System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31219, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31219 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31219 - **State**: PUBLISHED - **Published Date**: May 12, 2025 at 21:42 UTC - **Last Updated**: May 13, 2025 at 17:43 UTC - **Reserved Date**: March 27, 2025 at 16:13 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with improved memory handling. This issue is fixed in watchOS 11.5, macOS Sonoma 14.7.6, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, macOS Ventura 13.7.6. An attacker may be able to cause unexpected system termination or corrupt kernel memory. ### Affected Products **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - iPadOS** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - visionOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/122720) 2. [](https://support.apple.com/en-us/122716) 3. [](https://support.apple.com/en-us/122405) 4. [](https://support.apple.com/en-us/122404) 5. [](https://support.apple.com/en-us/122717) 6. [](https://support.apple.com/en-us/122721) 7. [](https://support.apple.com/en-us/122722) 8. [](https://support.apple.com/en-us/122718)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12112, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12112 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12112 - **State**: PUBLISHED - **Published Date**: April 23, 2020 at 17:53 UTC - **Last Updated**: August 04, 2024 at 11:48 UTC - **Reserved Date**: April 23, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description BigBlueButton before 2.2.5 allows remote attackers to obtain sensitive files via Local File Inclusion. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://twitter.com/thibeault_chenu/status/1249976515917422593) 2. [](https://twitter.com/bigbluebutton/status/1252706369486180353) 3. [](https://github.com/bigbluebutton/bigbluebutton/compare/v2.2.4...v2.2.5) 4. [](https://cwe.mitre.org/data/definitions/23.html) 5. [](https://github.com/tchenu/CVE-2020-12112)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0893, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0893 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0893 - **State**: PUBLISHED - **Published Date**: May 24, 2024 at 06:42 UTC - **Last Updated**: August 01, 2024 at 18:18 UTC - **Reserved Date**: January 25, 2024 at 14:27 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Schema App Structured Data plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the MarkupUpdate function in all versions up to, and including, 2.1.0. This makes it possible for authenticated attackers, with subscriber access or higher, to update or delete post metadata. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Affected Products **vberkel - Schema App Structured Data** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1089ab17-b780-4840-8dcd-c50258513634?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/schema-app-structured-data-for-schemaorg/trunk/lib/SchemaEditor.php#L327) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3582, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3582 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3582 - **State**: PUBLISHED - **Published Date**: October 21, 2020 at 18:36 UTC - **Last Updated**: November 13, 2024 at 17:20 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Cisco - Cisco Adaptive Security Appliance (ASA) Software** Affected versions: - n/a (Status: affected) ### References 1. [20201021 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Cross-Site Scripting Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-multiple-FCB3vPZe)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10017, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10017 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10017 - **State**: PUBLISHED - **Published Date**: April 11, 2018 at 05:00 UTC - **Last Updated**: August 05, 2024 at 07:32 UTC - **Reserved Date**: April 11, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description soundlib/Snd_fx.cpp in OpenMPT before 1.27.07.00 and libopenmpt before 0.3.8 allows remote attackers to cause a denial of service (out-of-bounds read) via an IT or MO3 file with many nested pattern loops. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://openmpt.org/openmpt-1-27-07-00-released) 2. [](https://lib.openmpt.org/libopenmpt/2018/04/08/security-updates-0.3.8-0.2-beta31-0.2.7561-beta20.5-p8-0.2.7386-beta20.3-p11/) 3. [](https://github.com/OpenMPT/openmpt/commit/7ebf02af2e90f03e0dbd0e18b8b3164f372fb97c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7238, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7238 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7238 - **State**: PUBLISHED - **Published Date**: November 10, 2016 at 06:16 UTC - **Last Updated**: August 06, 2024 at 01:57 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 mishandle caching for NTLM password-change requests, which allows local users to gain privileges via a crafted application, aka "Windows NTLM Elevation of Privilege Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1037249](http://www.securitytracker.com/id/1037249) 2. [MS16-137](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-137) 3. [94045](http://www.securityfocus.com/bid/94045)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3266, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3266 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3266 - **State**: PUBLISHED - **Published Date**: July 24, 2008 at 15:18 UTC - **Last Updated**: August 07, 2024 at 09:28 UTC - **Reserved Date**: July 24, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in picture_pic_bv.asp in SoftAcid Hotel Reservation System (HRS) Multi allows remote attackers to execute arbitrary SQL commands via the key parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [hrsmulti-picturepicbv-sql-injection(43947)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43947) 2. [31170](http://secunia.com/advisories/31170) 3. [30316](http://www.securityfocus.com/bid/30316) 4. [ADV-2008-2154](http://www.vupen.com/english/advisories/2008/2154/references) 5. [4028](http://securityreason.com/securityalert/4028) 6. [6105](https://www.exploit-db.com/exploits/6105)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2358, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2358 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2358 - **State**: PUBLISHED - **Published Date**: February 20, 2017 at 08:35 UTC - **Last Updated**: August 05, 2024 at 13:48 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An issue was discovered in certain Apple products. macOS before 10.12.3 is affected. The issue involves the "Graphics Drivers" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.apple.com/HT207483) 2. [1037671](http://www.securitytracker.com/id/1037671) 3. [95723](http://www.securityfocus.com/bid/95723)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8198 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 13, 2015 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-36577, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-36577 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-36577 - **State**: PUBLISHED - **Published Date**: June 17, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 03:37 UTC - **Reserved Date**: May 30, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description apphp js-object-resolver < 3.1.1 is vulnerable to Prototype Pollution via Module.setNestedProperty. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/mestrtee/c90189f3d8480a5f267395ec40701373)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1327, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1327 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1327 - **State**: PUBLISHED - **Published Date**: February 04, 2021 at 16:42 UTC - **Last Updated**: November 08, 2024 at 23:46 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Cisco - Cisco Small Business RV Series Router Firmware** Affected versions: - n/a (Status: affected) ### References 1. [20210203 Cisco Small Business RV Series Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5205, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5205 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5205 - **State**: PUBLISHED - **Published Date**: January 19, 2017 at 05:43 UTC - **Last Updated**: August 06, 2024 at 00:53 UTC - **Reserved Date**: May 31, 2016 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac, incorrectly handles deferred page loads, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. ### Affected Products **n/a - Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac** Affected versions: - Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac (Status: affected) ### References 1. [RHSA-2016:2919](http://rhn.redhat.com/errata/RHSA-2016-2919.html) 2. [](https://crbug.com/646610) 3. [94633](http://www.securityfocus.com/bid/94633) 4. [](https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html) 5. [GLSA-201612-11](https://security.gentoo.org/glsa/201612-11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0768 - **State**: PUBLISHED - **Published Date**: April 02, 2003 at 05:00 UTC - **Last Updated**: August 08, 2024 at 03:03 UTC - **Reserved Date**: July 25, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in lukemftp FTP client in SuSE 6.4 through 8.0, and possibly other operating systems, allows a malicious FTP server to execute arbitrary code via a long PASV command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [lukemftp-pasv-bo(9130)](http://www.iss.net/security_center/static/9130.php) 2. [SuSE-SA:2002:018](http://www.novell.com/linux/security/advisories/2002_18_lukemftp.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0365, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0365 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0365 - **State**: PUBLISHED - **Published Date**: April 13, 2018 at 16:00 UTC - **Last Updated**: September 16, 2024 at 18:03 UTC - **Reserved Date**: November 29, 2016 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a XSS vulnerability in SearchHighlighter::highlightText() with non-default configurations. ### Affected Products **mediawiki - mediawiki** Affected versions: - n/a (Status: affected) ### References 1. [[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16](https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html) 2. [](https://phabricator.wikimedia.org/T144845) 3. [](https://security-tracker.debian.org/tracker/CVE-2017-0365)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41021, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41021 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41021 - **State**: PUBLISHED - **Published Date**: December 08, 2021 at 17:48 UTC - **Last Updated**: October 25, 2024 at 13:39 UTC - **Reserved Date**: September 13, 2021 at 00:00 UTC - **Assigned By**: fortinet ### Vulnerability Description A privilege escalation vulnerability in FortiNAC versions 8.8.8 and below and 9.1.2 and below may allow an admin user to escalate the privileges to root via the sudo command. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:X/RC:C` ### Affected Products **Fortinet - Fortinet FortiNAC** Affected versions: - FortiNAC 9.1.2, 9.1.1, 9.1.0, 8.8.8, 8.8.7, 8.8.6, 8.8.5, 8.8.4, 8.8.3, 8.8.2, 8.8.1, 8.8.0 (Status: affected) ### References 1. [](https://fortiguard.com/advisory/FG-IR-21-182)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14856, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14856 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14856 - **State**: PUBLISHED - **Published Date**: November 26, 2019 at 13:01 UTC - **Last Updated**: August 05, 2024 at 00:26 UTC - **Reserved Date**: August 10, 2019 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description ansible before versions 2.8.6, 2.7.14, 2.6.20 is vulnerable to a None ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **[UNKNOWN] - ansible** Affected versions: - 2.8.6 (Status: affected) - 2.7.14 (Status: affected) - 2.6.20 (Status: affected) ### References 1. [RHSA-2020:0756](https://access.redhat.com/errata/RHSA-2020:0756) 2. [openSUSE-SU-2020:0513](http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html) 3. [openSUSE-SU-2020:0523](http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14856)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34121, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34121 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34121 - **State**: PUBLISHED - **Published Date**: July 18, 2023 at 00:00 UTC - **Last Updated**: October 28, 2024 at 17:04 UTC - **Reserved Date**: June 07, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An Out of Bounds flaw was discovered in htmodoc 1.9.12 in function parse_tree() in toc.cxx, this possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/michaelrsweet/htmldoc/issues/433) 2. [](https://github.com/michaelrsweet/htmldoc/commit/c67bbd8756f015e33e4ba639a40c7f9d8bd9e8ab)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8755, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8755 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8755 - **State**: PUBLISHED - **Published Date**: September 13, 2017 at 01:00 UTC - **Last Updated**: September 16, 2024 at 16:39 UTC - **Reserved Date**: May 03, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8756, and CVE-2017-11764. ### Affected Products **Microsoft Corporation - Microsoft Edge** Affected versions: - Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016. (Status: affected) ### References 1. [1039342](http://www.securitytracker.com/id/1039342) 2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8755) 3. [42766](https://www.exploit-db.com/exploits/42766/) 4. [100778](http://www.securityfocus.com/bid/100778)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1884, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1884 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1884 - **State**: PUBLISHED - **Published Date**: July 13, 2011 at 23:00 UTC - **Last Updated**: August 06, 2024 at 22:46 UTC - **Reserved Date**: May 04, 2011 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Use After Free Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS11-054](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-054) 2. [oval:org.mitre.oval:def:12873](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12873) 3. [](http://support.avaya.com/css/P8/documents/100144947) 4. [TA11-193A](http://www.us-cert.gov/cas/techalerts/TA11-193A.html) 5. [73784](http://osvdb.org/73784) 6. [45186](http://secunia.com/advisories/45186) 7. [1025761](http://www.securitytracker.com/id?1025761) 8. [48596](http://www.securityfocus.com/bid/48596)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2595, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2595 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2595 - **State**: PUBLISHED - **Published Date**: July 16, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 05:17 UTC - **Reserved Date**: March 20, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle OLAP component in Oracle Database Server 12.1.0.1 and 12.1.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html) 2. [1032903](http://www.securitytracker.com/id/1032903)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26646, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26646 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26646 - **State**: PUBLISHED - **Published Date**: March 30, 2022 at 22:47 UTC - **Last Updated**: August 03, 2024 at 05:11 UTC - **Reserved Date**: March 07, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Online Banking System Protect v1.0 was discovered to contain a local file inclusion (LFI) vulnerability via the pages parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://online.com) 2. [](https://github.com/erik-451/CVE/blob/main/CVE-2022-26646/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17605, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17605 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17605 - **State**: PUBLISHED - **Published Date**: December 13, 2017 at 09:00 UTC - **Last Updated**: August 05, 2024 at 20:59 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Consumer Complaints Clone Script 1.0 has SQL Injection via the other-user-profile.php id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com/files/145310/Consumer-Complaints-Clone-Script-1.0-SQL-Injection.html) 2. [43274](https://www.exploit-db.com/exploits/43274/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39682, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39682 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39682 - **State**: PUBLISHED - **Published Date**: July 17, 2024 at 23:47 UTC - **Last Updated**: August 02, 2024 at 04:26 UTC - **Reserved Date**: June 27, 2024 at 18:44 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to HTML Injection in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary HTML in pages that will be shown whenever a user accesses a compromised page. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-116: Security Weakness ### Affected Products **XjSv - Cooked** Affected versions: - < 1.8.0 (Status: affected) ### References 1. [https://github.com/XjSv/Cooked/security/advisories/GHSA-fx69-f77x-84gr](https://github.com/XjSv/Cooked/security/advisories/GHSA-fx69-f77x-84gr)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-42406, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-42406 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-42406 - **State**: PUBLISHED - **Published Date**: October 26, 2023 at 00:00 UTC - **Last Updated**: September 10, 2024 at 19:36 UTC - **Reserved Date**: September 08, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in D-Link Online behavior audit gateway DAR-7000 V31R02B1413C allows a remote attacker to obtain sensitive information and execute arbitrary code via the editrole.php component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000_sql_:sysmanage:editrole.php.md) 2. [](https://github.com/1dreamGN/CVE/blob/main/CVE-2023-42406.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21183, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21183 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21183 - **State**: REJECTED - **Last Updated**: May 28, 2025 at 18:19 UTC - **Reserved Date**: February 18, 2022 at 21:23 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1017, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1017 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1017 - **State**: PUBLISHED - **Published Date**: September 12, 2001 at 04:00 UTC - **Last Updated**: August 01, 2024 at 16:55 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Seattle Labs Emurl 2.0, and possibly earlier versions, stores e-mail attachments in a specific directory with scripting enabled, which allows a malicious ASP file attachment to execute when the recipient opens the message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [544](http://www.securityfocus.com/bid/544) 2. [19990728 Seattle Labs EMURL Vulnerability](http://marc.info/?l=ntbugtraq&m=93316253431588&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4212, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4212 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4212 - **State**: PUBLISHED - **Published Date**: August 22, 2023 at 17:34 UTC - **Last Updated**: January 16, 2025 at 21:30 UTC - **Reserved Date**: August 07, 2023 at 15:55 UTC - **Assigned By**: icscert ### Vulnerability Description ​A command injection vulnerability exists in Trane XL824, XL850, XL1050, and Pivot thermostats allowing an attacker to execute arbitrary commands as root using a specially crafted filename. The vulnerability requires physical access to the device via a USB stick. ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-74: Security Weakness ### Affected Products **​Trane Technologies - XL824 Thermostat** Affected versions: - 0 (Status: affected) **​Trane Technologies - XL850 Thermostat** Affected versions: - 0 (Status: affected) **​Trane Technologies - XL1050 Thermostat** Affected versions: - 0 (Status: affected) **Trane Technologies - Pivot Thermostat** Affected versions: - 0 (Status: affected) ### References 1. [](https://https://www.cisa.gov/news-events/ics-advisories/icsa-23-234-02) 2. [](https://hub.tranetechnologies.com/docs/DOC-216377) 3. [](https://www.trane.com/commercial/north-america/us/en/contact-us/locate-sales-offices.html) ### Credits - Houlton McGuinn reported this vulnerability to Trane.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27637, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27637 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27637 - **State**: PUBLISHED - **Published Date**: March 05, 2025 at 00:00 UTC - **Last Updated**: April 23, 2025 at 15:52 UTC - **Reserved Date**: March 05, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.1002 Application 20.0.2614 allows Cross-Site Scripting V-2024-016. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm) 2. [](https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0330, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0330 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0330 - **State**: PUBLISHED - **Published Date**: February 06, 2014 at 23:00 UTC - **Last Updated**: August 06, 2024 at 09:13 UTC - **Reserved Date**: December 05, 2013 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Cross-site scripting (XSS) vulnerability in adminui/user_list.php on the Dell KACE K1000 management appliance 5.5.90545 allows remote attackers to inject arbitrary web script or HTML via the LABEL_ID parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [65333](http://www.securityfocus.com/bid/65333) 2. [102855](http://osvdb.org/102855) 3. [kace-cve20140330-xss(90954)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90954) 4. [VU#813382](http://www.kb.cert.org/vuls/id/813382)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15638, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15638 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15638 - **State**: PUBLISHED - **Published Date**: November 09, 2017 at 19:00 UTC - **Last Updated**: August 05, 2024 at 19:57 UTC - **Reserved Date**: October 19, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The SuSEfirewall2 package before 3.6.312-2.13.1 in SUSE Linux Enterprise (SLE) Desktop 12 SP2, Server 12 SP2, and Server for Raspberry Pi 12 SP2; before 3.6.312.333-3.10.1 in SLE Desktop 12 SP3 and Server 12 SP3; before 3.6_SVNr208-2.18.3.1 in SLE Server 11 SP4; before 3.6.312-5.9.1 in openSUSE Leap 42.2; and before 3.6.312.333-7.1 in openSUSE Leap 42.3 might allow remote attackers to bypass intended access restrictions on the portmap service by leveraging a missing source net restriction for _rpc_ services. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openSUSE-SU-2017:2940](http://lists.opensuse.org/opensuse-updates/2017-11/msg00014.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1372, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1372 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1372 - **State**: PUBLISHED - **Published Date**: May 02, 2022 at 18:08 UTC - **Last Updated**: April 16, 2025 at 16:26 UTC - **Reserved Date**: April 14, 2022 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in dlSlog.aspx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Delta Electronics - DIAEnergie** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-081-01) ### Credits - Michael Heinzl and Dusan Stevanovic of Trend Micro’s Zero Day Initiative reported these vulnerabilities to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5250, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5250 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5250 - **State**: PUBLISHED - **Published Date**: September 08, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 06:41 UTC - **Reserved Date**: July 01, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The API server in OpenShift Origin 1.0.5 allows remote attackers to cause a denial of service (master process crash) via crafted JSON data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/openshift/origin/issues/4374) 2. [RHSA-2015:1736](https://access.redhat.com/errata/RHSA-2015:1736) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1259867)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18427, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18427 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18427 - **State**: PUBLISHED - **Published Date**: October 17, 2018 at 04:00 UTC - **Last Updated**: August 05, 2024 at 11:08 UTC - **Reserved Date**: October 16, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description s-cms 3.0 allows SQL Injection via the member/post.php 0_id parameter or the POST data to member/member_login.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.s-cms.cn/update.html) 2. [](http://www.ttk7.cn/post-92.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43477, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43477 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43477 - **State**: PUBLISHED - **Published Date**: August 23, 2024 at 01:14 UTC - **Last Updated**: May 21, 2025 at 21:06 UTC - **Reserved Date**: August 14, 2024 at 01:08 UTC - **Assigned By**: microsoft ### Vulnerability Description Improper access control in Decentralized Identity Services resulted in a vulnerability that allows an unauthenticated attacker to disable Verifiable ID's on another tenant. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Microsoft - Microsoft Entra** Affected versions: - N/A (Status: affected) ### References 1. [Microsoft Entra ID Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43477)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2133 - **State**: PUBLISHED - **Published Date**: June 02, 2010 at 18:14 UTC - **Last Updated**: August 07, 2024 at 02:25 UTC - **Reserved Date**: June 02, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in contact.php in My Little Forum allows remote attackers to execute arbitrary SQL commands via the id parameter, a different vector than CVE-2007-2942. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [mylittleforum-contact-sql-injection(56618)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56618) 2. [38485](http://www.securityfocus.com/bid/38485) 3. [11616](http://www.exploit-db.com/exploits/11616) 4. [](http://packetstormsecurity.org/1003-exploits/mlf-sql.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47355, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47355 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47355 - **State**: PUBLISHED - **Published Date**: February 06, 2023 at 05:27 UTC - **Last Updated**: March 26, 2025 at 14:28 UTC - **Reserved Date**: December 13, 2022 at 05:23 UTC - **Assigned By**: Unisoc ### Vulnerability Description In log service, there is a missing permission check. This could lead to local denial of service in log service. ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000** Affected versions: - Android10/Android11/Android12 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1621031430231134210)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26925, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26925 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26925 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 13:21 UTC - **Last Updated**: February 26, 2025 at 14:28 UTC - **Reserved Date**: February 17, 2025 at 11:51 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Required Admin Menu Manager allows Cross Site Request Forgery.This issue affects Admin Menu Manager: from n/a through 1.0.3. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Required - Admin Menu Manager** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/admin-menu-manager/vulnerability/wordpress-admin-menu-manager-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Nguyen Thi Huyen Trang - Skalucy (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-9058, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-9058 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-9058 - **State**: PUBLISHED - **Published Date**: March 26, 2019 at 16:40 UTC - **Last Updated**: August 04, 2024 at 21:38 UTC - **Reserved Date**: February 23, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in CMS Made Simple 2.2.8. In the administrator page admin/changegroupperm.php, it is possible to send a crafted value in the sel_groups parameter that leads to authenticated object injection. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.cmsmadesimple.org/2019/03/Announcing-CMS-Made-Simple-v2.2.10-Spuzzum) 2. [](https://newsletter.cmsmadesimple.org/w/89247Qog4jCRCuRinvhsofwg)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25969, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25969 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25969 - **State**: PUBLISHED - **Published Date**: March 17, 2022 at 17:15 UTC - **Last Updated**: August 03, 2024 at 04:56 UTC - **Reserved Date**: March 14, 2022 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description The installer of WPS Office Version 10.8.0.6186 insecurely load VERSION.DLL (or some other DLLs), allowing an attacker to execute arbitrary code with the privilege of the user invoking the installer. ### Weakness Classification (CWE) - CWE-427: Security Weakness ### Affected Products **KINGSOFT JAPAN, INC. - The installer of WPS Office** Affected versions: - Reported for Version 10.8.0.6186 (Status: affected) ### References 1. [](https://support.kingsoft.jp/support-info/weakness.html) 2. [JVN#21234459: Multiple vulnerabilities in KINGSOFT 'WPS Office' and 'KINGSOFT Internet Security'](https://jvn.jp/en/jp/JVN21234459/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40490, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40490 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40490 - **State**: PUBLISHED - **Published Date**: February 06, 2025 at 00:00 UTC - **Last Updated**: February 06, 2025 at 21:07 UTC - **Reserved Date**: September 11, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tiny File Manager v2.4.7 and below was discovered to contain a Cross Site Scripting (XSS) vulnerability. This vulnerability allows attackers to execute arbitrary code via a crafted payload injected into the name of an uploaded or already existing file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/prasathmani/tinyfilemanager) 2. [](https://github.com/whitej3rry/CVE-2022-40490/blob/main/PoC.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0796, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0796 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0796 - **State**: PUBLISHED - **Published Date**: April 20, 2011 at 03:09 UTC - **Last Updated**: September 17, 2024 at 03:49 UTC - **Reserved Date**: February 04, 2011 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Applications Install component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.1, 12.1.2, and 12.1.3 allows local users to affect confidentiality via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21128, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21128 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21128 - **State**: PUBLISHED - **Published Date**: June 15, 2023 at 00:00 UTC - **Last Updated**: December 18, 2024 at 16:34 UTC - **Reserved Date**: November 03, 2022 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In various functions of AppStandbyController.java, there is a possible way to break manageability scenarios due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-272042183 ### Affected Products **n/a - Android** Affected versions: - Android-11 Android-12 Android-12L Android-13 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2023-06-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9847, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9847 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9847 - **State**: PUBLISHED - **Published Date**: June 24, 2017 at 17:00 UTC - **Last Updated**: September 17, 2024 at 00:45 UTC - **Reserved Date**: June 24, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The bdecode function in bdecode.cpp in libtorrent 1.1.3 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/arvidn/libtorrent/issues/2099)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-38658, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-38658 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-38658 - **State**: PUBLISHED - **Published Date**: December 22, 2022 at 18:52 UTC - **Last Updated**: April 15, 2025 at 14:34 UTC - **Reserved Date**: August 22, 2022 at 16:31 UTC - **Assigned By**: HCL ### Vulnerability Description BigFix deployments that have installed the Notification Service on Windows are susceptible to disclosing SMTP BigFix operator's sensitive data in clear text. Operators who use Notification Service related content from BES Support are at risk of leaving their SMTP sensitive data exposed. ### CVSS Metrics - **CVSS Base Score**: 7.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H` ### Affected Products **HCL Software - BigFix Server Automation** Affected versions: - <=3.2.1 (Status: affected) ### References 1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0102117)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0503, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0503 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0503 - **State**: PUBLISHED - **Published Date**: February 21, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:13 UTC - **Reserved Date**: February 21, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description uim before 0.4.5.1 trusts certain environment variables when libUIM is used in setuid or setgid applications, which allows local users to gain privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[uim] 20050220 uim 0.4.5.1 released](http://lists.freedesktop.org/archives/uim/2005-February/000996.html) 2. [MDKSA-2005:046](http://www.mandriva.com/security/advisories?name=MDKSA-2005:046) 3. [12604](http://www.securityfocus.com/bid/12604) 4. [13981](http://secunia.com/advisories/13981)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-22164, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-22164 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-22164 - **State**: PUBLISHED - **Published Date**: January 09, 2024 at 17:01 UTC - **Last Updated**: June 03, 2025 at 14:31 UTC - **Reserved Date**: January 05, 2024 at 16:53 UTC - **Assigned By**: Splunk ### Vulnerability Description In Splunk Enterprise Security (ES) versions below 7.1.2, an attacker can use investigation attachments to perform a denial of service (DoS) to the Investigation. The attachment endpoint does not properly limit the size of the request which lets an attacker cause the Investigation to become inaccessible. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Affected Products **Splunk - Splunk Enterprise Security (ES)** Affected versions: - 7.3 (Status: affected) - 7.2 (Status: affected) - 7.1 (Status: affected) ### References 1. [](https://advisory.splunk.com/advisories/SVD-2024-0101) 2. [](https://research.splunk.com/application/bb85b25e-2d6b-4e39-bd27-50db42edcb8f/) ### Credits - Vikram Ashtaputre, Splunk
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38990, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38990 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38990 - **State**: PUBLISHED - **Published Date**: July 01, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 04:19 UTC - **Reserved Date**: June 21, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tada5hi sp-common v0.5.4 was discovered to contain a prototype pollution via the function mergeDeep. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/mestrtee/ae5f6b0d8f5d7de716e6af6d189b2169)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45368, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45368 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45368 - **State**: PUBLISHED - **Published Date**: May 17, 2024 at 06:28 UTC - **Last Updated**: August 03, 2024 at 14:09 UTC - **Reserved Date**: November 14, 2022 at 12:58 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Lenderd 1003 Mortgage Application allows Relative Path Traversal.This issue affects 1003 Mortgage Application: from n/a through 1.75. ### CVSS Metrics - **CVSS Base Score**: 7.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Lenderd - 1003 Mortgage Application** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/1003-mortgage-application/wordpress-1003-mortgage-application-plugin-1-73-local-file-inclusion?_s_id=cve) ### Credits - Rodrigo Escobar - ipax (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2251, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2251 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2251 - **State**: PUBLISHED - **Published Date**: July 20, 2011 at 23:00 UTC - **Last Updated**: August 06, 2024 at 22:53 UTC - **Reserved Date**: June 02, 2011 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.3.0.3 allows remote attackers to affect integrity via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [TA11-201A](http://www.us-cert.gov/cas/techalerts/TA11-201A.html) 2. [](http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47967, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47967 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47967 - **State**: PUBLISHED - **Published Date**: October 07, 2024 at 21:06 UTC - **Last Updated**: December 11, 2024 at 19:17 UTC - **Reserved Date**: October 07, 2024 at 18:03 UTC - **Assigned By**: Solidigm ### Vulnerability Description Improper resource initialization handling in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Solidigm - D7-P5510** Affected versions: - JCV1NX93 (Status: unaffected) - JCV1NP93 (Status: unaffected) - JCV1NQ93 (Status: unaffected) - JCV10400 (Status: unaffected) - JCV10404 (Status: unaffected) **Solidigm - D7-P5520** Affected versions: - 9CV1AP18 (Status: unaffected) - 9CV10314 (Status: unaffected) - 9CV10410 (Status: unaffected) - 4IAAHPK5 (Status: unaffected) - 9CV1MA70 (Status: unaffected) - 9CV1R410 (Status: unaffected) **Solidigm - D7-P5620** Affected versions: - 9CV1AP18 (Status: unaffected) - 1.0.0-9CV10314 (Status: unaffected) - 9CV10410 (Status: unaffected) - 4IAAHPK5 (Status: unaffected) **Solidigm - D7-P5500** Affected versions: - 2CV10C034 (Status: unaffected) - 1.3.0-2CV10300 (Status: unaffected) - 2CV1L031 (Status: unaffected) - 2CV1RC53 (Status: unaffected) - 2CV10300 (Status: unaffected) **Solidigm - D7-P5600** Affected versions: - 2CV10C034 (Status: unaffected) - 1.3.0-2CV10300 (Status: unaffected) - 2CV1L031 (Status: unaffected) - 2CV10300 (Status: unaffected) ### References 1. [](https://www.solidigm.com/support-page/support-security.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26317, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26317 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26317 - **State**: PUBLISHED - **Published Date**: August 02, 2023 at 00:00 UTC - **Last Updated**: October 16, 2024 at 20:07 UTC - **Reserved Date**: February 22, 2023 at 00:00 UTC - **Assigned By**: Xiaomi ### Vulnerability Description Xiaomi routers have an external interface that can lead to command injection. The vulnerability is caused by lax filtering of responses from external interfaces. Attackers can exploit this vulnerability to gain access to the router by hijacking the ISP or upper-layer routing. ### CVSS Metrics - **CVSS Base Score**: 7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Xiaomi - Xiaomi router** Affected versions: - Xiaomi Router Firmware version before 2023.2 (Status: affected) ### References 1. [](https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=529)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10491, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10491 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10491 - **State**: PUBLISHED - **Published Date**: April 18, 2018 at 14:00 UTC - **Last Updated**: September 17, 2024 at 01:35 UTC - **Reserved Date**: August 16, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SD 845, SD 850, and SDX20, an integer overflow leading to buffer overflow can occur in a QuRT API function. ### Affected Products **Qualcomm, Inc. - Snapdragon Mobile, Snapdragon Wear** Affected versions: - MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SD 845, SD 850, SDX20, , , , , (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-04-01) 2. [103671](http://www.securityfocus.com/bid/103671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6885, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6885 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6885 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 10, 2015 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0661, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0661 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0661 - **State**: PUBLISHED - **Published Date**: July 13, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 00:24 UTC - **Reserved Date**: July 12, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer signedness error in D-Link AirPlus DI-614+ running firmware 2.30 and earlier allows remote attackers to cause a denial of service (IP lease depletion) via a DHCP request with the LEASETIME option set to -1, which makes the DHCP lease valid for thirteen or more years. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [10621](http://www.securityfocus.com/bid/10621) 2. [20040628 DLINK 614+ - SOHO routers, DHCP service DOS](http://marc.info/?l=bugtraq&m=108844250013785&w=2) 3. [7294](http://www.osvdb.org/7294) 4. [12018](http://secunia.com/advisories/12018) 5. [dlink-dhcp-request-dos(16531)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16531) 6. [20040629 Re: DLINK 614+ - SOHO routers, system DOS](http://www.securityfocus.com/archive/1/367485)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27366, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27366 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27366 - **State**: PUBLISHED - **Published Date**: September 09, 2024 at 00:00 UTC - **Last Updated**: March 25, 2025 at 15:52 UTC - **Reserved Date**: February 25, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Samsung Mobile Processor, Wearable Processor Exynos Exynos 980, Exynos 850, Exynos 1080, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 1480, Exynos W920, Exynos W930. In the function slsi_rx_scan_done_ind(), there is no input validation check on a length coming from userspace, which can lead to a potential heap over-read. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AC:L/AV:L/A:N/C:H/I:N/PR:H/S:U/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://semiconductor.samsung.com/support/quality-support/product-security-updates/) 2. [](https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-27366/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46916, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46916 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46916 - **State**: PUBLISHED - **Published Date**: December 07, 2023 at 00:00 UTC - **Last Updated**: October 10, 2024 at 17:43 UTC - **Reserved Date**: October 30, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Maxima Max Pro Power 1.0 486A devices allow BLE traffic replay. An attacker can use GATT characteristic handle 0x0012 to perform potentially disruptive actions such as starting a Heart Rate monitor. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.maximawatches.com/products/max-pro-power) 2. [](http://packetstormsecurity.com/files/175660)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39378, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39378 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39378 - **State**: PUBLISHED - **Published Date**: September 11, 2024 at 16:07 UTC - **Last Updated**: September 13, 2024 at 03:55 UTC - **Reserved Date**: June 24, 2024 at 20:32 UTC - **Assigned By**: adobe ### Vulnerability Description Audition versions 24.4.1, 23.6.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Adobe - Audition** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/audition/apsb24-54.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7797 - **State**: PUBLISHED - **Published Date**: February 17, 2016 at 02:00 UTC - **Last Updated**: August 06, 2024 at 07:58 UTC - **Reserved Date**: October 09, 2015 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Cybozu Office 9.0.0 through 10.3.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-7795, CVE-2015-7796, CVE-2015-7798, CVE-2016-1149, and CVE-2016-1150. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [JVNDB-2016-000026](http://jvndb.jvn.jp/jvndb/JVNDB-2016-000026) 2. [](https://cs.cybozu.co.jp/2015/006072.html) 3. [](https://cs.cybozu.co.jp/2015/006087.html) 4. [](https://cs.cybozu.co.jp/2016/006107.html) 5. [JVN#69278491](http://jvn.jp/en/jp/JVN69278491/index.html) 6. [](https://cs.cybozu.co.jp/2016/006109.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8437, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8437 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8437 - **State**: PUBLISHED - **Published Date**: January 12, 2017 at 20:00 UTC - **Last Updated**: August 06, 2024 at 02:20 UTC - **Reserved Date**: October 05, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description Improper input validation in Access Control APIs. Access control API may return memory range checking incorrectly. Product: Android. Versions: Kernel 3.18. Android ID: A-31623057. References: QC-CR#1009695. ### Affected Products **Google Inc. - Android** Affected versions: - Kernel-3.18 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-01-01.html) 2. [95227](http://www.securityfocus.com/bid/95227)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12028, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12028 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12028 - **State**: PUBLISHED - **Published Date**: December 06, 2024 at 08:24 UTC - **Last Updated**: December 06, 2024 at 17:23 UTC - **Reserved Date**: December 02, 2024 at 15:04 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Friends plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several REST API endpoints in all versions up to, and including, 3.2.1. This makes it possible for unauthenticated attackers to send arbitrary friend requests on behalf of another website, accept the friend request for the targeted website, and then communicate with the site as an accepted friend. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **akirk - Friends** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/980b16d4-3c4a-4ed1-af46-f39f3ec6dd19?source=cve) 2. [](https://wordpress.org/plugins/friends/#developers) ### Credits - Colin Xu
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9475, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9475 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9475 - **State**: PUBLISHED - **Published Date**: May 07, 2020 at 20:29 UTC - **Last Updated**: August 04, 2024 at 10:26 UTC - **Reserved Date**: February 28, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The S. Siedle & Soehne SG 150-0 Smart Gateway before 1.2.4 allows local privilege escalation via a race condition in logrotate. By using an exploit chain, an attacker with access to the network can get root access on the gateway. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://research.hisolutions.com/2020/04/open-the-gates-insecurity-of-cloudless-smart-door-systems/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31323, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31323 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31323 - **State**: PUBLISHED - **Published Date**: May 18, 2021 at 19:43 UTC - **Last Updated**: August 03, 2024 at 22:55 UTC - **Reserved Date**: April 15, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the LottieParserImpl::parseDashProperty function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.shielder.it/blog/2021/02/hunting-for-bugs-in-telegrams-animated-stickers-remote-attack-surface/) 2. [](https://www.shielder.it/advisories/telegram-rlottie-lottieparserimpl-parsedashproperty-heap-buffer-overflow/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4813, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4813 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4813 - **State**: PUBLISHED - **Published Date**: October 09, 2006 at 21:00 UTC - **Last Updated**: August 08, 2024 at 00:01 UTC - **Reserved Date**: October 09, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Report Application Server (Crystalras.exe) before 11.0.0.1370, as used in Business Objects Crystal Reports XI, Crystal Reports Server XI, and BusinessObjects Enterprise XI, allows remote attackers to cause a denial of service (application hang) via certain network traffic, possibly involving multiple simultaneous TCP connections. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1014605](http://securitytracker.com/id?1014605) 2. [1014604](http://securitytracker.com/id?1014604) 3. [](http://support.businessobjects.com/downloads/critical_updates/security_bulletin_june05.asp) 4. [14433](http://www.securityfocus.com/bid/14433) 5. [](http://support.businessobjects.com/library/kbase/articles/c2017748.asp) 6. [business-object-crystal-server-dos(21654)](https://exchange.xforce.ibmcloud.com/vulnerabilities/21654) 7. [18473](http://www.osvdb.org/18473) 8. [16282](http://secunia.com/advisories/16282)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-28453, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-28453 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-28453 - **State**: PUBLISHED - **Published Date**: August 02, 2022 at 13:25 UTC - **Last Updated**: September 16, 2024 at 19:46 UTC - **Reserved Date**: November 12, 2020 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description This affects all versions of package npos-tesseract. The injection point is located in line 55 in lib/ocr.js. ### CVSS Metrics - **CVSS Base Score**: 9.4/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C` ### Affected Products **n/a - npos-tesseract** Affected versions: - 0 (Status: affected) ### References 1. [](https://security.snyk.io/vuln/SNYK-JS-NPOSTESSERACT-1051031) ### Credits - JHU System Security Lab
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1973, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1973 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1973 - **State**: PUBLISHED - **Published Date**: May 10, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:07 UTC - **Reserved Date**: May 04, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description DiGi Web Server allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request that contains a large number of / (slash) characters, which consumes resources when DiGi converts the slashes to \ (backslash) characters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [10228](http://www.securityfocus.com/bid/10228) 2. [11490](http://secunia.com/advisories/11490) 3. [5702](http://www.osvdb.org/5702) 4. [20040427 resources consumption in DiGi WWW Server](http://marc.info/?l=bugtraq&m=108311170018203&w=2) 5. [](http://sourceforge.net/project/shownotes.php?release_id=234261) 6. [digi-www-slash-dos(15987)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15987) 7. [1009957](http://securitytracker.com/alerts/2004/Apr/1009957.html) 8. [](http://www.autistici.org/fdonato/advisory/DiGiWwwServerC1-adv.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45639, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45639 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45639 - **State**: PUBLISHED - **Published Date**: October 16, 2023 at 09:32 UTC - **Last Updated**: September 16, 2024 at 15:55 UTC - **Reserved Date**: October 10, 2023 at 09:58 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Codex-m Sort SearchResult By Title plugin <= 10.0 versions. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Codex-m - Sort SearchResult By Title** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/sort-searchresult-by-title/wordpress-sort-searchresult-by-title-plugin-10-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Skalucy (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4170, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4170 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4170 - **State**: PUBLISHED - **Published Date**: December 09, 2022 at 00:00 UTC - **Last Updated**: April 14, 2025 at 18:11 UTC - **Reserved Date**: November 28, 2022 at 00:00 UTC - **Assigned By**: fedora ### Vulnerability Description The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set. ### Weakness Classification (CWE) - CWE-74: Security Weakness ### Affected Products **n/a - rxvt-unicode** Affected versions: - rxvt-unicode 9.30 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2151597) 2. [](https://www.openwall.com/lists/oss-security/2022/12/05/1) 3. [GLSA-202310-20](https://security.gentoo.org/glsa/202310-20)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38309, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38309 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38309 - **State**: PUBLISHED - **Published Date**: July 31, 2023 at 00:00 UTC - **Last Updated**: October 22, 2024 at 17:49 UTC - **Reserved Date**: July 14, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Webmin 2.021. A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the package search functionality. The vulnerability allows an attacker to inject a malicious payload in the "Search for Package" field, which gets reflected back in the application's response, leading to the execution of arbitrary JavaScript code within the context of the victim's browser. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://webmin.com/tags/webmin-changelog/) 2. [](https://github.com/jaysharma786/Webmin-2.021/blob/main/CVE-2023-38309)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0052 - **State**: PUBLISHED - **Published Date**: February 11, 2015 at 02:00 UTC - **Last Updated**: August 06, 2024 at 03:55 UTC - **Reserved Date**: November 18, 2014 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0027, CVE-2015-0035, CVE-2015-0039, and CVE-2015-0068. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1031723](http://www.securitytracker.com/id/1031723) 2. [72420](http://www.securityfocus.com/bid/72420) 3. [MS15-009](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1010, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1010 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1010 - **State**: PUBLISHED - **Published Date**: February 24, 2023 at 10:34 UTC - **Last Updated**: August 02, 2024 at 05:32 UTC - **Reserved Date**: February 24, 2023 at 10:33 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical was found in vox2png 1.0. Affected by this vulnerability is an unknown functionality of the file vox2png.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221743. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **n/a - vox2png** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.221743) 2. [](https://vuldb.com/?ctiid.221743) 3. [](https://github.com/10cksYiqiyinHangzhouTechnology/vox2png/blob/main/README.md) ### Credits - 10cksYiqiyinHangzhouTechnology (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24381, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24381 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24381 - **State**: PUBLISHED - **Published Date**: August 23, 2022 at 05:08 UTC - **Last Updated**: September 16, 2024 at 17:18 UTC - **Reserved Date**: February 24, 2022 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description All versions of package asneg/opcuastack are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P` ### Affected Products **n/a - ASNeG/OpcUaStack** Affected versions: - 0 (Status: affected) ### References 1. [](https://security.snyk.io/vuln/SNYK-UNMANAGED-ASNEGOPCUASTACK-2988735) ### Credits - Vera Mens - Uri Katz - Sharon Brizinov of Team82 (Claroty Research)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5132, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5132 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5132 - **State**: PUBLISHED - **Published Date**: March 27, 2018 at 21:00 UTC - **Last Updated**: August 06, 2024 at 11:34 UTC - **Reserved Date**: July 30, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Avolve Software ProjectDox 8.1 allows remote attackers to enumerate users via vectors related to email addresses. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [projectdox-cve20145132-info-disc(95737)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95737) 2. [20140903 Avolve Software ProjectDox Multiple Vulnerability Disclosure](http://www.securityfocus.com/archive/1/533345/100/0/threaded) 3. [](http://packetstormsecurity.com/files/128157/ProjectDox-8.1-XSS-User-Enumeration-Ciphertext-Reuse.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21479, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21479 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21479 - **State**: PUBLISHED - **Published Date**: April 19, 2022 at 20:38 UTC - **Last Updated**: September 24, 2024 at 20:07 UTC - **Reserved Date**: November 15, 2021 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server and unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 8.0.28 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2022.html) 2. [](https://security.netapp.com/advisory/ntap-20220429-0005/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8959, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8959 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8959 - **State**: PUBLISHED - **Published Date**: October 24, 2024 at 11:34 UTC - **Last Updated**: October 24, 2024 at 20:36 UTC - **Reserved Date**: September 17, 2024 at 21:12 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP Adminify – Custom WordPress Dashboard, Login and Admin Customizer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 4.0.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **litonice13 - WP Adminify – Custom WordPress Dashboard, Login and Admin Customizer** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/68094545-0e2a-429d-95b7-bfa86eca1caa?source=cve) 2. [](https://wordpress.org/plugins/adminify/#developers) 3. [](https://wpadminify.com/changelogs) 4. [](https://plugins.trac.wordpress.org/changeset/3165558/) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1688, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1688 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1688 - **State**: PUBLISHED - **Published Date**: June 06, 2022 at 08:51 UTC - **Last Updated**: August 03, 2024 at 00:10 UTC - **Reserved Date**: May 12, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Note Press WordPress plugin through 0.1.10 does not sanitise and escape the id parameter before using it in various SQL statement via the admin dashboard, leading to SQL Injections ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Unknown - Note Press** Affected versions: - 0.1.10 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/63d4444b-9b04-47f5-a692-c6c6c8ea7d92) 2. [](https://bulletin.iese.de/post/note-press_0-1-10_1) ### Credits - Daniel Krohmer (Fraunhofer IESE) - Shi Chen (University of Kaiserslautern)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10015, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10015 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10015 - **State**: PUBLISHED - **Published Date**: November 16, 2024 at 03:20 UTC - **Last Updated**: November 16, 2024 at 15:14 UTC - **Reserved Date**: October 16, 2024 at 00:05 UTC - **Assigned By**: Wordfence ### Vulnerability Description The ConvertCalculator for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' and 'type' parameters in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **jorisderuiter - ConvertCalculator for WordPress** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c1f55b51-cc93-4f45-9666-03740e147277?source=cve) 2. [](https://wordpress.org/plugins/convertcalculator/#developers) ### Credits - Peter Thaleikis
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-46675, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-46675 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-46675 - **State**: PUBLISHED - **Published Date**: September 13, 2024 at 05:29 UTC - **Last Updated**: May 04, 2025 at 09:31 UTC - **Reserved Date**: September 11, 2024 at 15:12 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: core: Prevent USB core invalid event buffer address access This commit addresses an issue where the USB core could access an invalid event buffer address during runtime suspend, potentially causing SMMU faults and other memory issues in Exynos platforms. The problem arises from the following sequence. 1. In dwc3_gadget_suspend, there is a chance of a timeout when moving the USB core to the halt state after clearing the run/stop bit by software. 2. In dwc3_core_exit, the event buffer is cleared regardless of the USB core's status, which may lead to an SMMU faults and other memory issues. if the USB core tries to access the event buffer address. To prevent this hardware quirk on Exynos platforms, this commit ensures that the event buffer address is not cleared by software when the USB core is active during runtime suspend by checking its status before clearing the buffer address. ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 4.19.321 (Status: unaffected) - 5.4.283 (Status: unaffected) - 5.10.225 (Status: unaffected) - 5.15.166 (Status: unaffected) - 6.1.108 (Status: unaffected) - 6.6.49 (Status: unaffected) - 6.10.8 (Status: unaffected) - 6.11 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/eca3f543f817da87c00d1a5697b473efb548204f) 2. [](https://git.kernel.org/stable/c/d2afc2bffec77316b90d530b07695e3f534df914) 3. [](https://git.kernel.org/stable/c/b72da4d89b97da71e056cc4d1429b2bc426a9c2f) 4. [](https://git.kernel.org/stable/c/111277b881def3153335acfe0d1f43e6cd83ac93) 5. [](https://git.kernel.org/stable/c/2189fd13c577d7881f94affc09c950a795064c4b) 6. [](https://git.kernel.org/stable/c/7bb11a75dd4d3612378b90e2a4aa49bdccea28ab) 7. [](https://git.kernel.org/stable/c/e23f6ad8d110bf632f7471482e10b43dc174fb72) 8. [](https://git.kernel.org/stable/c/14e497183df28c006603cc67fd3797a537eef7b9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6780, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6780 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6780 - **State**: PUBLISHED - **Published Date**: January 25, 2021 at 18:41 UTC - **Last Updated**: September 17, 2024 at 01:11 UTC - **Reserved Date**: January 10, 2020 at 00:00 UTC - **Assigned By**: bosch ### Vulnerability Description Use of Password Hash With Insufficient Computational Effort in the database of Bosch FSM-2500 server and Bosch FSM-5000 server up to and including version 5.2 allows a remote attacker with admin privileges to dump the credentials of other users and possibly recover their plain-text passwords by brute-forcing the MD5 hash. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-916: Security Weakness ### Affected Products **Bosch - FSM-2500** Affected versions: - unspecified (Status: affected) **Bosch - FSM-5000** Affected versions: - unspecified (Status: affected) ### References 1. [](https://psirt.bosch.com/security-advisories/BOSCH-SA-332072-BT.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24822, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24822 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24822 - **State**: PUBLISHED - **Published Date**: November 29, 2021 at 08:25 UTC - **Last Updated**: August 03, 2024 at 19:42 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Stylish Cost Calculator WordPress plugin before 7.0.4 does not have any authorisation and CSRF checks on some of its AJAX actions (available to authenticated users), which could allow any authenticated users, such as subscriber to call them, and perform Stored Cross-Site Scripting attacks against logged in admin, as well as frontend users due to the lack of sanitisation and escaping in some parameters ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Unknown - Stylish Cost Calculator** Affected versions: - 7.0.4 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/db84a782-d4c8-4abf-99ea-ea672a9b806e) ### Credits - apple502j
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30739, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30739 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30739 - **State**: PUBLISHED - **Published Date**: November 07, 2023 at 07:45 UTC - **Last Updated**: September 04, 2024 at 20:25 UTC - **Reserved Date**: April 14, 2023 at 01:59 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Arbitrary File Descriptor Write vulnerability in libsec-ril prior to SMR Nov-2023 Release 1 allows local attacker to execute arbitrary code. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - SMR Nov-2023 Release in Android 11, 12, 13 (Status: unaffected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0818, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0818 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0818 - **State**: PUBLISHED - **Published Date**: January 10, 2018 at 01:00 UTC - **Last Updated**: September 16, 2024 at 20:57 UTC - **Reserved Date**: December 01, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft ChakraCore allows an attacker to bypass Control Flow Guard (CFG) in conjunction with another vulnerability to run arbitrary code on a target system, due to how the Chakra scripting engine handles accessing memory, aka "Scripting Engine Security Feature Bypass". ### Affected Products **Microsoft Corporation - ChakraCore** Affected versions: - ChakraCore (Status: affected) ### References 1. [102412](http://www.securityfocus.com/bid/102412) 2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0818)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33775, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33775 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33775 - **State**: PUBLISHED - **Published Date**: May 01, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 02:36 UTC - **Reserved Date**: April 26, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue with the Autodiscover component in Nagios XI 2024R1.01 allows a remote attacker to escalate privileges via a crafted Dashlet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.nagios.com/changelog/#nagios-xi) 2. [](https://github.com/Neo-XeD/CVE-2024-33775)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1926, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1926 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1926 - **State**: PUBLISHED - **Published Date**: April 10, 2007 at 23:00 UTC - **Last Updated**: August 07, 2024 at 13:13 UTC - **Reserved Date**: April 10, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in JBMC Software DirectAdmin before 1.293 does not properly display log files, which allows remote authenticated users to inject arbitrary web script or HTML via (1) http or (2) ftp requests logged in /var/log/directadmin/security.log; (3) allows context-dependent attackers to inject arbitrary web script or HTML into /var/log/messages via a PHP script that invokes /usr/bin/logger; (4) allows local users to inject arbitrary web script or HTML into /var/log/messages by invoking /usr/bin/logger at the command line; and allows remote attackers to inject arbitrary web script or HTML via remote requests logged in the (5) /var/log/exim/rejectlog, (6) /var/log/exim/mainlog, (7) /var/log/proftpd/auth.log, (8) /var/log/httpd/error_log, (9) /var/log/httpd/access_log, (10) /var/log/directadmin/error.log, and (11) /var/log/directadmin/security.log files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20070401 DirectAdmin persistant XSS [takeover an Administrator`s account]](http://www.securityfocus.com/archive/1/464471/100/100/threaded) 2. [](http://www.directadmin.com/features.php?id=760) 3. [directadmin-log-xss(33390)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33390) 4. [24728](http://secunia.com/advisories/24728) 5. [23254](http://www.securityfocus.com/bid/23254) 6. [2534](http://securityreason.com/securityalert/2534) 7. [](http://www.directadmin.com/versions.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5978, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5978 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5978 - **State**: PUBLISHED - **Published Date**: September 12, 2019 at 15:58 UTC - **Last Updated**: August 04, 2024 at 20:09 UTC - **Reserved Date**: January 10, 2019 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Open redirect vulnerability in Cybozu Garoon 4.0.0 to 4.10.2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the application 'Scheduler'. ### Affected Products **Cybozu, Inc. - Cybozu Garoon** Affected versions: - 4.0.0 to 4.10.2 (Status: affected) ### References 1. [](http://jvn.jp/en/jp/JVN62618482/index.html) 2. [](https://kb.cybozu.support/article/35916)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29049, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29049 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29049 - **State**: PUBLISHED - **Published Date**: April 12, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 06:10 UTC - **Reserved Date**: April 11, 2022 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins promoted builds Plugin 873.v6149db_d64130 and earlier, except 3.10.1, does not validate the names of promotions defined in Job DSL, allowing attackers with Job/Configure permission to create a promotion with an unsafe name. ### Affected Products **Jenkins project - Jenkins promoted builds Plugin** Affected versions: - 3.10.1 (Status: unaffected) - unspecified (Status: affected) ### References 1. [](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2655)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4846, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4846 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4846 - **State**: PUBLISHED - **Published Date**: September 19, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 19:23 UTC - **Reserved Date**: September 18, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Citrix Access Gateway with Advanced Access Control (AAC) 4.2 before 20060914, when AAC is configured to use LDAP authentication, allows remote attackers to bypass authentication via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1016874](http://securitytracker.com/id?1016874) 2. [ADV-2006-3643](http://www.vupen.com/english/advisories/2006/3643) 3. [VU#658620](http://www.kb.cert.org/vuls/id/658620) 4. [20066](http://www.securityfocus.com/bid/20066) 5. [](http://support.citrix.com/article/CTX110950) 6. [21941](http://secunia.com/advisories/21941) 7. [citrix-acc-ldap-auth-bypass(28990)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28990) 8. [28938](http://www.osvdb.org/28938) 9. [](http://support.citrix.com/article/CTX110439)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6064, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6064 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6064 - **State**: PUBLISHED - **Published Date**: February 05, 2009 at 01:00 UTC - **Last Updated**: August 07, 2024 at 11:20 UTC - **Reserved Date**: February 04, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in DomPHP 0.81 allow remote attackers to execute arbitrary SQL commands via the cat parameter to agenda/index.php, and unspecified other vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4888](https://www.exploit-db.com/exploits/4888) 2. [27233](http://www.securityfocus.com/bid/27233)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3104, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3104 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3104 - **State**: PUBLISHED - **Published Date**: September 08, 2009 at 22:00 UTC - **Last Updated**: August 07, 2024 at 06:14 UTC - **Reserved Date**: September 08, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Symantec Norton AntiVirus 2005 through 2008; Norton Internet Security 2005 through 2008; AntiVirus Corporate Edition 9.0 before MR7, 10.0, 10.1 before MR8, and 10.2 before MR3; and Client Security 2.0 before MR7, 3.0, and 3.1 before MR8; when Internet Email Scanning is installed and enabled, allows remote attackers to cause a denial of service (CPU consumption and persistent connection loss) via unknown attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090826_01) 2. [36493](http://secunia.com/advisories/36493) 3. [ADV-2009-2449](http://www.vupen.com/english/advisories/2009/2449) 4. [57429](http://osvdb.org/57429) 5. [34670](http://www.securityfocus.com/bid/34670) 6. [symantec-email-scan-dos(52820)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52820)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2825, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2825 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2825 - **State**: PUBLISHED - **Published Date**: April 19, 2018 at 02:00 UTC - **Last Updated**: May 06, 2025 at 14:58 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H). ### Affected Products **Oracle Corporation - Java** Affected versions: - Java SE: 10 (Status: affected) ### References 1. [1040697](http://www.securitytracker.com/id/1040697) 2. [USN-3747-1](https://usn.ubuntu.com/3747-1/) 3. [](https://security.netapp.com/advisory/ntap-20180419-0001/) 4. [](https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0) 5. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html) 6. [103782](http://www.securityfocus.com/bid/103782)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-44223, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-44223 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-44223 - **State**: PUBLISHED - **Published Date**: November 25, 2021 at 14:51 UTC - **Last Updated**: August 04, 2024 at 04:17 UTC - **Reserved Date**: November 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description WordPress before 5.8 lacks support for the Update URI plugin header. This makes it easier for remote attackers to execute arbitrary code via a supply-chain attack against WordPress installations that use any plugin for which the slug satisfies the naming constraints of the WordPress.org Plugin Directory but is not yet present in that directory. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://vavkamil.cz/2021/11/25/wordpress-plugin-confusion-update-can-get-you-pwned/) 2. [](https://make.wordpress.org/core/2021/06/29/introducing-update-uri-plugin-header-in-wordpress-5-8/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7945, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7945 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7945 - **State**: PUBLISHED - **Published Date**: August 02, 2019 at 21:34 UTC - **Last Updated**: August 04, 2024 at 21:02 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description A stored cross-cite scripting vulnerability exists in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with privileges to modify currency symbols can inject malicious javascript. ### Affected Products **n/a - Magento 1 Magento 2** Affected versions: - Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 (Status: affected) ### References 1. [](https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1045, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1045 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1045 - **State**: PUBLISHED - **Published Date**: September 11, 2020 at 00:00 UTC - **Last Updated**: November 18, 2024 at 16:25 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description <p>A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.</p> <p>The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.</p> <p>The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.</p> ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C` ### Affected Products **Microsoft - ASP.NET Core 2.1** Affected versions: - 2.0 (Status: affected) **Microsoft - ASP.NET Core 3.1** Affected versions: - 3.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045) 2. [FEDORA-2020-e2deb72e0f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/) 3. [FEDORA-2020-48fa1ad65c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/) 4. [](https://github.com/dotnet/core/blob/main/release-notes/3.1/3.1.8/3.1.8.md#changes-in-318) 5. [](https://security.snyk.io/vuln/SNYK-RHEL8-DOTNET-1439600) 6. [](https://access.redhat.com/errata/RHSA-2020:3699)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4059, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4059 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4059 - **State**: PUBLISHED - **Published Date**: September 24, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 10:00 UTC - **Reserved Date**: September 12, 2008 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The XPConnect component in Mozilla Firefox before 2.0.0.17 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to a SCRIPT element. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [32025](http://secunia.com/advisories/32025) 2. [SSA:2008-269-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232) 3. [DSA-1697](http://www.debian.org/security/2009/dsa-1697) 4. [FEDORA-2008-8401](https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html) 5. [USN-645-1](http://www.ubuntu.com/usn/usn-645-1) 6. [MDVSA-2008:206](http://www.mandriva.com/security/advisories?name=MDVSA-2008:206) 7. [32144](http://secunia.com/advisories/32144) 8. [32010](http://secunia.com/advisories/32010) 9. [](http://www.mozilla.org/security/announce/2008/mfsa2008-41.html) 10. [ADV-2009-0977](http://www.vupen.com/english/advisories/2009/0977) 11. [USN-645-2](http://www.ubuntu.com/usn/usn-645-2) 12. [31346](http://www.securityfocus.com/bid/31346) 13. [31985](http://secunia.com/advisories/31985) 14. [SUSE-SA:2008:050](http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html) 15. [31984](http://secunia.com/advisories/31984) 16. [32185](http://secunia.com/advisories/32185) 17. [32196](http://secunia.com/advisories/32196) 18. [firefox2-xpcnativewrappers-code-execution(45352)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45352) 19. [DSA-1669](http://www.debian.org/security/2008/dsa-1669) 20. [32042](http://secunia.com/advisories/32042) 21. [33433](http://secunia.com/advisories/33433) 22. [ADV-2008-2661](http://www.vupen.com/english/advisories/2008/2661) 23. [SSA:2008-269-02](http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422) 24. [256408](http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1) 25. [32092](http://secunia.com/advisories/32092) 26. [MDVSA-2008:205](http://www.mandriva.com/security/advisories?name=MDVSA-2008:205) 27. [DSA-1696](http://www.debian.org/security/2009/dsa-1696) 28. [](https://bugzilla.mozilla.org/show_bug.cgi?id=419848) 29. [](http://download.novell.com/Download?buildid=WZXONb-tqBw~) 30. [FEDORA-2008-8429](https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html) 31. [1020915](http://www.securitytracker.com/id?1020915) 32. [USN-647-1](http://www.ubuntu.com/usn/usn-647-1) 33. [32007](http://secunia.com/advisories/32007) 34. [RHSA-2008:0882](http://www.redhat.com/support/errata/RHSA-2008-0882.html) 35. [32845](http://secunia.com/advisories/32845) 36. [DSA-1649](http://www.debian.org/security/2008/dsa-1649) 37. [oval:org.mitre.oval:def:9529](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9529) 38. [32012](http://secunia.com/advisories/32012) 39. [33434](http://secunia.com/advisories/33434) 40. [SSA:2008-270-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123) 41. [32044](http://secunia.com/advisories/32044) 42. [RHSA-2008:0908](http://www.redhat.com/support/errata/RHSA-2008-0908.html) 43. [34501](http://secunia.com/advisories/34501) 44. [32082](http://secunia.com/advisories/32082)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5167, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5167 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5167 - **State**: PUBLISHED - **Published Date**: February 13, 2017 at 21:00 UTC - **Last Updated**: August 05, 2024 at 14:55 UTC - **Reserved Date**: January 03, 2017 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description An issue was discovered in BINOM3 Universal Multifunctional Electric Power Quality Meter. Users do not have any option to change their own passwords. ### Affected Products **n/a - BINOM3 Electric Power Quality Meter** Affected versions: - BINOM3 Electric Power Quality Meter (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-031-01A) 2. [93028](http://www.securityfocus.com/bid/93028)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39713, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39713 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39713 - **State**: PUBLISHED - **Published Date**: March 16, 2022 at 14:03 UTC - **Last Updated**: August 04, 2024 at 02:13 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description Product: AndroidVersions: Android kernelAndroid ID: A-173788806References: Upstream kernel ### Affected Products **n/a - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2022-03-01) 2. [](http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html) 3. [[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update](https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-4125, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-4125 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-4125 - **State**: PUBLISHED - **Published Date**: August 24, 2022 at 15:09 UTC - **Last Updated**: August 03, 2024 at 17:16 UTC - **Reserved Date**: December 16, 2021 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description It was found that the original fix for log4j CVE-2021-44228 and CVE-2021-45046 in the OpenShift metering hive containers was incomplete, as not all JndiLookup.class files were removed. This CVE only applies to the OpenShift Metering hive container images, shipped in OpenShift 4.8, 4.7 and 4.6. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **n/a - kube-reporting/hive** Affected versions: - Fixed in v4.8, v4.7 and v4.6 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2033121) 2. [](https://access.redhat.com/security/cve/CVE-2021-4125) 3. [](https://access.redhat.com/security/cve/CVE-2021-44228) 4. [](https://access.redhat.com/security/cve/CVE-2021-45046) 5. [](https://github.com/kube-reporting/hive/pull/71) 6. [](https://github.com/kube-reporting/hive/pull/72) 7. [](https://github.com/kube-reporting/hive/pull/73)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1139, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1139 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1139 - **State**: PUBLISHED - **Published Date**: June 10, 2009 at 17:37 UTC - **Last Updated**: August 07, 2024 at 05:04 UTC - **Reserved Date**: March 25, 2009 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Memory leak in the LDAP service in Active Directory on Microsoft Windows 2000 SP4 and Server 2003 SP2, and Active Directory Application Mode (ADAM) on Windows XP SP2 and SP3 and Server 2003 SP2, allows remote attackers to cause a denial of service (memory consumption and service outage) via (1) LDAP or (2) LDAPS requests with unspecified OID filters, aka "Active Directory Memory Leak Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [54938](http://osvdb.org/54938) 2. [MS09-018](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-018) 3. [](http://support.avaya.com/elmodocs2/security/ASA-2009-214.htm) 4. [1022349](http://www.securitytracker.com/id?1022349) 5. [ADV-2009-1537](http://www.vupen.com/english/advisories/2009/1537) 6. [TA09-160A](http://www.us-cert.gov/cas/techalerts/TA09-160A.html) 7. [oval:org.mitre.oval:def:6253](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6253) 8. [35225](http://www.securityfocus.com/bid/35225) 9. [35355](http://secunia.com/advisories/35355)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0007, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0007 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0007 - **State**: PUBLISHED - **Published Date**: January 13, 2016 at 02:00 UTC - **Last Updated**: August 05, 2024 at 22:08 UTC - **Reserved Date**: December 04, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka "Windows Mount Point Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0006. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS16-008](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-008) 2. [1034645](http://www.securitytracker.com/id/1034645) 3. [](https://code.google.com/p/google-security-research/issues/detail?id=589) 4. [39311](https://www.exploit-db.com/exploits/39311/) 5. [79898](http://www.securityfocus.com/bid/79898) 6. [39310](https://www.exploit-db.com/exploits/39310/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17228, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17228 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17228 - **State**: PUBLISHED - **Published Date**: September 19, 2018 at 21:00 UTC - **Last Updated**: September 16, 2024 at 19:14 UTC - **Reserved Date**: September 19, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description nmap4j 1.1.0 allows attackers to execute arbitrary commands via shell metacharacters in an includeHosts call. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/narkisr/nmap4j/issues/9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0292, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0292 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0292 - **State**: PUBLISHED - **Published Date**: April 02, 2003 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:42 UTC - **Reserved Date**: May 01, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting vulnerability in Slash before 2.2.5, as used in Slashcode and elsewhere, allows remote attackers to steal cookies and authentication information from other users via Javascript in a URL, possibly in the formkey field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20020219 [SA-2002:01] Slashcode login vulnerability](http://marc.info/?l=bugtraq&m=101414005501708&w=2) 2. [slashcode-site-xss(8221)](http://www.iss.net/security_center/static/8221.php) 3. [4116](http://www.securityfocus.com/bid/4116)