System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3076
- **State**: PUBLISHED
- **Published Date**: April 24, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 23:40 UTC
- **Reserved Date**: March 10, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Heap-based buffer overflow in the j2k_encode_entry function in Pillow 2.5.0 through 3.1.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted Jpeg2000 file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://pillow.readthedocs.io/en/4.1.x/releasenotes/3.1.2.html)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1321929)
3. [98042](http://www.securityfocus.com/bid/98042) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7028
- **State**: PUBLISHED
- **Published Date**: August 21, 2009 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 11:49 UTC
- **Reserved Date**: August 21, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
RPG.Board 0.8 Beta2 and earlier allows remote attackers to bypass authentication and gain privileges by setting the keep4u cookie to a certain value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [rpgboard-keep4u-security-bypass(45501)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45501)
2. [31466](http://www.securityfocus.com/bid/31466)
3. [6591](https://www.exploit-db.com/exploits/6591) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2034, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2034
- **State**: PUBLISHED
- **Published Date**: July 08, 2020 at 16:35 UTC
- **Last Updated**: September 16, 2024 at 19:46 UTC
- **Reserved Date**: December 04, 2019 at 00:00 UTC
- **Assigned By**: palo_alto
### Vulnerability Description
An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network based attacker to execute arbitrary OS commands with root privileges. An attacker requires some knowledge of the firewall to exploit this issue. This issue can not be exploited if GlobalProtect portal feature is not enabled. This issue impacts PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; all versions of PAN-OS 8.0 and PAN-OS 7.1. Prisma Access services are not impacted by this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Palo Alto Networks - PAN-OS**
Affected versions:
- 8.0.* (Status: affected)
- 7.1.* (Status: affected)
- 9.1 (Status: affected)
- 9.0 (Status: affected)
- 8.1 (Status: affected)
### References
1. [](https://security.paloaltonetworks.com/CVE-2020-2034)
### Credits
- This issue was found by Yamata Li of Palo Alto Networks during internal security review. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3869, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3869
- **State**: REJECTED
- **Published Date**: October 30, 2019 at 15:36 UTC
- **Last Updated**: October 30, 2019 at 15:36 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2957, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2957
- **State**: PUBLISHED
- **Published Date**: October 31, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 13:57 UTC
- **Reserved Date**: May 31, 2007 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Integer overflow in McAfee E-Business Server before 8.5.3 for Solaris, and before 8.1.2 for Linux, HP-UX, and AIX, allows remote attackers to execute arbitrary code via a large length value in an authentication packet, which results in a heap-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://knowledge.mcafee.com/SupportSite/dynamickc.do?externalId=614035&sliceId=SAL_Public&command=show&forward=nonthreadedKC&kcId=614035)
2. [ADV-2007-3663](http://www.vupen.com/english/advisories/2007/3663)
3. [26372](http://secunia.com/advisories/26372)
4. [26269](http://www.securityfocus.com/bid/26269)
5. [mcafee-ebusiness-auth-packet-bo(38175)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38175)
6. [1018878](http://securitytracker.com/id?1018878)
7. [](http://secunia.com/secunia_research/2007-69/advisory/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30704, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30704
- **State**: REJECTED
- **Published Date**: April 09, 2024 at 00:00 UTC
- **Last Updated**: May 27, 2024 at 00:14 UTC
- **Reserved Date**: March 27, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1446, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1446
- **State**: PUBLISHED
- **Published Date**: October 23, 2007 at 01:00 UTC
- **Last Updated**: August 08, 2024 at 02:28 UTC
- **Reserved Date**: October 22, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the save_into_file function in save.c for Rogue 5.2-2 allows local users to execute arbitrary code with games group privileges by setting a long HOME environment variable and invoking the save game function with a ~ (tilde).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6912](http://www.securityfocus.com/bid/6912)
2. [20030221 Rogue buffer overflow](http://archives.neohapsis.com/archives/bugtraq/2003-02/0260.html)
3. [rogue-saveintofile-bo(11382)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11382) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0175
- **State**: PUBLISHED
- **Published Date**: January 20, 2009 at 15:26 UTC
- **Last Updated**: August 07, 2024 at 04:24 UTC
- **Reserved Date**: January 20, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in Heathco Software MP3 TrackMaker 1.5 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long string in an invalid .mp3 file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4920](http://securityreason.com/securityalert/4920)
2. [33183](http://www.securityfocus.com/bid/33183)
3. [mp3trackmaker-mp3-bo(47852)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47852)
4. [7708](https://www.exploit-db.com/exploits/7708) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0009, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0009 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0009
- **State**: PUBLISHED
- **Published Date**: January 08, 2020 at 15:31 UTC
- **Last Updated**: August 04, 2024 at 05:47 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-142938932
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2020-01-01)
2. [](http://packetstormsecurity.com/files/155903/Android-ashmem-Read-Only-Bypasses.html)
3. [[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update](https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html)
4. [[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update](https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5015
- **State**: PUBLISHED
- **Published Date**: November 13, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 10:40 UTC
- **Reserved Date**: November 10, 2008 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Mozilla Firefox 3.x before 3.0.4 assigns chrome privileges to a file: URI when it is accessed in the same tab from a chrome or privileged about: page, which makes it easier for user-assisted attackers to execute arbitrary JavaScript with chrome privileges via malicious code in a file that has already been saved on the local system.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-3146](http://www.vupen.com/english/advisories/2008/3146)
2. [oval:org.mitre.oval:def:11063](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11063)
3. [1021191](http://www.securitytracker.com/id?1021191)
4. [32281](http://www.securityfocus.com/bid/32281)
5. [32713](http://secunia.com/advisories/32713)
6. [MDVSA-2008:230](http://www.mandriva.com/security/advisories?name=MDVSA-2008:230)
7. [ADV-2009-0977](http://www.vupen.com/english/advisories/2009/0977)
8. [32695](http://secunia.com/advisories/32695)
9. [RHSA-2008:0978](http://www.redhat.com/support/errata/RHSA-2008-0978.html)
10. [32778](http://secunia.com/advisories/32778)
11. [](https://bugzilla.mozilla.org/show_bug.cgi?id=447579)
12. [FEDORA-2008-9669](https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html)
13. [256408](http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1)
14. [SUSE-SA:2008:055](http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html)
15. [32721](http://secunia.com/advisories/32721)
16. [TA08-319A](http://www.us-cert.gov/cas/techalerts/TA08-319A.html)
17. [](http://www.mozilla.org/security/announce/2008/mfsa2008-51.html)
18. [USN-667-1](http://ubuntu.com/usn/usn-667-1)
19. [34501](http://secunia.com/advisories/34501) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16264
- **State**: PUBLISHED
- **Published Date**: January 22, 2020 at 12:42 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 31, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The BlueZ system service in Tizen allows an unprivileged process to partially control Bluetooth or acquire sensitive information, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf)
2. [](https://review.tizen.org/git/?p=platform/upstream/bluez.git%3Ba=commit%3Bh=ff9878c95efc12d4a4495153ab51e3a09f8d3c01)
3. [](https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0691, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0691 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0691
- **State**: PUBLISHED
- **Published Date**: October 06, 2021 at 14:11 UTC
- **Last Updated**: August 03, 2024 at 15:47 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In the SELinux policy configured in system_app.te, there is a possible way for system_app to gain code execution in other processes due to an overly-permissive SELinux policy. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-188554048
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-09-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40597, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40597 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40597
- **State**: PUBLISHED
- **Published Date**: June 29, 2022 at 19:44 UTC
- **Last Updated**: August 04, 2024 at 02:44 UTC
- **Reserved Date**: September 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The firmware of EDIMAX IC-3140W Version 3.11 is hardcoded with Administrator username and password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.edimax.com/edimax/download/download/data/edimax/global/download/)
2. [](https://drive.google.com/file/d/1ZPFwAoO8tAD0zrWwVZ9W6-CUCrcM0Exm/view?usp=sharing)
3. [](https://drive.google.com/file/d/1DZCzVULjchY0rSJBXIPr0gJM1qWCcAZ5/view?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27853, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27853 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27853
- **State**: PUBLISHED
- **Published Date**: September 27, 2022 at 17:55 UTC
- **Last Updated**: May 21, 2025 at 15:27 UTC
- **Reserved Date**: March 01, 2021 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers.
### Weakness Classification (CWE)
- CWE-290: Security Weakness
### Affected Products
**IEEE - 802.2**
Affected versions:
- 802.2h-1997 (Status: affected)
**IETF - draft-ietf-v6ops-ra-guard**
Affected versions:
- 08 (Status: affected)
**IETF - P802.1Q**
Affected versions:
- D1.0 (Status: affected)
### References
1. [](https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/)
2. [](https://standards.ieee.org/ieee/802.2/1048/)
3. [](https://standards.ieee.org/ieee/802.1Q/10323/)
4. [20220927 Vulnerabilities in Layer 2 Network Security Controls Affecting Cisco Products: September 2022](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-VU855201-J3z8CKTX)
5. [](https://kb.cert.org/vuls/id/855201)
6. [](https://blog.champtar.fr/VLAN0_LLC_SNAP/)
### Credits
- Etienne Champetier (@champtar) <champetier.etienne@gmail.com> |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14361, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14361 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14361
- **State**: PUBLISHED
- **Published Date**: September 15, 2020 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 12:46 UTC
- **Reserved Date**: June 17, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
### Weakness Classification (CWE)
- CWE-191: Security Weakness
### Affected Products
**n/a - xorg-x11-server**
Affected versions:
- before xorg-x11-server 1.20.9 (Status: affected)
### References
1. [](https://lists.x.org/archives/xorg-announce/2020-August/003058.html)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1869142)
3. [USN-4488-2](https://usn.ubuntu.com/4488-2/)
4. [GLSA-202012-01](https://security.gentoo.org/glsa/202012-01)
5. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1418/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31816
- **State**: PUBLISHED
- **Published Date**: April 08, 2024 at 00:00 UTC
- **Last Updated**: August 14, 2024 at 13:50 UTC
- **Reserved Date**: April 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In TOTOLINK EX200 V4.0.3c.7646_B20201211, an attacker can obtain sensitive information without authorization through the function getEasyWizardCfg.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Leak_getEasyWizardCfg/Leak.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3645, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3645 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3645
- **State**: PUBLISHED
- **Published Date**: July 15, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 14:21 UTC
- **Reserved Date**: July 09, 2007 at 00:00 UTC
- **Assigned By**: freebsd
### Vulnerability Description
archive_read_support_format_tar.c in libarchive before 2.2.4 allows user-assisted remote attackers to cause a denial of service (crash) via (1) an end-of-file condition within a tar header that follows a pax extension header or (2) a malformed pax extension header in an (a) PAX or a (b) TAR archive, which results in a NULL pointer dereference, a different issue than CVE-2007-3644.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [freebsd-libarchive-null-pax-dos(35404)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35404)
2. [ADV-2007-2521](http://www.vupen.com/english/advisories/2007/2521)
3. [DSA-1455](http://www.debian.org/security/2008/dsa-1455)
4. [FreeBSD-SA-07:05.libarchive](http://security.freebsd.org/advisories/FreeBSD-SA-07:05.libarchive.asc)
5. [](http://security.freebsd.org/patches/SA-07:05/libarchive.patch)
6. [26050](http://secunia.com/advisories/26050)
7. [24885](http://www.securityfocus.com/bid/24885)
8. [GLSA-200708-03](http://security.gentoo.org/glsa/glsa-200708-03.xml)
9. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=432924)
10. [38094](http://osvdb.org/38094)
11. [](http://people.freebsd.org/~kientzle/libarchive/)
12. [26062](http://secunia.com/advisories/26062)
13. [38093](http://osvdb.org/38093)
14. [26355](http://secunia.com/advisories/26355)
15. [1018379](http://www.securitytracker.com/id?1018379)
16. [28377](http://secunia.com/advisories/28377)
17. [SUSE-SR:2007:015](http://www.novell.com/linux/security/advisories/2007_15_sr.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3248, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3248 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3248
- **State**: PUBLISHED
- **Published Date**: August 16, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 19:57 UTC
- **Reserved Date**: June 06, 2012 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
HP Fortify Software Security Center 3.1, 3.3, 3.4, and 3.5 allows remote attackers to obtain sensitive information via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT100879](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03447824)
2. [1027398](http://www.securitytracker.com/id?1027398)
3. [HPSBMU02801](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03447824) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6725
- **State**: PUBLISHED
- **Published Date**: December 26, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 20:34 UTC
- **Reserved Date**: December 26, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in PHPBuilder 0.0.2 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter to (1) lib/htm2php.php and (2) sitetools/htm2php.php. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-5125](http://www.vupen.com/english/advisories/2006/5125) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50266, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50266 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50266
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 20:42 UTC
- **Last Updated**: August 02, 2024 at 22:16 UTC
- **Reserved Date**: December 05, 2023 at 20:42 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Bazarr manages and downloads subtitles. In version 1.2.4, the proxy method in bazarr/bazarr/app/ui.py does not validate the user-controlled protocol and url variables and passes them to requests.get() without any sanitization, which leads to a blind server-side request forgery (SSRF). This issue allows for crafting GET requests to internal and external resources on behalf of the server. 1.3.1 contains a partial fix, which limits the vulnerability to HTTP/HTTPS protocols.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**morpheus65535 - bazarr**
Affected versions:
- 1.2.4 (Status: affected)
### References
1. [https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/](https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/)
2. [https://github.com/morpheus65535/bazarr/commit/17add7fbb3ae1919a40d505470d499d46df9ae6b](https://github.com/morpheus65535/bazarr/commit/17add7fbb3ae1919a40d505470d499d46df9ae6b)
3. [https://github.com/morpheus65535/bazarr/releases/tag/v1.3.1](https://github.com/morpheus65535/bazarr/releases/tag/v1.3.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6328, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6328
- **State**: PUBLISHED
- **Published Date**: December 22, 2013 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 17:39 UTC
- **Reserved Date**: October 31, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Web Content Manager (WCM) UI in IBM WebSphere Portal 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.0.0.x through 7.0.0.2 CF26, and 8.0.0.x before 8.0.0.1 CF09 allows remote attackers to inject arbitrary web script or HTML via vectors involving IFRAME elements.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [64495](http://www.securityfocus.com/bid/64495)
2. [101269](http://osvdb.org/101269)
3. [PM96345](http://www-01.ibm.com/support/docview.wss?uid=swg1PM96345)
4. [](http://www-01.ibm.com/support/docview.wss?uid=swg21660011)
5. [ibm-wsportal-cve20136328-xss(88909)](https://exchange.xforce.ibmcloud.com/vulnerabilities/88909) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49516, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49516 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49516
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:13 UTC
- **Last Updated**: May 04, 2025 at 08:39 UTC
- **Reserved Date**: February 26, 2025 at 02:08 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ice: always check VF VSI pointer values
The ice_get_vf_vsi function can return NULL in some cases, such as if
handling messages during a reset where the VSI is being removed and
recreated.
Several places throughout the driver do not bother to check whether this
VSI pointer is valid. Static analysis tools maybe report issues because
they detect paths where a potentially NULL pointer could be dereferenced.
Fix this by checking the return value of ice_get_vf_vsi everywhere.
### Affected Products
**Linux - Linux**
Affected versions:
- 37165e3f5664ee901e89ff9c13723c2743c5e47f (Status: affected)
- 37165e3f5664ee901e89ff9c13723c2743c5e47f (Status: affected)
**Linux - Linux**
Affected versions:
- 5.16 (Status: affected)
- 0 (Status: unaffected)
- 5.18.3 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/e7be3877589d539c52e5d1d23a625f889b541b9d)
2. [](https://git.kernel.org/stable/c/baeb705fd6a7245cc1fa69ed991a9cffdf44a174) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2492, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2492 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2492
- **State**: PUBLISHED
- **Published Date**: April 18, 2025 at 08:57 UTC
- **Last Updated**: May 20, 2025 at 08:21 UTC
- **Reserved Date**: March 18, 2025 at 09:23 UTC
- **Assigned By**: ASUS
### Vulnerability Description
An improper authentication control vulnerability exists in AiCloud. This vulnerability can be triggered by a crafted request, potentially leading to unauthorized execution of functions.
Refer to the 'ASUS Router AiCloud vulnerability' section on the ASUS Security Advisory for more information.
### Weakness Classification (CWE)
- CWE-288: Security Weakness
### Affected Products
**ASUS - Router**
Affected versions:
- 3.0.0.4_382 series (Status: affected)
- 3.0.0.4_386 series (Status: affected)
- 3.0.0.4_388 series (Status: affected)
- 3.0.0.6_102 series (Status: affected)
### References
1. [](https://www.asus.com/content/asus-product-security-advisory/)
### Credits
- Nanyu Zhong of VARAS@IIE |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7083
- **State**: PUBLISHED
- **Published Date**: May 10, 2019 at 16:43 UTC
- **Last Updated**: August 05, 2024 at 06:17 UTC
- **Reserved Date**: February 15, 2018 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
If a process running within Aruba Instant crashes, it may leave behind a "core dump", which contains the memory contents of the process at the time it crashed. It was discovered that core dumps are stored in a way that unauthenticated users can access them through the Aruba Instant web interface. Core dumps could contain sensitive information such as keys and passwords. Workaround: Block access to the Aruba Instant web interface from all untrusted users. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.0
### Affected Products
**n/a - Aruba Instant (IAP)**
Affected versions:
- Aruba Instant 4.x prior to 6.4.4.8 - 4.2.4.12 Aruba Instant 6.5.x prior to 6.5.4.11 Aruba Instant 8.3.x prior to 8.3.0.6 Aruba Instant 8.4.x prior to 8.4.0.1 (Status: affected)
### References
1. [](http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-001.txt)
2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-549547.pdf)
3. [108374](http://www.securityfocus.com/bid/108374) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1983, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1983 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1983
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 06:31 UTC
- **Last Updated**: August 03, 2024 at 16:32 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Possible buffer overflow due to improper handling of negative data length while processing write request in VR service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables**
Affected versions:
- APQ8017, APQ8053, APQ8064AU, APQ8096AU, AQT1000, MSM8917, MSM8953, MSM8996AU, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6426, QCA6430, QCA6436, QCA6564A, QCA6564AU, QCA6574A, QCA6574AU, QCM2290, QCM4290, QCM6125, QCM6490, QCS2290, QCS4290, QCS603, QCS605, QCS610, QCS6125, QCS6490, Qualcomm215, SD 455, SD 636, SD 675, SD205, SD210, SD429, SD439, SD460, SD480, SD632, SD662, SD665, SD675, SD678, SD690 5G, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD855, SD865 5G, SD870, SD888, SD888 5G, SDM630, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3988, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WSA8830, WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32792
- **State**: PUBLISHED
- **Published Date**: April 18, 2025 at 16:04 UTC
- **Last Updated**: April 21, 2025 at 13:28 UTC
- **Reserved Date**: April 10, 2025 at 12:51 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
SES safely executes third-party JavaScript 'strict' mode programs in compartments that have no excess authority in their global scope. Prior to version 1.12.0, web pages and web extensions using `ses` and the Compartment API to evaluate third-party code in an isolated execution environment that have also elsewhere used `const`, `let`, and `class` bindings in the top-level scope of a `<script>` tag will have inadvertently revealed these bindings in the lexical scope of third-party code. This issue has been patched in version 1.12.0. Workarounds for this issue involve either avoiding top-level `let`, `const`, or `class` bindings in `<script>` tags, or change these to `var` bindings to be reflected on `globalThis`.
### Weakness Classification (CWE)
- CWE-497: Security Weakness
### Affected Products
**endojs - endo**
Affected versions:
- < 1.12.0 (Status: affected)
### References
1. [https://github.com/endojs/endo/security/advisories/GHSA-h9w6-f932-gq62](https://github.com/endojs/endo/security/advisories/GHSA-h9w6-f932-gq62) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34026, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34026 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34026
- **State**: PUBLISHED
- **Published Date**: September 22, 2022 at 17:01 UTC
- **Last Updated**: May 27, 2025 at 15:05 UTC
- **Reserved Date**: June 20, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ICEcoder v8.1 allows attackers to execute a directory traversal.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/icecoder/ICEcoder)
2. [](http://icecoder.com)
3. [](https://github.com/icecoder/ICEcoder/blob/master/classes/Settings.php)
4. [](https://github.com/icecoder/ICEcoder/blob/master/lib/settings.php)
5. [](https://gist.github.com/enferas/85cdbadf5cba32ec7c8db6ea9e6833bf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11499, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11499 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11499
- **State**: PUBLISHED
- **Published Date**: April 02, 2020 at 22:43 UTC
- **Last Updated**: August 04, 2024 at 11:35 UTC
- **Reserved Date**: April 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Firmware Analysis and Comparison Tool (FACT) 3 has Stored XSS when updating analysis details via a localhost web request, as demonstrated by mishandling of the tags and version fields in helperFunctions/mongo_task_conversion.py.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/fkie-cad/FACT_core/issues/375)
2. [](https://github.com/fkie-cad/FACT_core/pull/376) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4180, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4180
- **State**: PUBLISHED
- **Published Date**: August 08, 2007 at 01:11 UTC
- **Last Updated**: August 07, 2024 at 14:46 UTC
- **Reserved Date**: August 07, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in data/inc/theme.php in Pluck 4.3, when register_globals is enabled, allows remote attackers to read arbitrary local files via a .. (dot dot) in the file parameter. NOTE: CVE and a reliable third party dispute this vulnerability because the code uses a fixed argument when invoking fputs, which cannot be used to read files
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [pluck-theme-directory-traversal(35757)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35757)
2. [2973](http://securityreason.com/securityalert/2973)
3. [20070802 False: Pluck 4.3 themes.php Remote File Inclusion and disclosure](http://www.attrition.org/pipermail/vim/2007-August/001752.html)
4. [20070802 Pluck 4.3 themes.php Remote File Inclusion and disclosure](http://www.securityfocus.com/archive/1/475323/100/0/threaded)
5. [](http://outlaw.aria-security.info/?p=12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30867, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30867 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30867
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 12:14 UTC
- **Last Updated**: August 02, 2024 at 14:37 UTC
- **Reserved Date**: April 19, 2023 at 10:43 UTC
- **Assigned By**: apache
### Vulnerability Description
In the Streampark platform, when users log in to the system and use certain features, some pages provide a name-based fuzzy search, such as job names, role names, etc. The sql syntax :select * from table where jobName like '%jobName%'. However, the jobName field may receive illegal parameters, leading to SQL injection. This could potentially result in information leakage.
Mitigation:
Users are recommended to upgrade to version 2.1.2, which fixes the issue.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Apache Software Foundation - Apache StreamPark (incubating)**
Affected versions:
- 2.0.0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/bhdzh6hnh04yyf3g203bbyvxryd720o2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13537
- **State**: PUBLISHED
- **Published Date**: January 14, 2020 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 23:57 UTC
- **Reserved Date**: July 11, 2019 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
The IEC870IP driver for AVEVA’s Vijeo Citect and Citect SCADA and Schneider Electric’s Power SCADA Operation has a buffer overflow vulnerability that could result in a server-side crash.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**AVEVA - Vijeo Citect and Citect SCADA**
Affected versions:
- IEC870IP driver v4.14.02 and prior (Status: affected)
### References
1. [](https://www.us-cert.gov/ics/advisories/icsa-19-290-01)
2. [](https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec139.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-21117, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-21117 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-21117
- **State**: PUBLISHED
- **Published Date**: April 22, 2020 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 12:19 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NETGEAR XR500 devices before 2.3.2.32 are affected by remote code execution by unauthenticated attackers via the traceroute handler.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000060241/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-XR500-PSV-2018-0313) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1678, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1678 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1678
- **State**: PUBLISHED
- **Published Date**: March 26, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 13:06 UTC
- **Reserved Date**: March 26, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Fizzle 0.5 extension for Firefox allows remote attackers to inject arbitrary web script or HTML via RSS feeds, which are executed by the chrome: URI handler.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24654](http://secunia.com/advisories/24654)
2. [2480](http://securityreason.com/securityalert/2480)
3. [20070324 Fizzle : Firefox Extension Vulnerability](http://www.securityfocus.com/archive/1/463816/100/0/threaded)
4. [23144](http://www.securityfocus.com/bid/23144)
5. [33522](http://www.osvdb.org/33522)
6. [fizzle-rssfeed-xss(33227)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33227)
7. [ADV-2007-1112](http://www.vupen.com/english/advisories/2007/1112) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5357, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5357
- **State**: PUBLISHED
- **Published Date**: May 30, 2025 at 17:31 UTC
- **Last Updated**: May 30, 2025 at 17:56 UTC
- **Reserved Date**: May 30, 2025 at 09:06 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in FreeFloat FTP Server 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component PWD Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
- CWE-119: Security Weakness
### Affected Products
**FreeFloat - FTP Server**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-310651 | FreeFloat FTP Server PWD Command buffer overflow](https://vuldb.com/?id.310651)
2. [VDB-310651 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.310651)
3. [Submit #585641 | FreeFloat FTP Server 1.0 Buffer Overflow](https://vuldb.com/?submit.585641)
4. [](https://fitoxs.com/exploit/exploit-c15b3c9a2d7b1618fc5a30df50e5a13d6275f109f1fba20465d4cdd76ee8772b.txt)
### Credits
- Fernando Mengali (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0746, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0746 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0746
- **State**: PUBLISHED
- **Published Date**: January 04, 2018 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 01:06 UTC
- **Reserved Date**: December 01, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Windows kernel in Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0745 and CVE-2018-0747.
### Affected Products
**Microsoft Corporation - Windows kernel**
Affected versions:
- Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 (Status: affected)
### References
1. [1040097](http://www.securitytracker.com/id/1040097)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0746)
3. [43471](https://www.exploit-db.com/exploits/43471/)
4. [102365](http://www.securityfocus.com/bid/102365) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4718, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4718 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4718
- **State**: PUBLISHED
- **Published Date**: September 12, 2006 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 19:23 UTC
- **Reserved Date**: September 12, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in livre_or.php in KorviBlog 1.3.0 allow remote attackers to inject arbitrary web script or HTML via the (1) prenom, (2) emailFrom, or (3) body parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19943](http://www.securityfocus.com/bid/19943)
2. [21853](http://secunia.com/advisories/21853)
3. [korviblog-livre-xss(28852)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28852)
4. [20060911 KorviBlog - XSS permanent](http://marc.info/?l=full-disclosure&m=115796637230932&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0237, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0237 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0237
- **State**: PUBLISHED
- **Published Date**: January 16, 2024 at 15:56 UTC
- **Last Updated**: June 02, 2025 at 15:09 UTC
- **Reserved Date**: January 04, 2024 at 14:28 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The EventON WordPress plugin through 4.5.8, EventON WordPress plugin before 2.2.7 do not have authorisation in some AJAX actions, allowing unauthenticated users to update virtual events settings, such as meeting URL, moderator, access details etc
### Weakness Classification (CWE)
- CWE-862 Missing Authorization: Missing Authorization
### Affected Products
**Unknown - EventON Premium**
Affected versions:
- 0 (Status: affected)
**Unknown - EventON**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/73d1b00e-1f17-4d9a-bfc8-6bc43a46b90b/)
### Credits
- Erwan LR (WPScan)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4315, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4315
- **State**: PUBLISHED
- **Published Date**: September 16, 2013 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 16:38 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2013:1541](http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html)
2. [54772](http://secunia.com/advisories/54772)
3. [RHSA-2013:1521](http://rhn.redhat.com/errata/RHSA-2013-1521.html)
4. [](https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/)
5. [54828](http://secunia.com/advisories/54828)
6. [DSA-2755](http://www.debian.org/security/2013/dsa-2755) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5626, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5626 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5626
- **State**: PUBLISHED
- **Published Date**: May 22, 2019 at 18:11 UTC
- **Last Updated**: August 04, 2024 at 20:01 UTC
- **Reserved Date**: January 07, 2019 at 00:00 UTC
- **Assigned By**: rapid7
### Vulnerability Description
The Android mobile application BlueCats Reveal before 3.0.19 stores the username and password in a clear text file. This file persists until the user logs out or the session times out from non-usage (30 days of no user activity). This can allow an attacker to compromise the affected BlueCats network implementation. The attacker would first need to gain physical control of the Android device or compromise it with a malicious app.
### Weakness Classification (CWE)
- CWE-922: Security Weakness
### Affected Products
**BlueCats - Reveal**
Affected versions:
- before 3.0.19 (Status: affected)
### References
1. [](https://blog.rapid7.com/2019/05/21/investigating-the-plumbing-of-the-iot-ecosystem-r7-2018-65-r7-2019-07-fixed/)
2. [](https://play.google.com/store/apps/details?id=com.bluecats.bcreveal)
### Credits
- This vulnerability was discovered by Rapid7 researcher Deral Heiland. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21084, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21084 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21084
- **State**: PUBLISHED
- **Published Date**: June 28, 2021 at 13:56 UTC
- **Last Updated**: September 17, 2024 at 03:02 UTC
- **Reserved Date**: December 18, 2020 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
AEM's Cloud Service offering, as well as versions 6.5.7.0 (and below), 6.4.8.3 (and below) and 6.3.3.8 (and below) are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Experience Manager**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb21-15.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3527, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3527 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3527
- **State**: PUBLISHED
- **Published Date**: July 12, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 18:30 UTC
- **Reserved Date**: July 11, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in BosClassifieds Classified Ads allow remote attackers to execute arbitrary PHP code via a URL in the insPath parameter to (1) index.php, (2) recent.php, (3) account.php, (4) classified.php, or (5) search.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27315](http://www.osvdb.org/27315)
2. [27314](http://www.osvdb.org/27314)
3. [27317](http://www.osvdb.org/27317)
4. [27316](http://www.osvdb.org/27316)
5. [ADV-2006-2807](http://www.vupen.com/english/advisories/2006/2807)
6. [1016447](http://securitytracker.com/id?1016447)
7. [](http://www.jaascois.com/exploits/18602018/)
8. [27318](http://www.osvdb.org/27318)
9. [18883](http://www.securityfocus.com/bid/18883)
10. [21056](http://secunia.com/advisories/21056)
11. [bosclassifieds-multiple-scripts-file-include(27662)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27662) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7008
- **State**: PUBLISHED
- **Published Date**: August 06, 2024 at 03:40 UTC
- **Last Updated**: August 08, 2024 at 15:35 UTC
- **Reserved Date**: July 23, 2024 at 03:50 UTC
- **Assigned By**: STAR_Labs
### Vulnerability Description
Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected cross-site scripting.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Calibre - Calibre**
Affected versions:
- 7.15.0 (Status: affected)
### References
1. [](https://starlabs.sg/advisories/24/24-7008/)
2. [](https://github.com/kovidgoyal/calibre/commit/863abac24e7bc3e5ca0b3307362ff1953ba53fe0)
### Credits
- Devesh Logendran of STAR Labs SG Pte. Ltd. (@starlabs_sg) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2419, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2419 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2419
- **State**: PUBLISHED
- **Published Date**: January 16, 2019 at 19:00 UTC
- **Last Updated**: October 02, 2024 at 16:20 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the PeopleSoft Enterprise CC Common Application Objects component of Oracle PeopleSoft Products (subcomponent: Form and Approval Builder). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise CC Common Application Objects, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise CC Common Application Objects accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise CC Common Application Objects accessible data. Note: This Enterprise Common Component is used by all PeopleSoft Application products. Please refer to the <a target="_blank" href="https://support.oracle.com/rs?type=doc&id=2487756.1">MOS Note Doc ID 2493366.1 for patch information. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - PeopleSoft Enterprise CC Common Application Objects**
Affected versions:
- 9.2 (Status: affected)
### References
1. [106607](http://www.securityfocus.com/bid/106607)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6447, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6447
- **State**: REJECTED
- **Published Date**: December 19, 2007 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 22:29 UTC
- **Reserved Date**: December 19, 2007 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2168, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2168 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2168
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 03:23 UTC
- **Last Updated**: May 01, 2025 at 13:21 UTC
- **Reserved Date**: March 10, 2025 at 14:05 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table, Woocommerce Slider plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.4.1. This is due to missing or incorrect nonce validation on the dismiss() function. This makes it possible for unauthenticated attackers to set arbitrary user meta values to `1` which can be leveraged to lock and administrator out of their site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**bdthemes - Ultimate Store Kit – Elementor powered WooCommerce Builder, 80+ Widgets and Template Builder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a48634d7-30c9-4124-87dd-93a303a969eb?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/ultimate-store-kit/tags/2.3.6/admin/admin-notice.php#L43)
3. [](https://plugins.trac.wordpress.org/changeset/3283438/ultimate-store-kit/trunk/admin/admin-notice.php)
4. [](https://plugins.trac.wordpress.org/changeset/3255125/ultimate-store-kit/trunk/admin/admin-notice.php)
### Credits
- Peter Thaleikis |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7579
- **State**: PUBLISHED
- **Published Date**: March 01, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 06:31 UTC
- **Reserved Date**: February 28, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
\application\admin\controller\update_urls.class.php in YzmCMS 3.6 has SQL Injection via the catids array parameter to admin/update_urls/update_category_url.html.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.atksec.com/article/yzmcms-v3.6-sqli/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28554
- **State**: PUBLISHED
- **Published Date**: November 07, 2023 at 05:26 UTC
- **Last Updated**: August 02, 2024 at 13:43 UTC
- **Reserved Date**: March 17, 2023 at 11:41 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Information Disclosure in Qualcomm IPC while reading values from shared memory in VM.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AQT1000 (Status: affected)
- AR9380 (Status: affected)
- C-V2X 9150 (Status: affected)
- CSR8811 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Immersive Home 214 Platform (Status: affected)
- Immersive Home 216 Platform (Status: affected)
- Immersive Home 316 Platform (Status: affected)
- Immersive Home 318 Platform (Status: affected)
- IPQ4019 (Status: affected)
- IPQ4028 (Status: affected)
- IPQ4029 (Status: affected)
- IPQ5010 (Status: affected)
- IPQ5028 (Status: affected)
- IPQ6010 (Status: affected)
- IPQ6018 (Status: affected)
- IPQ6028 (Status: affected)
- IPQ8064 (Status: affected)
- IPQ8065 (Status: affected)
- IPQ8068 (Status: affected)
- IPQ8070A (Status: affected)
- IPQ8071A (Status: affected)
- IPQ8072A (Status: affected)
- IPQ8074A (Status: affected)
- IPQ8076 (Status: affected)
- IPQ8076A (Status: affected)
- IPQ8078 (Status: affected)
- IPQ8078A (Status: affected)
- IPQ8173 (Status: affected)
- IPQ8174 (Status: affected)
- PMP8074 (Status: affected)
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QCA4024 (Status: affected)
- QCA6310 (Status: affected)
- QCA6320 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6426 (Status: affected)
- QCA6430 (Status: affected)
- QCA6436 (Status: affected)
- QCA6554A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA7500 (Status: affected)
- QCA8072 (Status: affected)
- QCA8075 (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCA9880 (Status: affected)
- QCA9886 (Status: affected)
- QCA9888 (Status: affected)
- QCA9889 (Status: affected)
- QCA9898 (Status: affected)
- QCA9980 (Status: affected)
- QCA9984 (Status: affected)
- QCA9985 (Status: affected)
- QCA9990 (Status: affected)
- QCA9992 (Status: affected)
- QCA9994 (Status: affected)
- QCN5021 (Status: affected)
- QCN5022 (Status: affected)
- QCN5024 (Status: affected)
- QCN5052 (Status: affected)
- QCN5054 (Status: affected)
- QCN5122 (Status: affected)
- QCN5124 (Status: affected)
- QCN5152 (Status: affected)
- QCN5154 (Status: affected)
- QCN5164 (Status: affected)
- QCN6023 (Status: affected)
- QCN6024 (Status: affected)
- QCN6122 (Status: affected)
- QCN6132 (Status: affected)
- QCN9000 (Status: affected)
- QCN9022 (Status: affected)
- QCN9024 (Status: affected)
- QCN9070 (Status: affected)
- QCN9072 (Status: affected)
- QCN9074 (Status: affected)
- QCN9100 (Status: affected)
- QCS410 (Status: affected)
- QCS610 (Status: affected)
- QCS8155 (Status: affected)
- QSM8250 (Status: affected)
- Qualcomm 205 Mobile Platform (Status: affected)
- Qualcomm 215 Mobile Platform (Status: affected)
- Qualcomm Video Collaboration VC1 Platform (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SD835 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SDX55 (Status: affected)
- Snapdragon 210 Processor (Status: affected)
- Snapdragon 212 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 835 Mobile PC Platform (Status: affected)
- Snapdragon 855 Mobile Platform (Status: affected)
- Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- Snapdragon W5+ Gen 1 Wearable Platform (Status: affected)
- Snapdragon Wear 4100+ Platform (Status: affected)
- Snapdragon X55 5G Modem-RF System (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- SW5100 (Status: affected)
- SW5100P (Status: affected)
- SXR2130 (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9370 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3610 (Status: affected)
- WCN3660B (Status: affected)
- WCN3680B (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32268, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32268 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32268
- **State**: PUBLISHED
- **Published Date**: April 04, 2025 at 15:59 UTC
- **Last Updated**: April 04, 2025 at 19:02 UTC
- **Reserved Date**: April 04, 2025 at 10:02 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in www.15.to QR Code Tag for WC allows Cross Site Request Forgery. This issue affects QR Code Tag for WC: from n/a through 1.9.36.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**www.15.to - QR Code Tag for WC**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/qr-code-tag-for-wc-from-goaskle-com/vulnerability/wordpress-qr-code-tag-for-wc-plugin-1-9-35-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11163, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11163 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11163
- **State**: PUBLISHED
- **Published Date**: February 22, 2021 at 06:25 UTC
- **Last Updated**: August 04, 2024 at 11:28 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Possible buffer overflow while updating ikev2 parameters due to lack of check of input validation for certain parameters received from the ePDG server in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile**
Affected versions:
- APQ8017, AQT1000, AR8035, CSRB31024, MSM8917, PM215, PM3003A, PM4125, PM4250, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM640A, PM640L, PM640P, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PMC1000H, PMI632, PMI8937, PMI8952, PMK8002, PMM855AU, PMR525, PMR735A, PMX24, PMX50, PMX55, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QBT1500, QBT2000, QCA6174A, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564AU, QCA6574A, QCA6574AU, QCA6584AU, QCA6595AU, QCA6696, QCA8337, QCA9377, QCM2290, QCM4290, QCM6125, QCS2290, QCS410, QCS4290, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET5100, QET5100M, QET6110, QFE2101, QFE2550, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308 ...[truncated*] (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0836, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0836
- **State**: PUBLISHED
- **Published Date**: September 01, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:03 UTC
- **Reserved Date**: August 08, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
dvips converter for Postscript files in the tetex package calls the system() function insecurely, which allows remote attackers to execute arbitrary commands via certain print jobs, possibly involving fonts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20021018 GLSA: tetex](http://marc.info/?l=bugtraq&m=103497852330838&w=2)
2. [5978](http://www.securityfocus.com/bid/5978)
3. [20021216 [OpenPKG-SA-2002.015] OpenPKG Security Advisory (tetex)](http://marc.info/?l=bugtraq&m=104005975415582&w=2)
4. [CLA-2002:537](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000537)
5. [VU#169841](http://www.kb.cert.org/vuls/id/169841)
6. [DSA-207](http://www.debian.org/security/2002/dsa-207)
7. [HPSBTL0210-073](http://www.securityfocus.com/advisories/4567)
8. [RHSA-2002:195](http://www.redhat.com/support/errata/RHSA-2002-195.html)
9. [dvips-system-execute-commands(10365)](http://www.iss.net/security_center/static/10365.php)
10. [RHSA-2002:194](http://www.redhat.com/support/errata/RHSA-2002-194.html)
11. [MDKSA-2002:070](http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-070.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31224
- **State**: PUBLISHED
- **Published Date**: September 12, 2022 at 18:35 UTC
- **Last Updated**: September 17, 2024 at 02:01 UTC
- **Reserved Date**: May 19, 2022 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell BIOS versions contain an Improper Protection Against Voltage and Clock Glitches vulnerability. An attacker with physical access to the system could potentially exploit this vulnerability by triggering a fault condition in order to change the behavior of the system.
### CVSS Metrics
- **CVSS Base Score**: 2/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-1247: Security Weakness
### Affected Products
**Dell - CPG BIOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/000202196) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14708, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14708
- **State**: PUBLISHED
- **Published Date**: August 06, 2019 at 22:21 UTC
- **Last Updated**: August 05, 2024 at 00:26 UTC
- **Reserved Date**: August 06, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on MicroDigital N-series cameras with firmware through 6400.0.8.5. A buffer overflow in the action parameter leads to remote code execution in the context of the nobody account.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.microdigital.ru/)
2. [](http://www.microdigital.co.kr/)
3. [](https://pastebin.com/PSyqqs1g) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2281, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2281 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2281
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56028
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 09:23 UTC
- **Last Updated**: January 03, 2025 at 19:11 UTC
- **Reserved Date**: December 14, 2024 at 19:42 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lemonade Coding Studio Lemonade Social Networks Autoposter Pinterest allows Reflected XSS.This issue affects Lemonade Social Networks Autoposter Pinterest: from n/a through 2.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Lemonade Coding Studio - Lemonade Social Networks Autoposter Pinterest**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/lemonade-sna-pinterest-edition/vulnerability/wordpress-lemonade-social-networks-autoposter-pinterest-plugin-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23543, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23543
- **State**: PUBLISHED
- **Published Date**: January 07, 2022 at 20:05 UTC
- **Last Updated**: September 16, 2024 at 20:06 UTC
- **Reserved Date**: January 08, 2021 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P`
### Affected Products
**n/a - realms-shim**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.npmjs.com/package/realms-shim)
2. [](https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309908)
### Credits
- Cristian-Alexandru Staicu
- Abdullah Alhamdan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33219
- **State**: PUBLISHED
- **Published Date**: January 06, 2023 at 05:02 UTC
- **Last Updated**: April 09, 2025 at 19:49 UTC
- **Reserved Date**: June 14, 2022 at 10:44 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption in Automotive due to integer overflow to buffer overflow while registering a new listener with shared buffer.
### CVSS Metrics
- **CVSS Base Score**: 9.3/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- APQ8064AU (Status: affected)
- APQ8096AU (Status: affected)
- MSM8996AU (Status: affected)
- QAM8295P (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8295P (Status: affected)
- SA8540P (Status: affected)
- SA9000P (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1382, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1382 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1382
- **State**: PUBLISHED
- **Published Date**: March 10, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 12:50 UTC
- **Reserved Date**: March 09, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The PHP COM extensions for PHP on Windows systems allow context-dependent attackers to execute arbitrary code via a WScript.Shell COM object, as demonstrated by using the Run method of this object to execute cmd.exe, which bypasses PHP's safe mode.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3429](https://www.exploit-db.com/exploits/3429) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16735, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16735 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16735
- **State**: PUBLISHED
- **Published Date**: December 13, 2019 at 20:48 UTC
- **Last Updated**: August 05, 2024 at 01:24 UTC
- **Reserved Date**: September 24, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stack-based buffer overflow in processCommandUploadLog in libcommon.so in Petwant PF-103 firmware 4.22.2.42 and Petalk AI 3.2.2.30 allows remote attackers to cause denial of service or run arbitrary code as the root user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562aea3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54015
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 10:28 UTC
- **Last Updated**: May 13, 2025 at 09:38 UTC
- **Reserved Date**: November 27, 2024 at 09:14 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.90), SIPROTEC 5 6MD85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MD86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MD89 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MU85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7KE85 (CP300) (All versions >= V8.80), SIPROTEC 5 7SA82 (CP150) (All versions < V9.90), SIPROTEC 5 7SA86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SA87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.90), SIPROTEC 5 7SD86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SD87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SJ86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SK82 (CP150) (All versions < V9.90), SIPROTEC 5 7SK85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.90), SIPROTEC 5 7SL86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SL87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SS85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7ST85 (CP300) (All versions >= V8.80 < V9.68), SIPROTEC 5 7ST86 (CP300) (All versions < V9.83), SIPROTEC 5 7SX82 (CP150) (All versions < V9.90), SIPROTEC 5 7SX85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SY82 (CP150) (All versions < V9.90), SIPROTEC 5 7UM85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.90), SIPROTEC 5 7UT85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VE85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VK87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VU85 (CP300) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.2) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 2) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions >= V8.80 < V9.90), SIPROTEC 5 Compact 7SX800 (CP050) (All versions >= V9.50 < V9.90). Affected devices do not properly validate SNMP GET requests. This could allow an unauthenticated, remote attacker to retrieve sensitive information of the affected devices with SNMPv2 GET requests using default credentials.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-1392: Security Weakness
### Affected Products
**Siemens - SIPROTEC 5 6MD84 (CP300)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPROTEC 5 6MD85 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 6MD86 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 6MD89 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 6MU85 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7KE85 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7SA82 (CP150)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPROTEC 5 7SA86 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7SA87 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7SD82 (CP150)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPROTEC 5 7SD86 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7SD87 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7SJ81 (CP150)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPROTEC 5 7SJ82 (CP150)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPROTEC 5 7SJ85 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7SJ86 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7SK82 (CP150)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPROTEC 5 7SK85 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7SL82 (CP150)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPROTEC 5 7SL86 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7SL87 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7SS85 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7ST85 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7ST86 (CP300)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPROTEC 5 7SX82 (CP150)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPROTEC 5 7SX85 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7SY82 (CP150)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPROTEC 5 7UM85 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7UT82 (CP150)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPROTEC 5 7UT85 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7UT86 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7UT87 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7VE85 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7VK87 (CP300)**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 7VU85 (CP300)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.2)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 2)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPROTEC 5 Communication Module ETH-BD-2FO**
Affected versions:
- V8.80 (Status: affected)
**Siemens - SIPROTEC 5 Compact 7SX800 (CP050)**
Affected versions:
- V9.50 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-767615.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5035, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5035 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5035
- **State**: PUBLISHED
- **Published Date**: May 27, 2024 at 07:22 UTC
- **Last Updated**: August 01, 2024 at 21:03 UTC
- **Reserved Date**: May 16, 2024 at 21:01 UTC
- **Assigned By**: ONEKEY
### Vulnerability Description
The affected device expose a network service called "rftest" that is vulnerable to unauthenticated command injection on ports TCP/8888, TCP/8889, and TCP/8890. By successfully exploiting this flaw, remote unauthenticated attacker can gain arbitrary command execution on the device with elevated privileges.This issue affects Archer C4500X: through 1_1.1.6.
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**TP-Link - Archer C4500X**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://onekey.com/blog/security-advisory-remote-command-execution-on-tp-link-archer-c5400x/)
2. [](https://www.tp-link.com/en/support/download/archer-c5400x/#Firmware)
### Credits
- Quentin Kaiser from ONEKEY Research Labs |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24286, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24286 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24286
- **State**: PUBLISHED
- **Published Date**: May 14, 2021 at 11:38 UTC
- **Last Updated**: August 03, 2024 at 19:28 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The settings page of the Redirect 404 to parent WordPress plugin before 1.3.1 did not properly sanitise the tab parameter before outputting it back, leading to a reflected Cross-Site Scripting issue
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Moove Agency - Redirect 404 to parent**
Affected versions:
- 1.3.1 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/b9a535f3-cb0b-46fe-b345-da3462584e27)
2. [](http://packetstormsecurity.com/files/164328/WordPress-Redirect-404-To-Parent-1.3.0-Cross-Site-Scripting.html)
### Credits
- 0xB9 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1117, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1117 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1117
- **State**: PUBLISHED
- **Published Date**: September 06, 2013 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 02:41 UTC
- **Reserved Date**: January 11, 2013 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Buffer overflow in the exception handler in Cisco WebEx Recording Format (WRF) player T27 LD before SP32 EP16, T27 L10N before SP32_ORION111, and T28 before T28.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted WRF file, aka Bug ID CSCuc27639.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130904 Multiple Vulnerabilities in the Cisco WebEx Recording Format and Advanced Recording Format Players](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130904-webex) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4077, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4077 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4077
- **State**: PUBLISHED
- **Published Date**: October 14, 2013 at 01:00 UTC
- **Last Updated**: September 17, 2024 at 02:41 UTC
- **Reserved Date**: July 31, 2012 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco NX-OS allows local users to gain privileges and execute arbitrary commands via the sed e option, aka Bug IDs CSCtf25457 and CSCtf27651.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20131004 Cisco NX-OS Software Input Validation Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4077)
2. [98127](http://osvdb.org/98127)
3. [62849](http://www.securityfocus.com/bid/62849)
4. [55191](http://secunia.com/advisories/55191) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5544, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5544 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5544
- **State**: PUBLISHED
- **Published Date**: July 31, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 16:53 UTC
- **Reserved Date**: January 12, 2018 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
When the F5 BIG-IP APM 13.0.0-13.1.1 or 12.1.0-12.1.3 renders certain pages (pages with a logon agent or a confirm box), the BIG-IP APM may disclose configuration information such as partition and agent names via URI parameters.
### Affected Products
**F5 Networks, Inc. - BIG-IP (APM)**
Affected versions:
- 13.0.0-13.1.1 (Status: affected)
- 12.1.0-12.1.3 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K23024812)
2. [1041398](http://www.securitytracker.com/id/1041398)
3. [104932](http://www.securityfocus.com/bid/104932) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34577, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34577 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34577
- **State**: PUBLISHED
- **Published Date**: September 21, 2023 at 00:00 UTC
- **Last Updated**: September 24, 2024 at 18:19 UTC
- **Reserved Date**: June 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in Prestashop opartplannedpopup 1.4.11 and earlier allows remote attackers to run arbitrary SQL commands via OpartPlannedPopupModuleFrontController::prepareHook() method.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.friendsofpresta.org/modules/2023/09/19/opartplannedpopup.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26210, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26210 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26210
- **State**: PUBLISHED
- **Published Date**: November 03, 2020 at 18:20 UTC
- **Last Updated**: August 04, 2024 at 15:49 UTC
- **Reserved Date**: October 01, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
In BookStack before version 0.30.4, a user with permissions to edit a page could add an attached link which would execute untrusted JavaScript code when clicked by a viewer of the page. Dangerous content may remain in the database after this update. If you think this could have been exploited the linked advisory provides a SQL query to test. As a workaround, page edit permissions could be limited to only those that are trusted until you can upgrade although this will not address existing exploitation of this vulnerability. The issue is fixed in version 0.30.4.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**BookStackApp - BookStack**
Affected versions:
- < 0.30.4 (Status: affected)
### References
1. [](https://github.com/BookStackApp/BookStack/security/advisories/GHSA-7p2j-4h6p-cq3h)
2. [](https://github.com/BookStackApp/BookStack/commit/349162ea139556b2d25e09e155cec84e21cc9227)
3. [](https://bookstackapp.com/blog/beta-release-v0-30-4/)
4. [](https://github.com/BookStackApp/BookStack/releases/tag/v0.30.4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49047, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49047 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49047
- **State**: PUBLISHED
- **Published Date**: November 27, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 21:46 UTC
- **Reserved Date**: November 20, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AX1803 v1.0.0.1 contains a stack overflow via the devName parameter in the function formSetDeviceName.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formSetDeviceName.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7236
- **State**: PUBLISHED
- **Published Date**: January 19, 2020 at 20:02 UTC
- **Last Updated**: August 04, 2024 at 09:25 UTC
- **Reserved Date**: January 19, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
UHP UHP-100 3.4.1.15, 3.4.2.4, and 3.4.3 devices allow XSS via cw2?td= (Site Name field of the Site Setup section).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sku11army.blogspot.com/2020/01/uhp-networks-multiple-reflected-xss-in.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3314, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3314 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3314
- **State**: PUBLISHED
- **Published Date**: January 27, 2017 at 22:01 UTC
- **Last Updated**: October 08, 2024 at 20:34 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Core). Supported versions that are affected are 12.0.0, 12.1.0 and 12.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS v3.0 Base Score 6.1 (Confidentiality and Integrity impacts).
### Affected Products
**Oracle - FLEXCUBE Universal Banking**
Affected versions:
- 12.0.0 (Status: affected)
- 12.1.0 (Status: affected)
- 12.2.0 (Status: affected)
### References
1. [95549](http://www.securityfocus.com/bid/95549)
2. [1037636](http://www.securitytracker.com/id/1037636)
3. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2356, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2356 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2356
- **State**: PUBLISHED
- **Published Date**: July 20, 2021 at 22:43 UTC
- **Last Updated**: September 26, 2024 at 14:02 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H).
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.7.34 and prior (Status: affected)
- 8.0.25 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2021.html)
2. [](https://security.netapp.com/advisory/ntap-20210723-0001/)
3. [FEDORA-2021-dc4299a8d0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/)
4. [FEDORA-2021-df40c41094](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1010034, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1010034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1010034
- **State**: PUBLISHED
- **Published Date**: July 15, 2019 at 12:39 UTC
- **Last Updated**: August 05, 2024 at 03:07 UTC
- **Reserved Date**: March 20, 2019 at 00:00 UTC
- **Assigned By**: dwf
### Vulnerability Description
Deepwoods Software WebLibrarian 3.5.2 and earlier is affected by: SQL Injection. The impact is: Exposing the entire database. The component is: Function "AllBarCodes" (defined at database_code.php line 1018) is vulnerable to a boolean-based blind sql injection. This function call can be triggered by any user logged-in with at least Volunteer role or manage_circulation capabilities. PoC : /wordpress/wp-admin/admin.php?page=weblib-circulation-desk&orderby=title&order=DESC.
### Affected Products
**Deepwoods Software - WebLibrarian**
Affected versions:
- ≤ 3.5.2 (Status: affected)
### References
1. [](https://plugins.trac.wordpress.org/browser/weblibrarian/trunk/includes/database_code.php)
2. [](https://wpvulndb.com/vulnerabilities/9553) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42050, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42050 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42050
- **State**: PUBLISHED
- **Published Date**: December 14, 2021 at 14:09 UTC
- **Last Updated**: August 04, 2024 at 03:22 UTC
- **Reserved Date**: October 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in AbanteCart before 1.3.2. It allows DOM Based XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/abantecart/abantecart-src/releases)
2. [](https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-abantecart-e-commerce-platform/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1724, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1724 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1724
- **State**: PUBLISHED
- **Published Date**: June 21, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:34 UTC
- **Reserved Date**: June 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting vulnerability (XSS) in phpimageview.php for PHPImageView 1.0 allows remote attackers to execute arbitrary script as other users via the pic parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020504 Security holes : PHP Image View, NewsPro, Photo DB, As_web, GuestBook](http://online.securityfocus.com/archive/82/270970)
2. [4668](http://www.securityfocus.com/bid/4668)
3. [](http://www.ifrance.com/kitetoua/tuto/5holes4.txt)
4. [phpimageview-var-css(9000)](https://exchange.xforce.ibmcloud.com/vulnerabilities/9000) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0217, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0217
- **State**: PUBLISHED
- **Published Date**: January 16, 2008 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 07:39 UTC
- **Reserved Date**: January 10, 2008 at 00:00 UTC
- **Assigned By**: freebsd
### Vulnerability Description
The script program in FreeBSD 5.0 through 7.0-PRERELEASE invokes openpty, which creates a pseudo-terminal with world-readable and world-writable permissions when it is not run as root, which allows local users to read data from the terminal of the user running script.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28498](http://secunia.com/advisories/28498)
2. [1019191](http://www.securitytracker.com/id?1019191)
3. [freebsd-openpty-information-disclosure(39665)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39665)
4. [27284](http://www.securityfocus.com/bid/27284)
5. [FreeBSD-SA-08:01](http://security.FreeBSD.org/advisories/FreeBSD-SA-08:01.pty.asc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1329, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1329 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1329
- **State**: PUBLISHED
- **Published Date**: July 06, 2018 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 00:42 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Quality Manager (RQM) 5.0.x and 6.0 through 6.0.5 are vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 126231.
### Affected Products
**IBM - Rational Quality Manager**
Affected versions:
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
- 6.0.5 (Status: affected)
- 5.0.x (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=ibm10716201)
2. [ibm-rqm-cve20171329-html-injection(126231)](https://exchange.xforce.ibmcloud.com/vulnerabilities/126231) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-48036, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-48036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48036
- **State**: PUBLISHED
- **Published Date**: October 17, 2024 at 12:21 UTC
- **Last Updated**: October 17, 2024 at 13:02 UTC
- **Reserved Date**: October 08, 2024 at 13:14 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SKT Themes SKT Blocks – Gutenberg based Page Builder allows Stored XSS.This issue affects SKT Blocks – Gutenberg based Page Builder: from n/a through 1.6.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SKT Themes - SKT Blocks – Gutenberg based Page Builder**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/skt-blocks/wordpress-skt-blocks-plugin-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4249, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4249 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4249
- **State**: PUBLISHED
- **Published Date**: July 13, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:25 UTC
- **Reserved Date**: April 27, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Heap-based buffer overflow in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [91722](http://www.securityfocus.com/bid/91722)
2. [SUSE-SU-2016:1826](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html)
3. [GLSA-201607-03](https://security.gentoo.org/glsa/201607-03)
4. [openSUSE-SU-2016:1802](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html)
5. [](https://helpx.adobe.com/security/products/flash-player/apsb16-25.html)
6. [RHSA-2016:1423](https://access.redhat.com/errata/RHSA-2016:1423)
7. [MS16-093](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093)
8. [1036280](http://www.securitytracker.com/id/1036280) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000644, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000644 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000644
- **State**: PUBLISHED
- **Published Date**: August 20, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 20:31 UTC
- **Reserved Date**: August 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Eclipse RDF4j version < 2.4.0 Milestone 2 contains a XML External Entity (XXE) vulnerability in RDF4j XML parser parsing RDF files that can result in the disclosure of confidential data, denial of service, server side request forgery, port scanning. This attack appear to be exploitable via Specially crafted RDF file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/eclipse/rdf4j/issues/1056)
2. [](https://0dd.zone/2018/08/05/rdf4j-XXE/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13066, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13066
- **State**: PUBLISHED
- **Published Date**: July 02, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 08:52 UTC
- **Reserved Date**: July 02, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a memory leak in util/parser.c in libming 0.4.8, which will lead to a denial of service via parseSWF_DEFINEBUTTON2, parseSWF_DEFINEFONT, parseSWF_DEFINEFONTINFO, parseSWF_DEFINELOSSLESS, parseSWF_DEFINESPRITE, parseSWF_DEFINETEXT, parseSWF_DOACTION, parseSWF_FILLSTYLEARRAY, parseSWF_FRAMELABEL, parseSWF_LINESTYLEARRAY, parseSWF_PLACEOBJECT2, or parseSWF_SHAPEWITHSTYLE.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/libming/libming/issues/146) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15989, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15989 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15989
- **State**: PUBLISHED
- **Published Date**: November 03, 2020 at 02:21 UTC
- **Last Updated**: August 04, 2024 at 13:30 UTC
- **Reserved Date**: July 27, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Uninitialized data in PDFium in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1108351)
3. [openSUSE-SU-2020:1829](http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html)
4. [FEDORA-2020-127d40f1ab](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/)
5. [FEDORA-2020-8aca25b5c8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS/)
6. [FEDORA-2020-4e8e48da22](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/)
7. [DSA-4824](https://www.debian.org/security/2021/dsa-4824)
8. [GLSA-202101-30](https://security.gentoo.org/glsa/202101-30) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9719, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9719
- **State**: PUBLISHED
- **Published Date**: November 16, 2017 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 20:47 UTC
- **Reserved Date**: June 15, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the kernel driver MDSS, a buffer overflow can occur in HDMI CEC parsing if frame size is out of range.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2017-11-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2303, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2303
- **State**: PUBLISHED
- **Published Date**: August 05, 2022 at 15:11 UTC
- **Last Updated**: August 03, 2024 at 00:32 UTC
- **Reserved Date**: July 04, 2022 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab CE/EE affecting all versions before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. It may be possible for group members to bypass 2FA enforcement enabled at the group level by using Resource Owner Password Credentials grant to obtain an access token without using 2FA.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=15.2, <15.2.1 (Status: affected)
- >=15.1, <15.1.4 (Status: affected)
- >=0.0, <15.0.5 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/355028)
2. [](https://hackerone.com/reports/1498133)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2303.json)
### Credits
- Thanks [albatraoz](https://hackerone.com/albatraoz) for reporting this vulnerability through our HackerOne bug bounty program. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6221, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6221 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6221
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: August 14, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-7263, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-7263 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-7263
- **State**: PUBLISHED
- **Published Date**: December 28, 2024 at 07:02 UTC
- **Last Updated**: December 28, 2024 at 16:15 UTC
- **Reserved Date**: May 25, 2024 at 03:55 UTC
- **Assigned By**: huawei
### Vulnerability Description
Some Huawei home music system products have a path traversal vulnerability. Successful exploitation of this vulnerability may cause unauthorized file deletion or file permission change.(Vulnerability ID:HWPSIRT-2023-53450)
This vulnerability has been assigned a (CVE)ID:CVE-2023-7263
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-35: Security Weakness
### Affected Products
**Huawei - HarmonyOS AILife Solution 8.0**
Affected versions:
- HarmonyOS AILife Audio Service 3.0.2.307 (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-ptvihhms-20747ba3-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24646
- **State**: PUBLISHED
- **Published Date**: February 03, 2025 at 14:22 UTC
- **Last Updated**: February 03, 2025 at 16:26 UTC
- **Reserved Date**: January 23, 2025 at 14:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Maxim Glazunov XML for Avito allows Reflected XSS. This issue affects XML for Avito: from n/a through 2.5.2.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Maxim Glazunov - XML for Avito**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/xml-for-avito/vulnerability/wordpress-xml-for-avito-plugin-2-5-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Le Ngoc Anh (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3341, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3341 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3341
- **State**: PUBLISHED
- **Published Date**: August 19, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:43 UTC
- **Reserved Date**: May 07, 2014 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The SNMP module in Cisco NX-OS 7.0(3)N1(1) and earlier on Nexus 5000 and 6000 devices provides different error messages for invalid requests depending on whether the VLAN ID exists, which allows remote attackers to enumerate VLANs via a series of requests, aka Bug ID CSCup85616.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=35338)
2. [cisco-nxos-cve20143341-info-disc(95329)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95329)
3. [69266](http://www.securityfocus.com/bid/69266)
4. [20140818 Cisco NX-OS Software SNMP Information Disclosure Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3341)
5. [1030746](http://www.securitytracker.com/id/1030746) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16649, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16649
- **State**: PUBLISHED
- **Published Date**: November 07, 2017 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 20:27 UTC
- **Reserved Date**: November 07, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3617-1](https://usn.ubuntu.com/3617-1/)
2. [USN-3619-2](https://usn.ubuntu.com/3619-2/)
3. [USN-3617-3](https://usn.ubuntu.com/3617-3/)
4. [[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update](https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html)
5. [](https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ)
6. [](https://patchwork.ozlabs.org/patch/834771/)
7. [USN-3822-2](https://usn.ubuntu.com/3822-2/)
8. [USN-3617-2](https://usn.ubuntu.com/3617-2/)
9. [101761](http://www.securityfocus.com/bid/101761)
10. [USN-3619-1](https://usn.ubuntu.com/3619-1/)
11. [USN-3822-1](https://usn.ubuntu.com/3822-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30695, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30695 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30695
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 14:28 UTC
- **Last Updated**: August 03, 2024 at 22:40 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave, iOS 14.6 and iPadOS 14.6. Processing a maliciously crafted USD file may disclose memory contents.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212528)
2. [](https://support.apple.com/en-us/HT212529)
3. [](https://support.apple.com/en-us/HT212530)
4. [](https://support.apple.com/en-us/HT212531) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9181, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9181 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9181
- **State**: PUBLISHED
- **Published Date**: December 22, 2016 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 02:42 UTC
- **Reserved Date**: November 04, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
perl-Image-Info: When parsing an SVG file, external entity expansion (XXE) was not disabled. An attacker could craft an SVG file which, when processed by an application using perl-Image-Info, could cause denial of service or, potentially, information disclosure.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20161104 Re: CVE request: XXE in perl Image:nfo and XML:wig](http://www.openwall.com/lists/oss-security/2016/11/04/2)
2. [94220](http://www.securityfocus.com/bid/94220) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14674, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14674 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14674
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: September 21, 2017 at 00:00 UTC
- **Assigned By**: forcepoint
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37150, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37150 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37150
- **State**: PUBLISHED
- **Published Date**: August 10, 2022 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 01:16 UTC
- **Reserved Date**: July 21, 2021 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to request secure resources. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Apache Software Foundation - Apache Traffic Server**
Affected versions:
- 8.0.0 to 9.1.2 (Status: affected)
### References
1. [](https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21)
2. [DSA-5206](https://www.debian.org/security/2022/dsa-5206)
3. [FEDORA-2022-9832c0c04b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/)
4. [FEDORA-2022-23043f5a0b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/)
5. [[debian-lts-announce] 20230123 [SECURITY] [DLA 3279-1] trafficserver security update](https://lists.debian.org/debian-lts-announce/2023/01/msg00019.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23183, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23183
- **State**: PUBLISHED
- **Published Date**: May 22, 2025 at 15:32 UTC
- **Last Updated**: May 22, 2025 at 15:56 UTC
- **Reserved Date**: January 12, 2025 at 08:45 UTC
- **Assigned By**: INCD
### Vulnerability Description
CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**UBtech - Freepass**
Affected versions:
- 1.3.1807.1500 (Status: affected)
### References
1. [](https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0)
### Credits
- Moriel Harush, Dudu Moyal |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4484, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4484 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4484
- **State**: PUBLISHED
- **Published Date**: January 30, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 11:20 UTC
- **Reserved Date**: June 20, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
FontParser in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted .dfont file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/HT204245)
2. [](http://support.apple.com/HT204246)
3. [1031650](http://www.securitytracker.com/id/1031650)
4. [APPLE-SA-2015-01-27-2](http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html)
5. [](http://support.apple.com/HT204244)
6. [APPLE-SA-2015-01-27-1](http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html)
7. [APPLE-SA-2015-01-27-4](http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21115, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21115
- **State**: PUBLISHED
- **Published Date**: April 16, 2024 at 21:26 UTC
- **Last Updated**: March 25, 2025 at 14:27 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Affected Products
**Oracle Corporation - VM VirtualBox**
Affected versions:
- * (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3572, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3572 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3572
- **State**: PUBLISHED
- **Published Date**: November 16, 2005 at 07:37 UTC
- **Last Updated**: August 07, 2024 at 23:17 UTC
- **Reserved Date**: November 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in Peel 2.6 through 2.7 allows remote attackers to execute arbitrary SQL commands via the rubid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15415](http://www.securityfocus.com/bid/15415)
2. [17536](http://secunia.com/advisories/17536)
3. [ADV-2005-2416](http://www.vupen.com/english/advisories/2005/2416)
4. [20818](http://www.osvdb.org/20818) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15966, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15966 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15966
- **State**: PUBLISHED
- **Published Date**: October 29, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 20:13 UTC
- **Reserved Date**: October 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Zh YandexMap (aka com_zhyandexmap) component 6.1.1.0 for Joomla! allows SQL Injection via the placemarklistid parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [101694](http://www.securityfocus.com/bid/101694)
2. [](https://packetstormsecurity.com/files/144436/Joomla-Zh-YandexMap-6.1.1.0-SQL-Injection.html)
3. [43093](https://www.exploit-db.com/exploits/43093/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0863, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0863 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0863
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:37 UTC
- **Reserved Date**: November 22, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cisco 12000 with IOS 12.0 and line cards based on Engine 2 does not handle the "fragment" keyword in a compiled ACL (Turbo ACL) for packets that are sent to the router, which allows remote attackers to cause a denial of service via a flood of fragments.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [M-018](http://www.ciac.org/ciac/bulletins/m-018.shtml)
2. [20011114 Multiple Vulnerabilities in Access Control List Implementation for Cisco 12000 Series Internet Router](http://www.cisco.com/warp/public/707/GSR-ACL-pub.shtml)
3. [1987](http://www.osvdb.org/1987)
4. [cisco-acl-outgoing-fragment(7551)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7551)
5. [3539](http://www.securityfocus.com/bid/3539) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46319, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46319
- **State**: PUBLISHED
- **Published Date**: December 20, 2022 at 00:00 UTC
- **Last Updated**: April 16, 2025 at 18:20 UTC
- **Reserved Date**: November 29, 2022 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Fingerprint calibration has a vulnerability of lacking boundary judgment. Successful exploitation of this vulnerability may cause out-of-bounds write.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 2.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 12.0.0 (Status: affected)
- 11.0.1 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2022/12/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8014, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8014 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8014
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 19:43 UTC
- **Last Updated**: August 04, 2024 at 21:02 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-41.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24925, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24925
- **State**: PUBLISHED
- **Published Date**: February 11, 2022 at 17:40 UTC
- **Last Updated**: August 03, 2024 at 04:29 UTC
- **Reserved Date**: February 10, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper input validation vulnerability in SettingsProvider prior to Android S(12) allows privileged attackers to trigger a permanent denial of service attack on a victim's devices.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- - (Status: affected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=2) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.