System stringclasses 1
value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14273, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14273 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14273
- **State**: PUBLISHED
- **Published Date**: December 28, 2020 at 19:06 UTC
- **Last Updated**: August 04, 2024 at 12:39 UTC
- **Reserved Date**: June 17, 2020 at 00:00 UTC
- **Assigned By**: HCL
### Vulnerability Description
HCL Domino is susceptible to a Denial of Service (DoS) vulnerability due to insufficient validation of input to its public API. An unauthenticated attacker could could exploit this vulnerability to crash the Domino server.
### Affected Products
**n/a - HCL Domino**
Affected versions:
- v10, v11 (Status: affected)
### References
1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0085947) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2318, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2318
- **State**: PUBLISHED
- **Published Date**: March 08, 2024 at 13:00 UTC
- **Last Updated**: June 10, 2025 at 07:28 UTC
- **Reserved Date**: March 08, 2024 at 06:48 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in ZKTeco ZKBio Media 2.0.0_x64_2024-01-29-1028. It has been classified as problematic. Affected is an unknown function of the file /pro/common/download of the component Service Port 9999. The manipulation of the argument fileName with the input ../../../../zkbio_media.sql leads to path traversal: '../filedir'. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.1.3 Build 2025-05-26-1605 is able to address this issue. It is recommended to upgrade the affected component.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-24: Security Weakness
- CWE-23: Security Weakness
### Affected Products
**ZKTeco - ZKBio Media**
Affected versions:
- 2.0.0_x64_2024-01-29-1028 (Status: affected)
### References
1. [VDB-256272 | ZKTeco ZKBio Media Service Port 9999 download path traversal](https://vuldb.com/?id.256272)
2. [VDB-256272 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.256272)
3. [Submit #288530 | zkteco zkbio media V2.0.0_x64_2024-01-29-1028 Path Traversal Vulnerability](https://vuldb.com/?submit.288530)
4. [](https://gist.github.com/whiteman007/a3b25a7ddf38774329d72930e0cd841a)
5. [](https://www.zkteco.com/en/Security_Bulletinsibs/11)
### Credits
- Hussein Amer (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6637, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6637
- **State**: PUBLISHED
- **Published Date**: December 19, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 20:33 UTC
- **Reserved Date**: December 19, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Servlet Engine and Web Container in IBM WebSphere Application Server (WAS) before 6.0.2.17, when ibm-web-ext.xmi sets fileServingEnabled to true and servlet caching is enabled, allows remote attackers to obtain JSP source code and other sensitive information via "specific requests."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-0970](http://www.vupen.com/english/advisories/2007/0970)
2. [24478](http://secunia.com/advisories/24478)
3. [](http://www-1.ibm.com/support/docview.wss?uid=swg21243541)
4. [](http://www-1.ibm.com/support/docview.wss?uid=swg27006876)
5. [21636](http://www.securityfocus.com/bid/21636)
6. [22991](http://www.securityfocus.com/bid/22991)
7. [PK32374](http://www-1.ibm.com/support/docview.wss?uid=swg24015155)
8. [23414](http://secunia.com/advisories/23414)
9. [ADV-2006-5050](http://www.vupen.com/english/advisories/2006/5050) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50374, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50374
- **State**: PUBLISHED
- **Published Date**: March 28, 2024 at 06:31 UTC
- **Last Updated**: August 02, 2024 at 22:16 UTC
- **Reserved Date**: December 07, 2023 at 12:18 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Server-Side Request Forgery (SSRF) vulnerability in NiteoThemes CMP – Coming Soon & Maintenance.This issue affects CMP – Coming Soon & Maintenance: from n/a through 4.1.10.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**NiteoThemes - CMP – Coming Soon & Maintenance**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/cmp-coming-soon-maintenance/wordpress-cmp-coming-soon-maintenance-plugin-by-niteothemes-plugin-4-1-10-server-side-request-forgery-ssrf-vulnerability?_s_id=cve)
### Credits
- Yuchen Ji (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31904, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31904
- **State**: PUBLISHED
- **Published Date**: May 22, 2024 at 18:34 UTC
- **Last Updated**: August 02, 2024 at 01:59 UTC
- **Reserved Date**: April 07, 2024 at 12:45 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM App Connect Enterprise 11.0.0.1 through 11.0.0.25 and 12.0.1.0 through 12.0.12.0 integration nodes could allow an authenticated user to cause a denial of service due to an uncaught exception. IBM X-Force ID: 289647.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-248: Security Weakness
### Affected Products
**IBM - App Connect Enterprise**
Affected versions:
- 11.0.0.1 (Status: affected)
- 12.0.1.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7154607)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/289647) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3757, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3757
- **State**: PUBLISHED
- **Published Date**: September 27, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 14:28 UTC
- **Reserved Date**: July 12, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Safari in Apple iPhone 1.1.1 allows remote user-assisted attackers to trick the iPhone user into making calls to arbitrary telephone numbers via a crafted "tel:" link that causes iPhone to display a different number than the number that will be dialed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25854](http://www.securityfocus.com/bid/25854)
2. [iphone-tellink-call-hijacking(36856)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36856)
3. [APPLE-SA-2007-09-27](http://lists.apple.com/archives/security-announce/2007/Sep/msg00001.html)
4. [](http://docs.info.apple.com/article.html?artnum=306586)
5. [38534](http://osvdb.org/38534)
6. [26983](http://secunia.com/advisories/26983)
7. [ADV-2007-3287](http://www.vupen.com/english/advisories/2007/3287)
8. [1018752](http://securitytracker.com/id?1018752) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2669, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2669 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2669
- **State**: PUBLISHED
- **Published Date**: January 18, 2018 at 02:00 UTC
- **Last Updated**: October 03, 2024 at 20:34 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality Reporting and Analytics component of Oracle Hospitality Applications (subcomponent: Report). Supported versions that are affected are 8.5.1 and 9.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Reporting and Analytics. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Hospitality Reporting and Analytics, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Reporting and Analytics accessible data as well as unauthorized read access to a subset of Oracle Hospitality Reporting and Analytics accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - Hospitality Reporting and Analytics**
Affected versions:
- 8.5.1 (Status: affected)
- 9.0.0 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html)
2. [102570](http://www.securityfocus.com/bid/102570) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2580, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2580
- **State**: PUBLISHED
- **Published Date**: April 25, 2025 at 05:25 UTC
- **Last Updated**: April 25, 2025 at 19:01 UTC
- **Reserved Date**: March 20, 2025 at 22:27 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Contact Form by Bit Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.18.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**bitpressadmin - Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1f3b5d85-a8b0-43ac-b593-a61e20b9a4ca?source=cve)
2. [](https://wordpress.org/plugins/bit-form/#developers)
3. [](https://plugins.trac.wordpress.org/changeset/3271396/)
### Credits
- Avraham Shemesh |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49404, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49404
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:12 UTC
- **Last Updated**: May 04, 2025 at 08:36 UTC
- **Reserved Date**: February 26, 2025 at 02:08 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
RDMA/hfi1: Fix potential integer multiplication overflow errors
When multiplying of different types, an overflow is possible even when
storing the result in a larger type. This is because the conversion is
done after the multiplication. So arithmetic overflow and thus in
incorrect value is possible.
Correct an instance of this in the inter packet delay calculation. Fix by
ensuring one of the operands is u64 which will promote the other to u64 as
well ensuring no overflow.
### Affected Products
**Linux - Linux**
Affected versions:
- 7724105686e718ac476a6ad3304fea2fbcfcffde (Status: affected)
- 7724105686e718ac476a6ad3304fea2fbcfcffde (Status: affected)
- 7724105686e718ac476a6ad3304fea2fbcfcffde (Status: affected)
- 7724105686e718ac476a6ad3304fea2fbcfcffde (Status: affected)
- 7724105686e718ac476a6ad3304fea2fbcfcffde (Status: affected)
- 7724105686e718ac476a6ad3304fea2fbcfcffde (Status: affected)
- 7724105686e718ac476a6ad3304fea2fbcfcffde (Status: affected)
- 7724105686e718ac476a6ad3304fea2fbcfcffde (Status: affected)
- 7724105686e718ac476a6ad3304fea2fbcfcffde (Status: affected)
**Linux - Linux**
Affected versions:
- 4.3 (Status: affected)
- 0 (Status: unaffected)
- 4.9.318 (Status: unaffected)
- 4.14.283 (Status: unaffected)
- 4.19.247 (Status: unaffected)
- 5.4.198 (Status: unaffected)
- 5.10.121 (Status: unaffected)
- 5.15.46 (Status: unaffected)
- 5.17.14 (Status: unaffected)
- 5.18.3 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/252f4afd4557a2e7075f793a5c80fe6dd9e9ee4a)
2. [](https://git.kernel.org/stable/c/a89cb7ddf6a89bab6012e19da38b7cdb26175c19)
3. [](https://git.kernel.org/stable/c/79c164e61f818054cd6012e9035701840d895c51)
4. [](https://git.kernel.org/stable/c/8858284dd74906fa00f04f0252c75df4893a7959)
5. [](https://git.kernel.org/stable/c/31dca00d0cc9f4133320d72eb7e3720badc6d6e6)
6. [](https://git.kernel.org/stable/c/3f09ec80f115d2875d747ed28adc1773037e0f8b)
7. [](https://git.kernel.org/stable/c/06039d8afefdbac05bcea5f397188407eba2996d)
8. [](https://git.kernel.org/stable/c/ef5ab2e48a5f9960e2352332b7cdb7064bb49032)
9. [](https://git.kernel.org/stable/c/f93e91a0372c922c20d5bee260b0f43b4b8a1bee) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7191, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7191
- **State**: PUBLISHED
- **Published Date**: May 17, 2019 at 04:27 UTC
- **Last Updated**: August 05, 2024 at 06:24 UTC
- **Reserved Date**: February 17, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1743792)
2. [](https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1748846)
3. [](https://github.com/torvalds/linux/commit/0ad646c81b2182f7fa67ec0c8c825e0ee165696d)
4. [](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0ad646c81b2182f7fa67ec0c8c825e0ee165696d)
5. [](https://github.com/torvalds/linux/commit/5c25f65fd1e42685f7ccd80e0621829c105785d9)
6. [](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c25f65fd1e42685f7ccd80e0621829c105785d9)
7. [](https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.14)
8. [108380](http://www.securityfocus.com/bid/108380)
9. [openSUSE-SU-2019:1479](http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html)
10. [openSUSE-SU-2019:1570](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html)
11. [openSUSE-SU-2019:1579](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11418, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11418
- **State**: PUBLISHED
- **Published Date**: April 21, 2019 at 20:09 UTC
- **Last Updated**: August 04, 2024 at 22:55 UTC
- **Reserved Date**: April 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
apply.cgi on the TRENDnet TEW-632BRP 1.010B32 router has a buffer overflow via long strings to the SOAPACTION:HNAP1 interface.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/zyw-200/IOTFuzzer/blob/master/Trendnet_response.png) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32680, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32680 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32680
- **State**: PUBLISHED
- **Published Date**: April 09, 2025 at 16:09 UTC
- **Last Updated**: April 09, 2025 at 18:09 UTC
- **Reserved Date**: April 09, 2025 at 11:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Grade Us, Inc. Review Stream allows Stored XSS. This issue affects Review Stream: from n/a through 1.6.7.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Grade Us, Inc. - Review Stream**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/review-stream/vulnerability/wordpress-review-stream-plugin-1-6-7-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Nabil Irawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34134, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34134 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34134
- **State**: PUBLISHED
- **Published Date**: June 27, 2022 at 23:09 UTC
- **Last Updated**: August 03, 2024 at 08:16 UTC
- **Reserved Date**: June 20, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /application/controllers/Users.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/bbalet/jorani/issues/369)
2. [](https://github.com/bbalet/jorani/commit/299b5a3a66add4ac643e3ba78ada4d9637c8baff) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1891, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1891 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1891
- **State**: PUBLISHED
- **Published Date**: May 07, 2021 at 09:10 UTC
- **Last Updated**: August 03, 2024 at 16:25 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
A possible use-after-free occurrence in audio driver can happen when pointers are not properly handled in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8009W, APQ8017, APQ8053, AQT1000, AR8031, AR8035, AR9380, CSR8811, CSRA6620, CSRA6640, CSRB31024, IPQ4018, IPQ4028, IPQ4029, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078A, IPQ8173, IPQ8174, MSM8909W, MSM8917, MSM8953, PM215, PM3003A, PM4125, PM4250, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM6350, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8004, PM8005, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PM855, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8953, PM8998, PMC1000H, PMD9655, PME605, PMI632, PMI8937, PMI8952, PMI8998, PMK7350, PMK8002, PMK8003, PMK8350, PMM6155AU, PMM8155AU, PMM8195AU, PMM855AU, PMR525, PMR735A, PMR735B, PMW3100, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT ...[truncated*] (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4092, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4092
- **State**: PUBLISHED
- **Published Date**: July 30, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 14:46 UTC
- **Reserved Date**: July 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in index.php in iFoto 1.0.1 and earlier allows remote attackers to list arbitrary directories, and possibly download arbitrary photos, via a .. (dot dot) in the dir parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20081004 iFoto, CSS-based GD2 photo gallery <= 1.0: Remote File Disclosure Vulnerability](http://www.securityfocus.com/archive/1/497027/100/0/threaded)
2. [25065](http://www.securityfocus.com/bid/25065)
3. [20081007 Re: iFoto, CSS-based GD2 photo gallery <= 1.0: Remote File Disclosure Vulnerability](http://www.securityfocus.com/archive/1/497113/100/0/threaded)
4. [26186](http://secunia.com/advisories/26186)
5. [](http://lostmon.blogspot.com/2007/07/ifoto-traversal-folder-enumeration.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36109, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36109 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36109
- **State**: PUBLISHED
- **Published Date**: September 09, 2022 at 17:20 UTC
- **Last Updated**: April 23, 2025 at 17:12 UTC
- **Reserved Date**: July 15, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where supplementary groups are not set up properly. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. This bug is fixed in Moby (Docker Engine) 20.10.18. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade, this problem can be worked around by not using the `"USER $USERNAME"` Dockerfile instruction. Instead by calling `ENTRYPOINT ["su", "-", "user"]` the supplementary groups will be set up properly.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**moby - moby**
Affected versions:
- < 20.10.18 (Status: affected)
### References
1. [https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4](https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4)
2. [https://github.com/moby/moby/commit/de7af816e76a7fd3fbf06bffa6832959289fba32](https://github.com/moby/moby/commit/de7af816e76a7fd3fbf06bffa6832959289fba32)
3. [https://github.com/moby/moby/releases/tag/v20.10.18](https://github.com/moby/moby/releases/tag/v20.10.18)
4. [https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7JL2QA3RB732MLJ3RMUXB3IB7AA22YU](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7JL2QA3RB732MLJ3RMUXB3IB7AA22YU)
5. [https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQQ4E3JBXVR3VK5FIZVJ3QS2TAOOXXTQ](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQQ4E3JBXVR3VK5FIZVJ3QS2TAOOXXTQ)
6. [https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation](https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-21005, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-21005 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-21005
- **State**: PUBLISHED
- **Published Date**: August 27, 2019 at 11:54 UTC
- **Last Updated**: August 05, 2024 at 12:19 UTC
- **Reserved Date**: August 26, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The bbp-move-topics plugin before 1.1.6 for WordPress has code injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/bbp-move-topics/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0325, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0325 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0325
- **State**: PUBLISHED
- **Published Date**: February 01, 2024 at 22:03 UTC
- **Last Updated**: August 01, 2024 at 18:04 UTC
- **Reserved Date**: January 08, 2024 at 17:02 UTC
- **Assigned By**: Perforce
### Vulnerability Description
In Helix Sync versions prior to 2024.1, a local command injection was identified. Reported by Bryan Riggins.
### CVSS Metrics
- **CVSS Base Score**: 3.6/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**Helix - Sync**
Affected versions:
- 0.0.0 (Status: affected)
### References
1. [](https://perforce.com) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52349, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52349
- **State**: PUBLISHED
- **Published Date**: April 08, 2024 at 02:21 UTC
- **Last Updated**: March 28, 2025 at 19:15 UTC
- **Reserved Date**: January 19, 2024 at 02:58 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In ril service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000**
Affected versions:
- Android12/Android13/Android14 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1777143682512781313) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4207
- **State**: PUBLISHED
- **Published Date**: August 19, 2013 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 16:38 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) via an invalid DSA signature that is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality, a different vulnerability than CVE-2013-4206.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20130806 CVE request: three additional flaws fixed in putty 0.63](http://www.openwall.com/lists/oss-security/2013/08/06/11)
2. [54533](http://secunia.com/advisories/54533)
3. [DSA-2736](http://www.debian.org/security/2013/dsa-2736)
4. [openSUSE-SU-2013:1347](http://lists.opensuse.org/opensuse-updates/2013-08/msg00035.html)
5. [](http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-bignum-division-by-zero.html)
6. [54379](http://secunia.com/advisories/54379) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21196, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21196 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21196
- **State**: PUBLISHED
- **Published Date**: April 09, 2021 at 21:35 UTC
- **Last Updated**: August 03, 2024 at 18:01 UTC
- **Reserved Date**: December 21, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Heap buffer overflow in TabStrip in Google Chrome on Windows prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_30.html)
2. [](https://crbug.com/1175992)
3. [GLSA-202104-08](https://security.gentoo.org/glsa/202104-08)
4. [FEDORA-2021-c3754414e7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/)
5. [FEDORA-2021-ff893e12c5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/)
6. [FEDORA-2021-35d2bb4627](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33939
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 15:55 UTC
- **Last Updated**: May 19, 2025 at 16:58 UTC
- **Reserved Date**: April 29, 2024 at 08:10 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authentication Bypass Using an Alternate Path or Channel vulnerability in Masteriyo Masteriyo - LMS. Unauth access to course progress.This issue affects Masteriyo - LMS: from n/a through 1.7.3.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-288: Security Weakness
### Affected Products
**Masteriyo - Masteriyo - LMS**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/learning-management-system/vulnerability/wordpress-lms-by-masteriyo-plugin-1-7-3-broken-authentication-vulnerability?_s_id=cve)
### Credits
- Steven Julian (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-48475, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-48475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48475
- **State**: PUBLISHED
- **Published Date**: May 29, 2025 at 16:27 UTC
- **Last Updated**: May 29, 2025 at 17:58 UTC
- **Reserved Date**: May 22, 2025 at 12:11 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the System does not provide a check on which "clients" of the System an authorized user can view and edit, and which ones they cannot. As a result, an authorized user who does not have access to any of the existing mailboxes, as well as to any of the existing conversations, has the ability to view and edit the System's clients. The limitation of client visibility can be implemented by the limit_user_customer_visibility setting, however, in the specified scenarios, there is no check for the presence of this setting. This issue has been patched in version 1.8.180.
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**freescout-help-desk - freescout**
Affected versions:
- < 1.8.180 (Status: affected)
### References
1. [https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-xvch-f75c-8w8q](https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-xvch-f75c-8w8q)
2. [https://github.com/freescout-help-desk/freescout/commit/1f154ce039618ed5abd960c97619c23534c0717a](https://github.com/freescout-help-desk/freescout/commit/1f154ce039618ed5abd960c97619c23534c0717a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5245, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5245 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5245
- **State**: PUBLISHED
- **Published Date**: May 27, 2025 at 14:31 UTC
- **Last Updated**: May 27, 2025 at 15:20 UTC
- **Reserved Date**: May 27, 2025 at 08:07 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in GNU Binutils up to 2.44. This affects the function debug_type_samep of the file /binutils/debug.c of the component objdump. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**GNU - Binutils**
Affected versions:
- 2.0 (Status: affected)
- 2.1 (Status: affected)
- 2.2 (Status: affected)
- 2.3 (Status: affected)
- 2.4 (Status: affected)
- 2.5 (Status: affected)
- 2.6 (Status: affected)
- 2.7 (Status: affected)
- 2.8 (Status: affected)
- 2.9 (Status: affected)
- 2.10 (Status: affected)
- 2.11 (Status: affected)
- 2.12 (Status: affected)
- 2.13 (Status: affected)
- 2.14 (Status: affected)
- 2.15 (Status: affected)
- 2.16 (Status: affected)
- 2.17 (Status: affected)
- 2.18 (Status: affected)
- 2.19 (Status: affected)
- 2.20 (Status: affected)
- 2.21 (Status: affected)
- 2.22 (Status: affected)
- 2.23 (Status: affected)
- 2.24 (Status: affected)
- 2.25 (Status: affected)
- 2.26 (Status: affected)
- 2.27 (Status: affected)
- 2.28 (Status: affected)
- 2.29 (Status: affected)
- 2.30 (Status: affected)
- 2.31 (Status: affected)
- 2.32 (Status: affected)
- 2.33 (Status: affected)
- 2.34 (Status: affected)
- 2.35 (Status: affected)
- 2.36 (Status: affected)
- 2.37 (Status: affected)
- 2.38 (Status: affected)
- 2.39 (Status: affected)
- 2.40 (Status: affected)
- 2.41 (Status: affected)
- 2.42 (Status: affected)
- 2.43 (Status: affected)
- 2.44 (Status: affected)
### References
1. [VDB-310347 | GNU Binutils objdump debug.c debug_type_samep memory corruption](https://vuldb.com/?id.310347)
2. [VDB-310347 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.310347)
3. [Submit #584635 | GNU Binutils objdump 2.44 Memory Corruption](https://vuldb.com/?submit.584635)
4. [](https://sourceware.org/bugzilla/show_bug.cgi?id=32829)
5. [](https://sourceware.org/bugzilla/attachment.cgi?id=16004)
6. [](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a)
7. [](https://www.gnu.org/)
### Credits
- lcyf-fizz (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1367, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1367 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1367
- **State**: PUBLISHED
- **Published Date**: August 06, 2012 at 15:00 UTC
- **Last Updated**: September 17, 2024 at 00:46 UTC
- **Reserved Date**: February 27, 2012 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The MallocLite implementation in Cisco IOS 12.0, 12.2, 15.0, 15.1, and 15.2 allows remote attackers to cause a denial of service (Route Processor crash) via a BGP UPDATE message with a modified local-preference (aka LOCAL_PREF) attribute length, aka Bug ID CSCtq06538.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.cisco.com/en/US/docs/ios/12_2sr/release/notes/122SRcavs1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0654, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0654
- **State**: PUBLISHED
- **Published Date**: September 07, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 03:35 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in GROWI v.3.1.11 and earlier allows remote attackers to inject arbitrary web script or HTML via the modal for creating Wiki page.
### Affected Products
**WESEEK, Inc. - GROWI**
Affected versions:
- v.3.1.11 and earlier (Status: affected)
### References
1. [](https://weseek.co.jp/security/2018/07/31/growi-prevent-xss/)
2. [JVN#18716340](http://jvn.jp/en/jp/JVN18716340/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6555
- **State**: PUBLISHED
- **Published Date**: December 28, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 16:11 UTC
- **Reserved Date**: December 27, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in modules/mod_pxt_latest.php in the mosDirectory (com_directory) 2.3.2 component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[mosConfig_absolute_path] parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4783](https://www.exploit-db.com/exploits/4783)
2. [40023](http://osvdb.org/40023)
3. [27014](http://www.securityfocus.com/bid/27014) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6158, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6158
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3435, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3435
- **State**: PUBLISHED
- **Published Date**: October 10, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 18:30 UTC
- **Reserved Date**: July 07, 2006 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
PowerPoint in Microsoft Office 2000, XP, 2003, 2004 for Mac, and v.X for Mac does not properly parse the slide notes field in a document, which allows remote user-assisted attackers to execute arbitrary code via crafted data in this field, which triggers an erroneous object pointer calculation that uses data from within the document. NOTE: this issue is different than other PowerPoint vulnerabilities including CVE-2006-4694.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#187028](http://www.kb.cert.org/vuls/id/187028)
2. [SSRT061264](http://www.securityfocus.com/archive/1/449179/100/0/threaded)
3. [](http://www.zerodayinitiative.com/advisories/ZDI-06-032.html)
4. [29446](http://www.osvdb.org/29446)
5. [oval:org.mitre.oval:def:476](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A476)
6. [20061010 ZDI-06-032: Microsoft Office PowerPoint Malformed Slide Notes Rebuilding Vulnerability](http://www.securityfocus.com/archive/1/448149/100/0/threaded)
7. [20304](http://www.securityfocus.com/bid/20304)
8. [HPSBST02161](http://www.securityfocus.com/archive/1/449179/100/0/threaded)
9. [ADV-2006-3977](http://www.vupen.com/english/advisories/2006/3977)
10. [MS06-058](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058)
11. [1017030](http://securitytracker.com/id?1017030) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3038, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3038 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3038
- **State**: PUBLISHED
- **Published Date**: September 12, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 16:00 UTC
- **Reserved Date**: April 12, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Unspecified vulnerability in IBM Rational Requirements Composer before 4.0.4 makes it easier for remote attackers to discover credentials via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [rrc-cve20133038-weak-security(84708)](https://exchange.xforce.ibmcloud.com/vulnerabilities/84708)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21645927) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11071, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11071 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11071
- **State**: PUBLISHED
- **Published Date**: May 12, 2020 at 00:25 UTC
- **Last Updated**: August 04, 2024 at 11:21 UTC
- **Reserved Date**: March 30, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
SLPJS (npm package slpjs) before version 0.27.2, has a vulnerability where users could experience false-negative validation outcomes for MINT transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton. This is fixed in version 0.27.2.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-697: Security Weakness
### Affected Products
**simpleledger - slpjs**
Affected versions:
- < 0.27.2 (Status: affected)
### References
1. [](https://github.com/simpleledger/slpjs/security/advisories/GHSA-jc83-cpf9-q7c6)
2. [](https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0924, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0924
- **State**: PUBLISHED
- **Published Date**: August 31, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:03 UTC
- **Reserved Date**: August 16, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CGIScript.net csNews.cgi allows remote authenticated users to execute arbitrary Perl code via terminating quotes and metacharacters in text fields of the "Advanced Settings" capability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4451](http://www.securityfocus.com/bid/4451)
2. [20020611 CGIscript.net - csNews.cgi - Multiple Vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2002-06/0091.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28446, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28446
- **State**: PUBLISHED
- **Published Date**: March 24, 2023 at 19:46 UTC
- **Last Updated**: February 19, 2025 at 20:25 UTC
- **Reserved Date**: March 15, 2023 at 15:59 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Deno is a simple, modern and secure runtime for JavaScript and TypeScript that uses V8 and is built in Rust. Arbitrary program names without any ANSI filtering allows any malicious program to clear the first 2 lines of a `op_spawn_child` or `op_kill` prompt and replace it with any desired text. This works with any command on the respective platform, giving the program the full ability to choose what program they wanted to run. This problem can not be exploited on systems that do not attach an interactive prompt (for example headless servers). This issue has been patched in version 1.31.2.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-150: Security Weakness
### Affected Products
**denoland - deno**
Affected versions:
- >= 1.8.0, < 1.31.2 (Status: affected)
### References
1. [https://github.com/denoland/deno/security/advisories/GHSA-vq67-rp93-65qf](https://github.com/denoland/deno/security/advisories/GHSA-vq67-rp93-65qf)
2. [https://github.com/denoland/deno/blob/7d13d65468c37022f003bb680dfbddd07ea72173/runtime/js/40_process.js#L175](https://github.com/denoland/deno/blob/7d13d65468c37022f003bb680dfbddd07ea72173/runtime/js/40_process.js#L175)
3. [https://github.com/denoland/deno/releases/tag/v1.31.2](https://github.com/denoland/deno/releases/tag/v1.31.2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31336
- **State**: PUBLISHED
- **Published Date**: May 31, 2022 at 14:56 UTC
- **Last Updated**: August 03, 2024 at 07:19 UTC
- **Reserved Date**: May 23, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Online Ordering System 2.3.2 is vulnerable to SQL Injection via /ordering/admin/stockin/loaddata.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/janobe/online-ordering-system/SQLi-7.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14789
- **State**: PUBLISHED
- **Published Date**: October 21, 2020 at 14:04 UTC
- **Last Updated**: September 26, 2024 at 20:22 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.7.31 and prior (Status: affected)
- 8.0.21 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
2. [](https://security.netapp.com/advisory/ntap-20201023-0003/)
3. [FEDORA-2020-eee64a579c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/)
4. [FEDORA-2020-4f9ee82bc5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/)
5. [FEDORA-2020-53df1c05be](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/)
6. [FEDORA-2020-561eed63ef](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/)
7. [FEDORA-2020-b995eb2973](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/)
8. [FEDORA-2020-ac2d47d89a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/)
9. [GLSA-202105-27](https://security.gentoo.org/glsa/202105-27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23451, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23451 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23451
- **State**: PUBLISHED
- **Published Date**: July 25, 2022 at 14:11 UTC
- **Last Updated**: September 17, 2024 at 03:23 UTC
- **Reserved Date**: January 08, 2021 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
The package otp-generator before 3.0.0 are vulnerable to Insecure Randomness due to insecure generation of random one-time passwords, which may allow a brute-force attack.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Affected Products
**n/a - otp-generator**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://security.snyk.io/vuln/SNYK-JS-OTPGENERATOR-1655480)
2. [](https://github.com/Maheshkumar-Kakade/otp-generator/issues/12)
3. [](https://github.com/Maheshkumar-Kakade/otp-generator/commit/b27de1ce439ae7f533cec26677e9698671275b70)
### Credits
- Mateusz Wojciechowski |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2393, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2393 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2393
- **State**: PUBLISHED
- **Published Date**: February 14, 2018 at 12:00 UTC
- **Last Updated**: August 05, 2024 at 04:21 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
Under certain conditions SAP Internet Graphics Server (IGS) 7.20, 7.20EXT, 7.45, 7.49, 7.53, fails to validate XML External Entity appropriately causing the SAP Internet Graphics Server (IGS) to become unavailable.
### Affected Products
**SAP SE - SAP Internet Graphics Server**
Affected versions:
- 7.20 (Status: affected)
- 7.20EXT (Status: affected)
- 7.45 (Status: affected)
- 7.49 (Status: affected)
- 7.53 (Status: affected)
### References
1. [](https://launchpad.support.sap.com/#/notes/2525222)
2. [](https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54107, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54107 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54107
- **State**: PUBLISHED
- **Published Date**: December 12, 2024 at 12:01 UTC
- **Last Updated**: December 12, 2024 at 15:00 UTC
- **Reserved Date**: November 29, 2024 at 02:34 UTC
- **Assigned By**: huawei
### Vulnerability Description
Read/Write vulnerability in the image decoding module
Impact: Successful exploitation of this vulnerability will affect availability.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 5.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/12/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1290, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1290
- **State**: PUBLISHED
- **Published Date**: March 07, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 12:50 UTC
- **Reserved Date**: March 06, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in ViewReport.php in Tyger Bug Tracking System (TygerBT) 1.1.3 allows remote attackers to execute arbitrary SQL commands via the bug parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [tyger-viewbugs-sql-injection(32791)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32791)
2. [24385](http://secunia.com/advisories/24385) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4568, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4568
- **State**: PUBLISHED
- **Published Date**: October 05, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 15:01 UTC
- **Reserved Date**: August 28, 2007 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Integer overflow in the build_range function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values, which triggers a heap-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SA:2007:054](http://www.novell.com/linux/security/advisories/2007_54_xorg.html)
2. [1018763](http://www.securitytracker.com/id?1018763)
3. [28542](http://secunia.com/advisories/28542)
4. [](http://docs.info.apple.com/article.html?artnum=307430)
5. [200642](http://sunsolve.sun.com/search/document.do?assetkey=1-66-200642-1)
6. [28891](http://secunia.com/advisories/28891)
7. [FEDORA-2007-4263](https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00352.html)
8. [20071003 rPSA-2007-0205-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs](http://www.securityfocus.com/archive/1/481432/100/0/threaded)
9. [27052](http://secunia.com/advisories/27052)
10. [20071002 Multiple Vendor X Font Server Multiple Vulnerabilities](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=602)
11. [ADV-2008-0495](http://www.vupen.com/english/advisories/2008/0495/references)
12. [27060](http://secunia.com/advisories/27060)
13. [ADV-2008-0924](http://www.vupen.com/english/advisories/2008/0924/references)
14. [[xorg-announce] 20071002 [ANNOUNCE] X.Org security advisory: multiple vulnerabilities in X font server](http://lists.freedesktop.org/archives/xorg-announce/2007-October/000416.html)
15. [RHSA-2008:0029](http://www.redhat.com/support/errata/RHSA-2008-0029.html)
16. [xfs-protocol-requests-bo(36919)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36919)
17. [28004](http://secunia.com/advisories/28004)
18. [27240](http://secunia.com/advisories/27240)
19. [27168](http://secunia.com/advisories/27168)
20. [](https://issues.rpath.com/browse/RPL-1756)
21. [29420](http://secunia.com/advisories/29420)
22. [27040](http://secunia.com/advisories/27040)
23. [APPLE-SA-2008-03-18](http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html)
24. [27176](http://secunia.com/advisories/27176)
25. [DSA-1385](http://www.debian.org/security/2007/dsa-1385)
26. [GLSA-200710-11](http://security.gentoo.org/glsa/glsa-200710-11.xml)
27. [27228](http://secunia.com/advisories/27228)
28. [ADV-2007-3467](http://www.vupen.com/english/advisories/2007/3467)
29. [RHSA-2008:0030](http://www.redhat.com/support/errata/RHSA-2008-0030.html)
30. [103114](http://sunsolve.sun.com/search/document.do?assetkey=1-26-103114-1)
31. [MDKSA-2007:210](http://www.mandriva.com/security/advisories?name=MDKSA-2007:210)
32. [25898](http://www.securityfocus.com/bid/25898)
33. [](http://bugs.gentoo.org/show_bug.cgi?id=194606)
34. [TA08-043B](http://www.us-cert.gov/cas/techalerts/TA08-043B.html)
35. [ADV-2007-3338](http://www.vupen.com/english/advisories/2007/3338)
36. [27560](http://secunia.com/advisories/27560)
37. [](http://docs.info.apple.com/article.html?artnum=307562)
38. [APPLE-SA-2008-02-11](http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html)
39. [oval:org.mitre.oval:def:10882](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10882)
40. [ADV-2007-3337](http://www.vupen.com/english/advisories/2007/3337)
41. [28536](http://secunia.com/advisories/28536)
42. [](http://bugs.freedesktop.org/show_bug.cgi?id=12298) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4165
- **State**: PUBLISHED
- **Published Date**: August 21, 2012 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 20:28 UTC
- **Reserved Date**: August 07, 2012 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player before 10.3.183.23 and 11.x before 11.4.402.265 on Windows and Mac OS X, before 10.3.183.23 and 11.x before 11.2.202.238 on Linux, before 11.1.111.16 on Android 2.x and 3.x, and before 11.1.115.17 on Android 4.x; Adobe AIR before 3.4.0.2540; and Adobe AIR SDK before 3.4.0.2540 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4163 and CVE-2012-4164.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2012:1203](http://rhn.redhat.com/errata/RHSA-2012-1203.html)
2. [GLSA-201209-01](http://security.gentoo.org/glsa/glsa-201209-01.xml)
3. [HPSBMU02948](http://marc.info/?l=bugtraq&m=139455789818399&w=2)
4. [](http://www.adobe.com/support/security/bulletins/apsb12-19.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5127, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5127 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5127
- **State**: PUBLISHED
- **Published Date**: June 06, 2024 at 17:26 UTC
- **Last Updated**: November 03, 2024 at 18:27 UTC
- **Reserved Date**: May 19, 2024 at 17:30 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
In lunary-ai/lunary versions 1.2.2 through 1.2.25, an improper access control vulnerability allows users on the Free plan to invite other members and assign them any role, including those intended for Paid and Enterprise plans only. This issue arises due to insufficient backend validation of roles and permissions, enabling unauthorized users to join a project and potentially exploit roles and permissions not intended for their use. The vulnerability specifically affects the Team feature, where the backend fails to validate whether a user has paid for a plan before allowing them to send invite links with any role assigned. This could lead to unauthorized access and manipulation of project settings or data.
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**lunary-ai - lunary-ai/lunary**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/719a5db3-f943-4100-a660-011cadf1bb32)
2. [](https://github.com/lunary-ai/lunary/commit/b7bd3a830a0f47ba07d0fd57bf78c4dd8a216297) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1408, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1408
- **State**: PUBLISHED
- **Published Date**: March 28, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 17:12 UTC
- **Reserved Date**: March 28, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vavoom 1.19.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via (1) a packet with no data or (2) a large packet, which prevents Vavoom from discarding the packet from the socket.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-1104](http://www.vupen.com/english/advisories/2006/1104)
2. [19388](http://secunia.com/advisories/19388)
3. [](http://aluigi.altervista.org/adv/vaboom-adv.txt)
4. [17261](http://www.securityfocus.com/bid/17261)
5. [vavoom-fionread-dos(25454)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25454) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24394
- **State**: PUBLISHED
- **Published Date**: September 06, 2021 at 11:09 UTC
- **Last Updated**: August 03, 2024 at 19:28 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
An id GET parameter of the Easy Testimonial Manager WordPress plugin through 1.2.0 is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Unknown - Easy Testimonial Manager**
Affected versions:
- 1.2.0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/e0bc9251-cccc-4416-91b2-8395d89d8fb3)
2. [](https://codevigilant.com/disclosure/2021/wp-plugin-easy-testimonial-manager/)
### Credits
- Syed Sheeraz Ali of Codevigilant |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1005, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1005 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1005
- **State**: PUBLISHED
- **Published Date**: May 19, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 14:49 UTC
- **Reserved Date**: January 10, 2013 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT5785)
2. [54886](http://secunia.com/advisories/54886)
3. [](http://support.apple.com/kb/HT5934)
4. [oval:org.mitre.oval:def:17601](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17601)
5. [APPLE-SA-2013-06-04-2](http://lists.apple.com/archives/security-announce/2013/Jun/msg00001.html)
6. [](http://support.apple.com/kb/HT5766)
7. [APPLE-SA-2013-05-16-1](http://lists.apple.com/archives/security-announce/2013/May/msg00000.html)
8. [APPLE-SA-2013-09-18-2](http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0536, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0536
- **State**: PUBLISHED
- **Published Date**: January 08, 2019 at 21:00 UTC
- **Last Updated**: August 04, 2024 at 17:51 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0549, CVE-2019-0554, CVE-2019-0569.
### Affected Products
**Microsoft - Windows 7**
Affected versions:
- 32-bit Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows RT 8.1**
Affected versions:
- Windows RT 8.1 (Status: affected)
**Microsoft - Windows Server 2008**
Affected versions:
- 32-bit Systems Service Pack 2 (Status: affected)
- 32-bit Systems Service Pack 2 (Server Core installation) (Status: affected)
- Itanium-Based Systems Service Pack 2 (Status: affected)
- x64-based Systems Service Pack 2 (Status: affected)
- x64-based Systems Service Pack 2 (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 32-bit systems (Status: affected)
- x64-based systems (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2008 R2**
Affected versions:
- Itanium-Based Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Server Core installation) (Status: affected)
**Microsoft - Windows 10**
Affected versions:
- 32-bit Systems (Status: affected)
- Version 1607 for 32-bit Systems (Status: affected)
- Version 1607 for x64-based Systems (Status: affected)
- Version 1703 for 32-bit Systems (Status: affected)
- Version 1703 for x64-based Systems (Status: affected)
- Version 1709 for 32-bit Systems (Status: affected)
- Version 1709 for ARM64-based Systems (Status: affected)
- Version 1709 for x64-based Systems (Status: affected)
- Version 1803 for 32-bit Systems (Status: affected)
- Version 1803 for ARM64-based Systems (Status: affected)
- Version 1803 for x64-based Systems (Status: affected)
- Version 1809 for 32-bit Systems (Status: affected)
- Version 1809 for ARM64-based Systems (Status: affected)
- Version 1809 for x64-based Systems (Status: affected)
- x64-based Systems (Status: affected)
**Microsoft - Windows 10 Servers**
Affected versions:
- version 1709 (Server Core Installation) (Status: affected)
- version 1803 (Server Core Installation) (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0536)
2. [106406](http://www.securityfocus.com/bid/106406) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30347, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30347 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30347
- **State**: PUBLISHED
- **Published Date**: March 21, 2025 at 00:00 UTC
- **Last Updated**: March 21, 2025 at 15:52 UTC
- **Reserved Date**: March 21, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Varnish Enterprise before 6.0.13r13 allows remote attackers to obtain sensitive information via an out-of-bounds read for range requests on ephemeral MSE4 stevedore objects.
### CVSS Metrics
- **CVSS Base Score**: 4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**varnish-software - Varnish Enterprise**
Affected versions:
- 6 (Status: affected)
### References
1. [](https://docs.varnish-software.com/security/VEV00001/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34465, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34465 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34465
- **State**: PUBLISHED
- **Published Date**: June 23, 2023 at 15:07 UTC
- **Last Updated**: November 29, 2024 at 14:38 UTC
- **Reserved Date**: June 06, 2023 at 16:16 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
XWiki Platform is a generic wiki platform. Starting in version 11.8-rc-1 and prior to versions 14.4.8, 14.10.6, and 15.2, `Mail.MailConfig` can be edited by any logged-in user by default. Consequently, they can change the mail obfuscation configuration and view and edit the mail sending configuration, including the smtp domain name and credentials. The problem has been patched in XWiki 14.4.8, 14.10.6, and 15.1. As a workaround, the rights of the `Mail.MailConfig` page can be manually updated so that only a set of trusted users can view, edit and delete it (e.g., the `XWiki.XWikiAdminGroup` group).
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**xwiki - xwiki-platform**
Affected versions:
- >= 11.8-rc-1, < 14.4.8 (Status: affected)
- >= 14.5, < 14.10.6 (Status: affected)
- >= 15.0-rc-1, < 15.1 (Status: affected)
### References
1. [https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g75c-cjr6-39mc](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g75c-cjr6-39mc)
2. [https://github.com/xwiki/xwiki-platform/commit/8910b8857d3442d2e8142f655fdc0512930354d1](https://github.com/xwiki/xwiki-platform/commit/8910b8857d3442d2e8142f655fdc0512930354d1)
3. [https://github.com/xwiki/xwiki-platform/commit/d28d7739089e1ae8961257d9da7135d1a01cb7d4](https://github.com/xwiki/xwiki-platform/commit/d28d7739089e1ae8961257d9da7135d1a01cb7d4)
4. [https://jira.xwiki.org/browse/XWIKI-20519](https://jira.xwiki.org/browse/XWIKI-20519)
5. [https://jira.xwiki.org/browse/XWIKI-20671](https://jira.xwiki.org/browse/XWIKI-20671) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11149
- **State**: PUBLISHED
- **Published Date**: June 01, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 08:01 UTC
- **Reserved Date**: May 16, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 7 of 46).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20180531 [CORE-2018-0002] - Quest DR Series Disk Backup Multiple Vulnerabilities](http://seclists.org/fulldisclosure/2018/May/71)
2. [](http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html)
3. [](https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49155, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49155 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49155
- **State**: PUBLISHED
- **Published Date**: December 18, 2023 at 22:13 UTC
- **Last Updated**: November 20, 2024 at 20:33 UTC
- **Reserved Date**: November 22, 2023 at 23:35 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Button Generator – easily Button Builder.This issue affects Button Generator – easily Button Builder: from n/a through 2.3.8.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Wow-Company - Button Generator – easily Button Builder**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/button-generation/wordpress-button-generator-easily-button-builder-plugin-2-3-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Elliot (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26302
- **State**: PUBLISHED
- **Published Date**: December 23, 2022 at 23:03 UTC
- **Last Updated**: April 14, 2025 at 14:37 UTC
- **Reserved Date**: October 01, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
is.js is a general-purpose check library. Versions 0.9.0 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). is.js uses a regex copy-pasted from a gist to validate URLs. Trying to validate a malicious string can cause the regex to loop “forever." This vulnerability was found using a CodeQL query which identifies inefficient regular expressions. is.js has no patch for this issue.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**arasatasaygin - is.js**
Affected versions:
- 0.9.0 (Status: affected)
### References
1. [](https://securitylab.github.com/advisories/GHSL-2020-295-redos-is.js)
2. [](https://github.com/arasatasaygin/is.js/issues/320) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2244
- **State**: PUBLISHED
- **Published Date**: April 22, 2021 at 21:53 UTC
- **Last Updated**: September 26, 2024 at 15:03 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Hyperion Analytic Provider Services product of Oracle Hyperion (component: JAPI) and Essbase Analytic Provider Services product of Oracle Essbase (component: JAPI). Supported versions that are affected are Hyperion Analytic Provider Services 11.1.2.4 and 12.2.1.4, and Essbase Analytic Provider Services 21.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Hyperion Analytic Provider Services. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Hyperion Analytic Provider Services, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Hyperion Analytic Provider Services. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Affected Products
**Oracle Corporation - Hyperion Analytic Provider Services**
Affected versions:
- 11.1.2.4 (Status: affected)
- 12.2.1.4 (Status: affected)
- 21.2 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2021.html)
2. [](https://www.oracle.com/security-alerts/cpujul2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6366
- **State**: PUBLISHED
- **Published Date**: August 18, 2016 at 18:00 UTC
- **Last Updated**: November 15, 2024 at 18:02 UTC
- **Reserved Date**: July 26, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92521](http://www.securityfocus.com/bid/92521)
2. [](https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip)
3. [](http://blogs.cisco.com/security/shadow-brokers)
4. [20160817 Cisco Adaptive Security Appliance SNMP Remote Code Execution Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp)
5. [](http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516)
6. [](https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html)
7. [40258](https://www.exploit-db.com/exploits/40258/)
8. [1036637](http://www.securitytracker.com/id/1036637) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7324, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7324 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7324
- **State**: PUBLISHED
- **Published Date**: September 09, 2020 at 09:40 UTC
- **Last Updated**: September 16, 2024 at 23:31 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: trellix
### Vulnerability Description
Improper Access Control vulnerability in McAfee MVISION Endpoint prior to 20.9 Update allows local users to bypass security mechanisms and deny access to the SYSTEM folder via incorrectly applied permissions.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**McAfee LLC - MVISION Endpoint**
Affected versions:
- 20.x (Status: affected)
### References
1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10328) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2338
- **State**: PUBLISHED
- **Published Date**: May 19, 2008 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 08:58 UTC
- **Reserved Date**: May 19, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Interspire ActiveKB 1.5 and earlier allows remote attackers to gain privileges by setting the auth cookie to true when accessing unspecified scripts in /admin.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30265](http://secunia.com/advisories/30265)
2. [1020035](http://www.securitytracker.com/id?1020035)
3. [5616](https://www.exploit-db.com/exploits/5616)
4. [activekb-admin-security-bypass(42427)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42427)
5. [29226](http://www.securityfocus.com/bid/29226) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3206, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3206 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3206
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 14:16 UTC
- **Reserved Date**: December 05, 2016 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Java implementation of AMF3 deserializers used by Flamingo amf-serializer by Exadel, version 2.2.0, allows external entity references (XXEs) from XML documents embedded within AMF3 messages. If the XML parsing is handled incorrectly it could potentially expose sensitive data on the server, denial of service, or server side request forgery.
### Weakness Classification (CWE)
- CWE-611: Security Weakness
### Affected Products
**Exadel - Flamingo amf-serializer**
Affected versions:
- 2.2.0 (Status: affected)
### References
1. [](https://codewhitesec.blogspot.com/2017/04/amf.html)
2. [VU#307983](https://www.kb.cert.org/vuls/id/307983)
3. [](http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution)
4. [97380](http://www.securityfocus.com/bid/97380) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37429, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37429 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37429
- **State**: PUBLISHED
- **Published Date**: July 22, 2024 at 08:26 UTC
- **Last Updated**: August 02, 2024 at 03:57 UTC
- **Reserved Date**: June 09, 2024 at 08:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hamid Alinia – idehweb Login with phone number allows Stored XSS.This issue affects Login with phone number: from n/a through 1.7.35.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Hamid Alinia – idehweb - Login with phone number**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/login-with-phone-number/wordpress-login-with-phone-number-plugin-1-7-35-admin-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LuxF0z (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42142
- **State**: PUBLISHED
- **Published Date**: January 23, 2024 at 00:00 UTC
- **Last Updated**: October 21, 2024 at 10:37 UTC
- **Reserved Date**: October 11, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Contiki-NG tinyDTLS through master branch 53a0d97. DTLS servers mishandle the early use of a large epoch number. This vulnerability allows remote attackers to cause a denial of service and false-positive packet drops.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/contiki-ng/tinydtls/issues/24)
2. [](https://seclists.org/fulldisclosure/2024/Jan/15) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0279, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0279
- **State**: PUBLISHED
- **Published Date**: July 15, 2021 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 01:06 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
Juniper Networks Contrail Cloud (CC) releases prior to 13.6.0 have RabbitMQ service enabled by default with hardcoded credentials. The messaging services of RabbitMQ are used when coordinating operations and status information among Contrail services. An attacker with access to an administrative service for RabbitMQ (e.g. GUI), can use these hardcoded credentials to cause a Denial of Service (DoS) or have access to unspecified sensitive system information. This issue affects the Juniper Networks Contrail Cloud releases on versions prior to 13.6.0.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**Juniper Networks - Contrail Cloud**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://kb.juniper.net/JSA11183) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1636, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1636 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1636
- **State**: PUBLISHED
- **Published Date**: March 28, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:34 UTC
- **Reserved Date**: March 28, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the htp PL/SQL package for Oracle 9i Application Server (9iAS) allows remote attackers to inject arbitrary web script or HTML via the cbuf parameter to htp.print.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oracle-htpprint-xss(10687)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10687)
2. [](http://www.nextgenss.com/papers/hpoas.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5319, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5319
- **State**: PUBLISHED
- **Published Date**: February 06, 2020 at 17:45 UTC
- **Last Updated**: September 16, 2024 at 20:27 UTC
- **Reserved Date**: January 03, 2020 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell EMC Unity, Dell EMC Unity XT, and Dell EMC UnityVSA versions prior to 5.0.2.0.5.009 contain a Denial of Service vulnerability on NAS Server SSH implementation that is used to provide SFTP service on a NAS server. A remote unauthenticated attacker may potentially exploit this vulnerability and cause a Denial of Service (Storage Processor Panic) by sending an out of order SSH protocol sequence.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-129: Security Weakness
### Affected Products
**Dell - Unity**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/security/en-us/details/540336/DSA-2020-019-Dell-EMC-Unity-Family-Dell-EMC-Unity-XT-Family-Denial-of-Service-Vulnerability) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36458
- **State**: PUBLISHED
- **Published Date**: July 05, 2023 at 20:57 UTC
- **Last Updated**: October 18, 2024 at 19:36 UTC
- **Reserved Date**: June 21, 2023 at 18:50 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
1Panel is an open source Linux server operation and maintenance management panel. Prior to version 1.3.6, an authenticated attacker can craft a malicious payloads to achieve command injection when entering the container terminal. The vulnerability has been fixed in v1.3.6.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**1Panel-dev - 1Panel**
Affected versions:
- , 1.3.6 (Status: affected)
### References
1. [https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-7x2c-fgx6-xf9h](https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-7x2c-fgx6-xf9h)
2. [https://github.com/1Panel-dev/1Panel/releases/tag/v1.3.6](https://github.com/1Panel-dev/1Panel/releases/tag/v1.3.6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45687, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45687 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45687
- **State**: PUBLISHED
- **Published Date**: December 26, 2021 at 21:51 UTC
- **Last Updated**: August 04, 2024 at 04:47 UTC
- **Reserved Date**: December 26, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the raw-cpuid crate before 9.1.1 for Rust. If the serialize feature is used (which is not the the default), a Deserialize operation may lack sufficient validation, leading to memory corruption or a panic.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2021-0089.html)
2. [](https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/raw-cpuid/RUSTSEC-2021-0089.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13174, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13174 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13174
- **State**: PUBLISHED
- **Published Date**: July 05, 2018 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 08:52 UTC
- **Reserved Date**: July 04, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for CryptoABS (ABS), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/CryptoABS) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40514, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40514
- **State**: PUBLISHED
- **Published Date**: January 16, 2025 at 00:00 UTC
- **Last Updated**: February 03, 2025 at 20:34 UTC
- **Reserved Date**: July 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Insecure Permissions vulnerability in themesebrand Chatvia v.5.3.2 allows a remote attacker to escalate privileges via the User profile name and image upload functions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/php-lover-boy/ChatVia) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2489, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2489 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2489
- **State**: PUBLISHED
- **Published Date**: June 05, 2023 at 13:38 UTC
- **Last Updated**: January 08, 2025 at 17:03 UTC
- **Reserved Date**: May 03, 2023 at 08:30 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Stop Spammers Security | Block Spam Users, Comments, Forms WordPress plugin before 2023 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Stop Spammers Security | Block Spam Users, Comments, Forms**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/dcbe3334-357a-4744-b50c-309d10cca30d)
### Credits
- Erwan LR (WPScan)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24754, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24754
- **State**: PUBLISHED
- **Published Date**: January 27, 2025 at 13:59 UTC
- **Last Updated**: January 27, 2025 at 14:24 UTC
- **Reserved Date**: January 23, 2025 at 14:53 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Houzez.co Houzez. This issue affects Houzez: from n/a through 3.4.0.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Houzez.co - Houzez**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/theme/houzez/vulnerability/wordpress-houzez-theme-3-4-0-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Ananda Dhakal (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2211, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2211 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2211
- **State**: PUBLISHED
- **Published Date**: July 12, 2022 at 20:33 UTC
- **Last Updated**: August 03, 2024 at 00:32 UTC
- **Reserved Date**: June 27, 2022 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor.
### Affected Products
**n/a - libguestfs**
Affected versions:
- none (Status: affected)
### References
1. [](https://access.redhat.com/security/cve/CVE-2022-2211) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6333, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6333 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6333
- **State**: PUBLISHED
- **Published Date**: October 16, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 07:15 UTC
- **Reserved Date**: August 17, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20151012 Cisco Application Policy Infrastructure Controller Privilege Escalation SSH Key Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151012-apic)
2. [1033793](http://www.securitytracker.com/id/1033793) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9093, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9093 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9093
- **State**: PUBLISHED
- **Published Date**: April 16, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 21:58 UTC
- **Reserved Date**: October 28, 2016 at 00:00 UTC
- **Assigned By**: symantec
### Vulnerability Description
A version of the SymEvent Driver that shipped with Symantec Endpoint Protection 12.1 RU6 MP6 and earlier fails to properly sanitize logged-in user input. SEP 14.0 and later are not impacted by this issue. A non-admin user would need to be able to save an executable file to disk and then be able to successfully run that file. If properly constructed, the file could access the driver interface and potentially manipulate certain system calls. On all 32-bit systems and in most cases on 64-bit systems, this will result in a denial of service that will crash the system. In very narrow circumstances, and on 64-bit systems only, this could allow the user to run arbitrary code on the local machine with kernel-level privileges. This could result in a non-privileged user gaining privileged access on the local machine.
### Affected Products
**Symantec Corporation - Endpoint Protection**
Affected versions:
- Prior to SEP 12.1 RU6 MP7 (Status: affected)
### References
1. [1037961](http://www.securitytracker.com/id/1037961)
2. [96294](http://www.securityfocus.com/bid/96294)
3. [](https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170306_00) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30787, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30787 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30787
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 13:48 UTC
- **Last Updated**: August 03, 2024 at 22:40 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. An application may be able to cause unexpected system termination or write kernel memory.
### Affected Products
**Apple - Security Update - Catalina**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212602)
2. [](https://support.apple.com/en-us/HT212600)
3. [](https://support.apple.com/en-us/HT212603) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38814, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38814 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38814
- **State**: PUBLISHED
- **Published Date**: September 15, 2022 at 19:34 UTC
- **Last Updated**: August 03, 2024 at 11:02 UTC
- **Reserved Date**: August 29, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross-site scripting (XSS) vulnerability in the auth_settings component of FiberHome AN5506-02-B vRP2521 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the sncfg_loid text field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/168065/Fiberhome-AN5506-02-B-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26769
- **State**: PUBLISHED
- **Published Date**: February 17, 2025 at 11:38 UTC
- **Last Updated**: February 18, 2025 at 15:44 UTC
- **Reserved Date**: February 14, 2025 at 06:53 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webilia Inc. Vertex Addons for Elementor allows Stored XSS. This issue affects Vertex Addons for Elementor: from n/a through 1.2.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Webilia Inc. - Vertex Addons for Elementor**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/addons-for-elementor-builder/vulnerability/wordpress-vertex-addons-for-elementor-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Webula (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0149
- **State**: PUBLISHED
- **Published Date**: September 29, 1999 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:27 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The wrap CGI program in IRIX allows remote attackers to view arbitrary directory listings via a .. (dot dot) attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19970501-02-PX](ftp://patches.sgi.com/support/free/security/advisories/19970501-02-PX)
2. [247](http://www.osvdb.org/247)
3. [373](http://www.securityfocus.com/bid/373)
4. [http-sgi-wrap(290)](https://exchange.xforce.ibmcloud.com/vulnerabilities/290) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14766, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14766 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14766
- **State**: PUBLISHED
- **Published Date**: September 27, 2017 at 08:00 UTC
- **Last Updated**: August 05, 2024 at 19:34 UTC
- **Reserved Date**: September 27, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Simple Student Result plugin before 1.6.4 for WordPress has an Authentication Bypass vulnerability because the fn_ssr_add_st_submit() function and fn_ssr_del_st_submit() function in functions.php only require knowing the student id number.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/8920)
2. [](https://limbenjamin.com/articles/simple-student-result-auth-bypass.html)
3. [](https://wordpress.org/plugins/simple-student-result/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19579
- **State**: PUBLISHED
- **Published Date**: July 10, 2019 at 16:52 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GitLab EE version 11.5 is vulnerable to a persistent XSS vulnerability in the Operations page. This is fixed in 11.5.1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab-ce/issues/53917)
2. [](https://about.gitlab.com/2018/11/28/security-release-gitlab-11-dot-5-dot-1-released/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37042, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37042 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37042
- **State**: PUBLISHED
- **Published Date**: December 07, 2021 at 15:45 UTC
- **Last Updated**: August 04, 2024 at 01:09 UTC
- **Reserved Date**: July 20, 2021 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read.
### Affected Products
**Huawei - EMUI**
Affected versions:
- 11.0.1 (Status: affected)
- 11.0.0 (Status: affected)
- 10.1.1 (Status: affected)
- 10.1.0 (Status: affected)
**Huawei - Magic UI**
Affected versions:
- 4.0.0 (Status: affected)
- 3.1.1 (Status: affected)
- 3.1.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2021/9/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25725
- **State**: PUBLISHED
- **Published Date**: January 06, 2023 at 05:02 UTC
- **Last Updated**: April 09, 2025 at 20:15 UTC
- **Reserved Date**: February 22, 2022 at 11:38 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Denial of service in MODEM due to improper pointer handling
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AR8035 (Status: affected)
- CSRB31024 (Status: affected)
- QCA6390 (Status: affected)
- QCA6391 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCM6490 (Status: affected)
- QCN6024 (Status: affected)
- QCN9024 (Status: affected)
- QCS6490 (Status: affected)
- QCX315 (Status: affected)
- SA415M (Status: affected)
- SA515M (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD480 (Status: affected)
- SD690 5G (Status: affected)
- SD695 (Status: affected)
- SD750G (Status: affected)
- SD765 (Status: affected)
- SD765G (Status: affected)
- SD768G (Status: affected)
- SD778G (Status: affected)
- SD780G (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SD870 (Status: affected)
- SD888 (Status: affected)
- SD888 5G (Status: affected)
- SDX55 (Status: affected)
- SDX55M (Status: affected)
- SDX57M (Status: affected)
- SDX65 (Status: affected)
- SDXR2 5G (Status: affected)
- SM4375 (Status: affected)
- SM7250P (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- WCD9341 (Status: affected)
- WCD9360 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3988 (Status: affected)
- WCN3991 (Status: affected)
- WCN3998 (Status: affected)
- WCN6740 (Status: affected)
- WCN6750 (Status: affected)
- WCN6850 (Status: affected)
- WCN6851 (Status: affected)
- WCN6855 (Status: affected)
- WCN6856 (Status: affected)
- WCN7850 (Status: affected)
- WCN7851 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23091, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23091
- **State**: PUBLISHED
- **Published Date**: February 01, 2025 at 06:53 UTC
- **Last Updated**: March 13, 2025 at 12:54 UTC
- **Reserved Date**: January 10, 2025 at 19:05 UTC
- **Assigned By**: hackerone
### Vulnerability Description
An Improper Certificate Validation on UniFi OS devices, with Identity Enterprise configured, could allow a malicious actor to execute a man-in-the-middle (MitM) attack during application update.
### Affected Products
**Ubiquiti Inc - UDM**
Affected versions:
- 4.1.13 (Status: affected)
**Ubiquiti Inc - UDM-Pro**
Affected versions:
- 4.1.13 (Status: affected)
**Ubiquiti Inc - UDM-SE**
Affected versions:
- 4.1.13 (Status: affected)
**Ubiquiti Inc - UDM-Pro-Max**
Affected versions:
- 4.1.13 (Status: affected)
**Ubiquiti Inc - UDW**
Affected versions:
- 4.1.13 (Status: affected)
**Ubiquiti Inc - UNVR**
Affected versions:
- 4.1.11 (Status: affected)
**Ubiquiti Inc - UNVR PRO**
Affected versions:
- 4.1.11 (Status: affected)
**Ubiquiti Inc - UCKP**
Affected versions:
- 4.1.11 (Status: affected)
**Ubiquiti Inc - UCK**
Affected versions:
- 4.1.11 (Status: affected)
**Ubiquiti Inc - UCK-Enterprise**
Affected versions:
- 4.1.11 (Status: affected)
**Ubiquiti Inc - UCG-Max**
Affected versions:
- 4.1.13 (Status: affected)
**Ubiquiti Inc - EFG**
Affected versions:
- 4.1.13 (Status: affected)
### References
1. [](https://community.ui.com/releases/Security-Advisory-Bulletin-045-045/6011bc61-f2eb-457f-b71d-755703817aaf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4596, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4596 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4596
- **State**: PUBLISHED
- **Published Date**: July 02, 2014 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 11:20 UTC
- **Reserved Date**: June 23, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in js/button-snapapp.php in the SnapApp plugin 1.5 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) msg or (2) act parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [68433](http://www.securityfocus.com/bid/68433)
2. [](http://codevigilant.com/disclosure/wp-plugin-wpsnapapp-a3-cross-site-scripting-xss) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3460, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3460
- **State**: PUBLISHED
- **Published Date**: November 02, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:10 UTC
- **Reserved Date**: November 02, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Oracle Agent in Oracle Enterprise Manager 9.0.4.1 up to 10.1.0.4 has unknown impact and attack vectors, as identified by Oracle Vuln# EM01.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2005-090497.html)
2. [TA05-292A](http://www.us-cert.gov/cas/techalerts/TA05-292A.html)
3. [VU#865948](http://www.kb.cert.org/vuls/id/865948)
4. [15134](http://www.securityfocus.com/bid/15134)
5. [VU#210524](http://www.kb.cert.org/vuls/id/210524)
6. [17250](http://secunia.com/advisories/17250) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21007, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21007 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21007
- **State**: PUBLISHED
- **Published Date**: April 16, 2024 at 21:26 UTC
- **Last Updated**: August 21, 2024 at 14:51 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Oracle Corporation - WebLogic Server**
Affected versions:
- 12.2.1.4.0 (Status: affected)
- 14.1.1.0.0 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15874, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15874 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15874
- **State**: PUBLISHED
- **Published Date**: October 24, 2017 at 20:00 UTC
- **Last Updated**: June 09, 2025 at 15:24 UTC
- **Reserved Date**: October 24, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.busybox.net/show_bug.cgi?id=10436) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0971, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0971 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0971
- **State**: PUBLISHED
- **Published Date**: February 02, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:37 UTC
- **Reserved Date**: January 31, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in ACI 4d webserver allows remote attackers to read arbitrary files via a .. (dot dot) or drive letter (e.g., C:) in an HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3209](http://www.securityfocus.com/bid/3209)
2. [20010820 ACI 4D WebServer Directory traversal.](http://www.securityfocus.com/archive/1/206102)
3. [4d-webserver-directory-traversal(7010)](http://www.iss.net/security_center/static/7010.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8106, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8106 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8106
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 20:29 UTC
- **Last Updated**: August 04, 2024 at 21:10 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-41.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24837
- **State**: PUBLISHED
- **Published Date**: April 11, 2022 at 20:20 UTC
- **Last Updated**: April 23, 2025 at 18:40 UTC
- **Reserved Date**: February 10, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
HedgeDoc is an open-source, web-based, self-hosted, collaborative markdown editor. Images uploaded with HedgeDoc version 1.9.1 and later have an enumerable filename after the upload, resulting in potential information leakage of uploaded documents. This is especially relevant for private notes and affects all upload backends, except Lutim and imgur. This issue is patched in version 1.9.3 by replacing the filename generation with UUIDv4. If you cannot upgrade to HedgeDoc 1.9.3, it is possible to block POST requests to `/uploadimage`, which will disable future uploads.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**hedgedoc - hedgedoc**
Affected versions:
- >=1.9.1, < 1.9.3 (Status: affected)
### References
1. [](https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-q6vv-2q26-j7rx)
2. [](https://github.com/node-formidable/formidable/issues/808)
3. [](https://github.com/hedgedoc/hedgedoc/commit/9e2f9e21e904c4a319e84265da7ef03b0a8e343a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20076
- **State**: PUBLISHED
- **Published Date**: February 12, 2023 at 00:00 UTC
- **Last Updated**: October 28, 2024 at 16:34 UTC
- **Reserved Date**: October 27, 2022 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Cisco IOx application hosting environment could allow an authenticated, remote attacker to execute arbitrary commands as root on the underlying host operating system. This vulnerability is due to incomplete sanitization of parameters that are passed in for activation of an application. An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying host operating system.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-233: Security Weakness
### Affected Products
**Cisco - Cisco IOS **
Affected versions:
- n/a (Status: affected)
### References
1. [20230201 Cisco IOx Application Hosting Environment Command Injection Vulnerability](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-8whGn5dL) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8919, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8919
- **State**: PUBLISHED
- **Published Date**: July 25, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 16:48 UTC
- **Reserved Date**: May 12, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NetApp OnCommand API Services before 1.2P3 logs the LDAP BIND password when a user attempts to log in using the REST API, which allows remote authenticated users to obtain sensitive password information via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [99957](http://www.securityfocus.com/bid/99957)
2. [](https://kb.netapp.com/support/s/article/ka51A0000008Spy/NTAP-20170718-0001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31895, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31895 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31895
- **State**: PUBLISHED
- **Published Date**: July 13, 2021 at 11:02 UTC
- **Last Updated**: May 13, 2025 at 09:38 UTC
- **Reserved Date**: April 29, 2021 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in RUGGEDCOM i800 (All versions < V4.3.7), RUGGEDCOM i801 (All versions < V4.3.7), RUGGEDCOM i802 (All versions < V4.3.7), RUGGEDCOM i803 (All versions < V4.3.7), RUGGEDCOM M2100 (All versions < V4.3.7), RUGGEDCOM M2200 (All versions < V4.3.7), RUGGEDCOM M969 (All versions < V4.3.7), RUGGEDCOM RMC30 (All versions < V4.3.7), RUGGEDCOM RMC8388 V4.X (All versions < V4.3.7), RUGGEDCOM RMC8388 V5.X (All versions < V5.5.4), RUGGEDCOM RP110 (All versions < V4.3.7), RUGGEDCOM RS1600 (All versions < V4.3.7), RUGGEDCOM RS1600F (All versions < V4.3.7), RUGGEDCOM RS1600T (All versions < V4.3.7), RUGGEDCOM RS400 (All versions < V4.3.7), RUGGEDCOM RS401 (All versions < V4.3.7), RUGGEDCOM RS416 (All versions < V4.3.7), RUGGEDCOM RS416P (All versions < V4.3.7), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.7), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.5.4), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.7), RUGGEDCOM RS416v2 V5.X (All versions < 5.5.4), RUGGEDCOM RS8000 (All versions < V4.3.7), RUGGEDCOM RS8000A (All versions < V4.3.7), RUGGEDCOM RS8000H (All versions < V4.3.7), RUGGEDCOM RS8000T (All versions < V4.3.7), RUGGEDCOM RS900 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RS900G (All versions < V4.3.7), RUGGEDCOM RS900G (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RS900GP (All versions < V4.3.7), RUGGEDCOM RS900L (All versions < V4.3.7), RUGGEDCOM RS900W (All versions < V4.3.7), RUGGEDCOM RS910 (All versions < V4.3.7), RUGGEDCOM RS910L (All versions < V4.3.7), RUGGEDCOM RS910W (All versions < V4.3.7), RUGGEDCOM RS920L (All versions < V4.3.7), RUGGEDCOM RS920W (All versions < V4.3.7), RUGGEDCOM RS930L (All versions < V4.3.7), RUGGEDCOM RS930W (All versions < V4.3.7), RUGGEDCOM RS940G (All versions < V4.3.7), RUGGEDCOM RS969 (All versions < V4.3.7), RUGGEDCOM RSG2100 (All versions), RUGGEDCOM RSG2100 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RSG2100P (All versions < V4.3.7), RUGGEDCOM RSG2100P (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RSG2100PNC (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RSG2100PNC (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RSG2200 (All versions < V4.3.7), RUGGEDCOM RSG2288 V4.X (All versions < V4.3.7), RUGGEDCOM RSG2288 V5.X (All versions < V5.5.4), RUGGEDCOM RSG2300 V4.X (All versions < V4.3.7), RUGGEDCOM RSG2300 V5.X (All versions < V5.5.4), RUGGEDCOM RSG2300P V4.X (All versions < V4.3.7), RUGGEDCOM RSG2300P V5.X (All versions < V5.5.4), RUGGEDCOM RSG2488 V4.X (All versions < V4.3.7), RUGGEDCOM RSG2488 V5.X (All versions < V5.5.4), RUGGEDCOM RSG907R (All versions < V5.5.4), RUGGEDCOM RSG908C (All versions < V5.5.4), RUGGEDCOM RSG909R (All versions < V5.5.4), RUGGEDCOM RSG910C (All versions < V5.5.4), RUGGEDCOM RSG920P V4.X (All versions < V4.3.7), RUGGEDCOM RSG920P V5.X (All versions < V5.5.4), RUGGEDCOM RSL910 (All versions < V5.5.4), RUGGEDCOM RST2228 (All versions < V5.5.4), RUGGEDCOM RST2228P (All versions < V5.5.4), RUGGEDCOM RST916C (All versions < V5.5.4), RUGGEDCOM RST916P (All versions < V5.5.4). The DHCP client in affected devices fails to properly sanitize incoming DHCP packets. This could allow an unauthenticated remote attacker to cause memory to be overwritten, potentially allowing remote code execution.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Siemens - RUGGEDCOM i800**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM i801**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM i802**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM i803**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM M2100**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM M2200**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM M969**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RMC30**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RMC8388 V4.X**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RMC8388 V5.X**
Affected versions:
- All versions < V5.5.4 (Status: affected)
**Siemens - RUGGEDCOM RP110**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS1600**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RS1600F**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RS1600T**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RS400**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS401**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS416**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS416P**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RS416Pv2 V4.X**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RS416Pv2 V5.X**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RS416v2 V4.X**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS416v2 V5.X**
Affected versions:
- All versions < 5.5.4 (Status: affected)
**Siemens - RUGGEDCOM RS8000**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS8000A**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS8000H**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS8000T**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS900 (32M) V4.X**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS900 (32M) V5.X**
Affected versions:
- All versions < V5.5.4 (Status: affected)
**Siemens - RUGGEDCOM RS900G**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS900G (32M) V4.X**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS900G (32M) V5.X**
Affected versions:
- All versions < V5.5.4 (Status: affected)
**Siemens - RUGGEDCOM RS900GP**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS900L**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS900W**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS910**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS910L**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS910W**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS920L**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS920W**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS930L**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS930W**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS940G**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RS969**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RSG2100**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RSG2100 (32M) V4.X**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RSG2100 (32M) V5.X**
Affected versions:
- All versions < V5.5.4 (Status: affected)
**Siemens - RUGGEDCOM RSG2100P**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RSG2100P (32M) V4.X**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RSG2100P (32M) V5.X**
Affected versions:
- All versions < V5.5.4 (Status: affected)
**Siemens - RUGGEDCOM RSG2100PNC (32M) V4.X**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RSG2100PNC (32M) V5.X**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RSG2200**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RSG2288 V4.X**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RSG2288 V5.X**
Affected versions:
- All versions < V5.5.4 (Status: affected)
**Siemens - RUGGEDCOM RSG2300 V4.X**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RSG2300 V5.X**
Affected versions:
- All versions < V5.5.4 (Status: affected)
**Siemens - RUGGEDCOM RSG2300P V4.X**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RSG2300P V5.X**
Affected versions:
- All versions < V5.5.4 (Status: affected)
**Siemens - RUGGEDCOM RSG2488 V4.X**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RSG2488 V5.X**
Affected versions:
- All versions < V5.5.4 (Status: affected)
**Siemens - RUGGEDCOM RSG907R**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RSG908C**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RSG909R**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RSG910C**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RSG920P V4.X**
Affected versions:
- All versions < V4.3.7 (Status: affected)
**Siemens - RUGGEDCOM RSG920P V5.X**
Affected versions:
- All versions < V5.5.4 (Status: affected)
**Siemens - RUGGEDCOM RSL910**
Affected versions:
- All versions < V5.5.4 (Status: affected)
**Siemens - RUGGEDCOM RST2228**
Affected versions:
- All versions < V5.5.4 (Status: affected)
**Siemens - RUGGEDCOM RST2228P**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RST916C**
Affected versions:
- All versions < V5.5.4 (Status: affected)
**Siemens - RUGGEDCOM RST916P**
Affected versions:
- All versions < V5.5.4 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-373591.pdf)
2. [](https://cert-portal.siemens.com/productcert/html/ssa-373591.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1050, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1050 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1050
- **State**: PUBLISHED
- **Published Date**: March 22, 2010 at 18:17 UTC
- **Last Updated**: August 07, 2024 at 01:06 UTC
- **Reserved Date**: March 22, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in AudiStat 1.3 allows remote attackers to execute arbitrary SQL commands via the mday parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [38494](http://secunia.com/advisories/38494)
2. [](http://packetstormsecurity.org/1002-exploits/audistats-sql.txt)
3. [11334](http://www.exploit-db.com/exploits/11334) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-11035, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-11035 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-11035
- **State**: PUBLISHED
- **Published Date**: April 07, 2020 at 13:24 UTC
- **Last Updated**: August 06, 2024 at 03:47 UTC
- **Reserved Date**: April 07, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Samsung mobile devices with software through 2016-05-27 (Exynos AP chipsets). A local graphics user can cause a Kernel Crash via the fb0(DECON) frame buffer interface. The Samsung ID is SVE-2016-7011 (October 2016).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4130, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4130
- **State**: PUBLISHED
- **Published Date**: December 06, 2011 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 00:01 UTC
- **Reserved Date**: October 18, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugs.proftpd.org/show_bug.cgi?id=3711)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-11-328/)
3. [](http://www.proftpd.org/docs/NEWS-1.3.3g)
4. [50631](http://www.securityfocus.com/bid/50631) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44236
- **State**: PUBLISHED
- **Published Date**: December 15, 2022 at 00:00 UTC
- **Last Updated**: April 21, 2025 at 14:41 UTC
- **Reserved Date**: October 30, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Beijing Zed-3 Technologies Co.,Ltd VoIP simpliclty ASG 8.5.0.17807 (20181130-16:12) has a Weak password vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/liong007/Zed-3/issues/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17849, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17849 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17849
- **State**: PUBLISHED
- **Published Date**: December 24, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 21:06 UTC
- **Reserved Date**: December 22, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A buffer overflow vulnerability in GetGo Download Manager 5.3.0.2712 and earlier could allow remote HTTP servers to execute arbitrary code on NAS devices via a long response.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45087](https://www.exploit-db.com/exploits/45087/)
2. [](https://packetstormsecurity.com/files/145530/GetGo-Download-Manager-5.3.0.2712-Buffer-Overflow.html)
3. [43391](https://www.exploit-db.com/exploits/43391/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1323, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1323 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1323
- **State**: PUBLISHED
- **Published Date**: September 01, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:19 UTC
- **Reserved Date**: November 26, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2003:256](http://www.redhat.com/support/errata/RHSA-2003-256.html)
2. [20021220 GLSA: perl](http://marc.info/?l=bugtraq&m=104040175522502&w=2)
3. [](http://use.perl.org/articles/02/10/06/1118222.shtml?tid=5)
4. [SCOSA-2004.1](ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.1/SCOSA-2004.1.txt)
5. [RHSA-2003:257](http://www.redhat.com/support/errata/RHSA-2003-257.html)
6. [20021219 TSLSA-2002-0087 - perl](http://marc.info/?l=bugtraq&m=104033126305252&w=2)
7. [20030606-01-A](ftp://patches.sgi.com/support/free/security/advisories/20030606-01-A)
8. [20021216 [OpenPKG-SA-2002.014] OpenPKG Security Advisory (perl)](http://marc.info/?l=bugtraq&m=104005919814869&w=2)
9. [CSSA-2004-007.0](ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-007.0.txt)
10. [safe-pm-bypass-restrictions(10574)](http://www.iss.net/security_center/static/10574.php)
11. [3814](http://www.osvdb.org/3814)
12. [oval:org.mitre.oval:def:1160](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1160)
13. [2183](http://www.osvdb.org/2183)
14. [DSA-208](http://www.debian.org/security/2002/dsa-208)
15. [6111](http://www.securityfocus.com/bid/6111)
16. [20021105 Perl Safe.pm compartment reuse vuln](http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0061.html)
17. [](http://bugs6.perl.org/rt2/Ticket/Display.html?id=17744) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0610, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0610 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0610
- **State**: PUBLISHED
- **Published Date**: February 06, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 07:54 UTC
- **Reserved Date**: February 05, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a modified size value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/project/shownotes.php?release_id=571174&group_id=63887)
2. [27561](http://www.securityfocus.com/bid/27561)
3. [VU#721460](http://www.kb.cert.org/vuls/id/721460)
4. [28747](http://secunia.com/advisories/28747)
5. [](http://forum.ultravnc.info/viewtopic.php?t=11850)
6. [](http://ultravnc.svn.sourceforge.net/viewvc/ultravnc/UltraVNC%20Project%20Root/UltraVNC/vncviewer/ClientConnection.cpp?sortby=date&r1=169&r2=168&pathrev=169)
7. [18666](http://www.exploit-db.com/exploits/18666)
8. [1019293](http://www.securitytracker.com/id?1019293)
9. [ADV-2008-0392](http://www.vupen.com/english/advisories/2008/0392) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29189, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29189 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29189
- **State**: PUBLISHED
- **Published Date**: April 09, 2025 at 00:00 UTC
- **Last Updated**: April 09, 2025 at 14:42 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Flowise <= 2.2.3 is vulnerable to SQL Injection. via tableName parameter at Postgres_VectorStores.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://drive.google.com/file/d/1WHPslTmQmAM9xPJifULS2qAo7hcidB4L/view?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3994, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3994
- **State**: PUBLISHED
- **Published Date**: October 03, 2018 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 23:50 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.2.0.9297. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
### Affected Products
**Foxit Software - Foxit PDF Reader**
Affected versions:
- 9.2.0.9297 (Status: affected)
### References
1. [1041769](http://www.securitytracker.com/id/1041769)
2. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0662) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45392, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45392
- **State**: PUBLISHED
- **Published Date**: February 14, 2022 at 16:25 UTC
- **Last Updated**: August 04, 2024 at 04:39 UTC
- **Reserved Date**: December 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Buffer Overflow vulnerability exists in Tenda Router AX12 V22.03.01.21_CN in the sub_422CE4 function in page /goform/setIPv6Status via the prefixDelegate parameter, which causes a Denial of Service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.tenda.com.cn/)
2. [](http://tendawifi.com/index.html)
3. [](https://www.tenda.com.cn/product/AX12.html)
4. [](https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30931, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30931
- **State**: PUBLISHED
- **Published Date**: June 14, 2022 at 15:45 UTC
- **Last Updated**: August 03, 2024 at 07:03 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Employee Leaves Management System (ELMS) V 2.1 is vulnerable to Cross Site Request Forgery (CSRF) via /myprofile.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.acunetix.com/vulnerabilities/web/possible-csrf-cross-site-request-forgery/)
2. [](https://medium.com/%40niteshbiwal2011/my-first-cve-2022-30931-e70b9cbecbba) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.