net/security_center/static/8386.php)
2. [4237](http://www.securityfocus.com/bid/4237)
3. [20020305 PureTLS Security Announcement: Upgrade to 0.9b2](http://archives.neohapsis.com/archives/bugtraq/2002-03/0056.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1113
- **State**: PUBLISHED
- **Published Date**: March 03, 2008 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 17:29 UTC
- **Reserved Date**: March 03, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cisco Unified Wireless IP Phone 7921, when using Protected Extensible Authentication Protocol (PEAP), does not validate server certificates, which allows remote wireless access points to steal hashed passwords and conduct man-in-the-middle (MITM) attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://blogs.zdnet.com/security/?p=896)
2. [20080223 Cisco confirms vulnerability in 7921 Wi-Fi IP phone](http://seclists.org/fulldisclosure/2008/Feb/0449.html)
3. [1019494](http://securitytracker.com/id?1019494)
4. [20080221 Cisco and Vocera wireless LAN VoIP devices don't check certificates](http://seclists.org/fulldisclosure/2008/Feb/0402.html)
5. [27935](http://www.securityfocus.com/bid/27935)
6. [](http://blogs.zdnet.com/security/?p=901)
7. [29082](http://secunia.com/advisories/29082) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37986, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37986 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37986
- **State**: PUBLISHED
- **Published Date**: May 20, 2025 at 17:09 UTC
- **Last Updated**: May 26, 2025 at 05:25 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: class: Invalidate USB device pointers on partner unregistration
To avoid using invalid USB device pointers after a Type-C partner
disconnects, this patch clears the pointers upon partner unregistration.
This ensures a clean state for future connections.
### Affected Products
**Linux - Linux**
Affected versions:
- 59de2a56d127890cc610f3896d5fc31887c54ac2 (Status: affected)
- 59de2a56d127890cc610f3896d5fc31887c54ac2 (Status: affected)
- 59de2a56d127890cc610f3896d5fc31887c54ac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.7 (Status: affected)
- 0 (Status: unaffected)
- 6.12.26 (Status: unaffected)
- 6.14.5 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/40966fc9939e85677fdb489dfddfa205baaad03b)
2. [](https://git.kernel.org/stable/c/74911338f47c13d1b9470fc50718182bffad42e2)
3. [](https://git.kernel.org/stable/c/66e1a887273c6b89f09bc11a40d0a71d5a081a8e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12362
- **State**: PUBLISHED
- **Published Date**: October 18, 2018 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 08:30 UTC
- **Reserved Date**: June 14, 2018 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
### Affected Products
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [GLSA-201810-01](https://security.gentoo.org/glsa/201810-01)
2. [](https://www.mozilla.org/security/advisories/mfsa2018-15/)
3. [RHSA-2018:2112](https://access.redhat.com/errata/RHSA-2018:2112)
4. [GLSA-201811-13](https://security.gentoo.org/glsa/201811-13)
5. [DSA-4235](https://www.debian.org/security/2018/dsa-4235)
6. [](https://www.mozilla.org/security/advisories/mfsa2018-18/)
7. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1452375)
8. [RHSA-2018:2113](https://access.redhat.com/errata/RHSA-2018:2113)
9. [](https://www.mozilla.org/security/advisories/mfsa2018-16/)
10. [DSA-4244](https://www.debian.org/security/2018/dsa-4244)
11. [104560](http://www.securityfocus.com/bid/104560)
12. [1041193](http://www.securitytracker.com/id/1041193)
13. [](https://www.mozilla.org/security/advisories/mfsa2018-19/)
14. [RHSA-2018:2252](https://access.redhat.com/errata/RHSA-2018:2252)
15. [](https://www.mozilla.org/security/advisories/mfsa2018-17/)
16. [[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html)
17. [RHSA-2018:2251](https://access.redhat.com/errata/RHSA-2018:2251)
18. [USN-3705-1](https://usn.ubuntu.com/3705-1/)
19. [USN-3714-1](https://usn.ubuntu.com/3714-1/)
20. [[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update](https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44491, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44491
- **State**: PUBLISHED
- **Published Date**: April 15, 2022 at 17:24 UTC
- **Last Updated**: August 04, 2024 at 04:25 UTC
- **Reserved Date**: December 01, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can cause a calculation of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c to result in an extremely large value in order to cause a segmentation fault and crash the application. This is a digs-- calculation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/YottaDB/DB/YDB/-/issues/828) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23955, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23955 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23955
- **State**: PUBLISHED
- **Published Date**: February 26, 2021 at 02:10 UTC
- **Last Updated**: August 03, 2024 at 19:14 UTC
- **Reserved Date**: January 13, 2021 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The browser could have been confused into transferring a pointer lock state into another tab, which could have lead to clickjacking attacks. This vulnerability affects Firefox < 85.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- < 85 (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2021-03/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1684837) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10267, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10267
- **State**: PUBLISHED
- **Published Date**: April 06, 2020 at 12:08 UTC
- **Last Updated**: September 16, 2024 at 23:52 UTC
- **Reserved Date**: March 10, 2020 at 00:00 UTC
- **Assigned By**: Alias
### Vulnerability Description
Universal Robots control box CB 3.1 across firmware versions (tested on 1.12.1, 1.12, 1.11 and 1.10) does not encrypt or protect in any way the intellectual property artifacts installed from the UR+ platform of hardware and software components (URCaps). These files (*.urcaps) are stored under '/root/.urcaps' as plain zip files containing all the logic to add functionality to the UR3, UR5 and UR10 robots. This flaw allows attackers with access to the robot or the robot network (while in combination with other flaws) to retrieve and easily exfiltrate all installed intellectual property.
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**Universal Robots - UR3, UR5 and UR10**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/aliasrobotics/RVD/issues/1489)
### Credits
- Víctor Mayoral Vilches <victor@aliasrobotics.com> |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35910, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35910 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35910
- **State**: PUBLISHED
- **Published Date**: May 19, 2024 at 08:35 UTC
- **Last Updated**: May 04, 2025 at 09:08 UTC
- **Reserved Date**: May 17, 2024 at 13:50 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
tcp: properly terminate timers for kernel sockets
We had various syzbot reports about tcp timers firing after
the corresponding netns has been dismantled.
Fortunately Josef Bacik could trigger the issue more often,
and could test a patch I wrote two years ago.
When TCP sockets are closed, we call inet_csk_clear_xmit_timers()
to 'stop' the timers.
inet_csk_clear_xmit_timers() can be called from any context,
including when socket lock is held.
This is the reason it uses sk_stop_timer(), aka del_timer().
This means that ongoing timers might finish much later.
For user sockets, this is fine because each running timer
holds a reference on the socket, and the user socket holds
a reference on the netns.
For kernel sockets, we risk that the netns is freed before
timer can complete, because kernel sockets do not hold
reference on the netns.
This patch adds inet_csk_clear_xmit_timers_sync() function
that using sk_stop_timer_sync() to make sure all timers
are terminated before the kernel socket is released.
Modules using kernel sockets close them in their netns exit()
handler.
Also add sock_not_owned_by_me() helper to get LOCKDEP
support : inet_csk_clear_xmit_timers_sync() must not be called
while socket lock is held.
It is very possible we can revert in the future commit
3a58f13a881e ("net: rds: acquire refcount on TCP sockets")
which attempted to solve the issue in rds only.
(net/smc/af_smc.c and net/mptcp/subflow.c have similar code)
We probably can remove the check_net() tests from
tcp_out_of_resources() and __tcp_close() in the future.
### Affected Products
**Linux - Linux**
Affected versions:
- 26abe14379f8e2fa3fd1bcf97c9a7ad9364886fe (Status: affected)
- 26abe14379f8e2fa3fd1bcf97c9a7ad9364886fe (Status: affected)
- 26abe14379f8e2fa3fd1bcf97c9a7ad9364886fe (Status: affected)
- 26abe14379f8e2fa3fd1bcf97c9a7ad9364886fe (Status: affected)
- 26abe14379f8e2fa3fd1bcf97c9a7ad9364886fe (Status: affected)
- 26abe14379f8e2fa3fd1bcf97c9a7ad9364886fe (Status: affected)
- 26abe14379f8e2fa3fd1bcf97c9a7ad9364886fe (Status: affected)
- 26abe14379f8e2fa3fd1bcf97c9a7ad9364886fe (Status: affected)
**Linux - Linux**
Affected versions:
- 4.2 (Status: affected)
- 0 (Status: unaffected)
- 4.19.312 (Status: unaffected)
- 5.4.274 (Status: unaffected)
- 5.10.215 (Status: unaffected)
- 5.15.154 (Status: unaffected)
- 6.1.85 (Status: unaffected)
- 6.6.26 (Status: unaffected)
- 6.8.5 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/93f0133b9d589cc6e865f254ad9be3e9d8133f50)
2. [](https://git.kernel.org/stable/c/44e62f5d35678686734afd47c6a421ad30772e7f)
3. [](https://git.kernel.org/stable/c/e3e27d2b446deb1f643758a0c4731f5c22492810)
4. [](https://git.kernel.org/stable/c/2e43d8eba6edd1cf05a3a20fdd77688fa7ec16a4)
5. [](https://git.kernel.org/stable/c/91b243de910a9ac8476d40238ab3dbfeedd5b7de)
6. [](https://git.kernel.org/stable/c/c1ae4d1e76eacddaacb958b67cd942082f800c87)
7. [](https://git.kernel.org/stable/c/899265c1389fe022802aae73dbf13ee08837a35a)
8. [](https://git.kernel.org/stable/c/151c9c724d05d5b0dd8acd3e11cb69ef1f2dbada) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29998, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29998 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29998
- **State**: PUBLISHED
- **Published Date**: March 13, 2025 at 11:23 UTC
- **Last Updated**: March 13, 2025 at 19:33 UTC
- **Reserved Date**: March 13, 2025 at 06:38 UTC
- **Assigned By**: CERT-In
### Vulnerability Description
This vulnerability exists in the CAP back office application due to missing rate limiting on OTP requests in an API endpoint. An authenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endpoint which could lead to the OTP bombing/flooding on the targeted system.
### Weakness Classification (CWE)
- CWE-799: Cross-site Scripting (XSS)
### Affected Products
**Rising Technosoft - CAP back office application**
Affected versions:
- <2.0.4 (Status: affected)
### References
1. [](https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0048)
### Credits
- This vulnerability is reported by Mohit Gadiya. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51498, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51498 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51498
- **State**: PUBLISHED
- **Published Date**: June 11, 2024 at 14:37 UTC
- **Last Updated**: August 02, 2024 at 22:32 UTC
- **Reserved Date**: December 20, 2023 at 15:33 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Woo WooCommerce Canada Post Shipping.This issue affects WooCommerce Canada Post Shipping: from n/a through 2.8.3.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Woo - WooCommerce Canada Post Shipping**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/woocommerce-shipping-canada-post/wordpress-woocommerce-canada-post-shipping-plugin-2-8-3-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22647
- **State**: PUBLISHED
- **Published Date**: February 23, 2021 at 03:13 UTC
- **Last Updated**: August 03, 2024 at 18:44 UTC
- **Reserved Date**: January 05, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to multiple out-of-bounds write issues while processing project files, which may allow an attacker to execute arbitrary code.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**n/a - Luxion KeyShot**
Affected versions:
- versions prior to 10.1 (Status: affected)
**n/a - Luxion KeyShot Viewer**
Affected versions:
- versions prior to 10.1 (Status: affected)
**n/a - Luxion KeyShot Network Rendering**
Affected versions:
- versions prior to 10.1 (Status: affected)
**n/a - Luxion KeyVR**
Affected versions:
- versions prior to 10.1 (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01)
2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-21-322/)
4. [](https://www.zerodayinitiative.com/advisories/ZDI-21-321/)
5. [](https://www.zerodayinitiative.com/advisories/ZDI-21-320/)
6. [](https://www.zerodayinitiative.com/advisories/ZDI-21-326/)
7. [](https://www.zerodayinitiative.com/advisories/ZDI-21-318/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3185, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3185 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3185
- **State**: PUBLISHED
- **Published Date**: October 17, 2018 at 01:00 UTC
- **Last Updated**: October 02, 2024 at 19:38 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.7.23 and prior (Status: affected)
- 8.0.12 and prior (Status: affected)
### References
1. [1041888](http://www.securitytracker.com/id/1041888)
2. [RHSA-2018:3655](https://access.redhat.com/errata/RHSA-2018:3655)
3. [USN-3799-1](https://usn.ubuntu.com/3799-1/)
4. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html)
5. [105594](http://www.securityfocus.com/bid/105594)
6. [](https://security.netapp.com/advisory/ntap-20181018-0002/)
7. [RHSA-2019:1258](https://access.redhat.com/errata/RHSA-2019:1258)
8. [GLSA-201908-24](https://security.gentoo.org/glsa/201908-24) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0899, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0899 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0899
- **State**: PUBLISHED
- **Published Date**: June 03, 2009 at 16:33 UTC
- **Last Updated**: August 07, 2024 at 04:48 UTC
- **Reserved Date**: March 14, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM WebSphere Application Server (WAS) 6.1 through 6.1.0.24 and 7.0 through 7.0.0.4, IBM WebSphere Portal Server 5.1 through 6.0, and IBM Integrated Solutions Console (ISC) 6.0.1 do not properly set the IsSecurityEnabled security flag during migration of WebSphere Member Manager (WMM) to Virtual Member Manager (VMM) and a Federated Repository, which allows attackers to obtain sensitive information from repositories via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35406](http://www.securityfocus.com/bid/35406)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21375859)
3. [websphere-issecurityenabled-info-disclosure(50882)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50882)
4. [PK78134](http://www-1.ibm.com/support/docview.wss?uid=swg1PK78134) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30120, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30120 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30120
- **State**: PUBLISHED
- **Published Date**: June 24, 2022 at 15:00 UTC
- **Last Updated**: August 03, 2024 at 06:40 UTC
- **Reserved Date**: May 02, 2022 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
XSS in /dashboard/blocks/stacks/view_details/ - old browsers only. When using an older browser with built-in XSS protection disabled, insufficient sanitation where built urls are outputted can be exploited for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 to allow XSS. This cannot be exploited in modern-day web browsers due to an automatic input escape mechanism. Concrete CMS Security team ranked this vulnerability 3.1with CVSS v3.1 Vector AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N. Sanitation has been added where built urls are output. Credit to Credit to Bogdan Tiron from FORTBRIDGE (https://www.fortbridge.co.uk/ ) for reporting
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - https://github.com/concrete5/concrete5**
Affected versions:
- Remediated in Concrete CMS 8.5.8 and 9.1.0. Affected Versions are Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 (Status: affected)
### References
1. [](https://documentation.concretecms.org/developers/introduction/version-history/910-release-notes)
2. [](https://documentation.concretecms.org/developers/introduction/version-history/858-release-notes)
3. [](https://hackerone.com/reports/1363598) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17431, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17431 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17431
- **State**: PUBLISHED
- **Published Date**: October 10, 2019 at 11:15 UTC
- **Last Updated**: August 05, 2024 at 01:40 UTC
- **Reserved Date**: October 10, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in fastadmin 1.0.0.20190705_beta. There is a public/index.php/admin/auth/admin/add CSRF vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Imanfeng/fastadmin/blob/master/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34961, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34961 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34961
- **State**: PUBLISHED
- **Published Date**: June 08, 2023 at 00:00 UTC
- **Last Updated**: January 06, 2025 at 20:29 UTC
- **Reserved Date**: June 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Chamilo v1.11.x up to v1.11.18 was discovered to contain a cross-site scripting (XSS) vulnerability via the /feedback/comment field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-105-2023-04-15-Low-impact-Moderate-risk-XSS-in-student-work-comments)
2. [](https://github.com/chamilo/chamilo-lms/commit/80d1a8c9063a20f286b0195ef537c84a1a11875a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0086, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0086
- **State**: PUBLISHED
- **Published Date**: January 05, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 12:03 UTC
- **Reserved Date**: January 05, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Apache HTTP Server, when accessed through a TCP connection with a large window size, allows remote attackers to cause a denial of service (network bandwidth consumption) via a Range header that specifies multiple copies of the same fragment. NOTE: the severity of this issue has been disputed by third parties, who state that the large window size required by the attack is not normally supported or configured by the server, or that a DDoS-style attack would accomplish the same goal
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33456](http://osvdb.org/33456)
2. [20070104 Re: a cheesy Apache / IIS DoS vuln (+a question)](http://www.securityfocus.com/archive/1/455920/100/0/threaded)
3. [20070104 Re: a cheesy Apache / IIS DoS vuln (+a question)](http://www.securityfocus.com/archive/1/455879/100/0/threaded)
4. [20070103 a cheesy Apache / IIS DoS vuln (+a question)](http://www.securityfocus.com/archive/1/455833/100/0/threaded)
5. [20070104 Re: a cheesy Apache / IIS DoS vuln (+a question)](http://www.securityfocus.com/archive/1/455882/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-25011, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-25011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-25011
- **State**: PUBLISHED
- **Published Date**: May 21, 2021 at 16:25 UTC
- **Last Updated**: August 05, 2024 at 12:26 UTC
- **Reserved Date**: May 04, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in PutLE16().
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**n/a - libwebp**
Affected versions:
- libwebp 1.0.1 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1956919)
2. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9119)
3. [](https://chromium.googlesource.com/webm/libwebp/+/v1.0.1)
4. [](https://chromium.googlesource.com/webm/libwebp/+log/be738c6d396fa5a272c1b209be4379a7532debfe..29fb8562c60b5a919a75d904ff7366af423f8ab9?pretty=fuller&n=10000) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5373, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5373 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5373
- **State**: PUBLISHED
- **Published Date**: November 28, 2012 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 21:05 UTC
- **Reserved Date**: October 10, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Oracle Java SE 7 and earlier, and OpenJDK 7 and earlier, computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash3 algorithm, a different vulnerability than CVE-2012-2739.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdf)
2. [56673](http://www.securityfocus.com/bid/56673)
3. [](https://www.131002.net/data/talks/appsec12_slides.pdf)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=880705)
5. [](http://2012.appsec-forum.ch/conferences/#c17)
6. [java-murmur-hash-dos(80299)](https://exchange.xforce.ibmcloud.com/vulnerabilities/80299)
7. [](http://www.ocert.org/advisories/ocert-2012-001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4640, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4640
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:42 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0213, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0213 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0213
- **State**: PUBLISHED
- **Published Date**: February 02, 2013 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 14:18 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a (1) FRAME or (2) IFRAME element.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.samba.org/samba/security/CVE-2013-0213)
2. [SUSE-SU-2013:0326](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html)
3. [openSUSE-SU-2013:0281](http://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html)
4. [57631](http://www.securityfocus.com/bid/57631)
5. [openSUSE-SU-2013:0277](http://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html)
6. [SUSE-SU-2013:0519](http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html)
7. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993)
8. [RHSA-2014:0305](http://rhn.redhat.com/errata/RHSA-2014-0305.html)
9. [USN-2922-1](http://www.ubuntu.com/usn/USN-2922-1)
10. [DSA-2617](http://www.debian.org/security/2013/dsa-2617)
11. [RHSA-2013:1310](http://rhn.redhat.com/errata/RHSA-2013-1310.html)
12. [RHSA-2013:1542](http://rhn.redhat.com/errata/RHSA-2013-1542.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1720
- **State**: PUBLISHED
- **Published Date**: April 18, 2019 at 00:20 UTC
- **Last Updated**: November 21, 2024 at 19:39 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the XML API of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to cause the CPU to increase to 100% utilization, causing a denial of service (DoS) condition on an affected system. The vulnerability is due to improper handling of the XML input. An attacker could exploit this vulnerability by sending a specifically crafted XML payload. A successful exploit could allow the attacker to exhaust CPU resources, resulting in a DoS condition until the system is manually rebooted. Software versions prior to X12.5.1 are affected.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Cisco - Cisco TelePresence Video Communication Server (VCS)**
Affected versions:
- unspecified (Status: affected)
### References
1. [20190417 Cisco Expressway Series and Cisco TelePresence Video Communication Server Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-ces-tvcs-dos)
2. [108002](http://www.securityfocus.com/bid/108002) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4331, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4331
- **State**: PUBLISHED
- **Published Date**: May 01, 2024 at 12:50 UTC
- **Last Updated**: February 13, 2025 at 17:53 UTC
- **Reserved Date**: April 29, 2024 at 21:45 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Picture In Picture in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 124.0.6367.118 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html)
2. [](https://issues.chromium.org/issues/335003891)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/)
6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/)
7. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9588, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9588
- **State**: PUBLISHED
- **Published Date**: February 12, 2019 at 00:00 UTC
- **Last Updated**: September 17, 2024 at 02:16 UTC
- **Reserved Date**: April 05, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In avdt_scb_hdl_report of avdt_scb_act.cc in Android-7.0, Android-7.1.1, Android-7.1.2, Android-8.0, Android-8.1 and Android-9, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Android ID: A-111450156.
### Affected Products
**Android - Android**
Affected versions:
- Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 (Status: affected)
### References
1. [106495](http://www.securityfocus.com/bid/106495)
2. [](https://source.android.com/security/bulletin/2019-01-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2676, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2676
- **State**: PUBLISHED
- **Published Date**: August 23, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:45 UTC
- **Reserved Date**: August 23, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in displayimage.php in Coppermine Photo Gallery before 1.3.4 allows remote attackers to inject arbitrary web script or HTML via EXIF data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://coppermine-gallery.net/forum/index.php?topic=20933.0)
2. [16499](http://secunia.com/advisories/16499)
3. [1014799](http://securitytracker.com/id?1014799)
4. [14625](http://www.securityfocus.com/bid/14625) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41861, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41861 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41861
- **State**: PUBLISHED
- **Published Date**: September 26, 2023 at 07:41 UTC
- **Last Updated**: September 23, 2024 at 20:04 UTC
- **Reserved Date**: September 04, 2023 at 10:33 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Restrict plugin <= 2.2.4 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Restrict - Restrict**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/restricted-content/wordpress-restrict-membership-site-content-and-user-access-restrictions-for-wordpress-plugin-2-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- thiennv (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9310, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9310
- **State**: PUBLISHED
- **Published Date**: September 27, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 21:46 UTC
- **Reserved Date**: February 28, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In libFDK, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112891546
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4892, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4892 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4892
- **State**: PUBLISHED
- **Published Date**: October 21, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 11:27 UTC
- **Reserved Date**: July 10, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The uControl Smart Home Automation (aka de.ucontrol) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
2. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
3. [VU#200753](http://www.kb.cert.org/vuls/id/200753) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21260
- **State**: PUBLISHED
- **Published Date**: July 13, 2023 at 00:01 UTC
- **Last Updated**: October 30, 2024 at 18:54 UTC
- **Reserved Date**: November 03, 2022 at 22:37 UTC
- **Assigned By**: google_android
### Vulnerability Description
In notification access permission dialog box, malicious application can embedded a very long service label that overflow the original user prompt and possibly contains mis-leading information to be appeared as a system message for user confirmation.
### Affected Products
**Google - Android**
Affected versions:
- 13, 12L, 12, 11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/aaos/2023-07-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-18657, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-18657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-18657
- **State**: PUBLISHED
- **Published Date**: June 23, 2021 at 18:43 UTC
- **Last Updated**: August 04, 2024 at 14:00 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vulnerability in GetSimpleCMS <= 3.3.15 in admin/changedata.php via the redirect_url parameter and the headers_sent function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1310)
2. [](https://github.com/LoRexxar/CVE_Request/blob/master/getsimplecms%20v3.3.15/getsimplecms_before_v3.3.15.md)
3. [](https://www.seebug.org/vuldb/ssvid-97929) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40810, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40810 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40810
- **State**: PUBLISHED
- **Published Date**: October 24, 2024 at 16:40 UTC
- **Last Updated**: October 29, 2024 at 20:45 UTC
- **Reserved Date**: July 10, 2024 at 17:11 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6. An app may be able to cause a coprocessor crash.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/120911) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45020
- **State**: PUBLISHED
- **Published Date**: December 05, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 13:53 UTC
- **Reserved Date**: November 07, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Rukovoditel v3.2.1 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability in the component /rukovoditel/index.php?module=users/login. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/rukovoditel.net/2022/rukovoditel-3.2.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0246, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0246 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0246
- **State**: PUBLISHED
- **Published Date**: January 22, 2010 at 21:20 UTC
- **Last Updated**: August 07, 2024 at 00:45 UTC
- **Reserved Date**: January 07, 2010 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3671, CVE-2009-3674, and CVE-2010-0245.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:8378](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8378)
2. [ie-deleted-object-code-exec(55776)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55776)
3. [MS10-002](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38510, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38510 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38510
- **State**: PUBLISHED
- **Published Date**: August 28, 2022 at 23:58 UTC
- **Last Updated**: August 03, 2024 at 10:54 UTC
- **Reserved Date**: August 22, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda_TX9pro V22.03.02.10 was discovered to contain a buffer overflow via the component httpd/SetNetControlList.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/whiter6666/CVE/blob/main/Tenda_TX9pro/SetNetControlList.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-5326, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-5326 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-5326
- **State**: PUBLISHED
- **Published Date**: May 13, 2016 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 00:30 UTC
- **Reserved Date**: April 10, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
imlib2 before 1.4.9 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) by drawing a 2x1 ellipse.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.enlightenment.org/legacy/imlib2.git/commit/?id=c94d83ccab15d5ef02f88d42dce38ed3f0892882)
2. [[Enlightenment-announce] 20160501 imlib2 1.4.9](https://sourceforge.net/p/enlightenment/mailman/message/35055012/)
3. [DSA-3555](http://www.debian.org/security/2016/dsa-3555)
4. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=639414)
5. [openSUSE-SU-2016:1330](http://lists.opensuse.org/opensuse-updates/2016-05/msg00076.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24598, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24598 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24598
- **State**: PUBLISHED
- **Published Date**: May 29, 2023 at 00:00 UTC
- **Last Updated**: January 14, 2025 at 15:19 UTC
- **Reserved Date**: January 29, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OX App Suite before backend 7.10.6-rev37 has an information leak in the handling of distribution lists, e.g., partial disclosure of the private contacts of another user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://open-xchange.com)
2. [](http://seclists.org/fulldisclosure/2023/May/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10223, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10223 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10223
- **State**: PUBLISHED
- **Published Date**: February 14, 2017 at 06:30 UTC
- **Last Updated**: August 06, 2024 at 03:14 UTC
- **Reserved Date**: February 12, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in BigTree CMS before 4.2.15. The vulnerability exists due to insufficient filtration of user-supplied data in the "id" HTTP GET parameter passed to the "core/admin/adjax/dashboard/check-module-integrity.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/bigtreecms/BigTree-CMS/blob/master/README.md)
2. [](https://github.com/bigtreecms/BigTree-CMS/commit/59ebef5978f80e2fdc7b4db4a28b668c5a39fbc3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41702, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41702 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41702
- **State**: PUBLISHED
- **Published Date**: July 30, 2024 at 09:18 UTC
- **Last Updated**: August 02, 2024 at 04:46 UTC
- **Reserved Date**: July 21, 2024 at 07:20 UTC
- **Assigned By**: INCD
### Vulnerability Description
SiberianCMS - CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SiberianCMS - SiberianCMS v5.0.8**
Affected versions:
- version 5.0.8 (Status: affected)
### References
1. [](https://www.gov.il/en/Departments/faq/cve_advisories)
### Credits
- Yotam Zaltsman |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8285, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8285 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8285
- **State**: PUBLISHED
- **Published Date**: October 25, 2016 at 14:00 UTC
- **Last Updated**: October 10, 2024 at 18:12 UTC
- **Reserved Date**: September 26, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the PeopleSoft Enterprise HCM component in Oracle PeopleSoft Products 9.2 allows remote administrators to affect confidentiality and integrity via vectors related to Candidate Gateway.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html)
2. [93723](http://www.securityfocus.com/bid/93723)
3. [1037046](http://www.securitytracker.com/id/1037046) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1959, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1959 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1959
- **State**: PUBLISHED
- **Published Date**: June 14, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:06 UTC
- **Reserved Date**: June 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
jammail.pl in jamchen JamMail 1.8 allows remote attackers to execute arbitrary commands via shell metacharacters in the mail parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1014175](http://securitytracker.com/id?1014175)
2. [13937](http://www.securityfocus.com/bid/13937) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2045, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2045
- **State**: PUBLISHED
- **Published Date**: January 20, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 09:58 UTC
- **Reserved Date**: February 19, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the old and new interfaces in Viprinet Multichannel VPN Router 300 allow remote attackers to inject arbitrary web script or HTML via the username when (1) logging in or (2) creating an account in the old interface, (3) username when creating an account in the new interface, (4) hostname in the old interface, (5) inspect parameter in the config module, (6) commands parameter in the atcommands tool, or (7) host parameter in the ping tool.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2045/)
2. [39407](https://www.exploit-db.com/exploits/39407/)
3. [20160203 Security Advisories](http://www.securityfocus.com/archive/1/537441/100/0/threaded)
4. [](http://packetstormsecurity.com/files/135613/Viprinet-Multichannel-VPN-Router-300-Cross-Site-Scripting.html)
5. [20160203 Security Advisories](http://seclists.org/fulldisclosure/2016/Feb/8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6167
- **State**: REJECTED
- **Last Updated**: February 11, 2025 at 01:06 UTC
- **Reserved Date**: November 15, 2023 at 20:30 UTC
- **Assigned By**: GitLab
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7125, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7125 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7125
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 16, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3007, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3007 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3007
- **State**: PUBLISHED
- **Published Date**: October 31, 2023 at 11:18 UTC
- **Last Updated**: August 03, 2024 at 00:53 UTC
- **Reserved Date**: August 26, 2022 at 09:47 UTC
- **Assigned By**: CERT-In
### Vulnerability Description
The vulnerability exists in Syska SW100 Smartwatch due to an improper implementation and/or configuration of Nordic Device Firmware Update (DFU) which is used for performing Over-The-Air (OTA) firmware updates on the Bluetooth Low Energy (BLE) devices. An unauthenticated attacker could exploit this vulnerability by setting arbitrary values to handle on the vulnerable device over Bluetooth.
Successful exploitation of this vulnerability could allow the attacker to perform firmware update, device reboot or data manipulation on the target device.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Syska Led Lights Pvt Ltd - Syska SW100 Smartwatch**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0333)
### Credits
- This vulnerability is reported by Shakir Zari from Payatu Security Consulting Pvt Ltd., Maharashtra, India. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3964, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3964 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3964
- **State**: PUBLISHED
- **Published Date**: December 02, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:31 UTC
- **Reserved Date**: December 02, 2005 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple buffer overflows in libUil (libUil.so) in OpenMotif 2.2.3, and possibly other versions, allows attackers to execute arbitrary code via the (1) diag_issue_diagnostic function in UilDiags.c and (2) open_source_file function in UilSrcSrc.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2006:0272](http://www.redhat.com/support/errata/RHSA-2006-0272.html)
2. [20051202 [xfocus-SD-051202]openMotif libUil Multiple vulnerability](http://www.securityfocus.com/archive/1/418459/100/0/threaded)
3. [oval:org.mitre.oval:def:9393](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9393)
4. [1015303](http://securitytracker.com/id?1015303)
5. [20051201 [xfocus-SD-051202]openMotif-libUil-Multiple_vulnerability](http://marc.info/?l=full-disclosure&m=113349242925897&w=2)
6. [openmotif-opensourcefile-bo(23389)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23389)
7. [ADV-2005-2709](http://www.vupen.com/english/advisories/2005/2709)
8. [openmotif-diagissuediagnostic-bo(23388)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23388)
9. [RHSA-2008:0261](http://www.redhat.com/support/errata/RHSA-2008-0261.html)
10. [15686](http://www.securityfocus.com/bid/15686)
11. [15684](http://www.securityfocus.com/bid/15684) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0078, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0078 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0078
- **State**: PUBLISHED
- **Published Date**: May 14, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 09:05 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The CatalogController in Red Hat CloudForms Management Engine (CFME) before 5.2.3.2 allows remote authenticated users to delete arbitrary catalogs via vectors involving guessing the catalog ID.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2014:0469](http://rhn.redhat.com/errata/RHSA-2014-0469.html)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1064556) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15570, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15570 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15570
- **State**: PUBLISHED
- **Published Date**: October 18, 2017 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 19:57 UTC
- **Reserved Date**: October 17, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Redmine before 3.2.8, 3.3.x before 3.3.5, and 3.4.x before 3.4.3, XSS exists in app/views/timelog/_list.html.erb via crafted column data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.redmine.org/projects/redmine/wiki/Security_Advisories)
2. [](https://github.com/redmine/redmine/commit/1a0976417975a128b0a932ba1552c37e9414953b)
3. [DSA-4191](https://www.debian.org/security/2018/dsa-4191)
4. [](https://www.redmine.org/issues/27186) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0475, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0475
- **State**: PUBLISHED
- **Published Date**: September 18, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:21 UTC
- **Reserved Date**: May 24, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
index.php in Jelsoft vBulletin does not properly initialize a PHP variable that is used to store template information, which allows remote attackers to execute arbitrary PHP code via special characters in the templatecache parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.vbulletin.com/forum/showthread.php?s=b20af207b5b908ecf7a4ecf56fbe3cd3&threadid=10839)
2. [vbulletin-php-elevate-privileges(6237)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6237)
3. [20010315 vBulletin allows arbitrary code execution](http://archives.neohapsis.com/archives/bugtraq/2001-03/0180.html)
4. [2474](http://www.securityfocus.com/bid/2474) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5118, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5118 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5118
- **State**: PUBLISHED
- **Published Date**: July 09, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 06:32 UTC
- **Reserved Date**: June 26, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3135 and CVE-2015-4432.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [75592](http://www.securityfocus.com/bid/75592)
2. [1032810](http://www.securitytracker.com/id/1032810)
3. [SUSE-SU-2015:1211](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html)
4. [RHSA-2015:1214](http://rhn.redhat.com/errata/RHSA-2015-1214.html)
5. [SUSE-SU-2015:1214](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html)
6. [GLSA-201507-13](https://security.gentoo.org/glsa/201507-13)
7. [](https://helpx.adobe.com/security/products/flash-player/apsb15-16.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5780, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5780 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5780
- **State**: PUBLISHED
- **Published Date**: September 09, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 11:55 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Bouncy Bill (aka mominis.Generic_Android.Bouncy_Bill) application 1.9.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#325361](http://www.kb.cert.org/vuls/id/325361)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24533, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24533 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24533
- **State**: PUBLISHED
- **Published Date**: April 15, 2022 at 19:03 UTC
- **Last Updated**: January 02, 2025 at 18:51 UTC
- **Reserved Date**: February 05, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Remote Desktop Protocol Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Remote Desktop Protocol Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24533) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22287, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22287
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 17:56 UTC
- **Last Updated**: May 20, 2025 at 13:10 UTC
- **Reserved Date**: January 03, 2025 at 13:15 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Eniture Technology LTL Freight Quotes – FreightQuote Edition allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LTL Freight Quotes – FreightQuote Edition: from n/a through 2.3.11.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Eniture Technology - LTL Freight Quotes – FreightQuote Edition**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/ltl-freight-quotes-freightquote-edition/vulnerability/wordpress-ltl-freight-quotes-freightquote-edition-plugin-2-3-11-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12360, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12360 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12360
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 05:00 UTC
- **Last Updated**: December 09, 2024 at 19:51 UTC
- **Reserved Date**: December 08, 2024 at 20:45 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in code-projects Online Class and Exam Scheduling System 1.0. It has been rated as critical. This issue affects some unknown processing of the file class_update.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**code-projects - Online Class and Exam Scheduling System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-287279 | code-projects Online Class and Exam Scheduling System class_update.php sql injection](https://vuldb.com/?id.287279)
2. [VDB-287279 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.287279)
3. [Submit #458891 | code-projects Online Class and Exam Scheduling System 11 SQL Injection](https://vuldb.com/?submit.458891)
4. [](https://github.com/bjtyyy/CVE/blob/main/Online%20Class%20and%20Exam%20Scheduling%20System.docx)
5. [](https://code-projects.org/)
### Credits
- T123 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2327, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2327 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2327
- **State**: PUBLISHED
- **Published Date**: December 02, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 05:10 UTC
- **Reserved Date**: March 18, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PCRE before 8.36 mishandles the /(((a\2)|(a*)\g<-1>))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20151128 Re: Heap Overflow in PCRE](http://www.openwall.com/lists/oss-security/2015/11/29/1)
2. [](http://www.fortiguard.com/advisory/FG-VD-15-010/)
3. [74924](http://www.securityfocus.com/bid/74924)
4. [RHSA-2016:2750](http://rhn.redhat.com/errata/RHSA-2016-2750.html)
5. [](https://bugs.exim.org/show_bug.cgi?id=1503)
6. [](https://jira.mongodb.org/browse/SERVER-17252)
7. [](http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7247, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7247 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7247
- **State**: PUBLISHED
- **Published Date**: November 26, 2014 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 12:40 UTC
- **Reserved Date**: September 30, 2014 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Unspecified vulnerability in JustSystems Ichitaro 2008 through 2011; Ichitaro Government 6, 7, 2008, 2009, and 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; and Ichitaro 2014 Tetsu allows remote attackers to execute arbitrary code via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVN#16318793](http://jvn.jp/en/jp/JVN16318793/index.html)
2. [JVNDB-2014-000131](http://jvndb.jvn.jp/jvndb/JVNDB-2014-000131)
3. [](http://www.justsystems.com/jp/info/js14003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3365, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3365
- **State**: PUBLISHED
- **Published Date**: August 07, 2023 at 14:31 UTC
- **Last Updated**: October 10, 2024 at 20:20 UTC
- **Reserved Date**: June 22, 2023 at 08:51 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The MultiParcels Shipping For WooCommerce WordPress plugin before 1.14.14 does not have authorisation when deleting shipment, allowing any authenticated users, such as subscriber to delete arbitrary shipment
### Weakness Classification (CWE)
- CWE-862 Missing Authorization: Missing Authorization
### Affected Products
**Unknown - MultiParcels Shipping For WooCommerce**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/21ce5baa-8085-4053-8d8b-f7d3e2ae70c1)
### Credits
- Erwan LR (WPScan)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34793, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34793
- **State**: PUBLISHED
- **Published Date**: October 27, 2021 at 18:56 UTC
- **Last Updated**: November 07, 2024 at 21:45 UTC
- **Reserved Date**: June 15, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the TCP Normalizer of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software operating in transparent mode could allow an unauthenticated, remote attacker to poison MAC address tables, resulting in a denial of service (DoS) vulnerability. This vulnerability is due to incorrect handling of certain TCP segments when the affected device is operating in transparent mode. An attacker could exploit this vulnerability by sending a crafted TCP segment through an affected device. A successful exploit could allow the attacker to poison the MAC address tables in adjacent devices, resulting in network disruption.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-924: Security Weakness
### Affected Products
**Cisco - Cisco Adaptive Security Appliance (ASA) Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20211027 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Transparent Mode Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dos-JxYWMJyL) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20888, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20888 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20888
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 14:18 UTC
- **Last Updated**: January 07, 2025 at 14:56 UTC
- **Reserved Date**: November 01, 2022 at 15:41 UTC
- **Assigned By**: vmware
### Vulnerability Description
Aria Operations for Networks contains an authenticated deserialization vulnerability. A malicious actor with network access to VMware Aria Operations for Networks and valid 'member' role credentials may be able to perform a deserialization attack resulting in remote code execution.
### Affected Products
**n/a - Aria Operations for Networks (Formerly vRealize Network Insight)**
Affected versions:
- Aria Operations for Networks (Formerly vRealize Network Insight) 6.x (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2023-0012.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38041, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38041 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38041
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 00:24 UTC
- **Last Updated**: March 07, 2025 at 18:23 UTC
- **Reserved Date**: July 12, 2023 at 01:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A logged in user may elevate its permissions by abusing a Time-of-Check to Time-of-Use (TOCTOU) race condition. When a particular process flow is initiated, an attacker can exploit this condition to gain unauthorized elevated privileges on the affected system.
### Affected Products
**Ivanti - Secure Access Client**
Affected versions:
- 22.6R1 (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/CVE-2023-38041-New-client-side-release-to-address-a-privilege-escalation-on-Windows-user-machines?language=en_US) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0717, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0717 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0717
- **State**: PUBLISHED
- **Published Date**: May 07, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:28 UTC
- **Reserved Date**: September 19, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GoodTech FTP server allows remote attackers to cause a denial of service via a large number of RNTO commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20000830 [EXPL] GoodTech's FTP Server vulnerable to a DoS (RNTO)](http://www.securityfocus.com/templates/archive.pike?list=1&msg=02ff01c0124c%24e9387660%240201a8c0%40aviram)
2. [1619](http://www.securityfocus.com/bid/1619)
3. [ftp-goodtech-rnto-dos(5166)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5166) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10772, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10772 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10772
- **State**: PUBLISHED
- **Published Date**: July 05, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 17:50 UTC
- **Reserved Date**: July 01, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!memcmp+0x0000000000000018" (with RPC initialization).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-10772) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1358
- **State**: PUBLISHED
- **Published Date**: March 12, 2023 at 07:31 UTC
- **Last Updated**: August 02, 2024 at 05:41 UTC
- **Reserved Date**: March 12, 2023 at 07:13 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in SourceCodester Gadget Works Online Ordering System 1.0. This affects an unknown part of the file /philosophy/admin/login.php of the component POST Parameter Handler. The manipulation of the argument user_email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222861 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Gadget Works Online Ordering System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.222861)
2. [](https://vuldb.com/?ctiid.222861)
3. [](https://github.com/heitaoa999/bug_report/blob/main/vendors/janobe/Gadget%20Works%20Online%20Ordering%20System/SQLi-1.md)
### Credits
- heitaoa999 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33056
- **State**: PUBLISHED
- **Published Date**: August 12, 2021 at 20:54 UTC
- **Last Updated**: August 03, 2024 at 23:42 UTC
- **Reserved Date**: May 17, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Belledonne Belle-sip before 4.5.20, as used in Linphone and other products, can crash via an invalid From header in a SIP message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BelledonneCommunications/belle-sip/commit/116e3eb48fe43ea63eb9f3c4b4b30c48d58d6ff0)
2. [](https://github.com/BelledonneCommunications/belle-sip/compare/4.5.15...4.5.20) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40289, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40289 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40289
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 14:58 UTC
- **Reserved Date**: August 14, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A command injection issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker can exploit this to elevate privileges from a user with BMC administrative privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.supermicro.com/en/support/security_center#%21advisories)
2. [](https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3893, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3893
- **State**: PUBLISHED
- **Published Date**: November 12, 2010 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 03:26 UTC
- **Reserved Date**: October 12, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The administrator interface in IBM OmniFind Enterprise Edition 8.x and 9.x does not restrict use of a session ID (aka SID) value to a single IP address, which allows remote attackers to perform arbitrary administrative actions by leveraging cookie theft, related to a "session impersonation" issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20101109 IBM OmniFind - several vulnerabilities](http://www.securityfocus.com/archive/1/514688/100/0/threaded)
2. [44740](http://www.securityfocus.com/bid/44740)
3. [](http://security.fatihkilic.de/advisory/fkilic-sa-2010-ibm-omnifind.txt)
4. [ADV-2010-2933](http://www.vupen.com/english/advisories/2010/2933) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0582, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0582 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0582
- **State**: PUBLISHED
- **Published Date**: November 11, 2014 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 09:20 UTC
- **Reserved Date**: December 20, 2013 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0589.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [71039](http://www.securityfocus.com/bid/71039)
2. [](http://helpx.adobe.com/security/products/flash-player/apsb14-24.html)
3. [openSUSE-SU-2015:0725](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27085, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27085 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27085
- **State**: PUBLISHED
- **Published Date**: April 08, 2025 at 16:29 UTC
- **Last Updated**: April 09, 2025 at 17:45 UTC
- **Reserved Date**: February 18, 2025 at 14:05 UTC
- **Assigned By**: hpe
### Vulnerability Description
Multiple vulnerabilities exist in the web-based management interface of AOS-10 GW and AOS-8 Controller/Mobility Conductor. Successful exploitation of these vulnerabilities could allow an authenticated, remote attacker to download arbitrary files from the filesystem of an affected device.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Hewlett Packard Enterprise (HPE) - HPE Aruba Networking AOS**
Affected versions:
- 10.7.0.0 (Status: affected)
- 10.4.0.0 (Status: affected)
- 8.12.0.0 (Status: affected)
- 8.10.0.0 (Status: affected)
### References
1. [](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04845en_us&docLocale=en_US)
### Credits
- ZZ from Moonlight Bug Hunter
- LIUPENG |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.