System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26918, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26918
- **State**: PUBLISHED
- **Published Date**: April 15, 2022 at 19:05 UTC
- **Last Updated**: January 02, 2025 at 18:51 UTC
- **Reserved Date**: March 11, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Fax Compose Form Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Fax Compose Form Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26918) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-19553, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-19553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-19553
- **State**: PUBLISHED
- **Published Date**: September 21, 2021 at 18:51 UTC
- **Last Updated**: August 04, 2024 at 14:15 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vlnerability exists in WUZHI CMS up to and including 4.1.0 in the config function in coreframe/app/attachment/libs/class/ckditor.class.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wuzhicms/wuzhicms/issues/179) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20164, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20164
- **State**: PUBLISHED
- **Published Date**: May 18, 2023 at 00:00 UTC
- **Last Updated**: October 28, 2024 at 16:29 UTC
- **Reserved Date**: October 27, 2022 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit these vulnerabilities, an attacker must have valid credentials on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Cisco - Cisco Identity Services Engine Software **
Affected versions:
- n/a (Status: affected)
### References
1. [20230517 Cisco Identity Services Engine Command Injection Vulnerabilities](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-sRQnsEU9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23128, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23128
- **State**: PUBLISHED
- **Published Date**: February 22, 2024 at 03:18 UTC
- **Last Updated**: January 28, 2025 at 16:20 UTC
- **Reserved Date**: January 11, 2024 at 21:46 UTC
- **Assigned By**: autodesk
### Vulnerability Description
A maliciously crafted MODEL file, when parsed in libodxdll.dll and ASMDATAX229A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Autodesk - AutoCAD**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
- 2021 (Status: affected)
**Autodesk - AutoCAD Architecture**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
- 2021 (Status: affected)
**Autodesk - AutoCAD Electrical**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
- 2021 (Status: affected)
**Autodesk - AutoCAD Mechanical**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
- 2021 (Status: affected)
**Autodesk - AutoCAD MEP**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
- 2021 (Status: affected)
**Autodesk - AutoCAD Plant 3D**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
- 2021 (Status: affected)
**Autodesk - Civil 3D**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
- 2021 (Status: affected)
**Autodesk - Advance Steel**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
- 2021 (Status: affected)
**Autodesk - AutoCAD MAP 3D**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
- 2021 (Status: affected)
### References
1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002)
2. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004)
3. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4022
- **State**: PUBLISHED
- **Published Date**: May 03, 2012 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 20:43 UTC
- **Reserved Date**: October 06, 2011 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The sensor in Cisco Intrusion Prevention System (IPS) 7.0 and 7.1 allows remote attackers to cause a denial of service (file-handle exhaustion and mainApp hang) by making authentication attempts that exceed the configured limit, aka Bug ID CSCto51204.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.cisco.com/web/software/282549709/56954/IPS-7-1-3-E4_readme.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31987, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31987 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31987
- **State**: PUBLISHED
- **Published Date**: October 05, 2021 at 21:46 UTC
- **Last Updated**: November 08, 2024 at 08:20 UTC
- **Reserved Date**: April 30, 2021 at 00:00 UTC
- **Assigned By**: Axis
### Vulnerability Description
A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to bypass blocked network recipients.
### Weakness Classification (CWE)
- CWE-1286: Security Weakness
### Affected Products
**Axis Communications AB - AXIS OS**
Affected versions:
- AXIS OS 5.51 or later (Status: affected)
### References
1. [](https://www.axis.com/files/tech_notes/CVE-2021-31987.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1142
- **State**: PUBLISHED
- **Published Date**: April 12, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 01:14 UTC
- **Reserved Date**: March 29, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly load VMware programs, which might allow Windows guest OS users to gain privileges by placing a Trojan horse program at an unspecified location on the guest OS disk.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201209-25](http://security.gentoo.org/glsa/glsa-201209-25.xml)
2. [39206](http://secunia.com/advisories/39206)
3. [[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues](http://lists.vmware.com/pipermail/security-announce/2010/000090.html)
4. [39394](http://www.securityfocus.com/bid/39394)
5. [20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues](http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html)
6. [](http://www.acrossecurity.com/aspr/ASPR-2010-04-12-2-PUB.txt)
7. [1023833](http://www.securitytracker.com/id?1023833)
8. [39198](http://secunia.com/advisories/39198)
9. [1023832](http://www.securitytracker.com/id?1023832)
10. [](http://www.vmware.com/security/advisories/VMSA-2010-0007.html)
11. [20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues](http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45254, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45254 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45254
- **State**: PUBLISHED
- **Published Date**: November 14, 2024 at 09:46 UTC
- **Last Updated**: November 14, 2024 at 15:04 UTC
- **Reserved Date**: August 25, 2024 at 06:16 UTC
- **Assigned By**: INCD
### Vulnerability Description
VaeMendis - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**VaeMendis - VaeMendis Ubooquity version 2.1.2**
Affected versions:
- 2.1.2 (Status: affected)
### References
1. [](https://www.gov.il/en/Departments/faq/cve_advisories)
### Credits
- Guy Hayou |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13434, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13434
- **State**: PUBLISHED
- **Published Date**: January 17, 2025 at 04:30 UTC
- **Last Updated**: February 12, 2025 at 19:26 UTC
- **Reserved Date**: January 15, 2025 at 20:09 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP Inventory Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'message' parameter in all versions up to, and including, 2.3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**chuck1982 - WP Inventory Manager**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7e3069d4-12b8-4949-9daf-0e01590799da?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3223184%40wp-inventory-manager&new=3223184%40wp-inventory-manager&sfp_email=&sfph_mail=)
### Credits
- ngocanh le |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24824, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24824
- **State**: PUBLISHED
- **Published Date**: March 31, 2023 at 22:01 UTC
- **Last Updated**: February 11, 2025 at 17:19 UTC
- **Reserved Date**: January 30, 2023 at 14:43 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. A polynomial time complexity issue in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. This CVE covers quadratic complexity issues when parsing text which leads with either large numbers of `>` or `-` characters. This issue has been addressed in version 0.29.0.gfm.10. Users are advised to upgrade. Users unable to upgrade should validate that their input comes from trusted sources.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
- CWE-407: Security Weakness
### Affected Products
**github - cmark-gfm**
Affected versions:
- < 0.29.0.gfm.10 (Status: affected)
### References
1. [https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh](https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh)
2. [https://github.com/github/cmark-gfm/commit/2300c1bd2c8226108885bf019655c4159cf26b59](https://github.com/github/cmark-gfm/commit/2300c1bd2c8226108885bf019655c4159cf26b59) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38764, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38764
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 13:00 UTC
- **Last Updated**: January 02, 2025 at 14:37 UTC
- **Reserved Date**: June 19, 2024 at 12:34 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Marsian allows Cross Site Request Forgery.This issue affects i-transform: from n/a through 3.0.9.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Marsian - i-transform**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/theme/i-transform/vulnerability/wordpress-i-transform-theme-3-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Dhabaleshwar Das (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22058
- **State**: PUBLISHED
- **Published Date**: September 26, 2022 at 16:35 UTC
- **Last Updated**: May 21, 2025 at 15:13 UTC
- **Reserved Date**: December 21, 2021 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption due to use after free issue in kernel while processing ION handles in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- APQ8009, APQ8009W, APQ8017, APQ8053, APQ8096AU, AQT1000, CSRB31024, MDM9150, MDM9206, MDM9250, MDM9607, MDM9626, MDM9628, MDM9640, MDM9650, MSM8909W, MSM8917, MSM8937, MSM8953, MSM8996AU, PM8937, QCA4020, QCA6174A, QCA6175A, QCA6310, QCA6320, QCA6335, QCA6420, QCA6430, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6595AU, QCA6696, QCA9367, QCA9377, QCA9379, QCN7605, QCN7606, QCS603, QCS605, Qualcomm215, SA415M, SD429, SD439, SD450, SD632, SD660, SD670, SD710, SD820, SD835, SD845, SD855, SDM429W, SDW2500, SDX20, SDX24, SDXR1, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3980, WCN3990, WCN3998, WSA8810, WSA8815 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/july-2022-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6513, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6513 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6513
- **State**: PUBLISHED
- **Published Date**: October 15, 2014 at 22:03 UTC
- **Last Updated**: August 06, 2024 at 12:17 UTC
- **Reserved Date**: September 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [61609](http://secunia.com/advisories/61609)
2. [70569](http://www.securityfocus.com/bid/70569)
3. [](http://www-01.ibm.com/support/docview.wss?uid=swg21688283)
4. [USN-2386-1](http://www.ubuntu.com/usn/USN-2386-1)
5. [USN-2388-1](http://www.ubuntu.com/usn/USN-2388-1)
6. [HPSBUX03218](http://marc.info/?l=bugtraq&m=141775382904016&w=2)
7. [61629](http://secunia.com/advisories/61629)
8. [SUSE-SU-2014:1549](http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html)
9. [USN-2388-2](http://www.ubuntu.com/usn/USN-2388-2)
10. [SUSE-SU-2014:1422](http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html)
11. [SUSE-SU-2015:0392](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html)
12. [SUSE-SU-2014:1526](http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html)
13. [SUSE-SU-2015:0345](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html)
14. [](http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html)
15. [SSRT101770](http://marc.info/?l=bugtraq&m=141775382904016&w=2)
16. [GLSA-201502-12](http://security.gentoo.org/glsa/glsa-201502-12.xml)
17. [SUSE-SU-2015:0344](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2431, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2431 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2431
- **State**: PUBLISHED
- **Published Date**: June 16, 2023 at 07:08 UTC
- **Last Updated**: February 13, 2025 at 16:44 UTC
- **Reserved Date**: April 30, 2023 at 22:44 UTC
- **Assigned By**: kubernetes
### Vulnerability Description
A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.
### CVSS Metrics
- **CVSS Base Score**: 3.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-1287: Security Weakness
### Affected Products
**Kubernetes - Kubernetes**
Affected versions:
- 0 (Status: affected)
- v1.25.0 (Status: affected)
- v1.26.0 (Status: affected)
- v1.27.0 (Status: affected)
### References
1. [](https://groups.google.com/g/kubernetes-security-announce/c/QHmx0HOQa10)
2. [](https://github.com/kubernetes/kubernetes/issues/118690)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBX4RL4UOC7JHWWYB2AJCKSUM7EG5Y5G/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/43HDSKBKPSW53OW647B5ETHRWFFNHSRQ/)
### Credits
- Tim Allclair
- Craig Ingram |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0962, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0962 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0962
- **State**: PUBLISHED
- **Published Date**: May 20, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 22:14 UTC
- **Reserved Date**: February 10, 2011 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in CSCOnm/servlet/com.cisco.nm.help.ServerHelpEngine in the Common Services Device Center in Cisco Unified Operations Manager (CUOM) before 8.6 allows remote attackers to inject arbitrary web script or HTML via the tag parameter, aka Bug ID CSCto12712.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=23087)
2. [](http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf)
3. [20110518 Cisco Unified Operations Manager Multiple Vulnerabilities - SOS-11-006](http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html)
4. [17304](http://www.exploit-db.com/exploits/17304)
5. [cisco-uom-common-services-xss(67524)](https://exchange.xforce.ibmcloud.com/vulnerabilities/67524) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46218, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46218 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46218
- **State**: PUBLISHED
- **Published Date**: December 07, 2023 at 01:10 UTC
- **Last Updated**: February 13, 2025 at 17:14 UTC
- **Reserved Date**: October 19, 2023 at 01:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
This flaw allows a malicious HTTP server to set "super cookies" in curl that
are then passed back to more origins than what is otherwise allowed or
possible. This allows a site to set cookies that then would get sent to
different and unrelated sites and domains.
It could do this by exploiting a mixed case flaw in curl's function that
verifies a given cookie domain against the Public Suffix List (PSL). For
example a cookie could be set with `domain=co.UK` when the URL used a lower
case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.
### Affected Products
**curl - curl**
Affected versions:
- 8.4.0 (Status: affected)
- 7.46.0 (Status: unaffected)
### References
1. [](https://hackerone.com/reports/2212193)
2. [](https://curl.se/docs/CVE-2023-46218.html)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ZX3VW67N4ACRAPMV2QS2LVYGD7H2MVE/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/)
5. [](https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html)
6. [](https://www.debian.org/security/2023/dsa-5587)
7. [](https://security.netapp.com/advisory/ntap-20240125-0007/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11026, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11026 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11026
- **State**: PUBLISHED
- **Published Date**: November 16, 2017 at 22:00 UTC
- **Last Updated**: September 17, 2024 at 04:24 UTC
- **Reserved Date**: July 07, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while flashing FRP partition using reference FRP unlock, authentication method can be compromised for static keys.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2017-11-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-1043, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-1043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-1043
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:45 UTC
- **Reserved Date**: November 29, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Format string vulnerability in ypserv in Mandrake Linux 7.1 and earlier, and possibly other Linux operating systems, allows an attacker to gain root privileges when ypserv is built without a vsyslog() function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [linux-ypserv-format-string(5731)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5731)
2. [MDKSA-2000:064](http://www.linux-mandrake.com/en/security/MDKSA-2000-064.php3?dis=7.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32702, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32702 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32702
- **State**: PUBLISHED
- **Published Date**: June 25, 2021 at 16:25 UTC
- **Last Updated**: August 03, 2024 at 23:25 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message. You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `1.4.1` or lower **unless** you are using custom error handling that does not return the error message in an HTML response. Upgrade to version `1.4.1` to resolve. The fix adds basic HTML escaping to the error message and it should not impact your users.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**auth0 - nextjs-auth0**
Affected versions:
- < 1.4.2 (Status: affected)
### References
1. [](https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7)
2. [](https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf)
3. [](https://www.npmjs.com/package/%40auth0/nextjs-auth0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11409, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11409
- **State**: PUBLISHED
- **Published Date**: November 21, 2024 at 02:06 UTC
- **Last Updated**: November 21, 2024 at 14:52 UTC
- **Reserved Date**: November 19, 2024 at 13:50 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Grid View Gallery plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.0 via deserialization of untrusted input from cs_all_photos_details parameter. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**priyajain2802 - Grid View Gallery**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a407d8b1-1d21-4b23-a8d6-a977544a19b4?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/grid-view-gallery/trunk/custom-slider-short-code.php#L161)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26819, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26819
- **State**: PUBLISHED
- **Published Date**: April 19, 2025 at 00:00 UTC
- **Last Updated**: April 21, 2025 at 15:09 UTC
- **Reserved Date**: February 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cJSON 1.7.15 might allow a denial of service via a crafted JSON document such as {"a": true, "b": [ null,9999999999999999999999999999999999999999999999912345678901234567]}.
### CVSS Metrics
- **CVSS Base Score**: 2.9/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-440: Security Weakness
### Affected Products
**cJSON Project - cJSON**
Affected versions:
- 1.7.15 (Status: affected)
### References
1. [](https://github.com/boofish/json_bugs/tree/main/cjson) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0294, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0294 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0294
- **State**: PUBLISHED
- **Published Date**: February 12, 2022 at 01:35 UTC
- **Last Updated**: August 02, 2024 at 23:25 UTC
- **Reserved Date**: January 19, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Push messaging in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop_19.html)
2. [](https://crbug.com/1273017) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20065, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20065
- **State**: PUBLISHED
- **Published Date**: April 11, 2022 at 19:37 UTC
- **Last Updated**: August 03, 2024 at 02:02 UTC
- **Reserved Date**: October 12, 2021 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In ccci, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06108658; Issue ID: ALPS06108658.
### Affected Products
**MediaTek, Inc. - MT6580, MT6737, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6833, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6983, MT8321, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8797**
Affected versions:
- Android 10.0, 11.0, 12.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/April-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24747, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24747
- **State**: PUBLISHED
- **Published Date**: January 31, 2024 at 22:10 UTC
- **Last Updated**: August 01, 2024 at 23:28 UTC
- **Reserved Date**: January 29, 2024 at 20:51 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
MinIO is a High Performance Object Storage. When someone creates an access key, it inherits the permissions of the parent key. Not only for `s3:*` actions, but also `admin:*` actions. Which means unless somewhere above in the access-key hierarchy, the `admin` rights are denied, access keys will be able to simply override their own `s3` permissions to something more permissive. The vulnerability is fixed in RELEASE.2024-01-31T20-20-33Z.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**minio - minio**
Affected versions:
- < RELEASE.2024-01-31T20-20-33Z (Status: affected)
### References
1. [https://github.com/minio/minio/security/advisories/GHSA-xx8w-mq23-29g4](https://github.com/minio/minio/security/advisories/GHSA-xx8w-mq23-29g4)
2. [https://github.com/minio/minio/commit/0ae4915a9391ef4b3ec80f5fcdcf24ee6884e776](https://github.com/minio/minio/commit/0ae4915a9391ef4b3ec80f5fcdcf24ee6884e776)
3. [https://github.com/minio/minio/releases/tag/RELEASE.2024-01-31T20-20-33Z](https://github.com/minio/minio/releases/tag/RELEASE.2024-01-31T20-20-33Z) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8726, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8726 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8726
- **State**: PUBLISHED
- **Published Date**: January 11, 2021 at 15:35 UTC
- **Last Updated**: August 05, 2024 at 07:02 UTC
- **Reserved Date**: March 15, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://k7computing.com)
2. [](http://k7antivirus.com)
3. [](https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39876
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 12:05 UTC
- **Last Updated**: May 01, 2025 at 03:55 UTC
- **Reserved Date**: July 01, 2024 at 13:05 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected applications do not properly handle log rotation. This could allow an unauthenticated remote attacker to cause a denial of service condition through resource exhaustion on the device.
### CVSS Metrics
- **CVSS Base Score**: 4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**Siemens - SINEMA Remote Connect Server**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-381581.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4188, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4188 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4188
- **State**: PUBLISHED
- **Published Date**: April 09, 2012 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 00:01 UTC
- **Reserved Date**: October 25, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the Create Attribute function in jclient in Novell iManager 2.7.4 before patch 4 allows remote authenticated users to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted EnteredAttrName parameter, a related issue to CVE-2010-1929.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1026894](http://www.securitytracker.com/id?1026894)
2. [imanager-enteredattrname-dos(74669)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74669)
3. [](http://www.novell.com/support/viewContent.do?externalId=7002971)
4. [48672](http://secunia.com/advisories/48672) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25736, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25736 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25736
- **State**: PUBLISHED
- **Published Date**: June 19, 2023 at 10:22 UTC
- **Last Updated**: December 11, 2024 at 16:18 UTC
- **Reserved Date**: February 13, 2023 at 08:46 UTC
- **Assigned By**: mozilla
### Vulnerability Description
An invalid downcast from `nsHTMLDocument` to `nsIContent` could have lead to undefined behavior. This vulnerability affects Firefox < 110.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1811331)
2. [](https://www.mozilla.org/security/advisories/mfsa2023-05/)
### Credits
- Lukas Bernhard |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23082, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23082 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23082
- **State**: PUBLISHED
- **Published Date**: April 08, 2024 at 00:00 UTC
- **Last Updated**: August 01, 2024 at 22:51 UTC
- **Reserved Date**: January 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ThreeTen Backport v1.6.8 was discovered to contain an integer overflow via the component org.threeten.bp.format.DateTimeFormatter::parse(CharSequence, ParsePosition). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://threeten.com)
2. [](https://github.com/ThreeTen/threetenbp)
3. [](https://gist.github.com/LLM4IG/d2618f5f4e5ac37eb75cff5617e58b90) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4710, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4710
- **State**: PUBLISHED
- **Published Date**: January 28, 2011 at 20:29 UTC
- **Last Updated**: August 07, 2024 at 03:55 UTC
- **Reserved Date**: January 28, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the addItem method in the Menu widget in YUI before 2.9.0 allows remote attackers to inject arbitrary web script or HTML via a field that is added to a menu, related to documentation that specifies this field as a text field rather than an HTML field, a similar issue to CVE-2010-4569 and CVE-2010-4570.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://yuilibrary.com/projects/yui2/ticket/2529231)
2. [](http://yuilibrary.com/projects/yui2/ticket/2529228)
3. [yui-additem-xss(65180)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65180)
4. [](http://yuilibrary.com/forum/viewtopic.php?p=12923) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1670, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1670
- **State**: PUBLISHED
- **Published Date**: April 10, 2011 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 22:37 UTC
- **Reserved Date**: April 09, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in actions/add.php in InTerra Blog Machine 1.84, and possibly earlier versions, allows remote attackers to inject arbitrary web script or HTML via the subject parameter to post_url/edit.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [47104](http://www.securityfocus.com/bid/47104)
2. [interrablogmachine-subject-xss(66562)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66562)
3. [20110331 HTB22931: XSS vulnerability in InTerra Blog Machine](http://www.securityfocus.com/archive/1/517271/100/0/threaded)
4. [](http://www.htbridge.ch/advisory/xss_vulnerability_in_interra_blog_machine.html)
5. [17098](http://www.exploit-db.com/exploits/17098)
6. [8195](http://securityreason.com/securityalert/8195) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41576, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41576 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41576
- **State**: PUBLISHED
- **Published Date**: October 14, 2022 at 00:00 UTC
- **Last Updated**: May 14, 2025 at 15:05 UTC
- **Reserved Date**: September 27, 2022 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
The rphone module has a script that can be maliciously modified.Successful exploitation of this vulnerability may cause irreversible programs to be implanted on user devices.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 2.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 12.0.0 (Status: affected)
- 11.0.1 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2022/10/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3618, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3618 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3618
- **State**: PUBLISHED
- **Published Date**: July 25, 2012 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 20:13 UTC
- **Reserved Date**: June 19, 2012 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT5485)
2. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html)
3. [](http://support.apple.com/kb/HT5503)
4. [APPLE-SA-2012-09-12-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html)
5. [APPLE-SA-2012-07-25-1](http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html)
6. [](http://support.apple.com/kb/HT5400) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3215, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3215 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3215
- **State**: PUBLISHED
- **Published Date**: June 14, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 14:05 UTC
- **Reserved Date**: June 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHPMailer 1.7, when configured to use sendmail, allows remote attackers to execute arbitrary shell commands via shell metacharacters in the SendmailSend function in class.phpmailer.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070611 PHPMailer command execution](http://www.securityfocus.com/archive/1/471065/100/0/threaded)
2. [DSA-1315](http://www.debian.org/security/2007/dsa-1315)
3. [](http://sourceforge.net/project/shownotes.php?release_id=517428&group_id=157374)
4. [phpmailer-popen-command-execution(34818)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34818)
5. [25755](http://secunia.com/advisories/25755)
6. [2802](http://securityreason.com/securityalert/2802)
7. [76139](http://osvdb.org/76139)
8. [24417](http://www.securityfocus.com/bid/24417)
9. [](https://sourceforge.net/tracker/index.php?func=detail&aid=1734811&group_id=26031&atid=385707)
10. [37206](http://osvdb.org/37206)
11. [ADV-2007-2267](http://www.vupen.com/english/advisories/2007/2267)
12. [](http://larholm.com/2007/06/11/phpmailer-0day-remote-execution/)
13. [](http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_rce)
14. [25626](http://secunia.com/advisories/25626)
15. [25758](http://secunia.com/advisories/25758)
16. [ADV-2007-2161](http://www.vupen.com/english/advisories/2007/2161)
17. [20111005 vTiger CRM 5.2.x <= Remote Code Execution Vulnerability](http://seclists.org/fulldisclosure/2011/Oct/223) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56182
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 09:48 UTC
- **Last Updated**: June 10, 2025 at 15:17 UTC
- **Reserved Date**: December 18, 2024 at 12:06 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC Field PG M6 (All versions < V26.01.12), SIMATIC IPC BX-21A (All versions < V31.01.07), SIMATIC IPC BX-32A (All versions < V29.01.07), SIMATIC IPC BX-39A (All versions < V29.01.07), SIMATIC IPC BX-59A (All versions < V32.01.04), SIMATIC IPC PX-32A (All versions < V29.01.07), SIMATIC IPC PX-39A (All versions < V29.01.07), SIMATIC IPC PX-39A PRO (All versions < V29.01.07), SIMATIC IPC RC-543A (All versions), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC RW-543B (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions < V25.02.15), SIMATIC IPC647E (All versions < V25.02.15), SIMATIC IPC677E (All versions < V25.02.15), SIMATIC IPC847E (All versions < V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to disable the BIOS password without proper authorization by directly communicate with the flash controller.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-693: Security Weakness
### Affected Products
**Siemens - SIMATIC Field PG M5**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC Field PG M6**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC BX-21A**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC BX-32A**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC BX-39A**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC BX-59A**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC PX-32A**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC PX-39A**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC PX-39A PRO**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC RC-543A**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC RC-543B**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC RW-543A**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC RW-543B**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC127E**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC227E**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC227G**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC277E**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC277G**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC277G PRO**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC3000 SMART V3**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC327G**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC347G**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC377G**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC427E**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC477E**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC477E PRO**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC527G**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC627E**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC647E**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC677E**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC IPC847E**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC ITP1000**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-216014.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6375, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6375 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6375
- **State**: PUBLISHED
- **Published Date**: December 07, 2006 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 20:26 UTC
- **Reserved Date**: December 07, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in display.php in Simple Machines Forum (SMF) 1.1 Final and earlier allows remote attackers to inject arbitrary web script or HTML via the contents of a file that is uploaded with the image parameter set, which can be interpreted as script by Internet Explorer's automatic type detection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23175](http://secunia.com/advisories/23175)
2. [ADV-2006-4843](http://www.vupen.com/english/advisories/2006/4843)
3. [smf-display-xss(30659)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30659)
4. [20061203 SMF upload XSS vulnerability](http://www.securityfocus.com/archive/1/453426/100/0/threaded)
5. [21431](http://www.securityfocus.com/bid/21431)
6. [2001](http://securityreason.com/securityalert/2001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14731, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14731 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14731
- **State**: PUBLISHED
- **Published Date**: October 21, 2020 at 14:04 UTC
- **Last Updated**: September 26, 2024 at 20:31 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Segment). Supported versions that are affected are 18.0 and 19.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 3.1/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Oracle Corporation - Retail Customer Management and Segmentation Foundation**
Affected versions:
- 18.0 (Status: affected)
- 19.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17926
- **State**: PUBLISHED
- **Published Date**: January 31, 2019 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 22:09 UTC
- **Reserved Date**: October 02, 2018 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
The product M2M ETHERNET (FW Versions 2.22 and prior, ETH-FW Versions 1.01 and prior) is vulnerable in that an attacker can upload a malicious language file by bypassing the user authentication mechanism.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**ABB - M2M ETHERNET**
Affected versions:
- FW Versions 2.22 and prior, ETH-FW Versions 1.01 and prior. (Status: affected)
### References
1. [106243](http://www.securityfocus.com/bid/106243)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-352-07) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34476
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 18:26 UTC
- **Reserved Date**: June 24, 2022 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
ASN.1 parsing of an indefinite SEQUENCE inside an indefinite GROUP could have resulted in the parser accepting malformed ASN.1. This vulnerability affects Firefox < 102.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2022-24/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1387919) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26311, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26311 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26311
- **State**: PUBLISHED
- **Published Date**: May 13, 2021 at 11:06 UTC
- **Last Updated**: September 17, 2024 at 04:25 UTC
- **Reserved Date**: January 29, 2021 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
### Affected Products
**AMD - SEV/SEV-ES**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3080, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3080 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3080
- **State**: PUBLISHED
- **Published Date**: May 01, 2013 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 02:41 UTC
- **Reserved Date**: April 16, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
VMware vCenter Server Appliance (vCSA) 5.1 before Update 1 allows remote authenticated users to create or overwrite arbitrary files, and consequently execute arbitrary code or cause a denial of service, by leveraging Virtual Appliance Management Interface (VAMI) web-interface access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.vmware.com/security/advisories/VMSA-2013-0006.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49146, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49146 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49146
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 01:55 UTC
- **Last Updated**: May 04, 2025 at 08:30 UTC
- **Reserved Date**: February 26, 2025 at 01:49 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
virtio: use virtio_device_ready() in virtio_device_restore()
After waking up a suspended VM, the kernel prints the following trace
for virtio drivers which do not directly call virtio_device_ready() in
the .restore:
PM: suspend exit
irq 22: nobody cared (try booting with the "irqpoll" option)
Call Trace:
<IRQ>
dump_stack_lvl+0x38/0x49
dump_stack+0x10/0x12
__report_bad_irq+0x3a/0xaf
note_interrupt.cold+0xb/0x60
handle_irq_event+0x71/0x80
handle_fasteoi_irq+0x95/0x1e0
__common_interrupt+0x6b/0x110
common_interrupt+0x63/0xe0
asm_common_interrupt+0x1e/0x40
? __do_softirq+0x75/0x2f3
irq_exit_rcu+0x93/0xe0
sysvec_apic_timer_interrupt+0xac/0xd0
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x12/0x20
arch_cpu_idle+0x12/0x20
default_idle_call+0x39/0xf0
do_idle+0x1b5/0x210
cpu_startup_entry+0x20/0x30
start_secondary+0xf3/0x100
secondary_startup_64_no_verify+0xc3/0xcb
</TASK>
handlers:
[<000000008f9bac49>] vp_interrupt
[<000000008f9bac49>] vp_interrupt
Disabling IRQ #22
This happens because we don't invoke .enable_cbs callback in
virtio_device_restore(). That callback is used by some transports
(e.g. virtio-pci) to enable interrupts.
Let's fix it, by calling virtio_device_ready() as we do in
virtio_dev_probe(). This function calls .enable_cts callback and sets
DRIVER_OK status bit.
This fix also avoids setting DRIVER_OK twice for those drivers that
call virtio_device_ready() in the .restore.
### Affected Products
**Linux - Linux**
Affected versions:
- d50497eb4e554e1f0351e1836ee7241c059592e6 (Status: affected)
- d50497eb4e554e1f0351e1836ee7241c059592e6 (Status: affected)
- d50497eb4e554e1f0351e1836ee7241c059592e6 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.16 (Status: affected)
- 0 (Status: unaffected)
- 5.16.19 (Status: unaffected)
- 5.17.2 (Status: unaffected)
- 5.18 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/94e9f5da39ee5f8ea31be1585de31c54f10dedce)
2. [](https://git.kernel.org/stable/c/4ae431113179d72c668b61df320af0c06d1aa5c5)
3. [](https://git.kernel.org/stable/c/8d65bc9a5be3f23c5e2ab36b6b8ef40095165b18) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51647
- **State**: PUBLISHED
- **Published Date**: November 09, 2024 at 13:17 UTC
- **Last Updated**: November 09, 2024 at 15:19 UTC
- **Reserved Date**: October 30, 2024 at 15:05 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Chaser324 Featured Posts Scroll allows Stored XSS.This issue affects Featured Posts Scroll: from n/a through 1.25.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Chaser324 - Featured Posts Scroll**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/featured-posts-scroll/wordpress-featured-posts-scroll-plugin-1-25-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13167
- **State**: PUBLISHED
- **Published Date**: March 13, 2020 at 18:24 UTC
- **Last Updated**: August 04, 2024 at 23:41 UTC
- **Reserved Date**: July 02, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple Stored XSS vulnerabilities were found in the Xerox Web Application, used by the Phaser 3320 V53.006.16.000 and other printers. Successful exploitation of this vulnerability can lead to session hijacking of the administrator in the web application or the execution of unwanted actions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.business.xerox.com/)
2. [](https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-xerox-printers/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1625, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1625 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1625
- **State**: PUBLISHED
- **Published Date**: September 20, 2012 at 01:00 UTC
- **Last Updated**: September 17, 2024 at 02:21 UTC
- **Reserved Date**: March 12, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Eval injection vulnerability in the fillpdf_form_export_decode function in fillpdf.admin.inc in the Fill PDF module 6.x-1.x before 6.x-1.16 and 7.x-1.x before 7.x-1.2 for Drupal allows remote authenticated users with administer PDFs privileges to execute arbitrary PHP code via unspecified vectors. NOTE: Some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [51288](http://www.securityfocus.com/bid/51288)
2. [78182](http://osvdb.org/78182)
3. [](http://drupal.org/node/1394428)
4. [47418](http://secunia.com/advisories/47418)
5. [[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)](http://www.openwall.com/lists/oss-security/2012/04/07/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0316, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0316 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0316
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 12:00 UTC
- **Last Updated**: November 29, 2024 at 15:06 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Session Initiation Protocol (SIP) call-handling functionality of Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability exists because the firmware of an affected phone incorrectly handles errors that could occur when an incoming phone call is not answered. An attacker could exploit this vulnerability by sending a set of maliciously crafted SIP packets to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. This vulnerability affects Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware if they are running a Multiplatform Firmware release prior to Release 11.1(2). Cisco Bug IDs: CSCvi24718.
### Weakness Classification (CWE)
- CWE-399: Security Weakness
### Affected Products
**n/a - Cisco IP Phone 6800, 7800, and 8800 Series unknown**
Affected versions:
- Cisco IP Phone 6800, 7800, and 8800 Series unknown (Status: affected)
### References
1. [1041073](http://www.securitytracker.com/id/1041073)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-multiplatform-sip) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1228, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1228 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1228
- **State**: PUBLISHED
- **Published Date**: March 02, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 12:50 UTC
- **Reserved Date**: March 02, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM DB2 UDB 8.2 before Fixpak 7 (aka fixpack 14), and DB2 9 before Fix Pack 2, on UNIX allows the "fenced" user to access certain unauthorized directories.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [IY87492](http://www-1.ibm.com/support/docview.wss?uid=swg1IY87492)
2. [24387](http://secunia.com/advisories/24387)
3. [IY86711](http://www-1.ibm.com/support/docview.wss?uid=swg1IY86711)
4. [1017731](http://www.securitytracker.com/id?1017731)
5. [22729](http://www.securityfocus.com/bid/22729) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46910, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46910 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46910
- **State**: PUBLISHED
- **Published Date**: February 27, 2024 at 06:53 UTC
- **Last Updated**: May 04, 2025 at 07:00 UTC
- **Reserved Date**: February 25, 2024 at 13:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled
The debugging code for kmap_local() doubles the number of per-CPU fixmap
slots allocated for kmap_local(), in order to use half of them as guard
regions. This causes the fixmap region to grow downwards beyond the start
of its reserved window if the supported number of CPUs is large, and collide
with the newly added virtual DT mapping right below it, which is obviously
not good.
One manifestation of this is EFI boot on a kernel built with NR_CPUS=32
and CONFIG_DEBUG_KMAP_LOCAL=y, which may pass the FDT in highmem, resulting
in block entries below the fixmap region that the fixmap code misidentifies
as fixmap table entries, and subsequently tries to dereference using a
phys-to-virt translation that is only valid for lowmem. This results in a
cryptic splat such as the one below.
ftrace: allocating 45548 entries in 89 pages
8<--- cut here ---
Unable to handle kernel paging request at virtual address fc6006f0
pgd = (ptrval)
[fc6006f0] *pgd=80000040207003, *pmd=00000000
Internal error: Oops: a06 [#1] SMP ARM
Modules linked in:
CPU: 0 PID: 0 Comm: swapper Not tainted 5.11.0+ #382
Hardware name: Generic DT based system
PC is at cpu_ca15_set_pte_ext+0x24/0x30
LR is at __set_fixmap+0xe4/0x118
pc : [<c041ac9c>] lr : [<c04189d8>] psr: 400000d3
sp : c1601ed8 ip : 00400000 fp : 00800000
r10: 0000071f r9 : 00421000 r8 : 00c00000
r7 : 00c00000 r6 : 0000071f r5 : ffade000 r4 : 4040171f
r3 : 00c00000 r2 : 4040171f r1 : c041ac78 r0 : fc6006f0
Flags: nZcv IRQs off FIQs off Mode SVC_32 ISA ARM Segment none
Control: 30c5387d Table: 40203000 DAC: 00000001
Process swapper (pid: 0, stack limit = 0x(ptrval))
So let's limit CONFIG_NR_CPUS to 16 when CONFIG_DEBUG_KMAP_LOCAL=y. Also,
fix the BUILD_BUG_ON() check that was supposed to catch this, by checking
whether the region grows below the start address rather than above the end
address.
### Affected Products
**Linux - Linux**
Affected versions:
- 2a15ba82fa6ca3f35502b3060f22118a938d2889 (Status: affected)
- 2a15ba82fa6ca3f35502b3060f22118a938d2889 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.11 (Status: affected)
- 0 (Status: unaffected)
- 5.11.16 (Status: unaffected)
- 5.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/5965ac11b1d5fcb38464728931649cd9df79c7c9)
2. [](https://git.kernel.org/stable/c/d624833f5984d484c5e3196f34b926f9e71dafee) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-48137, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-48137 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48137
- **State**: PUBLISHED
- **Published Date**: May 16, 2025 at 15:45 UTC
- **Last Updated**: May 16, 2025 at 16:21 UTC
- **Reserved Date**: May 15, 2025 at 18:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in proxymis Interview allows SQL Injection. This issue affects Interview: from n/a through 1.01.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**proxymis - Interview**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/interview/vulnerability/wordpress-interview-1-01-sql-injection-vulnerability?_s_id=cve)
### Credits
- 0x1ceKing (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5707, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5707 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5707
- **State**: PUBLISHED
- **Published Date**: June 06, 2025 at 00:31 UTC
- **Last Updated**: June 09, 2025 at 14:43 UTC
- **Reserved Date**: June 05, 2025 at 04:37 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /registered-user-testing.php. The manipulation of the argument testtype leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Human Metapneumovirus Testing Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-311228 | PHPGurukul Human Metapneumovirus Testing Management System registered-user-testing.php sql injection](https://vuldb.com/?id.311228)
2. [VDB-311228 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311228)
3. [Submit #590473 | PHPGurukul Human Metapneumovirus Testing Management System 1.0 SQL Injection](https://vuldb.com/?submit.590473)
4. [](https://github.com/f1rstb100d/myCVE/issues/56)
5. [](https://phpgurukul.com/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4745, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4745 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4745
- **State**: PUBLISHED
- **Published Date**: July 01, 2013 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 18:39 UTC
- **Reserved Date**: July 01, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the My quiz and poll (myquizpoll) extension before 2.0.6 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [90410](http://osvdb.org/90410)
2. [](http://typo3.org/extensions/repository/view/myquizpoll)
3. [](http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-005/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5276, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5276 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5276
- **State**: PUBLISHED
- **Published Date**: December 23, 2019 at 17:54 UTC
- **Last Updated**: August 04, 2024 at 19:54 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei smart phones with earlier versions than ELLE-AL00B 9.1.0.222(C00E220R2P1) have a buffer overflow vulnerability. An attacker may intercept and tamper with the packet in the local area network (LAN) to exploit this vulnerability. Successful exploitation may cause the affected phone abnormal.
### Affected Products
**Huawei - ELLE-AL00B**
Affected versions:
- earlier versions than 9.1.0.222(C00E220R2P1) (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191218-02-smartphone-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4348, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4348 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4348
- **State**: PUBLISHED
- **Published Date**: August 24, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 19:06 UTC
- **Reserved Date**: August 24, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in config.kochsuite.php in the Kochsuite (com_kochsuite) 0.9.4 component for Mambo and Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2215](https://www.exploit-db.com/exploits/2215)
2. [28098](http://www.osvdb.org/28098)
3. [kochsuite-config-file-include(28457)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28457)
4. [19590](http://www.securityfocus.com/bid/19590)
5. [20060818 Joomla Kochsuite Component <= 0.9.4 (config.kochsuite.php) Remote File Inclusion Vulnerability](http://www.securityfocus.com/archive/1/443703/100/0/threaded)
6. [1447](http://securityreason.com/securityalert/1447) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0667, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0667 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0667
- **State**: PUBLISHED
- **Published Date**: January 27, 2024 at 03:32 UTC
- **Last Updated**: August 01, 2024 at 18:11 UTC
- **Reserved Date**: January 17, 2024 at 20:10 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.15.21. This is due to missing or incorrect nonce validation on the 'execute' function. This makes it possible for unauthenticated attackers to execute arbitrary methods in the 'BoosterController' class via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Affected Products
**10web - Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/d55c832b-f558-4e8a-8301-33dd38d39ef1?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/form-maker/tags/1.15.21/booster/controller.php#L34)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3027368%40form-maker&new=3027368%40form-maker&sfp_email=&sfph_mail=)
### Credits
- David Jones |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37491, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37491
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 12:00 UTC
- **Last Updated**: January 02, 2025 at 14:52 UTC
- **Reserved Date**: June 09, 2024 at 11:43 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Apollo13Themes Rife Free allows Cross Site Request Forgery.This issue affects Rife Free: from n/a through 2.4.18.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Apollo13Themes - Rife Free**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/theme/rife-free/vulnerability/wordpress-rife-free-theme-2-4-18-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Dhabaleshwar Das (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50955, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50955 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50955
- **State**: PUBLISHED
- **Published Date**: November 13, 2024 at 00:00 UTC
- **Last Updated**: March 13, 2025 at 18:32 UTC
- **Reserved Date**: October 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in how XINJE XD5E-24R and XL5E-16T v3.5.3b handles TCP protocol messages allows attackers to cause a Denial of Service (DoS) via a crafted TCP message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Curator-Kim/Vulnerability-mining/blob/master/XINJE%20XD5E-24R%20XL5E-16T%20TCP%20DoS/XINJE%20XD5E-24R%20XL5E-16T%20TCP%20DoS.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2380, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2380 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2380
- **State**: PUBLISHED
- **Published Date**: December 22, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 08:58 UTC
- **Reserved Date**: May 21, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in authpgsqllib.c in Courier-Authlib before 0.62.0, when a non-Latin locale Postgres database is used, allows remote attackers to execute arbitrary SQL commands via query parameters containing apostrophes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33235](http://secunia.com/advisories/33235)
2. [32926](http://www.securityfocus.com/bid/32926)
3. [courier-library-postgres-sql-injection(47494)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47494)
4. [](http://www.courier-mta.org/authlib/changelog.html)
5. [34234](http://secunia.com/advisories/34234)
6. [50811](http://osvdb.org/50811)
7. [GLSA-200903-25](http://security.gentoo.org/glsa/glsa-200903-25.xml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14609, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14609 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14609
- **State**: PUBLISHED
- **Published Date**: July 27, 2018 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 09:29 UTC
- **Reserved Date**: July 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3821-1](https://usn.ubuntu.com/3821-1/)
2. [104917](http://www.securityfocus.com/bid/104917)
3. [[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html)
4. [](https://patchwork.kernel.org/patch/10500521/)
5. [USN-3821-2](https://usn.ubuntu.com/3821-2/)
6. [DSA-4308](https://www.debian.org/security/2018/dsa-4308)
7. [](https://bugzilla.kernel.org/show_bug.cgi?id=199833)
8. [USN-4094-1](https://usn.ubuntu.com/4094-1/)
9. [USN-4118-1](https://usn.ubuntu.com/4118-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3426, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3426 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3426
- **State**: PUBLISHED
- **Published Date**: April 21, 2016 at 10:00 UTC
- **Last Updated**: October 15, 2024 at 19:06 UTC
- **Reserved Date**: March 17, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Java SE 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality via vectors related to JCE.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2016:1222](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html)
2. [RHSA-2016:0677](http://rhn.redhat.com/errata/RHSA-2016-0677.html)
3. [SUSE-SU-2016:1299](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html)
4. [RHSA-2016:1039](http://rhn.redhat.com/errata/RHSA-2016-1039.html)
5. [RHSA-2016:0701](http://rhn.redhat.com/errata/RHSA-2016-0701.html)
6. [86449](http://www.securityfocus.com/bid/86449)
7. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html)
8. [SUSE-SU-2016:1303](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html)
9. [GLSA-201610-08](https://security.gentoo.org/glsa/201610-08)
10. [SUSE-SU-2016:1475](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html)
11. [openSUSE-SU-2016:1262](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html)
12. [SUSE-SU-2016:1300](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html)
13. [RHSA-2016:1430](https://access.redhat.com/errata/RHSA-2016:1430)
14. [](https://security.netapp.com/advisory/ntap-20160420-0001/)
15. [RHSA-2016:0708](http://rhn.redhat.com/errata/RHSA-2016-0708.html)
16. [RHSA-2016:0651](http://rhn.redhat.com/errata/RHSA-2016-0651.html)
17. [SUSE-SU-2016:1378](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html)
18. [SUSE-SU-2016:1248](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html)
19. [SUSE-SU-2016:1379](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html)
20. [SUSE-SU-2016:1458](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html)
21. [RHSA-2016:0716](http://rhn.redhat.com/errata/RHSA-2016-0716.html)
22. [1035596](http://www.securitytracker.com/id/1035596)
23. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html)
24. [USN-2963-1](http://www.ubuntu.com/usn/USN-2963-1)
25. [SUSE-SU-2016:1388](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html)
26. [RHSA-2016:0702](http://rhn.redhat.com/errata/RHSA-2016-0702.html)
27. [RHSA-2017:1216](https://access.redhat.com/errata/RHSA-2017:1216)
28. [DSA-3558](http://www.debian.org/security/2016/dsa-3558)
29. [RHSA-2016:0650](http://rhn.redhat.com/errata/RHSA-2016-0650.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2518, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2518 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2518
- **State**: PUBLISHED
- **Published Date**: October 14, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 05:52 UTC
- **Reserved Date**: July 17, 2009 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Integer overflow in GDI+ in Microsoft Office XP SP3 allows remote attackers to execute arbitrary code via an Office document with a bitmap (aka BMP) image that triggers memory corruption, aka "Office BMP Integer Overflow Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA09-286A](http://www.us-cert.gov/cas/techalerts/TA09-286A.html)
2. [oval:org.mitre.oval:def:6430](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6430)
3. [MS09-062](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-062) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1975, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1975 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1975
- **State**: PUBLISHED
- **Published Date**: July 23, 2024 at 14:38 UTC
- **Last Updated**: February 13, 2025 at 17:32 UTC
- **Reserved Date**: February 28, 2024 at 16:31 UTC
- **Assigned By**: isc
### Vulnerability Description
If a server hosts a zone containing a "KEY" Resource Record, or a resolver DNSSEC-validates a "KEY" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests.
This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**ISC - BIND 9**
Affected versions:
- 9.0.0 (Status: affected)
- 9.16.0 (Status: affected)
- 9.18.0 (Status: affected)
- 9.19.0 (Status: affected)
- 9.9.3-S1 (Status: affected)
- 9.16.8-S1 (Status: affected)
- 9.18.11-S1 (Status: affected)
### References
1. [CVE-2024-1975](https://kb.isc.org/docs/cve-2024-1975)
2. [](http://www.openwall.com/lists/oss-security/2024/07/23/1)
3. [](http://www.openwall.com/lists/oss-security/2024/07/31/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5857, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5857 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5857
- **State**: PUBLISHED
- **Published Date**: October 16, 2013 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 17:22 UTC
- **Reserved Date**: September 18, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Health Sciences InForm component in Oracle Industry Applications 4.5 SP3, 4.5 SP3a-k, 4.6 SP0, 4.6 SP0a-c, 4.6 SP1, 4.6 SP1a-c, 4.6 SP2, 4.6 SP2a-c, 5.0 SP0, 5.0 SP0a, 5.0 SP1, and 5.0 SP1a-b allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Web.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [63096](http://www.securityfocus.com/bid/63096)
2. [98491](http://osvdb.org/98491)
3. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4815, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4815 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4815
- **State**: PUBLISHED
- **Published Date**: May 17, 2025 at 02:31 UTC
- **Last Updated**: May 19, 2025 at 15:42 UTC
- **Reserved Date**: May 16, 2025 at 08:59 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Campcodes Sales and Inventory System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /pages/supplier_update.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**Campcodes - Sales and Inventory System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-309272 | Campcodes Sales and Inventory System supplier_update.php sql injection](https://vuldb.com/?id.309272)
2. [VDB-309272 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309272)
3. [Submit #574082 | campcodes Sales and Inventory System V1.0 SQL Injection](https://vuldb.com/?submit.574082)
4. [](https://github.com/iGGbondTC/cve/issues/2)
5. [](https://www.campcodes.com/)
### Credits
- iGGbond (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47602, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47602 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47602
- **State**: PUBLISHED
- **Published Date**: June 19, 2024 at 14:54 UTC
- **Last Updated**: May 04, 2025 at 07:14 UTC
- **Reserved Date**: May 24, 2024 at 15:11 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
mac80211: track only QoS data frames for admission control
For admission control, obviously all of that only works for
QoS data frames, otherwise we cannot even access the QoS
field in the header.
Syzbot reported (see below) an uninitialized value here due
to a status of a non-QoS nullfunc packet, which isn't even
long enough to contain the QoS header.
Fix this to only do anything for QoS data packets.
### Affected Products
**Linux - Linux**
Affected versions:
- 02219b3abca59fca81711bfe7ee78df7abad97ce (Status: affected)
- 02219b3abca59fca81711bfe7ee78df7abad97ce (Status: affected)
- 02219b3abca59fca81711bfe7ee78df7abad97ce (Status: affected)
- 02219b3abca59fca81711bfe7ee78df7abad97ce (Status: affected)
- 02219b3abca59fca81711bfe7ee78df7abad97ce (Status: affected)
**Linux - Linux**
Affected versions:
- 3.19 (Status: affected)
- 0 (Status: unaffected)
- 4.19.222 (Status: unaffected)
- 5.4.168 (Status: unaffected)
- 5.10.88 (Status: unaffected)
- 5.15.11 (Status: unaffected)
- 5.16 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/69f054d6642c8f6173724ce17e7ee3ff66b8f682)
2. [](https://git.kernel.org/stable/c/46b9e29db2012a4d2a40a26101862e002ccf387b)
3. [](https://git.kernel.org/stable/c/eed897a22230e3231a740eddd7d6d95ba476625f)
4. [](https://git.kernel.org/stable/c/42d08e97b196479f593499e887a9ab81446a34b9)
5. [](https://git.kernel.org/stable/c/d5e568c3a4ec2ddd23e7dc5ad5b0c64e4f22981a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32369, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32369 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32369
- **State**: PUBLISHED
- **Published Date**: May 07, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 02:06 UTC
- **Reserved Date**: April 12, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL Injection vulnerability in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a remote attacker to obtain sensitive information via a crafted payload to the start and limit parameter in the mliWhiteList.php component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cwe.mitre.org/data/definitions/89.html)
2. [](https://github.com/chucrutis/CVE-2024-32369) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0937, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0937 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0937
- **State**: PUBLISHED
- **Published Date**: January 30, 2012 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 18:39 UTC
- **Reserved Date**: January 30, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier does not limit the number of MySQL queries sent to external MySQL database servers, which allows remote attackers to use WordPress as a proxy for brute-force attacks or denial of service attacks via the dbhost parameter, a different vulnerability than CVE-2011-4898. NOTE: the vendor disputes the significance of this issue because an incomplete WordPress installation might be present on the network for only a short time
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18417](http://www.exploit-db.com/exploits/18417)
2. [](https://www.trustwave.com/spiderlabs/advisories/TWSL2012-002.txt)
3. [20120124 TWSL2012-002: Multiple Vulnerabilities in WordPress](http://archives.neohapsis.com/archives/bugtraq/2012-01/0150.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24387, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24387 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24387
- **State**: PUBLISHED
- **Published Date**: October 19, 2020 at 19:39 UTC
- **Last Updated**: August 04, 2024 at 15:12 UTC
- **Reserved Date**: August 19, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the yh_create_session() function of yubihsm-shell through 2.0.2. The function does not explicitly check the returned session id from the device. An invalid session id would lead to out-of-bounds read and write operations in the session array. This could be used by an attacker to cause a denial of service attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Yubico/yubihsm-shell)
2. [](https://developers.yubico.com/yubihsm-shell/)
3. [](https://www.yubico.com/support/security-advisories/ysa-2020-06/)
4. [](https://blog.inhq.net/posts/yubico-libyubihsm-vuln/)
5. [FEDORA-2020-8afd443d46](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y77KQJW76M3PFOBFLBT6DLH2NWHYRNZO/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1016, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1016 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1016
- **State**: PUBLISHED
- **Published Date**: September 24, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:12 UTC
- **Reserved Date**: December 17, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use malformed quoting in MIME headers, parameters, and values, including (1) fields that should not be quoted, (2) duplicate quotes, or (3) missing leading or trailing quote characters, which may be interpreted differently by mail clients.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [mime-quote-filtering-bypass(17336)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17336)
2. [20040914 Corsaire Security Advisory - Multiple vendor MIME field quoting issue](http://marc.info/?l=bugtraq&m=109521027007616&w=2)
3. [](http://www.uniras.gov.uk/vuls/2004/380375/mime.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0525
- **State**: PUBLISHED
- **Published Date**: February 11, 2009 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 23:30 UTC
- **Reserved Date**: February 11, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the sajax_get_common_js function in php/Sajax.php in Sajax 0.12 allows remote attackers to inject arbitrary web script or HTML via the URL parameter, which is not properly handled when using browsers that do not URL-encode requests, such as Internet Explorer 6. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33894](http://secunia.com/advisories/33894)
2. [33711](http://www.securityfocus.com/bid/33711) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0459, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0459 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0459
- **State**: PUBLISHED
- **Published Date**: December 14, 2020 at 21:51 UTC
- **Last Updated**: August 04, 2024 at 06:02 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In sendConfiguredNetworkChangedBroadcast of WifiConfigManager.java, there is a possible leak of sensitive WiFi configuration data due to a missing permission check. This could lead to local information disclosure of WiFi network names with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-159373687
### Affected Products
**n/a - Android**
Affected versions:
- Android-8.1 Android-9 Android-10 Android-8.0 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2020-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15823, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15823 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15823
- **State**: PUBLISHED
- **Published Date**: August 08, 2020 at 20:17 UTC
- **Last Updated**: August 04, 2024 at 13:30 UTC
- **Reserved Date**: July 19, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JetBrains YouTrack before 2020.2.8873 is vulnerable to SSRF in the Workflow component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.jetbrains.com)
2. [](https://blog.jetbrains.com/blog/2020/08/06/jetbrains-security-bulletin-q2-2020/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5445, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5445 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5445
- **State**: PUBLISHED
- **Published Date**: January 14, 2009 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 10:56 UTC
- **Reserved Date**: December 11, 2008 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.2 allows remote attackers to affect availability via unknown vectors. NOTE: the previous information was obtained from the January 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is a denial of service in observiced.exe via malformed private Protocol data that triggers a NULL pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.fortiguardcenter.com/advisory/FGA-2009-02.html)
2. [33525](http://secunia.com/advisories/33525)
3. [ADV-2009-0115](http://www.vupen.com/english/advisories/2009/0115)
4. [](http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html)
5. [33177](http://www.securityfocus.com/bid/33177)
6. [20090115 Oracle Secure Backup's observiced.exe Denial Of Service vulnerability](http://www.securityfocus.com/archive/1/500113/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3948, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3948 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3948
- **State**: PUBLISHED
- **Published Date**: April 18, 2024 at 11:00 UTC
- **Last Updated**: August 08, 2024 at 19:39 UTC
- **Reserved Date**: April 18, 2024 at 05:56 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Home Clean Service System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file \admin\student.add.php of the component Photo Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261440.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**SourceCodester - Home Clean Service System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-261440 | SourceCodester Home Clean Service System Photo student.add.php unrestricted upload](https://vuldb.com/?id.261440)
2. [VDB-261440 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.261440)
3. [Submit #318722 | SourceCodester Home Clean Service System in PHP Free Source Code V1.0 Unrestricted Upload](https://vuldb.com/?submit.318722)
4. [](https://github.com/xuanluansec/vul/issues/5)
### Credits
- fengxiangdi (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51924, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51924
- **State**: PUBLISHED
- **Published Date**: January 20, 2024 at 00:00 UTC
- **Last Updated**: November 13, 2024 at 16:59 UTC
- **Reserved Date**: December 26, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file upload vulnerability in the uap.framework.rc.itf.IResourceManager interface of YonBIP v3_23.05 allows attackers to execute arbitrary code via uploading a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.yonyou.com/)
2. [](http://yonbip.com)
3. [](https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51924.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30354, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30354
- **State**: PUBLISHED
- **Published Date**: April 02, 2024 at 20:15 UTC
- **Last Updated**: August 02, 2024 at 01:32 UTC
- **Reserved Date**: March 26, 2024 at 18:52 UTC
- **Assigned By**: zdi
### Vulnerability Description
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Doc objects in AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22808.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - PDF Reader**
Affected versions:
- 2023.3.0.23028 (Status: affected)
### References
1. [ZDI-24-332](https://www.zerodayinitiative.com/advisories/ZDI-24-332/)
2. [vendor-provided URL](https://www.foxit.com/support/security-bulletins.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33318, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33318
- **State**: PUBLISHED
- **Published Date**: December 20, 2023 at 18:53 UTC
- **Last Updated**: August 02, 2024 at 15:39 UTC
- **Reserved Date**: May 22, 2023 at 08:34 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in WooCommerce AutomateWoo.This issue affects AutomateWoo: from n/a through 4.9.40.
### CVSS Metrics
- **CVSS Base Score**: 9.9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**WooCommerce - AutomateWoo**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/woocommerce-follow-up-emails/wordpress-woocommerce-follow-up-emails-plugin-4-9-40-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52968, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52968
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 16:09 UTC
- **Last Updated**: February 11, 2025 at 16:35 UTC
- **Reserved Date**: November 18, 2024 at 13:36 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An improper authentication in Fortinet FortiClientMac 7.0.11 through 7.2.4 allows attacker to gain improper access to MacOS via empty password.
### CVSS Metrics
- **CVSS Base Score**: 5.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:R`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Fortinet - FortiClientMac**
Affected versions:
- 7.4.0 (Status: affected)
- 7.2.3 (Status: affected)
- 7.0.11 (Status: affected)
### References
1. [https://fortiguard.fortinet.com/psirt/FG-IR-24-300](https://fortiguard.fortinet.com/psirt/FG-IR-24-300) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1283, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1283 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1283
- **State**: PUBLISHED
- **Published Date**: November 27, 2017 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 16:14 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere MQ 8.0 and 9.0 could allow an authenticated user to cause a shared memory leak by MQ applications using dynamic queues, which can lead to lack of resources for other MQ applications. IBM X-Force ID: 125144.
### Affected Products
**IBM - MQ**
Affected versions:
- 8.0 (Status: affected)
- 9.0 (Status: affected)
- 9.0.1 (Status: affected)
- 9.0.0.1 (Status: affected)
- 9.0.2 (Status: affected)
- 8.0.0.1 (Status: affected)
- 8.0.0.2 (Status: affected)
- 8.0.0.3 (Status: affected)
- 8.0.0.4 (Status: affected)
- 8.0.0.5 (Status: affected)
- 8.0.0.6 (Status: affected)
- 8.0.0.7 (Status: affected)
- 9.0.3 (Status: affected)
- 9.0.4 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg22003852)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/125144) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16634
- **State**: PUBLISHED
- **Published Date**: December 04, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 10:32 UTC
- **Reserved Date**: September 06, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pluck v4.7.7 allows CSRF via admin.php?action=settings.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/security-breachlock/CVE-2018-16634/blob/master/PLUCK_CSRF.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49417, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49417 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49417
- **State**: PUBLISHED
- **Published Date**: December 11, 2023 at 00:00 UTC
- **Last Updated**: May 27, 2025 at 14:45 UTC
- **Reserved Date**: November 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLink A7000R V9.1.0u.6115_B20201022 has a stack overflow vulnerability via setOpModeCfg.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cnitlrt/iot_vuln/tree/master/totolink/A7000R/setOpModeCfg) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7182
- **State**: PUBLISHED
- **Published Date**: September 08, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 11:56 UTC
- **Reserved Date**: September 07, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the IMAP service in NetWin Surgemail 3.9e, and possibly other versions before 3.9g2, allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long first argument to the APPEND command, a different vector than CVE-2008-1497 and CVE-2008-1498. NOTE: due to lack of details, it is not certain whether this is the same issue as CVE-2008-2859.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5968](https://www.exploit-db.com/exploits/5968)
2. [30000](http://www.securityfocus.com/bid/30000)
3. [20080917 [AJECT] SurgeMail IMAP 3.9e vulnerability](http://www.securityfocus.com/archive/1/496482)
4. [](http://www.netwinsite.com/surgemail/help/updates.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32693
- **State**: PUBLISHED
- **Published Date**: April 22, 2024 at 07:58 UTC
- **Last Updated**: August 02, 2024 at 02:20 UTC
- **Reserved Date**: April 17, 2024 at 08:55 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in ValvePress Automatic.This issue affects Automatic: from n/a before 3.93.0.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**ValvePress - Automatic**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-automatic/wordpress-automatic-plugin-3-93-0-multiple-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34127, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34127 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34127
- **State**: PUBLISHED
- **Published Date**: July 13, 2023 at 00:47 UTC
- **Last Updated**: April 23, 2025 at 16:20 UTC
- **Reserved Date**: May 25, 2023 at 22:45 UTC
- **Assigned By**: sonicwall
### Vulnerability Description
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SonicWall GMS, SonicWall Analytics enables an authenticated attacker to execute arbitrary code with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**SonicWall - GMS**
Affected versions:
- 9.3.2-SP1 and earlier versions (Status: affected)
**SonicWall - Analytics**
Affected versions:
- 2.5.0.4-R7 and earlier versions (Status: affected)
### References
1. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010)
2. [](https://www.sonicwall.com/support/notices/230710150218060)
3. [](http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3744, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3744 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3744
- **State**: PUBLISHED
- **Published Date**: June 20, 2017 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 14:39 UTC
- **Reserved Date**: December 16, 2016 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
In the IMM2 firmware of Lenovo System x servers, remote commands issued by LXCA or other utilities may be captured in the First Failure Data Capture (FFDC) service log if the service log is generated when that remote command is running. Captured command data may contain clear text login information. Authorized users that can capture and export FFDC service log data may have access to these remote commands.
### Affected Products
**Lenovo Group Ltd. - Lenovo System x IMM2**
Affected versions:
- Lenovo System x IMM2 firmware versions earlier than 4.10 and IBM System x IMM2 firmware versions earlier than 6.20 (Status: affected)
### References
1. [](https://support.lenovo.com/product_security/LEN-14054) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31917, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31917
- **State**: PUBLISHED
- **Published Date**: June 09, 2025 at 15:56 UTC
- **Last Updated**: June 10, 2025 at 13:35 UTC
- **Reserved Date**: April 01, 2025 at 13:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Universal Video Player allows Reflected XSS. This issue affects Universal Video Player: from n/a through 3.8.3.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**LambertGroup - Universal Video Player**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/universal_video_player/vulnerability/wordpress-universal-video-player-plugin-3-8-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Tran Nguyen Bao Khanh (VCI - VNPT Cyber Immunity) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7666, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7666 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7666
- **State**: PUBLISHED
- **Published Date**: September 01, 2020 at 13:55 UTC
- **Last Updated**: September 16, 2024 at 20:41 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
This affects all versions of package github.com/u-root/u-root/pkg/cpio. It is vulnerable to leading, non-leading relative path traversal attacks and symlink based (relative and absolute) path traversal attacks in cpio file extraction.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Affected Products
**n/a - github.com/u-root/u-root/pkg/cpio**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/u-root/u-root/pull/1817)
2. [](https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGCPIO-570440)
### Credits
- Georgios Gkitsas of Snyk Security Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6624, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6624 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6624
- **State**: PUBLISHED
- **Published Date**: December 11, 2016 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 01:36 UTC
- **Reserved Date**: August 06, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in phpMyAdmin involving improper enforcement of the IP-based authentication rules. When phpMyAdmin is used with IPv6 in a proxy server environment, and the proxy server is in the allowed range but the attacking computer is not allowed, this vulnerability can allow the attacking computer to connect despite the IP rules. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92489](http://www.securityfocus.com/bid/92489)
2. [](https://www.phpmyadmin.net/security/PMASA-2016-47)
3. [GLSA-201701-32](https://security.gentoo.org/glsa/201701-32)
4. [[debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update](https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000214
- **State**: REJECTED
- **Published Date**: August 20, 2018 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 01:36 UTC
- **Reserved Date**: August 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35156
- **State**: PUBLISHED
- **Published Date**: June 28, 2024 at 18:12 UTC
- **Last Updated**: August 02, 2024 at 03:07 UTC
- **Reserved Date**: May 09, 2024 at 16:27 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM MQ 9.3 LTS and 9.3 CD could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 292766.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-209: Improper Input Validation
### Affected Products
**IBM - MQ**
Affected versions:
- 9.3 LTS and 9.3 CD (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7158058)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/292766) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1779, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1779 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1779
- **State**: PUBLISHED
- **Published Date**: January 29, 2018 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 03:53 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cognos Analytics 11.0 could store cached credentials locally that could be obtained by a local user. IBM X-Force ID: 136824.
### Affected Products
**IBM - Cognos Analytics**
Affected versions:
- 11.0 (Status: affected)
- 11.0.1 (Status: affected)
- 11.0.2 (Status: affected)
- 11.0.3 (Status: affected)
- 11.0.4 (Status: affected)
- 11.0.5 (Status: affected)
- 11.0.6 (Status: affected)
- 11.0.7 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg22011561)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/136824)
3. [102858](http://www.securityfocus.com/bid/102858)
4. [1040299](http://www.securitytracker.com/id/1040299)
5. [](https://security.netapp.com/advisory/ntap-20190401-0003/)
6. [](https://security.netapp.com/advisory/ntap-20190329-0003/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1374, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1374
- **State**: PUBLISHED
- **Published Date**: September 01, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:19 UTC
- **Reserved Date**: December 16, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20021212 Advisory 04/2002: Multiple MySQL vulnerabilities](http://marc.info/?l=bugtraq&m=103971644013961&w=2)
2. [20021216 [OpenPKG-SA-2002.013] OpenPKG Security Advisory (mysql)](http://marc.info/?l=bugtraq&m=104005886114500&w=2)
3. [CLSA-2002:555](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555)
4. [ESA-20021213-033](http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html)
5. [](http://security.e-matters.de/advisories/042002.html)
6. [DSA-212](http://www.debian.org/security/2002/dsa-212)
7. [RHSA-2002:288](http://www.redhat.com/support/errata/RHSA-2002-288.html)
8. [MDKSA-2002:087](http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087)
9. [RHSA-2003:166](http://www.redhat.com/support/errata/RHSA-2003-166.html)
10. [mysql-comchangeuser-password-bypass(10847)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10847)
11. [GLSA-200212-2](http://marc.info/?l=bugtraq&m=104004857201968&w=2)
12. [SUSE-SA:2003:003](http://www.novell.com/linux/security/advisories/2003_003_mysql.html)
13. [RHSA-2002:289](http://www.redhat.com/support/errata/RHSA-2002-289.html)
14. [2002-0086](http://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txt)
15. [6373](http://www.securityfocus.com/bid/6373)
16. [IMNX-2003-7+-008-01](http://www.securityfocus.com/advisories/5269) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0647
- **State**: PUBLISHED
- **Published Date**: February 07, 2008 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 07:54 UTC
- **Reserved Date**: February 07, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple stack-based buffer overflows in the HanGamePluginCn18.HanGamePluginCn18.1 ActiveX control in HanGamePluginCn18.dll in Ourgame GLWorld 2.6.1.29 (aka Lianzong Game Platform) allow remote attackers to execute arbitrary code via long arguments to the (1) hgs_startGame and (2) hgs_startNotify methods, as exploited in the wild as of February 2008. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27626](http://www.securityfocus.com/bid/27626)
2. [ADV-2008-0427](http://www.vupen.com/english/advisories/2008/0427)
3. [5153](https://www.exploit-db.com/exploits/5153)
4. [](http://www.symantec.com/enterprise/security_response/weblog/2008/02/zeroday_exploit_for_lianzong_g.html)
5. [28809](http://secunia.com/advisories/28809) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4619, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4619
- **State**: REJECTED
- **Published Date**: July 22, 2016 at 01:00 UTC
- **Last Updated**: June 07, 2017 at 01:57 UTC
- **Reserved Date**: May 11, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4081, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4081
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30966, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30966 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30966
- **State**: PUBLISHED
- **Published Date**: May 17, 2022 at 14:06 UTC
- **Last Updated**: August 03, 2024 at 07:03 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Random String Parameter Plugin 1.0 and earlier does not escape the name and description of Random String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
### Affected Products
**Jenkins project - Jenkins Random String Parameter Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 1.0 (Status: unknown)
### References
1. [](https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2717) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1829, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1829 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1829
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 14:43 UTC
- **Last Updated**: August 03, 2024 at 16:25 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.3. An application may be able to execute arbitrary code with kernel privileges.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212325) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4835, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4835 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4835
- **State**: PUBLISHED
- **Published Date**: May 05, 2010 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 22:20 UTC
- **Reserved Date**: May 05, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The (1) htk_read_header, (2) alaw_init, (3) ulaw_init, (4) pcm_init, (5) float32_init, and (6) sds_read_header functions in libsndfile 1.0.20 allow context-dependent attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted audio file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2009-1446](http://www.vupen.com/english/advisories/2009/1446)
2. [35126](http://www.securityfocus.com/bid/35126)
3. [35266](http://secunia.com/advisories/35266)
4. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=530831) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28104, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28104
- **State**: PUBLISHED
- **Published Date**: March 16, 2023 at 15:25 UTC
- **Last Updated**: February 25, 2025 at 14:55 UTC
- **Reserved Date**: March 10, 2023 at 18:34 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
`silverstripe/graphql` serves Silverstripe data as GraphQL representations. In versions 4.2.2 and 4.1.1, an attacker could use a specially crafted graphql query to execute a denial of service attack against a website which has a publicly exposed graphql endpoint. This mostly affects websites with particularly large/complex graphql schemas. Users should upgrade to `silverstripe/graphql` 4.2.3 or 4.1.2 to remedy the vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**silverstripe - silverstripe-graphql**
Affected versions:
- = 4.1.1 (Status: affected)
- = 4.2.2 (Status: affected)
### References
1. [https://github.com/silverstripe/silverstripe-graphql/security/advisories/GHSA-67g8-c724-8mp3](https://github.com/silverstripe/silverstripe-graphql/security/advisories/GHSA-67g8-c724-8mp3)
2. [https://github.com/silverstripe/silverstripe-graphql/pull/526](https://github.com/silverstripe/silverstripe-graphql/pull/526)
3. [https://github.com/silverstripe/silverstripe-graphql/releases/tag/4.1.2](https://github.com/silverstripe/silverstripe-graphql/releases/tag/4.1.2)
4. [https://github.com/silverstripe/silverstripe-graphql/releases/tag/4.2.3](https://github.com/silverstripe/silverstripe-graphql/releases/tag/4.2.3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11533, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11533 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11533
- **State**: PUBLISHED
- **Published Date**: April 04, 2020 at 19:02 UTC
- **Last Updated**: August 04, 2024 at 11:35 UTC
- **Reserved Date**: April 04, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ivanti Workspace Control before 10.4.30.0, when SCCM integration is enabled, allows local users to obtain sensitive information (keying material).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/A-locally-authenticated-user-with-low-privileges-can-recover-keying-material-due-to-an-unspecified-attack-vector) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4949, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4949
- **State**: PUBLISHED
- **Published Date**: January 26, 2021 at 14:25 UTC
- **Last Updated**: September 17, 2024 at 03:33 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 192025.
### Affected Products
**IBM - WebSphere Application Server**
Affected versions:
- 7.0 (Status: affected)
- 8.0 (Status: affected)
- 8.5 (Status: affected)
- 9.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6408244)
2. [ibm-websphere-cve20204949-xxe (192025)](https://exchange.xforce.ibmcloud.com/vulnerabilities/192025) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.