System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-21994, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-21994 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-21994 - **State**: PUBLISHED - **Published Date**: April 28, 2021 at 14:50 UTC - **Last Updated**: August 04, 2024 at 14:30 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description AVE DOMINAplus <=1.10.x suffers from clear-text credentials disclosure vulnerability that allows an unauthenticated attacker to issue a request to an unprotected directory that hosts an XML file '/xml/authClients.xml' and obtain administrative login information that allows for a successful authentication bypass attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5550.php) 2. [Exploit Database](https://www.exploit-db.com/exploits/47819) 3. [](https://cwe.mitre.org/data/definitions/522.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10230, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10230 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10230 - **State**: PUBLISHED - **Published Date**: March 16, 2020 at 15:34 UTC - **Last Updated**: August 04, 2024 at 10:58 UTC - **Reserved Date**: March 08, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CentOS-WebPanel.com (aka CWP) CentOS Web Panel (for CentOS 6 and 7) allows SQL Injection via the /cwp_{SESSION_HASH}/admin/loader_ajax.php term parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://centos-webpanel.com/changelog-cwp7) 2. [](https://www.exploit-db.com/exploits/48212)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4890, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4890 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4890 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30177, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30177 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30177 - **State**: PUBLISHED - **Published Date**: June 15, 2022 at 21:52 UTC - **Last Updated**: January 02, 2025 at 19:03 UTC - **Reserved Date**: May 03, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Azure RTOS GUIX Studio Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Affected Products **Microsoft - Azure RTOS GUIX Studio** Affected versions: - 6.0.0.0 (Status: affected) ### References 1. [Azure RTOS GUIX Studio Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30177)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3998, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3998 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3998 - **State**: PUBLISHED - **Published Date**: May 17, 2017 at 14:00 UTC - **Last Updated**: August 06, 2024 at 06:04 UTC - **Reserved Date**: May 15, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in phpwhois 4.2.5, as used in the adsense-click-fraud-monitoring plugin 1.7.5 for WordPress, allows remote attackers to inject arbitrary web script or HTML via the query parameter to whois.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.vapid.dhs.org/advisory.php?v=119)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18793, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18793 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18793 - **State**: PUBLISHED - **Published Date**: November 13, 2019 at 19:23 UTC - **Last Updated**: August 05, 2024 at 02:02 UTC - **Reserved Date**: November 06, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Parallels Plesk Panel 9.5 allows XSS in target/locales/tr-TR/help/index.htm? via the "fileName" parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/155175/Parallels-Plesk-Panel-9.5-Cross-Site-Scripting.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-40847, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-40847 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-40847 - **State**: PUBLISHED - **Published Date**: September 16, 2024 at 23:22 UTC - **Last Updated**: March 25, 2025 at 16:10 UTC - **Reserved Date**: July 10, 2024 at 17:11 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to access sensitive user data. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/121234) 2. [](https://support.apple.com/en-us/121238) 3. [](https://support.apple.com/en-us/121247)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0084, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0084 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0084 - **State**: PUBLISHED - **Published Date**: February 14, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:10 UTC - **Reserved Date**: January 19, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the ReadFontAlias function in XFree86 4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, allows local or remote authenticated users to execute arbitrary code via a malformed entry in the font alias (font.alias) file, a different vulnerability than CVE-2004-0083 and CVE-2004-0106. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:831](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A831) 2. [SuSE-SA:2004:006](http://www.novell.com/linux/security/advisories/2004_06_xf86.html) 3. [VU#667502](http://www.kb.cert.org/vuls/id/667502) 4. [RHSA-2004:060](http://www.redhat.com/support/errata/RHSA-2004-060.html) 5. [57768](http://sunsolve.sun.com/search/document.do?assetkey=1-26-57768-1) 6. [CLA-2004:821](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000821) 7. [xfree86-copyisolatin1lLowered-bo(15200)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15200) 8. [oval:org.mitre.oval:def:807](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A807) 9. [FLSA:2314](http://marc.info/?l=bugtraq&m=110979666528890&w=2) 10. [DSA-443](http://www.debian.org/security/2004/dsa-443) 11. [20040212 iDEFENSE Security Advisory 02.11.04: XFree86 Font Information File Buffer Overflow II](http://marc.info/?l=bugtraq&m=107662833512775&w=2) 12. [oval:org.mitre.oval:def:10405](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10405) 13. [9652](http://www.securityfocus.com/bid/9652) 14. [MDKSA-2004:012](http://www.mandriva.com/security/advisories?name=MDKSA-2004:012) 15. [](http://www.idefense.com/application/poi/display?id=73) 16. [RHSA-2004:059](http://www.redhat.com/support/errata/RHSA-2004-059.html) 17. [RHSA-2004:061](http://www.redhat.com/support/errata/RHSA-2004-061.html) 18. [SSA:2004-043](http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.405053)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0489, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0489 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0489 - **State**: PUBLISHED - **Published Date**: January 18, 2011 at 17:00 UTC - **Last Updated**: August 06, 2024 at 21:51 UTC - **Reserved Date**: January 18, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The server components in Objectivity/DB 10.0 do not require authentication for administrative commands, which allows remote attackers to modify data, obtain sensitive information, or cause a denial of service by sending requests over TCP to (1) the Lock Server or (2) the Advanced Multithreaded Server, as demonstrated by commands that are ordinarily sent by the (a) ookillls and (b) oostopams applications. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [42901](http://secunia.com/advisories/42901) 2. [15988](http://www.exploit-db.com/exploits/15988) 3. [objectivity-operations-sec-bypass(64699)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64699) 4. [70424](http://osvdb.org/70424) 5. [VU#782567](http://www.kb.cert.org/vuls/id/782567) 6. [45803](http://www.securityfocus.com/bid/45803) 7. [ADV-2011-0127](http://www.vupen.com/english/advisories/2011/0127)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21237, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21237 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21237 - **State**: PUBLISHED - **Published Date**: June 28, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 09:28 UTC - **Reserved Date**: November 03, 2022 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In applyRemoteView of NotificationContentInflater.java, there is a possible way to hide foreground service notification due to misleading or insufficient UI. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-251586912 ### Affected Products **n/a - Android** Affected versions: - Android-13 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2023-06-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10274, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10274 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10274 - **State**: PUBLISHED - **Published Date**: May 12, 2017 at 15:00 UTC - **Last Updated**: August 06, 2024 at 03:14 UTC - **Reserved Date**: March 28, 2017 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description An elevation of privilege vulnerability in the MediaTek touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-30202412. References: M-ALPS02897901. ### Affected Products **Google Inc. - Android** Affected versions: - n/a (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-05-01) 2. [98145](http://www.securityfocus.com/bid/98145)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-5371, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-5371 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-5371 - **State**: REJECTED - **Published Date**: November 28, 2012 at 00:00 UTC - **Last Updated**: September 17, 2024 at 03:07 UTC - **Reserved Date**: November 27, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-38547, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-38547 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-38547 - **State**: PUBLISHED - **Published Date**: February 07, 2023 at 00:00 UTC - **Last Updated**: March 25, 2025 at 15:39 UTC - **Reserved Date**: August 22, 2022 at 00:00 UTC - **Assigned By**: Zyxel ### Vulnerability Description A post-authentication command injection vulnerability in the CLI command of Zyxel ZyWALL/USG series firmware versions 4.20 through 4.72, VPN series firmware versions 4.30 through 5.32, USG FLEX series firmware versions 4.50 through 5.32, and ATP series firmware versions 4.32 through 5.32, which could allow an authenticated attacker with administrator privileges to execute OS commands. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Zyxel - ZyWALL/USG series firmware** Affected versions: - 4.20 through 4.72 (Status: affected) **Zyxel - VPN series firmware** Affected versions: - 4.30 through 5.32 (Status: affected) **Zyxel - USG FLEX series firmware** Affected versions: - 4.50 through 5.32 (Status: affected) **Zyxel - ATP series firmware** Affected versions: - 4.32 through 5.32 (Status: affected) ### References 1. [](https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-rce-in-firewalls)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0211, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0211 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0211 - **State**: PUBLISHED - **Published Date**: July 27, 2010 at 22:00 UTC - **Last Updated**: August 07, 2024 at 00:37 UTC - **Reserved Date**: January 06, 2010 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1024221](http://www.securitytracker.com/id?1024221) 2. [](http://support.apple.com/kb/HT4435) 3. [GLSA-201406-36](http://security.gentoo.org/glsa/glsa-201406-36.xml) 4. [](http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570) 5. [](http://www.vmware.com/security/advisories/VMSA-2011-0001.html) 6. [ADV-2010-1858](http://www.vupen.com/english/advisories/2010/1858) 7. [40677](http://secunia.com/advisories/40677) 8. [APPLE-SA-2010-11-10-1](http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html) 9. [ADV-2010-1849](http://www.vupen.com/english/advisories/2010/1849) 10. [41770](http://www.securityfocus.com/bid/41770) 11. [RHSA-2010:0542](http://www.redhat.com/support/errata/RHSA-2010-0542.html) 12. [40687](http://secunia.com/advisories/40687) 13. [20110105 VMSA-2011-0001 VMware ESX third party updates for Service Console packages glibc, sudo, and openldap](http://www.securityfocus.com/archive/1/515545/100/0/threaded) 14. [SUSE-SR:2010:014](http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html) 15. [RHSA-2010:0543](http://www.redhat.com/support/errata/RHSA-2010-0543.html) 16. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705) 17. [40639](http://secunia.com/advisories/40639) 18. [42787](http://secunia.com/advisories/42787) 19. [ADV-2011-0025](http://www.vupen.com/english/advisories/2011/0025)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45077, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45077 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45077 - **State**: PUBLISHED - **Published Date**: November 17, 2022 at 22:07 UTC - **Last Updated**: February 20, 2025 at 19:53 UTC - **Reserved Date**: November 09, 2022 at 00:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (subscriber+) PHP Object Injection vulnerability in Betheme theme <= 26.5.1.4 on WordPress. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Affected Products **Muffingroup - Betheme (WordPress theme)** Affected versions: - <= 26.5.1.4 (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/betheme/wordpress-betheme-theme-26-5-1-4-auth-php-object-injection-vulnerability?_s_id=cve) 2. [](https://themeforest.net/item/betheme-responsive-multipurpose-wordpress-theme/7758048) ### Credits - Vulnerability discovered by Dave Jong (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41836, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41836 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41836 - **State**: PUBLISHED - **Published Date**: October 13, 2023 at 14:51 UTC - **Last Updated**: September 16, 2024 at 20:36 UTC - **Reserved Date**: September 04, 2023 at 08:12 UTC - **Assigned By**: fortinet ### Vulnerability Description An improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.0 and 4.2.0 through 4.2.4, and 4.0.0 through 4.0.4 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.4 through 3.0.7 allows attacker to execute unauthorized code or commands via crafted HTTP requests. ### CVSS Metrics - **CVSS Base Score**: 3.4/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:F/RL:X/RC:C` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Fortinet - FortiSandbox** Affected versions: - 4.4.0 (Status: affected) - 4.2.0 (Status: affected) - 4.0.0 (Status: affected) - 3.2.0 (Status: affected) - 3.1.0 (Status: affected) - 3.0.4 (Status: affected) ### References 1. [https://fortiguard.com/psirt/FG-IR-23-215](https://fortiguard.com/psirt/FG-IR-23-215)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2621, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2621 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2621 - **State**: PUBLISHED - **Published Date**: August 19, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:30 UTC - **Reserved Date**: August 19, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description index.php in ECW-Shop 6.0.2 allows remote attackers to obtain sensitive information via the (1) min or (2) max parameter with a "'" (single quote), which reveals the path in an error message, possibly due to a SQL injection vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050815 [NOBYTES.COM: #9] ECW Shop 6.0.2 - Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=112421209919985&w=2) 2. [1014734](http://securitytracker.com/id?1014734) 3. [16459](http://secunia.com/advisories/16459)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-9347, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-9347 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-9347 - **State**: PUBLISHED - **Published Date**: September 27, 2019 at 18:05 UTC - **Last Updated**: August 04, 2024 at 21:46 UTC - **Reserved Date**: February 28, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In the m4v_h263 codec, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-109891727 ### Affected Products **n/a - Android** Affected versions: - Android-10 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/android-10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-39536, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-39536 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-39536 - **State**: PUBLISHED - **Published Date**: May 23, 2025 at 12:43 UTC - **Last Updated**: May 23, 2025 at 15:12 UTC - **Reserved Date**: April 16, 2025 at 06:24 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Chimpstudio JobHunt Job Alerts allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JobHunt Job Alerts: from n/a through 3.6. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Chimpstudio - JobHunt Job Alerts** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/jobhunt-notifications/vulnerability/wordpress-jobhunt-job-alerts-3-6-arbitrary-content-deletion-vulnerability?_s_id=cve) ### Credits - Bonds (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27528, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27528 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27528 - **State**: PUBLISHED - **Published Date**: May 28, 2025 at 08:12 UTC - **Last Updated**: May 28, 2025 at 13:20 UTC - **Reserved Date**: February 27, 2025 at 07:32 UTC - **Assigned By**: apache ### Vulnerability Description Deserialization of Untrusted Data vulnerability in Apache InLong. This issue affects Apache InLong: from 1.13.0 through 2.1.0. This vulnerability allows attackers to bypass the security mechanisms of InLong JDBC and leads to arbitrary file reading. Users are advised to upgrade to Apache InLong's 2.2.0 or cherry-pick [1] to solve it. [1] https://github.com/apache/inlong/pull/11747 ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **Apache Software Foundation - Apache InLong** Affected versions: - 1.13.0 (Status: affected) ### References 1. [](https://lists.apache.org/thread/b807rqzgyv4qgvxw3nhkq8tl6g90gqgj) 2. [](https://github.com/apache/inlong/pull/11747) ### Credits - yulat - m4x - h3h3qaq
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1308, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1308 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1308 - **State**: PUBLISHED - **Published Date**: September 12, 2001 at 04:00 UTC - **Last Updated**: August 01, 2024 at 17:11 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain programs in HP-UX 10.20 do not properly handle large user IDs (UID) or group IDs (GID) over 60000, which could allow local users to gain privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [hp-large-uid-gid(7594)](http://www.iss.net/security_center/static/7594.php) 2. [H-91](http://ciac.llnl.gov/ciac/bulletins/h-91.shtml) 3. [H-09](http://ciac.llnl.gov/ciac/bulletins/h-09.shtml) 4. [HPSBUX9611-041](http://ciac.llnl.gov/ciac/bulletins/h-91.shtml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0422, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0422 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0422 - **State**: PUBLISHED - **Published Date**: March 09, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:21 UTC - **Reserved Date**: May 24, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in Xsun in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20010410 Solaris Xsun buffer overflow vulnerability](http://archives.neohapsis.com/archives/bugtraq/2001-04/0158.html) 2. [oval:org.mitre.oval:def:555](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A555) 3. [solaris-xsun-home-bo(6343)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6343) 4. [2561](http://www.securityfocus.com/bid/2561)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15527, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15527 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15527 - **State**: PUBLISHED - **Published Date**: November 20, 2017 at 19:00 UTC - **Last Updated**: September 17, 2024 at 03:29 UTC - **Reserved Date**: October 17, 2017 at 00:00 UTC - **Assigned By**: symantec ### Vulnerability Description Prior to ITMS 8.1 RU4, the Symantec Management Console can be susceptible to a directory traversal exploit, which is a type of attack that can occur when there is insufficient security validation / sanitization of user-supplied input file names, such that characters representing "traverse to parent directory" are passed through to the file APIs. ### Affected Products **Symantec Corporation - Symantec Management Console** Affected versions: - Prior to ITMS 8.1 RU4 (Status: affected) ### References 1. [](https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171120_00) 2. [101743](http://www.securityfocus.com/bid/101743)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18738, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18738 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18738 - **State**: PUBLISHED - **Published Date**: October 28, 2018 at 03:00 UTC - **Last Updated**: August 05, 2024 at 11:16 UTC - **Reserved Date**: October 27, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An XSS issue was discovered in SEMCMS 3.4 via the admin/SEMCMS_Categories.php?pid=1&lgid=1 category_key parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/AvaterXXX/SEMCMS/blob/master/XSS.md#xss2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3933, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3933 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3933 - **State**: PUBLISHED - **Published Date**: December 01, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:31 UTC - **Reserved Date**: December 01, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in 88Script's Event Calendar 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the m parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [17796](http://secunia.com/advisories/17796) 2. [21269](http://www.osvdb.org/21269) 3. [15658](http://www.securityfocus.com/bid/15658) 4. [ADV-2005-2667](http://www.vupen.com/english/advisories/2005/2667) 5. [](http://pridels0.blogspot.com/2005/11/88scripts-event-calendar-v20-sql-inj.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40724, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40724 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40724 - **State**: PUBLISHED - **Published Date**: September 12, 2023 at 09:32 UTC - **Last Updated**: February 27, 2025 at 20:56 UTC - **Reserved Date**: August 21, 2023 at 10:57 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in QMS Automotive (All versions < V12.39). User credentials are found in memory as plaintext. An attacker could perform a memory dump, and get access to credentials, and use it for impersonation. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-316: Security Weakness ### Affected Products **Siemens - QMS Automotive** Affected versions: - All versions < V12.39 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43768 - **State**: PUBLISHED - **Published Date**: January 02, 2025 at 23:58 UTC - **Last Updated**: January 07, 2025 at 04:56 UTC - **Reserved Date**: August 15, 2024 at 20:40 UTC - **Assigned By**: google_android ### Vulnerability Description In skia_alloc_func of SkDeflate.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - 15 (Status: affected) - 14 (Status: affected) - 13 (Status: affected) - 12L (Status: affected) - 12 (Status: affected) ### References 1. [](https://android.googlesource.com/platform/external/skia/+/b5543cb8c6b95623743016055220378efe73eb93) 2. [](https://source.android.com/security/bulletin/2024-12-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36203, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36203 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36203 - **State**: PUBLISHED - **Published Date**: April 22, 2022 at 14:44 UTC - **Last Updated**: September 17, 2024 at 02:12 UTC - **Reserved Date**: July 06, 2021 at 00:00 UTC - **Assigned By**: jci ### Vulnerability Description The affected product may allow an attacker to identify and forge requests to internal systems by way of a specially crafted request. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **Johnnson Controls - Metasys System Configuration Tool (SCT)** Affected versions: - All (Status: affected) **Johnnson Controls - Metasys System Configuration Tool Pro (SCT Pro)** Affected versions: - All (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-111-02) ### Credits - Tony West and Scott Ponte reported this vulnerability to Johnson Controls. Johnson Controls reported this vulnerability to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24564, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24564 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24564 - **State**: PUBLISHED - **Published Date**: February 21, 2022 at 22:14 UTC - **Last Updated**: August 03, 2024 at 04:13 UTC - **Reserved Date**: February 07, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Checkmk <=2.0.0p19 contains a Cross Site Scripting (XSS) vulnerability. While creating or editing a user attribute, the Help Text is subject to HTML injection, which can be triggered for editing a user. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://checkmk.com/werk/13199)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4795, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4795 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4795 - **State**: PUBLISHED - **Published Date**: February 27, 2023 at 15:24 UTC - **Last Updated**: March 10, 2025 at 18:08 UTC - **Reserved Date**: December 28, 2022 at 11:29 UTC - **Assigned By**: WPScan ### Vulnerability Description The Galleries by Angie Makes WordPress plugin through 1.67 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Galleries by Angie Makes** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/5052e60f-59ea-4758-8af3-112285a18639) ### Credits - Lana Codes - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3050, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3050 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3050 - **State**: PUBLISHED - **Published Date**: September 26, 2022 at 15:01 UTC - **Last Updated**: May 21, 2025 at 15:45 UTC - **Reserved Date**: August 30, 2022 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Heap buffer overflow in WebUI in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html) 2. [](https://crbug.com/1337132) 3. [GLSA-202209-23](https://security.gentoo.org/glsa/202209-23) 4. [FEDORA-2022-3f28aa88cf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7172, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7172 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7172 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 16, 2015 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6130, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6130 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6130 - **State**: PUBLISHED - **Published Date**: November 14, 2023 at 16:19 UTC - **Last Updated**: August 30, 2024 at 18:34 UTC - **Reserved Date**: November 14, 2023 at 16:19 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description Path Traversal: '\..\filename' in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2. ### Weakness Classification (CWE) - CWE-29: Security Weakness ### Affected Products **salesagility - salesagility/suitecrm** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/22a27be9-f016-4daf-9887-c77eb3e1dc74) 2. [](https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25515, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25515 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25515 - **State**: PUBLISHED - **Published Date**: February 25, 2025 at 00:00 UTC - **Last Updated**: February 26, 2025 at 15:02 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Seacms <=13.3 is vulnerable to SQL Injection in admin_collect.php that allows an authenticated attacker to exploit the database. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Colorado-all/cve/blob/main/seacms/seacms%20V13.3-sql-5.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9290, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9290 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9290 - **State**: PUBLISHED - **Published Date**: March 15, 2020 at 21:52 UTC - **Last Updated**: October 25, 2024 at 14:26 UTC - **Reserved Date**: February 19, 2020 at 00:00 UTC - **Assigned By**: fortinet ### Vulnerability Description An Unsafe Search Path vulnerability in FortiClient for Windows online installer 6.2.3 and below may allow a local attacker with control over the directory in which FortiClientOnlineInstaller.exe and FortiClientVPNOnlineInstaller.exe resides to execute arbitrary code on the system via uploading malicious Filter Library DLL files in that directory. ### Affected Products **Fortinet - Fortinet FortiClient for Windows** Affected versions: - 6.2.3 and below (Status: affected) ### References 1. [](https://fortiguard.com/psirt/FG-IR-19-060)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-42719, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-42719 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-42719 - **State**: PUBLISHED - **Published Date**: December 04, 2023 at 00:54 UTC - **Last Updated**: October 11, 2024 at 17:54 UTC - **Reserved Date**: September 13, 2023 at 07:40 UTC - **Assigned By**: Unisoc ### Vulnerability Description In video service, there is a possible out of bounds read due to a incorrect bounds check. This could lead to local denial of service with no additional execution privileges needed ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - T606/T612/T616** Affected versions: - Android12 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24465, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24465 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24465 - **State**: PUBLISHED - **Published Date**: March 10, 2023 at 10:45 UTC - **Last Updated**: March 04, 2025 at 21:17 UTC - **Reserved Date**: March 07, 2023 at 03:52 UTC - **Assigned By**: OpenHarmony ### Vulnerability Description Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause the current application to crash. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **OpenHarmony - OpenHarmony** Affected versions: - 3.1 (Status: affected) - 3.0 (Status: affected) ### References 1. [](https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13875, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13875 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13875 - **State**: PUBLISHED - **Published Date**: March 20, 2025 at 06:00 UTC - **Last Updated**: March 20, 2025 at 19:12 UTC - **Reserved Date**: February 14, 2025 at 18:29 UTC - **Assigned By**: WPScan ### Vulnerability Description The WP-PManager WordPress plugin through 1.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - WP-PManager** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/82c54fb5-f1d9-4bae-a3de-d4335809b81c/) ### Credits - Hassan Khan Yusufzai - Splint3r7 - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27429, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27429 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27429 - **State**: REJECTED - **Published Date**: May 17, 2024 at 12:02 UTC - **Last Updated**: May 21, 2024 at 14:40 UTC - **Reserved Date**: February 25, 2024 at 13:47 UTC - **Assigned By**: Linux ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0523, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0523 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0523 - **State**: PUBLISHED - **Published Date**: August 13, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 21:58 UTC - **Reserved Date**: January 20, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description gypsy 0.8 does not properly restrict the files that can be read while running with root privileges, which allows local users to read otherwise restricted files via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20110125 Re: CVE request: multiple gypsy vulnerabilities](http://www.openwall.com/lists/oss-security/2011/01/25/10) 2. [FEDORA-2013-8659](http://lists.fedoraproject.org/pipermail/package-announce/2013-May/107020.html) 3. [openSUSE-SU-2012:0884](http://lists.opensuse.org/opensuse-updates/2012-07/msg00034.html) 4. [](https://bugs.freedesktop.org/show_bug.cgi?id=33431) 5. [FEDORA-2013-8687](http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106919.html) 6. [FEDORA-2013-8705](http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106927.html) 7. [[oss-security] 20110124 CVE request: multiple gypsy vulnerabilities](http://www.openwall.com/lists/oss-security/2011/01/24/10) 8. [49991](http://secunia.com/advisories/49991) 9. [](https://bugs.launchpad.net/ubuntu/+source/gypsy/+bug/690323) 10. [](http://cgit.freedesktop.org/gypsy/commit/?id=40101707cddb319481133b2a137294b6b669bd16)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-46191, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-46191 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-46191 - **State**: PUBLISHED - **Published Date**: May 09, 2025 at 00:00 UTC - **Last Updated**: May 10, 2025 at 01:57 UTC - **Reserved Date**: April 22, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Arbitrary File Upload in user_payment_update.php in SourceCodester Client Database Management System 1.0 allows unauthenticated users to upload arbitrary files via the uploaded_file_cancelled field. Due to the absence of proper file extension checks, MIME type validation, and authentication, attackers can upload executable PHP files to a web-accessible directory (/files/). This allows them to execute arbitrary commands remotely by accessing the uploaded script, resulting in full Remote Code Execution (RCE) without authentication. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://portswigger.net/web-security/file-upload) 2. [](https://github.com/x6vrn/mitre/blob/main/CVE-2025-46191.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3832, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3832 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3832 - **State**: PUBLISHED - **Published Date**: October 01, 2015 at 00:00 UTC - **Last Updated**: August 06, 2024 at 05:56 UTC - **Reserved Date**: May 12, 2015 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description Multiple buffer overflows in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I allow remote attackers to execute arbitrary code via invalid size values of NAL units in MP4 data, aka internal bug 19641538. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://android.googlesource.com/platform/frameworks/av/+/d48f0f145f8f0f4472bc0af668ac9a8bce44ba9b) 2. [[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)](https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2870, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2870 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2870 - **State**: PUBLISHED - **Published Date**: May 24, 2023 at 17:31 UTC - **Last Updated**: August 02, 2024 at 06:33 UTC - **Reserved Date**: May 24, 2023 at 17:05 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in EnTech Monitor Asset Manager 2.9. It has been declared as problematic. Affected by this vulnerability is the function 0x80002014 of the component IoControlCode Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier VDB-229849 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 3.3/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-404: Security Weakness ### Affected Products **EnTech - Monitor Asset Manager** Affected versions: - 2.9 (Status: affected) ### References 1. [](https://vuldb.com/?id.229849) 2. [](https://vuldb.com/?ctiid.229849) 3. [](https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2870) 4. [](https://drive.google.com/file/d/1ehTYhcdeTiB4rQ38n5FqhQZgVqcvvPE_/view?usp=sharing) ### Credits - Zeze7w (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6952, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6952 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6952 - **State**: PUBLISHED - **Published Date**: October 15, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:31 UTC - **Reserved Date**: September 19, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Manga Facts (aka app.mangafacts.ar) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 2. [VU#209465](http://www.kb.cert.org/vuls/id/209465) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25414, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25414 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25414 - **State**: PUBLISHED - **Published Date**: February 16, 2024 at 00:00 UTC - **Last Updated**: March 14, 2025 at 18:54 UTC - **Reserved Date**: February 07, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An arbitrary file upload vulnerability in /admin/upgrade of CSZ CMS v1.3.0 allows attackers to execute arbitrary code via uploading a crafted Zip file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com/files/175889/CSZ-CMS-1.3.0-Shell-Upload.html) 2. [](https://github.com/capture0x/CSZ_CMS)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2113, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2113 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2113 - **State**: PUBLISHED - **Published Date**: May 27, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:15 UTC - **Reserved Date**: May 27, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in BremsServer 1.2.4 allows remote attackers to inject arbitrary web script or HTML via the URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [9491](http://www.securityfocus.com/bid/9491) 2. [20040126 Directory traversal and XSS in BremsServer 1.2.4](http://marc.info/?l=bugtraq&m=107513747107031&w=2) 3. [3754](http://www.osvdb.org/3754) 4. [10731](http://secunia.com/advisories/10731) 5. [bremsserver-xss(14953)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14953) 6. [1008853](http://www.securitytracker.com/id?1008853)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-58124, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-58124 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-58124 - **State**: PUBLISHED - **Published Date**: April 07, 2025 at 03:41 UTC - **Last Updated**: April 07, 2025 at 14:10 UTC - **Reserved Date**: March 27, 2025 at 07:13 UTC - **Assigned By**: huawei ### Vulnerability Description Access control vulnerability in the security verification module Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality. ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-290: Security Weakness ### Affected Products **Huawei - HarmonyOS** Affected versions: - 4.0.0 (Status: affected) **Huawei - EMUI** Affected versions: - 14.0.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2025/4/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9104, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9104 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9104 - **State**: PUBLISHED - **Published Date**: October 16, 2024 at 02:05 UTC - **Last Updated**: October 16, 2024 at 13:37 UTC - **Reserved Date**: September 23, 2024 at 15:06 UTC - **Assigned By**: Wordfence ### Vulnerability Description The UltimateAI plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.8.3. This is due to the improper empty value check and a missing default activated value check in the 'ultimate_ai_change_pass' function. This makes it possible for unauthenticated attackers to reset the password of the first user, whose account is not yet activated or the first user who activated their account, who are subscribers. ### CVSS Metrics - **CVSS Base Score**: 5.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-703: Security Weakness ### Affected Products **Tophive - Ultimate AI** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3faf976d-0763-4e47-9bc3-18c791ec4487?source=cve) 2. [](https://codecanyon.net/item/ultimateai-ai-enhanced-wordpress-plugin-with-saas-for-content-code-chat-and-image-generation/51201953) ### Credits - István Márton
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9475, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9475 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9475 - **State**: PUBLISHED - **Published Date**: November 20, 2024 at 17:27 UTC - **Last Updated**: November 20, 2024 at 18:28 UTC - **Reserved Date**: April 05, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In HeadsetInterface::ClccResponse of btif_hf.cc, there is a possible out of bounds stack write due to a missing bounds check. This could lead to remote escalation of privilege via Bluetooth, if the recipient has enabled SIP calls with no additional execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - 7 (Status: affected) - 8 (Status: affected) - 8.1 (Status: affected) - 9 (Status: affected) - nyc-mr1-dev (Status: affected) - nyc-mr2-dev (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-09-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-41654, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-41654 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-41654 - **State**: PUBLISHED - **Published Date**: May 26, 2025 at 08:21 UTC - **Last Updated**: May 27, 2025 at 14:13 UTC - **Reserved Date**: April 16, 2025 at 11:17 UTC - **Assigned By**: CERTVDE ### Vulnerability Description An unauthenticated remote attacker can access information about running processes via the SNMP protocol. The amount of returned data can trigger a reboot by the watchdog. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **Pepperl+Fuchs - Profinet Gateway FB8122A.1.EL** Affected versions: - 0 (Status: affected) **Pepperl+Fuchs - Profinet Gateway LB8122A.1.EL** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert.vde.com/en/advisories/VDE-2025-011)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26458, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26458 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26458 - **State**: PUBLISHED - **Published Date**: April 11, 2023 at 02:34 UTC - **Last Updated**: February 07, 2025 at 19:33 UTC - **Reserved Date**: February 22, 2023 at 21:38 UTC - **Assigned By**: sap ### Vulnerability Description An information disclosure vulnerability exists in SAP Landscape Management - version 3.0, enterprise edition. It allows an authenticated SAP Landscape Management user to obtain privileged access to other systems making those other systems vulnerable to information disclosure and modification.The disclosed information is for Diagnostics Agent Connection via Java SCS Message Server of an SAP Solution Manager system and can only be accessed by authenticated SAP Landscape Management users, but they can escalate their privileges to the SAP Solution Manager system. ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-668: Security Weakness ### Affected Products **SAP - Landscape Management** Affected versions: - 3.0 (Status: affected) ### References 1. [](https://launchpad.support.sap.com/#/notes/3312733) 2. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19980, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19980 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19980 - **State**: PUBLISHED - **Published Date**: December 08, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 11:51 UTC - **Reserved Date**: December 08, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Anker Nebula Capsule Pro NBUI_M1_V2.1.9 devices allow attackers to cause a denial of service (reboot of the underlying Android 7.1.2 operating system) via a crafted application that sends data to WifiService. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ISCAS-Vulab/PoC_Nebula-Capsule-Pro-Wifi)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2386, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2386 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2386 - **State**: PUBLISHED - **Published Date**: July 13, 2010 at 22:07 UTC - **Last Updated**: August 07, 2024 at 02:32 UTC - **Reserved Date**: June 21, 2010 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle Solaris 8, 9, and 10, and OpenSolaris, allows local users to affect availability via unknown vectors related to GigaSwift Ethernet Driver. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11848, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11848 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11848 - **State**: PUBLISHED - **Published Date**: January 15, 2025 at 11:24 UTC - **Last Updated**: January 15, 2025 at 14:34 UTC - **Reserved Date**: November 26, 2024 at 20:55 UTC - **Assigned By**: Wordfence ### Vulnerability Description The NitroPack plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'nitropack_dismiss_notice_forever' AJAX action in all versions up to, and including, 1.17.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options to a fixed value of '1' which can activate certain options (e.g., enable user registration) or modify certain options in a way that leads to a denial of service condition. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **nitropack - NitroPack – Caching & Speed Optimization for Core Web Vitals, Defer CSS & JS, Lazy load Images and CDN** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1e1b06d0-f348-4a8b-8730-a87d8e2ba2a1?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3211235/nitropack) ### Credits - Sean Murphy
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10375, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10375 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10375 - **State**: PUBLISHED - **Published Date**: October 19, 2017 at 17:00 UTC - **Last Updated**: October 04, 2024 at 16:46 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Hospitality Guest Access component of Oracle Hospitality Applications (subcomponent: Base). Supported versions that are affected are 4.2.0 and 4.2.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Guest Access. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Guest Access accessible data as well as unauthorized read access to a subset of Oracle Hospitality Guest Access accessible data. CVSS 3.0 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N). ### Affected Products **Oracle Corporation - Hospitality Guest Access** Affected versions: - 4.2.0 (Status: affected) - 4.2.1 (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) 2. [101434](http://www.securityfocus.com/bid/101434)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38446, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38446 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38446 - **State**: PUBLISHED - **Published Date**: September 04, 2023 at 01:16 UTC - **Last Updated**: October 10, 2024 at 14:08 UTC - **Reserved Date**: July 18, 2023 at 07:24 UTC - **Assigned By**: Unisoc ### Vulnerability Description In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618** Affected versions: - Android9/Android10/Android11 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0310, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0310 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0310 - **State**: PUBLISHED - **Published Date**: May 07, 2001 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:14 UTC - **Reserved Date**: May 11, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IP fragment assembly in OpenBSD 2.4 allows a remote attacker to cause a denial of service by sending a large number of fragmented packets. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19990217 IP fragment assembly can bog the machine excessively and cause problems.](http://www.openbsd.org/errata24.html#maxqueue) 2. [7539](http://www.osvdb.org/7539)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45176, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45176 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45176 - **State**: PUBLISHED - **Published Date**: October 14, 2023 at 15:35 UTC - **Last Updated**: September 16, 2024 at 18:34 UTC - **Reserved Date**: October 05, 2023 at 01:38 UTC - **Assigned By**: ibm ### Vulnerability Description IBM App Connect Enterprise 11.0.0.1 through 11.0.0.23, 12.0.1.0 through 12.0.10.0 and IBM Integration Bus 10.1 through 10.1.0.1 are vulnerable to a denial of service for integration nodes on Windows. IBM X-Force ID: 247998. ### CVSS Metrics - **CVSS Base Score**: 6.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **IBM - App Connect Enterprise** Affected versions: - 11.0.0.1 (Status: affected) - 12.0.1.0 (Status: affected) **IBM - Integration Bus** Affected versions: - 10.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7051448) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/267998)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3899, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3899 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3899 - **State**: PUBLISHED - **Published Date**: November 29, 2005 at 21:00 UTC - **Last Updated**: August 07, 2024 at 23:24 UTC - **Reserved Date**: November 29, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The automatic update feature in Google Talk allows remote attackers to cause a denial of service (CPU and memory consumption) by poisoning a target's DNS cache and causing a large update file to be sent, which consumes large amounts of CPU and memory during the signature verification, aka BenjiBug. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [googletalk-automatic-update-dos(23180)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23180) 2. [20051123 Google Talk Denial of Service - BenjiBug](http://marc.info/?l=bugtraq&m=113278119300162&w=2) 3. [20051122 Google Talk Denial of Service - BenjiBug](http://lists.grok.org.uk/pipermail/full-disclosure/2005-November/038969.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33451, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33451 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33451 - **State**: PUBLISHED - **Published Date**: July 26, 2022 at 12:36 UTC - **Last Updated**: August 03, 2024 at 23:50 UTC - **Reserved Date**: May 20, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in lrzip version 0.641. There are memory leaks in fill_buffer() in stream.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ckolivas/lrzip/issues/198) 2. [](https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18692, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18692 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18692 - **State**: PUBLISHED - **Published Date**: February 23, 2019 at 11:00 UTC - **Last Updated**: August 05, 2024 at 11:16 UTC - **Reserved Date**: October 26, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A reflected Cross-Site scripting (XSS) vulnerability in SEMCO Semcosoft 5.3 allows remote attackers to inject arbitrary web scripts or HTML via the username parameter to the Login Form. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://atomic111.github.io/article/semcosoft-cross-site-scripting)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0185, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0185 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0185 - **State**: PUBLISHED - **Published Date**: May 06, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 09:05 UTC - **Reserved Date**: December 03, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [59329](http://secunia.com/advisories/59329) 2. [](https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d) 3. [](https://hoffmann-christian.info/files/php-fpm/0001-Fix-bug-67060-use-default-mode-of-660.patch) 4. [](https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1307027) 5. [](https://bugs.php.net/bug.php?id=67060) 6. [59061](http://secunia.com/advisories/59061) 7. [](http://www.php.net/ChangeLog-5.php) 8. [](http://www.php.net/archive/2014.php#id2014-05-01-1) 9. [](http://support.apple.com/kb/HT6443) 10. [[oss-security] 20140429 Fwd: [vs] php-fpm: privilege escalation due to insecure default config (CVE-2014-0185)](http://www.openwall.com/lists/oss-security/2014/04/29/5) 11. [](https://bugzilla.redhat.com/show_bug.cgi?id=1092815) 12. [openSUSE-SU-2015:1685](http://lists.opensuse.org/opensuse-updates/2015-10/msg00012.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0588, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0588 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0588 - **State**: PUBLISHED - **Published Date**: July 27, 2001 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:30 UTC - **Reserved Date**: July 27, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description sendmail 8.9.3, as included with the MMDF 2.43.3b package in SCO OpenServer 5.0.6, can allow a local attacker to gain additional privileges via a buffer overflow in the first argument to the command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20010327 SCO 5.0.6 MMDF issues (sendmail 8.9.3)](http://archives.neohapsis.com/archives/bugtraq/2001-03/0417.html) 2. [20010412 SSE072B: SCO OpenServer revision of buffer overflow fixes](http://security-archive.merton.ox.ac.uk/bugtraq-200104/0221.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21336, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21336 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21336 - **State**: PUBLISHED - **Published Date**: January 19, 2022 at 11:24 UTC - **Last Updated**: September 24, 2024 at 20:22 UTC - **Reserved Date**: November 15, 2021 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H` ### Affected Products **Oracle Corporation - MySQL Cluster** Affected versions: - 7.4.34 and prior (Status: affected) - 7.5.24 and prior (Status: affected) - 7.6.20 and prior (Status: affected) - 8.0.27 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2022.html) 2. [](https://security.netapp.com/advisory/ntap-20220121-0008/) 3. [](https://www.zerodayinitiative.com/advisories/ZDI-22-121/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27482, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27482 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27482 - **State**: PUBLISHED - **Published Date**: April 08, 2025 at 17:23 UTC - **Last Updated**: June 04, 2025 at 17:53 UTC - **Reserved Date**: February 26, 2025 at 14:42 UTC - **Assigned By**: microsoft ### Vulnerability Description Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-591: Security Weakness ### Affected Products **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows Server 2025 (Server Core installation)** Affected versions: - 10.0.26100.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows Server 2025** Affected versions: - 10.0.26100.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) ### References 1. [Windows Remote Desktop Services Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27482)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44107, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44107 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44107 - **State**: PUBLISHED - **Published Date**: September 10, 2024 at 20:47 UTC - **Last Updated**: September 12, 2024 at 03:55 UTC - **Reserved Date**: August 20, 2024 at 14:55 UTC - **Assigned By**: ivanti ### Vulnerability Description DLL hijacking in the management console of Ivanti Workspace Control version 10.18.0.0 and below allows a local authenticated attacker to escalate their privileges and achieve arbitrary code execution. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-427: Security Weakness ### Affected Products **Ivanti - Workspace Control** Affected versions: - 10.18.50.0 (Status: unaffected) ### References 1. [](https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12767, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12767 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12767 - **State**: PUBLISHED - **Published Date**: May 15, 2025 at 20:09 UTC - **Last Updated**: May 16, 2025 at 16:36 UTC - **Reserved Date**: December 18, 2024 at 19:26 UTC - **Assigned By**: WPScan ### Vulnerability Description The buddyboss-platform WordPress plugin before 2.7.60 lacks proper access controls and allows a logged-in user to view comments on private posts ### Weakness Classification (CWE) - CWE-639 Authorization Bypass Through User-Controlled Key: Security Weakness ### Affected Products **Unknown - buddyboss-platform** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/e8997f90-d8e9-4815-8808-aa0183443dae/) ### Credits - Faris Krivić - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8378, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8378 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8378 - **State**: PUBLISHED - **Published Date**: February 13, 2017 at 21:00 UTC - **Last Updated**: August 06, 2024 at 02:20 UTC - **Reserved Date**: September 28, 2016 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description An issue was discovered in Lynxspring JENEsys BAS Bridge versions 1.1.8 and older. The application's database lacks sufficient safeguards for protecting credentials. ### Affected Products **n/a - Lynxspring JENEsys BAS Bridge 1.1.8 and older** Affected versions: - Lynxspring JENEsys BAS Bridge 1.1.8 and older (Status: affected) ### References 1. [94344](http://www.securityfocus.com/bid/94344) 2. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-320-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39437, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39437 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39437 - **State**: PUBLISHED - **Published Date**: October 09, 2024 at 06:43 UTC - **Last Updated**: October 09, 2024 at 21:55 UTC - **Reserved Date**: June 25, 2024 at 06:13 UTC - **Assigned By**: Unisoc ### Vulnerability Description In linkturbonative service, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - cwe-77 Improper Neutralization of Special Elements used in a Command ('Command Injection'): Security Weakness ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000** Affected versions: - Android13/Android14 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1843898270204624897)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7640, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7640 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7640 - **State**: PUBLISHED - **Published Date**: October 21, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:56 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Hotel Room (aka com.wHotelRoom) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#534625](http://www.kb.cert.org/vuls/id/534625) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12348, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12348 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12348 - **State**: PUBLISHED - **Published Date**: November 30, 2017 at 09:00 UTC - **Last Updated**: August 05, 2024 at 18:36 UTC - **Reserved Date**: August 03, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in the web-based management interface of Cisco UCS Central Software could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the affected interface or hijack a valid session ID from a user of the affected interface. Cisco Bug IDs: CSCvf71978, CSCvf71986. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **n/a - Cisco UCS Central Software** Affected versions: - Cisco UCS Central Software (Status: affected) ### References 1. [102018](http://www.securityfocus.com/bid/102018) 2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-ucs-central) 3. [1039924](http://www.securitytracker.com/id/1039924)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3762, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3762 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3762 - **State**: PUBLISHED - **Published Date**: July 19, 2023 at 06:31 UTC - **Last Updated**: August 02, 2024 at 07:08 UTC - **Reserved Date**: July 18, 2023 at 19:29 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Intergard SGS 8.7.0. It has been classified as problematic. This affects an unknown part. The manipulation leads to cleartext storage of sensitive information in memory. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-234447. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-316: Security Weakness ### Affected Products **Intergard - SGS** Affected versions: - 8.7.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.234447) 2. [](https://vuldb.com/?ctiid.234447) 3. [](https://youtu.be/Ee2KU-T_0pI) ### Credits - hiagomoura (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41937, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41937 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41937 - **State**: PUBLISHED - **Published Date**: November 22, 2022 at 00:00 UTC - **Last Updated**: April 23, 2025 at 16:36 UTC - **Reserved Date**: September 30, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The application allows anyone with view access to modify any page of the wiki by importing a crafted XAR package. The problem has been patched in XWiki 14.6RC1, 14.6 and 13.10.8. As a workaround, setting the right of the page Filter.WebHome and making sure only the main wiki administrators can view the application installed on main wiki or edit the page and apply the changed described in commit fb49b4f. ### CVSS Metrics - **CVSS Base Score**: 9.6/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **xwiki - xwiki-platform** Affected versions: - < 13.10.8 (Status: affected) - >= 14.0.0, < 14.4.3 (Status: affected) - >= 14.5.0, < 14.6-rc-1 (Status: affected) ### References 1. [](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-q6jp-gcww-8v2j) 2. [](https://github.com/xwiki/xwiki-platform/commit/fb49b4f289ee28e45cfada8e97e320cd3ed27113) 3. [](https://jira.xwiki.org/browse/XWIKI-19758)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2720, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2720 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2720 - **State**: PUBLISHED - **Published Date**: May 14, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 05:24 UTC - **Reserved Date**: March 25, 2015 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description The update implementation in Mozilla Firefox before 38.0 on Windows does not ensure that the pathname for updater.exe corresponds to the application directory, which might allow local users to gain privileges via a Trojan horse file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [74611](http://www.securityfocus.com/bid/74611) 2. [](http://www.mozilla.org/security/announce/2015/mfsa2015-58.html) 3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1127481) 4. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34394, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34394 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34394 - **State**: PUBLISHED - **Published Date**: June 22, 2021 at 21:25 UTC - **Last Updated**: August 04, 2024 at 00:12 UTC - **Reserved Date**: June 09, 2021 at 00:00 UTC - **Assigned By**: nvidia ### Vulnerability Description Trusty contains a vulnerability in the NVIDIA OTE protocol that is present in all TAs. An incorrect message stream deserialization allows an attacker to use the malicious CA that is run by the user to cause the buffer overflow, which may lead to information disclosure and data modification. ### CVSS Metrics - **CVSS Base Score**: 4.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H` ### Affected Products **NVIDIA - NVIDIA Jetson TX2 series, TX2 NX, AGX Xavier series, Xavier NX** Affected versions: - All Jetson Linux versions prior to r32.5.1 (Status: affected) ### References 1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5205)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0345, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0345 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0345 - **State**: PUBLISHED - **Published Date**: July 10, 2003 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:50 UTC - **Reserved Date**: May 28, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#337764](http://www.kb.cert.org/vuls/id/337764) 2. [9225](http://secunia.com/advisories/9225) 3. [oval:org.mitre.oval:def:146](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A146) 4. [oval:org.mitre.oval:def:118](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A118) 5. [oval:org.mitre.oval:def:3391](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3391) 6. [win-smb-bo(12544)](https://exchange.xforce.ibmcloud.com/vulnerabilities/12544) 7. [MS03-024](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-024) 8. [8152](http://www.securityfocus.com/bid/8152) 9. [1007154](http://securitytracker.com/id?1007154)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1676, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1676 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1676 - **State**: REJECTED - **Published Date**: May 18, 2009 at 18:00 UTC - **Last Updated**: June 12, 2009 at 09:00 UTC - **Reserved Date**: May 18, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5628, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5628 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5628 - **State**: PUBLISHED - **Published Date**: January 30, 2017 at 04:24 UTC - **Last Updated**: August 05, 2024 at 15:04 UTC - **Reserved Date**: January 29, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Artifex Software, Inc. MuJS before 8f62ea10a0af68e56d5c00720523ebcba13c2e6a. The MakeDay function in jsdate.c does not validate the month, leading to an integer overflow when parsing a specially crafted JS file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://git.ghostscript.com/?p=mujs.git%3Bh=8f62ea10a0af68e56d5c00720523ebcba13c2e6a) 2. [](https://bugs.ghostscript.com/show_bug.cgi?id=697496) 3. [95855](http://www.securityfocus.com/bid/95855)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4716, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4716 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4716 - **State**: PUBLISHED - **Published Date**: October 23, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 10:24 UTC - **Reserved Date**: October 23, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in show.php in BitmixSoft PHP-Lance 1.52 allows remote attackers to execute arbitrary SQL commands via the catid parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4500](http://securityreason.com/securityalert/4500) 2. [32027](http://secunia.com/advisories/32027) 3. [31446](http://www.securityfocus.com/bid/31446) 4. [6605](https://www.exploit-db.com/exploits/6605)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-25147, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-25147 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-25147 - **State**: PUBLISHED - **Published Date**: June 07, 2023 at 01:51 UTC - **Last Updated**: December 28, 2024 at 00:54 UTC - **Reserved Date**: June 06, 2023 at 13:09 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Pretty Links plugin for WordPress is vulnerable to Stored Cross-Site Scripting via various IP headers as well as the referer header in versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping in the track_link function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **supercleanse - Pretty Links – Affiliate Links, Link Branding, Link Tracking & Marketing Plugin** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/ae058c5b-b90b-4a1e-9f56-d56dbd2d3607?source=cve) 2. [](https://blog.nintechnet.com/stored-xss-and-csv-injection-vulnerabilities-in-wordpress-shortlinks-by-pretty-links-plugin/) 3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2108490%40pretty-link%2Ftrunk&old=2078274%40pretty-link%2Ftrunk&sfp_email=&sfph_mail=) ### Credits - Jerome Bruandet
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31007, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31007 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31007 - **State**: PUBLISHED - **Published Date**: October 21, 2024 at 00:00 UTC - **Last Updated**: October 21, 2024 at 20:35 UTC - **Reserved Date**: March 27, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer Overflow vulnerability in IrfanView 32bit v.4.66 allows a local attacker to cause a denial of service via a crafted file. Affected component is IrfanView 32bit 4.66 with plugin formats.dll. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/kirito999/IrfanViewBug) 2. [](https://www.fosshub.com/IrfanView.html?dwl=iview466_setup.exe) 3. [](https://www.fosshub.com/IrfanView.html?dwl=iview466_plugins.zip) 4. [](https://mediaside.net/irfanview-italia/2024/04/12/4-67-data-di-rilascio-5-aprile-2024/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41294, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41294 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41294 - **State**: PUBLISHED - **Published Date**: September 30, 2021 at 10:40 UTC - **Last Updated**: September 17, 2024 at 03:53 UTC - **Reserved Date**: September 15, 2021 at 00:00 UTC - **Assigned By**: twcert ### Vulnerability Description ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files deletion. Using the specific GET parameter, unauthenticated attackers can remotely delete arbitrary files on the affected device and cause denial of service scenario. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **ECOA - ECS Router Controller ECS (FLASH)** Affected versions: - next of 0 (Status: unknown) **ECOA - RiskBuster Terminator E6L45** Affected versions: - next of 0 (Status: unknown) **ECOA - RiskBuster System RB 3.0.0** Affected versions: - next of 0 (Status: unknown) **ECOA - RiskBuster System TRANE 1.0** Affected versions: - next of 0 (Status: unknown) **ECOA - Graphic Control Software** Affected versions: - next of 0 (Status: unknown) **ECOA - SmartHome II E9246** Affected versions: - next of 0 (Status: unknown) **ECOA - RiskTerminator** Affected versions: - next of 0 (Status: unknown) ### References 1. [](https://www.twcert.org.tw/tw/cp-132-5130-7de92-1.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34837, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34837 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34837 - **State**: PUBLISHED - **Published Date**: August 24, 2022 at 15:14 UTC - **Last Updated**: September 17, 2024 at 04:04 UTC - **Reserved Date**: June 30, 2022 at 00:00 UTC - **Assigned By**: ABB ### Vulnerability Description Storing Passwords in a Recoverable Format vulnerability in ABB Zenon 8.20 allows an attacker who successfully exploit the vulnerability may add more network clients that may monitor various activities of the Zenon. ### CVSS Metrics - **CVSS Base Score**: 6.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L` ### Weakness Classification (CWE) - CWE-257: Security Weakness ### Affected Products **ABB - ABB Zenon** Affected versions: - unspecified (Status: affected) ### References 1. [](https://search.abb.com/library/Download.aspx?DocumentID=2NGA001479&LanguageCode=en&DocumentPartId=&Action=Launch) ### Credits - ABB thanks Ruben Santamarta for helping to identify the vulnerabilities and protecting our customers
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17567, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17567 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17567 - **State**: PUBLISHED - **Published Date**: September 28, 2018 at 00:00 UTC - **Last Updated**: August 05, 2024 at 10:54 UTC - **Reserved Date**: September 26, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Jekyll through 3.6.2, 3.7.x through 3.7.3, and 3.8.x through 3.8.3 allows attackers to access arbitrary files by specifying a symlink in the "include" key in the "_config.yml" file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/jekyll/jekyll/pull/7224) 2. [](https://jekyllrb.com/news/2018/09/19/security-fixes-for-3-6-3-7-3-8/) 3. [[accumulo-commits] 20190424 [accumulo-website] branch master updated: Update Jekyll (CVE-2018-17567)](https://lists.apache.org/thread.html/71da391f584b2fb301d2df0e491b279d87287e2fb4b11309f04ad984%40%3Ccommits.accumulo.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1192, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1192 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1192 - **State**: PUBLISHED - **Published Date**: January 13, 2021 at 21:21 UTC - **Last Updated**: November 12, 2024 at 20:45 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Cisco - Cisco Small Business RV Series Router Firmware** Affected versions: - n/a (Status: affected) ### References 1. [20210113 Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4991, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4991 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4991 - **State**: PUBLISHED - **Published Date**: September 21, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 15:17 UTC - **Reserved Date**: September 20, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The SOCKS4 Proxy in Microsoft Internet Security and Acceleration (ISA) Server 2004 SP1 and SP2 allows remote attackers to obtain potentially sensitive information (the destination IP address of another user's session) via an empty packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [25753](http://www.securityfocus.com/bid/25753) 2. [1018727](http://www.securitytracker.com/id?1018727) 3. [](http://www.zerodayinitiative.com/advisories/ZDI-07-053.html) 4. [isa-socks-information-disclosure(36715)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36715) 5. [45906](http://osvdb.org/45906)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30076, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30076 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30076 - **State**: PUBLISHED - **Published Date**: April 20, 2023 at 00:00 UTC - **Last Updated**: February 05, 2025 at 16:12 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Sourcecodester Judging Management System v1.0 is vulnerable to SQL Injection via /php-jms/print_judges.php?print_judges.php=&se_name=&sub_event_id=. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Dzero57/cve_report/blob/main/judging-management-system/SQLi-2.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18745, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18745 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18745 - **State**: PUBLISHED - **Published Date**: April 23, 2020 at 15:34 UTC - **Last Updated**: August 05, 2024 at 21:37 UTC - **Reserved Date**: April 20, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by stored XSS. This affects R6400 before 1.0.1.14, R6700 before 1.0.1.22, R6900 before 1.0.1.22, R7000 before 1.0.9.4, R7100LG before 1.0.0.32, R7300DST before 1.0.0.56, R7900 before 1.0.1.12, R8000 before 1.0.3.24, and R8500 before 1.0.2.74. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000051510/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-PSV-2017-0323)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2775, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2775 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2775 - **State**: PUBLISHED - **Published Date**: July 19, 2016 at 22:00 UTC - **Last Updated**: August 05, 2024 at 23:32 UTC - **Reserved Date**: February 26, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2016-53f0c65f40](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ5STNEUHBNEPUHJT7CYEVSMATFYMIX7/) 2. [](https://kb.isc.org/article/AA-01438) 3. [RHBA-2017:1767](https://access.redhat.com/errata/RHBA-2017:1767) 4. [FEDORA-2016-3fba74e7f5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT754KDUJTKOASJODJX7FKHCOQ6EC7UX/) 5. [92037](http://www.securityfocus.com/bid/92037) 6. [GLSA-201610-07](https://security.gentoo.org/glsa/201610-07) 7. [](https://kb.isc.org/article/AA-01435) 8. [RHBA-2017:0651](https://access.redhat.com/errata/RHBA-2017:0651) 9. [FEDORA-2016-2941b3264e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZUCSMEOZIZ2R2SKA4FPLTOVZHJBAOWC/) 10. [](https://kb.isc.org/article/AA-01393/74/CVE-2016-2775) 11. [1036360](http://www.securitytracker.com/id/1036360) 12. [FEDORA-2016-007efacd1c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7T2WJP5ELO4ZRSBXSETIZ3GAO6KOEFTA/) 13. [RHSA-2017:2533](https://access.redhat.com/errata/RHSA-2017:2533) 14. [](https://kb.isc.org/article/AA-01436) 15. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107) 16. [](https://security.netapp.com/advisory/ntap-20160722-0002/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7615, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7615 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7615 - **State**: PUBLISHED - **Published Date**: April 16, 2017 at 14:45 UTC - **Last Updated**: August 05, 2024 at 16:12 UTC - **Reserved Date**: April 09, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MantisBT through 2.3.0 allows arbitrary password reset and unauthenticated admin access via an empty confirm_hash value to verify.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [97707](http://www.securityfocus.com/bid/97707) 2. [](https://mantisbt.org/bugs/view.php?id=22690) 3. [](http://www.openwall.com/lists/oss-security/2017/04/16/2) 4. [41890](https://www.exploit-db.com/exploits/41890/) 5. [](http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt) 6. [](http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3737, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3737 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3737 - **State**: PUBLISHED - **Published Date**: February 13, 2020 at 14:53 UTC - **Last Updated**: August 04, 2024 at 07:44 UTC - **Reserved Date**: December 17, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. ### Affected Products **Adobe - Adobe Framemaker** Affected versions: - 2019.0.4 and below versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/framemaker/apsb20-04.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21895, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21895 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21895 - **State**: PUBLISHED - **Published Date**: December 22, 2021 at 18:06 UTC - **Last Updated**: August 03, 2024 at 18:30 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description A directory traversal vulnerability exists in the Web Manager FsTFtp functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to FsTFtp file overwrite. An attacker can make an authenticated HTTP request to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **n/a - Lantronix** Affected versions: - Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU) (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1337)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-37718, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-37718 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-37718 - **State**: PUBLISHED - **Published Date**: January 23, 2023 at 00:00 UTC - **Last Updated**: April 02, 2025 at 15:58 UTC - **Reserved Date**: August 08, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The management portal component of JetNexus/EdgeNexus ADC 4.2.8 was discovered to contain a command injection vulnerability. This vulnerability allows authenticated attackers to execute arbitrary commands through a specially crafted payload. This vulnerability can also be exploited from an unauthenticated context via unspecified vectors ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.edgenexus.io/products/load-balancer/) 2. [](https://www.cryptnetix.com/blog/2022/09/14/Edge-Nexus-Vulnerability-Disclosure.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50514, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50514 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50514 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:32 UTC - **Last Updated**: November 19, 2024 at 21:01 UTC - **Reserved Date**: October 24, 2024 at 07:27 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saturday Drive Ninja Forms allows Stored XSS.This issue affects Ninja Forms: from n/a through 3.8.16. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Saturday Drive - Ninja Forms** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/ninja-forms/wordpress-ninja-forms-the-contact-form-builder-that-grows-with-you-plugin-3-8-16-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Hwang Se-yeon (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5683, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5683 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5683 - **State**: PUBLISHED - **Published Date**: October 26, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 15:39 UTC - **Reserved Date**: October 26, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in TikiWiki 1.9.8.1 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the username parameter to the password reminder page (tiki-remind_password.php), (2) IMG tags in wiki pages, and (3) the local_php parameter to db/tiki-db.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://info.tikiwiki.org/tiki-read_article.php?articleId=15) 2. [20071025 TikiWiki <= 1.9.8.1 Cross Site Scripting / Local File Inclusion](http://www.securityfocus.com/archive/1/482801/30/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0576, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0576 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0576 - **State**: PUBLISHED - **Published Date**: May 03, 2012 at 22:00 UTC - **Last Updated**: August 06, 2024 at 18:30 UTC - **Reserved Date**: January 11, 2012 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle FLEXCUBE Direct Banking component in Oracle Financial Services Software 6.0.1 and 6.2.0 allows remote authenticated users to affect integrity via unknown vectors related to Core-Help. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1026953](http://www.securitytracker.com/id?1026953) 2. [53113](http://www.securityfocus.com/bid/53113) 3. [](http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html) 4. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1045, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1045 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1045 - **State**: PUBLISHED - **Published Date**: January 22, 2018 at 08:00 UTC - **Last Updated**: August 05, 2024 at 03:44 UTC - **Reserved Date**: December 04, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description In Moodle 3.x, there is XSS via a calendar event name. ### Affected Products **n/a - Moodle 3.x** Affected versions: - Moodle 3.x (Status: affected) ### References 1. [](https://moodle.org/mod/forum/discuss.php?d=364384) 2. [102755](http://www.securityfocus.com/bid/102755)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4454, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4454 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4454 - **State**: PUBLISHED - **Published Date**: May 09, 2025 at 02:00 UTC - **Last Updated**: May 09, 2025 at 03:35 UTC - **Reserved Date**: May 08, 2025 at 18:49 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in D-Link DIR-619L 2.04B04. It has been declared as critical. This vulnerability affects the function wake_on_lan. The manipulation of the argument mac leads to command injection. The attack can be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-77: Security Weakness - CWE-74: Security Weakness ### Affected Products **D-Link - DIR-619L** Affected versions: - 2.04B04 (Status: affected) ### References 1. [VDB-308068 | D-Link DIR-619L wake_on_lan command injection](https://vuldb.com/?id.308068) 2. [VDB-308068 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.308068) 3. [Submit #560798 | D-Link DIR-619L 2.04B04 Command Injection](https://vuldb.com/?submit.560798) 4. [](https://github.com/jylsec/vuldb/blob/main/D-Link/dlink_dir619l/Command_injection-wake_on_lan-mac/README.md) 5. [](https://www.dlink.com/) ### Credits - zjy148909 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20787, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20787 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20787 - **State**: PUBLISHED - **Published Date**: July 28, 2021 at 00:45 UTC - **Last Updated**: August 03, 2024 at 17:53 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site scripting vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0) allows a remote attacker to inject an arbitrary script by sending a specially crafted request to a specific URL. ### Affected Products **Japan Total System Co.,Ltd. - GroupSession** Affected versions: - GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0 (Status: affected) ### References 1. [](https://groupsession.jp/info/info-news/security202107) 2. [](https://jvn.jp/en/jp/JVN86026700/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5416, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5416 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5416 - **State**: PUBLISHED - **Published Date**: December 18, 2013 at 11:00 UTC - **Last Updated**: August 06, 2024 at 17:06 UTC - **Reserved Date**: August 22, 2013 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Unspecified vulnerability in IBM Rational ClearCase through 7.1.2.12, 8.0.0.x before 8.0.0.9, and 8.0.1.x before 8.0.1.2 allows local users to gain privileges via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21657982) 2. [ibm-rational-cve20135416-priv-escalation(87478)](https://exchange.xforce.ibmcloud.com/vulnerabilities/87478)