System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23418, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23418 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23418 - **State**: PUBLISHED - **Published Date**: March 04, 2025 at 03:44 UTC - **Last Updated**: March 11, 2025 at 16:09 UTC - **Reserved Date**: January 20, 2025 at 02:00 UTC - **Assigned By**: OpenHarmony ### Vulnerability Description in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read. ### CVSS Metrics - **CVSS Base Score**: 3.3/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **OpenHarmony - OpenHarmony** Affected versions: - v4.1.0 (Status: affected) ### References 1. [](https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11417, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11417 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11417 - **State**: PUBLISHED - **Published Date**: July 18, 2017 at 05:00 UTC - **Last Updated**: August 05, 2024 at 18:05 UTC - **Reserved Date**: July 17, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Fiyo CMS 2.0.7 has SQL injection in dapur/apps/app_article/controller/article_status.php via $_GET['id']. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/FiyoCMS/FiyoCMS/issues/5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39324, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39324 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39324 - **State**: REJECTED - **Last Updated**: July 02, 2024 at 16:19 UTC - **Reserved Date**: July 27, 2023 at 17:05 UTC - **Assigned By**: Go ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11038, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11038 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11038 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 11:02 UTC - **Last Updated**: November 19, 2024 at 14:32 UTC - **Reserved Date**: November 08, 2024 at 23:56 UTC - **Assigned By**: Wordfence ### Vulnerability Description The The WPB Popup for Contact Form 7 – Showing The Contact Form 7 Popup on Button Click – CF7 Popup plugin for WordPress is vulnerable to arbitrary shortcode execution via wpb_pcf_fire_contact_form AJAX action in all versions up to, and including, 1.7.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **wpbean - WPB Popup for Contact Form 7 – Showing The Contact Form 7 Popup on Button Click – CF7 Popup** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a7faa800-3b29-4b79-8b94-1e7985acb50d?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wpb-popup-for-contact-form-7/tags/1.7.4/includes/class.ajax.php#L34) 3. [](https://wordpress.org/plugins/wpb-popup-for-contact-form-7/#developers) 4. [](https://plugins.trac.wordpress.org/changeset/3188864/) 5. [](https://gist.github.com/wpbean/1a5abfea883621b4e150eab1362a420f) ### Credits - Arkadiusz Hydzik
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47658, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47658 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47658 - **State**: PUBLISHED - **Published Date**: October 09, 2024 at 14:02 UTC - **Last Updated**: May 04, 2025 at 09:36 UTC - **Reserved Date**: September 30, 2024 at 16:00 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: crypto: stm32/cryp - call finalize with bh disabled The finalize operation in interrupt mode produce a produces a spinlock recursion warning. The reason is the fact that BH must be disabled during this process. ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 6.6.50 (Status: unaffected) - 6.10.9 (Status: unaffected) - 6.11 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/d93a2f86b0a998aa1f0870c85a2a60a0771ef89a) 2. [](https://git.kernel.org/stable/c/5d734665cd5d93270731e0ff1dd673fec677f447) 3. [](https://git.kernel.org/stable/c/56ddb9aa3b324c2d9645b5a7343e46010cf3f6ce)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4787, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4787 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4787 - **State**: PUBLISHED - **Published Date**: July 16, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 06:25 UTC - **Reserved Date**: June 24, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015-2624, CVE-2015-2626, CVE-2015-2640, CVE-2015-2654, CVE-2015-2656, CVE-2015-4754, CVE-2015-4764, CVE-2015-4775, CVE-2015-4776, CVE-2015-4777, CVE-2015-4778, CVE-2015-4780, CVE-2015-4781, CVE-2015-4782, CVE-2015-4783, CVE-2015-4784, CVE-2015-4785, CVE-2015-4786, CVE-2015-4789, and CVE-2015-4790. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47990, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47990 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47990 - **State**: PUBLISHED - **Published Date**: January 18, 2023 at 18:19 UTC - **Last Updated**: April 03, 2025 at 13:00 UTC - **Reserved Date**: December 28, 2022 at 17:49 UTC - **Assigned By**: ibm ### Vulnerability Description IBM AIX 7.1, 7.2, 7.3 and VIOS , 3.1 could allow a non-privileged local user to exploit a vulnerability in X11 to cause a buffer overflow that could result in a denial of service or arbitrary code execution. IBM X-Force ID: 243556.   ### CVSS Metrics - **CVSS Base Score**: 6.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **IBM - AIX** Affected versions: - 7.1, 7.2, 7.3, VIOS 3.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6855827) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/243556)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20454, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20454 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20454 - **State**: PUBLISHED - **Published Date**: November 08, 2022 at 00:00 UTC - **Last Updated**: May 01, 2025 at 15:18 UTC - **Reserved Date**: October 14, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In fdt_next_tag of fdt.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242096164 ### Affected Products **n/a - Android** Affected versions: - Android-10 Android-11 Android-12 Android-12L Android-13 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2022-11-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9974, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9974 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9974 - **State**: PUBLISHED - **Published Date**: October 15, 2024 at 09:31 UTC - **Last Updated**: October 15, 2024 at 13:38 UTC - **Reserved Date**: October 15, 2024 at 05:09 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file classes/Master.php?f=add_to_card of the component POST Request Handler. The manipulation of the argument product_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Online Eyewear Shop** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-280339 | SourceCodester Online Eyewear Shop POST Request Master.php sql injection](https://vuldb.com/?id.280339) 2. [VDB-280339 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.280339) 3. [Submit #423231 | SourceCodester Online Eyewear Shop 1.0 SQL Injection](https://vuldb.com/?submit.423231) 4. [](https://gist.github.com/higordiego/2373b9e3e89f03e5f8888efd38eb4b48) 5. [](https://www.sourcecodester.com/) ### Credits - c4ttr4ck (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45906, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45906 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45906 - **State**: PUBLISHED - **Published Date**: October 17, 2023 at 00:00 UTC - **Last Updated**: September 13, 2024 at 19:53 UTC - **Reserved Date**: October 16, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/user/add. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20in%20the%20user%20added%20function.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8666, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8666 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8666 - **State**: PUBLISHED - **Published Date**: October 25, 2024 at 08:34 UTC - **Last Updated**: October 25, 2024 at 15:17 UTC - **Reserved Date**: September 10, 2024 at 16:59 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Shoutcast Icecast HTML5 Radio Player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'html5radio' shortcode in all versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **svnlabs - Shoutcast Icecast HTML5 Radio Player** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7e870ae2-abae-457a-b3d1-75a96ec09d41?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/shoutcast-icecast-html5-radio-player/trunk/shoutcast-icecast-html5-radio-player.php#L379) ### Credits - Krzysztof Zając
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-46682, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-46682 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-46682 - **State**: PUBLISHED - **Published Date**: December 07, 2022 at 00:00 UTC - **Last Updated**: April 23, 2025 at 16:04 UTC - **Reserved Date**: December 06, 2022 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins Plot Plugin 2.1.11 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. ### Affected Products **Jenkins Project - Jenkins Plot Plugin** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.jenkins.io/security/advisory/2022-12-07/#SECURITY-2940)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5895, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5895 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5895 - **State**: PUBLISHED - **Published Date**: September 18, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 07:06 UTC - **Reserved Date**: August 06, 2015 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Multiple unspecified vulnerabilities in SQLite before 3.8.10.2, as used in Apple iOS before 9, have unknown impact and attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033609](http://www.securitytracker.com/id/1033609) 2. [](https://support.apple.com/HT205212) 3. [76764](http://www.securityfocus.com/bid/76764) 4. [APPLE-SA-2015-09-16-1](http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25307, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25307 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25307 - **State**: PUBLISHED - **Published Date**: June 26, 2023 at 00:00 UTC - **Last Updated**: December 04, 2024 at 17:04 UTC - **Reserved Date**: February 06, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description nothub mrpack-install <= v0.16.2 is vulnerable to Directory Traversal. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/nothub/mrpack-install/security/advisories/GHSA-r887-gfxh-m9rr) 2. [](https://quiltmc.org/en/blog/2023-02-04-five-installer-vulnerabilities/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44977, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44977 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44977 - **State**: PUBLISHED - **Published Date**: September 04, 2024 at 19:54 UTC - **Last Updated**: May 21, 2025 at 09:13 UTC - **Reserved Date**: August 21, 2024 at 05:34 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Validate TA binary size Add TA binary size validation to avoid OOB write. (cherry picked from commit c0a04e3570d72aaf090962156ad085e37c62e442) ### Affected Products **Linux - Linux** Affected versions: - e50d9ba0d2cd0cb4dd18e2a41a83fe21d3b046b8 (Status: affected) - e50d9ba0d2cd0cb4dd18e2a41a83fe21d3b046b8 (Status: affected) - e50d9ba0d2cd0cb4dd18e2a41a83fe21d3b046b8 (Status: affected) - e50d9ba0d2cd0cb4dd18e2a41a83fe21d3b046b8 (Status: affected) **Linux - Linux** Affected versions: - 5.19 (Status: affected) - 0 (Status: unaffected) - 6.1.107 (Status: unaffected) - 6.6.48 (Status: unaffected) - 6.10.7 (Status: unaffected) - 6.11 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/5ab8793b9a6cc059f503cbe6fe596f80765e0f19) 2. [](https://git.kernel.org/stable/c/50553ea7cbd3344fbf40afb065f6a2d38171c1ad) 3. [](https://git.kernel.org/stable/c/e562415248f402203e7fb6d8c38c1b32fa99220f) 4. [](https://git.kernel.org/stable/c/c99769bceab4ecb6a067b9af11f9db281eea3e2a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4321, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4321 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4321 - **State**: PUBLISHED - **Published Date**: December 30, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 03:43 UTC - **Reserved Date**: November 29, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in an ActiveX control in ienipp.ocx in Novell iPrint Client 5.52 allows remote attackers to execute arbitrary code via a long argument to (1) the GetDriverSettings2 method, as reachable by (2) the GetDriverSettings method. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [8125](http://securityreason.com/securityalert/8125) 2. [](http://www.novell.com/support/viewContent.do?externalId=7007234) 3. [44966](http://www.securityfocus.com/bid/44966) 4. [16014](http://www.exploit-db.com/exploits/16014) 5. [](http://www.zerodayinitiative.com/advisories/ZDI-10-256/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1241, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1241 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1241 - **State**: PUBLISHED - **Published Date**: April 13, 2011 at 20:07 UTC - **Last Updated**: August 06, 2024 at 22:21 UTC - **Reserved Date**: March 04, 2011 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:12540](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12540) 2. [TA11-102A](http://www.us-cert.gov/cas/techalerts/TA11-102A.html) 3. [MS11-034](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034) 4. [47218](http://www.securityfocus.com/bid/47218) 5. [71756](http://osvdb.org/71756) 6. [ADV-2011-0952](http://www.vupen.com/english/advisories/2011/0952) 7. [](http://support.avaya.com/css/P8/documents/100133352) 8. [44156](http://secunia.com/advisories/44156) 9. [](http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx) 10. [1025345](http://www.securitytracker.com/id?1025345)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41147, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41147 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41147 - **State**: PUBLISHED - **Published Date**: January 26, 2023 at 00:00 UTC - **Last Updated**: April 01, 2025 at 14:36 UTC - **Reserved Date**: September 20, 2022 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18286. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **PDF-XChange - PDF-XChange Editor** Affected versions: - 9.4.362.0 (Status: affected) ### References 1. [](https://www.tracker-software.com/product/pdf-xchange-editor/history) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1337/) ### Credits - khangkito - Tran Van Khang (VinCSS)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15907, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15907 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15907 - **State**: PUBLISHED - **Published Date**: October 26, 2017 at 05:00 UTC - **Last Updated**: August 05, 2024 at 20:04 UTC - **Reserved Date**: October 25, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in phpCollab 2.5.1 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter to newsdesk/newsdesk.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.sstrunk.com/cve/phpCollab_newsdesk.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0802, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0802 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0802 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: October 25, 2001 at 00:00 UTC - **Assigned By**: sgi ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-46378, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-46378 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-46378 - **State**: PUBLISHED - **Published Date**: May 10, 2023 at 15:23 UTC - **Last Updated**: January 24, 2025 at 18:05 UTC - **Reserved Date**: December 02, 2022 at 18:54 UTC - **Assigned By**: talos ### Vulnerability Description An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no port argument is provided to the `PORT` command. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-823: Security Weakness ### Affected Products **Weston Embedded - uC-FTPs** Affected versions: - v 1.98.00 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681) 2. [https://github.com/weston-embedded/uC-FTPs/pull/2](https://github.com/weston-embedded/uC-FTPs/pull/2) ### Credits - Discovered by Kelly Leuschner of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21174, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21174 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21174 - **State**: PUBLISHED - **Published Date**: July 16, 2024 at 22:40 UTC - **Last Updated**: December 03, 2024 at 19:45 UTC - **Reserved Date**: December 07, 2023 at 22:28 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.23, 21.3-21.14 and 23.4. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java VM. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L). ### CVSS Metrics - **CVSS Base Score**: 3.1/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Affected Products **Oracle Corporation - Database - Enterprise Edition** Affected versions: - 19.3 (Status: affected) - 21.3 (Status: affected) - 23.4 (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujul2024.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3513, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3513 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3513 - **State**: PUBLISHED - **Published Date**: November 06, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:17 UTC - **Reserved Date**: November 06, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description index.php in VUBB alpha rc1 allows remote attackers to obtain the installation path of the application via a viewforum action with the f parameter set to a single quote ('). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20051101 VUBB XSS & path disclosure Vulnerabilities](http://marc.info/?l=bugtraq&m=113087965608496&w=2) 2. [](http://irannetjob.com/content/view/152/28/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3786, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3786 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3786 - **State**: PUBLISHED - **Published Date**: September 24, 2011 at 00:00 UTC - **Last Updated**: September 17, 2024 at 03:38 UTC - **Reserved Date**: September 23, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHProjekt 6.0.5 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by Setup/Controllers/IndexController.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phprojekt-6.0.5) 2. [[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability](http://www.openwall.com/lists/oss-security/2011/06/27/6) 3. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43480, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43480 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43480 - **State**: PUBLISHED - **Published Date**: April 16, 2023 at 08:20 UTC - **Last Updated**: January 10, 2025 at 18:53 UTC - **Reserved Date**: October 19, 2022 at 11:40 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Magneticlab Sàrl Homepage Pop-up plugin <= 1.2.5 versions. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Magneticlab Sàrl - Homepage Pop-up** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/homepage-pop-up/wordpress-homepage-pop-up-plugin-1-2-5-unauth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8075, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8075 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8075 - **State**: PUBLISHED - **Published Date**: September 27, 2019 at 15:21 UTC - **Last Updated**: August 04, 2024 at 21:10 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Player version 32.0.0.192 and earlier versions have a Same Origin Policy Bypass vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user. ### Affected Products **Adobe - Flash Player** Affected versions: - 32.0.0.192 and earlier versions (Status: affected) ### References 1. [FEDORA-2020-10ec8aca61](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AB2XOYF26EBHJEI6LXCBL32TGZM7UHQ4/) 2. [FEDORA-2020-3e005ce2e0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/) 3. [DSA-4824](https://www.debian.org/security/2021/dsa-4824) 4. [](https://helpx.adobe.com/security/products/flash-player/apsb19-30.html) 5. [](https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html) 6. [](https://crbug.com/945997)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24944, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24944 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24944 - **State**: REJECTED - **Last Updated**: May 12, 2023 at 00:00 UTC - **Reserved Date**: February 10, 2022 at 00:00 UTC - **Assigned By**: Silabs ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20105, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20105 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20105 - **State**: PUBLISHED - **Published Date**: June 28, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 08:57 UTC - **Reserved Date**: October 27, 2022 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the change password functionality of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with Read-only credentials to elevate privileges to Administrator on an affected system. This vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by authenticating to the application as a Read-only user and sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to alter the passwords of any user on the system, including an administrative user, and then impersonate that user. Note: Cisco Expressway Series refers to the Expressway Control (Expressway-C) device and the Expressway Edge (Expressway-E) device. ### CVSS Metrics - **CVSS Base Score**: 9.6/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H` ### Affected Products **Cisco - Cisco TelePresence Video Communication Server (VCS) Expressway** Affected versions: - X8.5.1 (Status: affected) - X8.5.3 (Status: affected) - X8.5 (Status: affected) - X8.6.1 (Status: affected) - X8.6 (Status: affected) - X8.1.1 (Status: affected) - X8.1.2 (Status: affected) - X8.1 (Status: affected) - X8.2.1 (Status: affected) - X8.2.2 (Status: affected) - X8.2 (Status: affected) - X8.7.1 (Status: affected) - X8.7.2 (Status: affected) - X8.7.3 (Status: affected) - X8.7 (Status: affected) - X8.8.1 (Status: affected) - X8.8.2 (Status: affected) - X8.8.3 (Status: affected) - X8.8 (Status: affected) - X8.9.1 (Status: affected) - X8.9.2 (Status: affected) - X8.9 (Status: affected) - X8.10.0 (Status: affected) - X8.10.1 (Status: affected) - X8.10.2 (Status: affected) - X8.10.3 (Status: affected) - X8.10.4 (Status: affected) - X12.5.8 (Status: affected) - X12.5.9 (Status: affected) - X12.5.0 (Status: affected) - X12.5.2 (Status: affected) - X12.5.7 (Status: affected) - X12.5.3 (Status: affected) - X12.5.4 (Status: affected) - X12.5.5 (Status: affected) - X12.5.1 (Status: affected) - X12.5.6 (Status: affected) - X12.6.0 (Status: affected) - X12.6.1 (Status: affected) - X12.6.2 (Status: affected) - X12.6.3 (Status: affected) - X12.6.4 (Status: affected) - X12.7.0 (Status: affected) - X12.7.1 (Status: affected) - X8.11.1 (Status: affected) - X8.11.2 (Status: affected) - X8.11.4 (Status: affected) - X8.11.3 (Status: affected) - X8.11.0 (Status: affected) - X14.0.1 (Status: affected) - X14.0.3 (Status: affected) - X14.0.2 (Status: affected) - X14.0.4 (Status: affected) - X14.0.5 (Status: affected) - X14.0.6 (Status: affected) - X14.0.7 (Status: affected) - X14.0.8 (Status: affected) - X14.0.9 (Status: affected) - X14.0.10 (Status: affected) - X14.0.11 (Status: affected) - X14.2.1 (Status: affected) - X14.2.0 (Status: affected) ### References 1. [cisco-sa-expressway-priv-esc-Ls2B9t7b](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-priv-esc-Ls2B9t7b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26979, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26979 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26979 - **State**: PUBLISHED - **Published Date**: August 06, 2022 at 20:45 UTC - **Last Updated**: August 03, 2024 at 05:18 UTC - **Reserved Date**: March 12, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Foxit PDF Reader before 12.0.1 and PDF Editor before 12.0.1 allow a NULL pointer dereference when this.Span is used for oState of Collab.addStateModel, because this.Span.text can be NULL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.foxit.com/support/security-bulletins.html) 2. [](https://drive.google.com/file/d/1WpwDgVRU-Mb792z6dgDoWMXDRSeB8ZLU/view?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-44345, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-44345 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-44345 - **State**: PUBLISHED - **Published Date**: December 02, 2022 at 00:00 UTC - **Last Updated**: April 24, 2025 at 19:49 UTC - **Reserved Date**: October 30, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=quotes/view_quote&id=. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BGP-OSPF/bug_report/blob/main/vendors/oretnom23/sanitization-management-system/SQLi-1.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4043, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4043 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4043 - **State**: PUBLISHED - **Published Date**: April 03, 2012 at 01:00 UTC - **Last Updated**: September 16, 2024 at 20:06 UTC - **Reserved Date**: October 13, 2011 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Integer overflow in an unspecified ActiveX control in SVUIGrd.ocx in ARC Informatique PcVue 6.0 through 10.0, FrontVue, and PlantVue allows remote attackers to execute arbitrary code via a large value for an integer parameter, leading to a buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.us-cert.gov/control_systems/pdf/ICSA-11-340-01.pdf) 2. [](http://www.pcvuesolutions.com/index.php?option=com_content&view=article&id=244&Itemid=257) 3. [](https://support.pcvuescada.com/index.php?option=com_k2&view=item&id=512&Itemid=440)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23149, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23149 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23149 - **State**: PUBLISHED - **Published Date**: June 25, 2024 at 02:43 UTC - **Last Updated**: January 28, 2025 at 17:17 UTC - **Reserved Date**: January 11, 2024 at 21:51 UTC - **Assigned By**: autodesk ### Vulnerability Description A maliciously crafted SLDDRW file, when parsed in ODXSW_DLL.dll through Autodesk applications, can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Autodesk - AutoCAD** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - AutoCAD Architecture** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - AutoCAD Electrical** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - AutoCAD Mechanical** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - AutoCAD MEP** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - AutoCAD Plant 3D** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - Civil 3D** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - Advance Steel** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - AutoCAD MAP 3D** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) ### References 1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1123, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1123 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1123 - **State**: PUBLISHED - **Published Date**: March 26, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 01:14 UTC - **Reserved Date**: March 26, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Chip Salzenberg Deliver does not properly associate a lockfile with the user who created the file, which allows local users to cause a denial of service (blockage of incoming e-mail) by creating lockfiles for arbitrary mailboxes. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [deliver-lockfile-dos(57558)](https://exchange.xforce.ibmcloud.com/vulnerabilities/57558) 2. [20100324 Multiple vulnerabilities in Deliver](http://www.securityfocus.com/archive/1/510306/100/0/threaded) 3. [38924](http://www.securityfocus.com/bid/38924)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9778, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9778 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9778 - **State**: PUBLISHED - **Published Date**: June 21, 2017 at 07:00 UTC - **Last Updated**: August 05, 2024 at 17:18 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GNU Debugger (GDB) 8.0 and earlier fails to detect a negative length field in a DWARF section. A malformed section in an ELF binary or a core file can cause GDB to repeatedly allocate memory until a process limit is reached. This can, for example, impede efforts to analyze malware with GDB. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=21600) 2. [99244](http://www.securityfocus.com/bid/99244)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2362, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2362 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2362 - **State**: PUBLISHED - **Published Date**: August 22, 2022 at 15:01 UTC - **Last Updated**: August 03, 2024 at 00:32 UTC - **Reserved Date**: July 09, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Download Manager WordPress plugin before 3.2.50 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based download blocking restrictions. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - Download Manager** Affected versions: - 3.2.50 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/d94b721e-9ce2-45e5-a673-2a57b0137653) ### Credits - Raad Haddad
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6240, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6240 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6240 - **State**: PUBLISHED - **Published Date**: June 07, 2017 at 20:00 UTC - **Last Updated**: August 06, 2024 at 07:15 UTC - **Reserved Date**: August 14, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ansible/ansible/commit/ca2f2c4ebd7b5e097eab0a710f79c1f63badf95b) 2. [[oss-security] 20150817 Re: CVE request: ansible zone/chroot/jail escape](http://www.openwall.com/lists/oss-security/2015/08/17/10) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1243468) 4. [](https://github.com/ansible/ansible/commit/952166f48eb0f5797b75b160fd156bbe1e8fc647) 5. [[debian-lts-announce] 20190916 [SECURITY] [DLA 1923-1] ansible security update](https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22193, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22193 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22193 - **State**: PUBLISHED - **Published Date**: April 14, 2022 at 15:50 UTC - **Last Updated**: September 17, 2024 at 02:06 UTC - **Reserved Date**: December 21, 2021 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description An Improper Handling of Unexpected Data Type vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS). Continued execution of this command might cause a sustained Denial of Service condition. If BGP rib sharding is configured and a certain CLI command is executed the rpd process can crash. During the rpd crash and restart, the routing protocols might be impacted and traffic disruption might be seen due to the loss of routing information. This issue affects: Juniper Networks Junos OS 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R2. Juniper Networks Junos OS Evolved 20.4 versions prior to 20.4R3-EVO; 21.1 versions prior to 21.1R3-EVO; 21.2 versions prior to 21.2R2-EVO. This issue does not affect: Juniper Networks Junos OS versions prior to 20.3R1. Juniper Networks Junos OS Evolved versions prior to 20.3R1-EVO. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-241: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - unspecified (Status: unaffected) - 20.3 (Status: affected) - 20.4 (Status: affected) - 21.1 (Status: affected) - 21.2 (Status: affected) **Juniper Networks - Junos OS Evolved** Affected versions: - unspecified (Status: unaffected) - 20.4 (Status: affected) - 21.1 (Status: affected) - 21.2 (Status: affected) - 20.3R1-EVO (Status: affected) ### References 1. [](https://kb.juniper.net/JSA69503)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-7202, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-7202 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-7202 - **State**: PUBLISHED - **Published Date**: February 27, 2024 at 08:30 UTC - **Last Updated**: October 28, 2024 at 00:09 UTC - **Reserved Date**: January 03, 2024 at 12:33 UTC - **Assigned By**: WPScan ### Vulnerability Description The Fatal Error Notify WordPress plugin before 1.5.3 does not have authorisation and CSRF checks in its test_error AJAX action, allowing any authenticated users, such as subscriber to call it and spam the admin email address with error messages. The issue is also exploitable via CSRF ### Weakness Classification (CWE) - CWE-862 Missing Authorization: Missing Authorization - CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF) ### Affected Products **Unknown - Fatal Error Notify** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/d923ba5b-1c20-40ee-ac69-cd0bb65b375a/) 2. [](https://research.cleantalk.org/cve-2023-7202-fatal-error-notify-error-email-sending-csrf/) ### Credits - Dmitrii Ignatyev - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24627, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24627 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24627 - **State**: PUBLISHED - **Published Date**: January 24, 2025 at 17:24 UTC - **Last Updated**: January 24, 2025 at 18:58 UTC - **Reserved Date**: January 23, 2025 at 14:51 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Linnea Huxford, LinSoftware Blur Text allows Stored XSS. This issue affects Blur Text: from n/a through 1.0.0. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Linnea Huxford, LinSoftware - Blur Text** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/blur-text/vulnerability/wordpress-blur-text-plugin-1-0-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - 0xd4rk5id3 (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3320, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3320 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3320 - **State**: PUBLISHED - **Published Date**: July 18, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 10:43 UTC - **Reserved Date**: May 07, 2014 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple open redirect vulnerabilities in the admin web interface in the web framework in Cisco Unified Communications Domain Manager (CDM) 8.1(.4) and earlier allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via crafted URLs for unspecified scripts, aka Bug ID CSCuo48835. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1030613](http://www.securitytracker.com/id/1030613) 2. [20140717 Cisco Unified Communications Domain Manager Admin HTTP Redirect Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3320) 3. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=34960) 4. [68694](http://www.securityfocus.com/bid/68694)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14615, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14615 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14615 - **State**: PUBLISHED - **Published Date**: September 20, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 19:34 UTC - **Reserved Date**: September 20, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An FBX-5313 issue was discovered in WatchGuard Fireware before 12.0. When a failed login attempt is made to the login endpoint of the XML-RPC interface, if JavaScript code, properly encoded to be consumed by XML parsers, is embedded as value of the user element, the code will be rendered in the context of any logged in user in the Web UI visiting "Traffic Monitor" sections "Events" and "All." As a side effect, no further events will be visible in the Traffic Monitor until the device is restarted. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://seclists.org/bugtraq/2017/Sep/22) 2. [](https://www.sidertia.com/Home/Community/Blog/2017/09/18/Fixed-Fireware-XXE-DOS-and-stored-XSS-vulnerabilities-discovered-by-Sidertia) 3. [](https://watchguardsupport.secure.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000L0HSAU&lang=en_US)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25656, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25656 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25656 - **State**: PUBLISHED - **Published Date**: September 16, 2022 at 05:25 UTC - **Last Updated**: August 03, 2024 at 04:42 UTC - **Reserved Date**: February 22, 2022 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Possible integer overflow and memory corruption due to improper validation of buffer size sent to write to console when computing the payload size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables** Affected versions: - AR8035, QCA6174A, QCA6390, QCA6391, QCA6426, QCA6436, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCA8081, QCA8337, QCA9377, QCM6490, QCS6490, SA6155P, SA8155P, SA8195P, SD 8 Gen1 5G, SD460, SD480, SD695, SD778G, SD780G, SD865 5G, SD870, SD888, SD888 5G, SDX12, SDX55M, SDX65, SDXR2 5G, SM7315, SM7325P, SM7450, SM8475, SM8475P, SW5100, SW5100P, WCD9326, WCD9335, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3950, WCN3980, WCN3988, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/september-2022-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-1188, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-1188 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-1188 - **State**: PUBLISHED - **Published Date**: December 19, 2000 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:45 UTC - **Reserved Date**: December 14, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in Quikstore shopping cart program allows remote attackers to read arbitrary files via a .. (dot dot) attack in the "page" parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20001120 Cgisecurity Quickstore Shopping cart](http://archives.neohapsis.com/archives/bugtraq/2000-11/0283.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1585, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1585 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1585 - **State**: PUBLISHED - **Published Date**: February 19, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 04:47 UTC - **Reserved Date**: February 11, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Fat Free CRM before 0.13.6 allows remote attackers to conduct cross-site request forgery (CSRF) attacks via a request without the authenticity_token, as demonstrated by a crafted HTML page that creates a new administrator account. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/fatfreecrm/fat_free_crm/wiki/CSRF-Vulnerability-%28CVE-2015-1585%29) 2. [20150214 [CVE-2015-1585] Fat Free CRM - CSRF Vulnerability in Version 0.13.5](http://www.securityfocus.com/archive/1/534709/100/0/threaded) 3. [fatfreecrm-cve20151585-csrf(100925)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100925) 4. [](http://packetstormsecurity.com/files/130410/Fat-Free-CRM-0.13.5-Cross-Site-Request-Forgery.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2894, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2894 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2894 - **State**: PUBLISHED - **Published Date**: October 04, 2011 at 10:00 UTC - **Last Updated**: August 06, 2024 at 23:15 UTC - **Reserved Date**: July 27, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.springsource.com/security/cve-2011-2894) 2. [49536](http://www.securityfocus.com/bid/49536) 3. [20110909 CVE-2011-2894: Spring Framework and Spring Security serialization-based remoting vulnerabilities](http://www.securityfocus.com/archive/1/519593/100/0/threaded) 4. [RHSA-2011:1334](http://www.redhat.com/support/errata/RHSA-2011-1334.html) 5. [spring-framework-object-sec-bypass(69687)](https://exchange.xforce.ibmcloud.com/vulnerabilities/69687) 6. [8405](http://securityreason.com/securityalert/8405) 7. [75263](http://osvdb.org/75263) 8. [](https://web.archive.org/web/20120307233721/http://www.springsource.com/security/cve-2011-2894)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37131, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37131 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37131 - **State**: PUBLISHED - **Published Date**: October 27, 2021 at 00:29 UTC - **Last Updated**: August 04, 2024 at 01:16 UTC - **Reserved Date**: July 20, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description There is a CSV injection vulnerability in ManageOne, iManager NetEco and iManager NetEco 6000. An attacker with high privilege may exploit this vulnerability through some operations to inject the CSV files. Due to insufficient input validation of some parameters, the attacker can exploit this vulnerability to inject CSV files to the target device. ### Affected Products **n/a - ManageOne;iManager NetEco;iManager NetEco 6000** Affected versions: - 6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC1.B070,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B090,8.0.0,8.0.0-LCN080,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3 (Status: affected) - V600R010C00CP2001,V600R010C00CP2002,V600R010C00CP3001,V600R010C00CP3002,V600R010C00CP3101,V600R010C00CP3102,V600R010C00SPC100,V600R010C00SPC110,V600R010C00SPC120,V600R010C00SPC200,V600R010C00SPC210,V600R010C00SPC300,V600R010C00SPC310 (Status: affected) - V600R009C00CP2201,V600R009C00CP2301,V600R009C00SPC100,V600R009C00SPC110,V600R009C00SPC120,V600R009C00SPC190,V600R009C00SPC200,V600R009C00SPC201,V600R009C00SPC202,V600R009C00SPC210,V600R009C00SPC220,V600R009C00SPC221,V600R009C00SPC230,V600R009C00SPC232 (Status: affected) ### References 1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-csv-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26271, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26271 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26271 - **State**: PUBLISHED - **Published Date**: December 10, 2020 at 22:10 UTC - **Last Updated**: August 04, 2024 at 15:56 UTC - **Reserved Date**: October 01, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In affected versions of TensorFlow under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The MakeEdge function creates an edge between one output tensor of the src node (given by output_index) and the input slot of the dst node (given by input_index). This is only possible if the types of the tensors on both sides coincide, so the function begins by obtaining the corresponding DataType values and comparing these for equality. However, there is no check that the indices point to inside of the arrays they index into. Thus, this can result in accessing data out of bounds of the corresponding heap allocated arrays. In most scenarios, this can manifest as unitialized data access, but if the index points far away from the boundaries of the arrays this can be used to leak addresses from the library. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **tensorflow - tensorflow** Affected versions: - < 1.15.5 (Status: affected) - >= 2.0.0, < 2.0.4 (Status: affected) - >= 2.1.0, < 2.1.3 (Status: affected) - >= 2.2.0, < 2.2.2 (Status: affected) - >= 2.3.0, < 2.3.2 (Status: affected) ### References 1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q263-fvxm-m5mw) 2. [](https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7257, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7257 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7257 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 12:00 UTC - **Last Updated**: September 16, 2024 at 20:38 UTC - **Reserved Date**: January 21, 2020 at 00:00 UTC - **Assigned By**: trellix ### Vulnerability Description Privilege escalation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to cause the deletion and creation of files they would not normally have permission to through altering the target of symbolic links whilst an anti-virus scan was in progress. This is timing dependent. ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-264: Security Weakness ### Affected Products **McAfee LLC - McAfee Endpoint Security (ENS)** Affected versions: - 10.x (Status: affected) ### References 1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10309) ### Credits - McAfee  credits  Jakub  Palaczynski  (ING Tech Poland) for reporting this flaw
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3375, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3375 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3375 - **State**: PUBLISHED - **Published Date**: January 27, 2017 at 22:01 UTC - **Last Updated**: October 08, 2024 at 20:21 UTC - **Reserved Date**: December 06, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). ### Affected Products **Oracle - Advanced Outbound Telephony** Affected versions: - 12.1.1 (Status: affected) - 12.1.2 (Status: affected) - 12.1.3 (Status: affected) - 12.2.3 (Status: affected) - 12.2.4 (Status: affected) - 12.2.5 (Status: affected) - 12.2.6 (Status: affected) ### References 1. [95531](http://www.securityfocus.com/bid/95531) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-23589, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-23589 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-23589 - **State**: PUBLISHED - **Published Date**: November 23, 2022 at 00:00 UTC - **Last Updated**: April 29, 2025 at 15:59 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A vulnerability in OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to cause a Denial of Service by Rebooting the router through " /mgm_dev_reboot.asp." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/huzaifahussain98/CVE-2020-23589)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2337, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2337 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2337 - **State**: PUBLISHED - **Published Date**: July 20, 2021 at 22:43 UTC - **Last Updated**: September 26, 2024 at 14:06 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle XML DB component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Easily exploitable vulnerability allows high privileged attacker having Create Any Procedure, Create Public Synonym privilege with network access via Oracle Net to compromise Oracle XML DB. Successful attacks of this vulnerability can result in takeover of Oracle XML DB. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Oracle Corporation - Database - Enterprise Edition** Affected versions: - 12.1.0.2 (Status: affected) - 12.2.0.1 (Status: affected) - 19c (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujul2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000625, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000625 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000625 - **State**: PUBLISHED - **Published Date**: December 28, 2018 at 14:00 UTC - **Last Updated**: August 05, 2024 at 12:40 UTC - **Reserved Date**: July 27, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Battelle V2I Hub 2.5.1 contains hard-coded credentials for the administrative account. An attacker could exploit this vulnerability to log in as an admin on any installation and gain unauthorized access to the system. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/147302)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1745, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1745 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1745 - **State**: PUBLISHED - **Published Date**: June 21, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:34 UTC - **Reserved Date**: June 21, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Off-by-one error in the CodeBrws.asp sample script in Microsoft IIS 5.0 allows remote attackers to view the source code for files with extensions containing with one additional character after .html, .htm, .asp, or .inc, such as .aspx files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [iis-codebrws-view-source(8853)](https://exchange.xforce.ibmcloud.com/vulnerabilities/8853) 2. [20020418 Re: Microsoft IIS 5.0 CodeBrws.asp Source Disclosure](http://online.securityfocus.com/archive/1/268303) 3. [4543](http://www.securityfocus.com/bid/4543)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0276, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0276 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0276 - **State**: PUBLISHED - **Published Date**: January 15, 2008 at 19:00 UTC - **Last Updated**: August 07, 2024 at 07:39 UTC - **Reserved Date**: January 15, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Devel module before 5.x-0.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via a site variable, related to lack of escaping of the variable table. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [drupal-devel-variable-xss(39606)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39606) 2. [](http://drupal.org/node/208524)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1348, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1348 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1348 - **State**: PUBLISHED - **Published Date**: June 23, 2017 at 16:00 UTC - **Last Updated**: August 05, 2024 at 13:32 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 126524. ### Affected Products **IBM - Sterling B2B Integrator** Affected versions: - 5.2 (Status: affected) - 5.2.1 (Status: affected) - 5.2.2 (Status: affected) - 5.2.3 (Status: affected) - 5.2.4 (Status: affected) - 5.2.5 (Status: affected) - 5.2.6 (Status: affected) ### References 1. [99245](http://www.securityfocus.com/bid/99245) 2. [](http://www.ibm.com/support/docview.wss?uid=swg22004199) 3. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/126524)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48057, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48057 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48057 - **State**: PUBLISHED - **Published Date**: November 04, 2024 at 00:00 UTC - **Last Updated**: November 05, 2024 at 17:28 UTC - **Reserved Date**: October 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description localai <=2.20.1 is vulnerable to Cross Site Scripting (XSS). When calling the delete model API and passing inappropriate parameters, it can cause a one-time storage XSS, which will trigger the payload when a user accesses the homepage. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rumbling-slice-eb0.notion.site/LocalAI-deleted-model-with-storage-XSS-CSRF-vulnerability-in-mudler-localai-101e3cda9e8c80e0ac12fe418d5dd982?pvs=4) 2. [](https://gist.github.com/AfterSnows/1bd7ee5a3a42dbb5f5ff67f7f9c8ccec)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4228, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4228 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4228 - **State**: PUBLISHED - **Published Date**: July 13, 2016 at 01:00 UTC - **Last Updated**: August 06, 2024 at 00:25 UTC - **Reserved Date**: April 27, 2016 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SU-2016:1826](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html) 2. [GLSA-201607-03](https://security.gentoo.org/glsa/201607-03) 3. [openSUSE-SU-2016:1802](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html) 4. [91719](http://www.securityfocus.com/bid/91719) 5. [40309](https://www.exploit-db.com/exploits/40309/) 6. [](https://helpx.adobe.com/security/products/flash-player/apsb16-25.html) 7. [RHSA-2016:1423](https://access.redhat.com/errata/RHSA-2016:1423) 8. [MS16-093](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093) 9. [1036280](http://www.securitytracker.com/id/1036280)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0592, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0592 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0592 - **State**: PUBLISHED - **Published Date**: November 12, 2020 at 17:56 UTC - **Last Updated**: August 04, 2024 at 06:11 UTC - **Reserved Date**: October 28, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Out of bounds write in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access. ### Affected Products **n/a - Intel(R) Processors** Affected versions: - See references (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00358) 2. [](https://security.netapp.com/advisory/ntap-20201113-0001/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13007, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13007 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13007 - **State**: PUBLISHED - **Published Date**: June 29, 2018 at 14:00 UTC - **Last Updated**: September 17, 2024 at 02:10 UTC - **Reserved Date**: June 29, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in gpmf-parser 1.1.2. There is a heap-based buffer over-read in GPMF_parser.c in the function GPMF_Next, related to certain checks for GPMF_KEY_END and nest_level (not conditional on a buffer_size_longs check). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gopro/gpmf-parser/issues/29)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3883, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3883 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3883 - **State**: PUBLISHED - **Published Date**: May 02, 2024 at 08:32 UTC - **Last Updated**: August 01, 2024 at 20:26 UTC - **Reserved Date**: April 16, 2024 at 12:52 UTC - **Assigned By**: Wordfence ### Vulnerability Description The 3D FlipBook plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Bookmark URL field in all versions up to, and including, 1.15.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **iberezansky - 3D FlipBook – PDF Flipbook WordPress** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/016462cf-abe9-4c90-abd2-b5bb69348d7e?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3079536/interactive-3d-flipbook-powered-physics-engine) ### Credits - Tim Coen
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28535, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28535 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28535 - **State**: PUBLISHED - **Published Date**: August 14, 2023 at 14:35 UTC - **Last Updated**: September 25, 2024 at 16:46 UTC - **Reserved Date**: March 17, 2023 at 11:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Paytm Paytm Payment Donation plugin <= 2.2.0 versions. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Paytm - Paytm Payment Donation** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/paytm-donation/wordpress-paytm-payment-donation-plugin-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - qilin_99 (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32209, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32209 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32209 - **State**: PUBLISHED - **Published Date**: April 10, 2025 at 08:09 UTC - **Last Updated**: April 10, 2025 at 19:28 UTC - **Reserved Date**: April 04, 2025 at 10:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in totalprocessing Total processing card payments for WooCommerce allows Path Traversal. This issue affects Total processing card payments for WooCommerce: from n/a through 7.1.5. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **totalprocessing - Total processing card payments for WooCommerce** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/totalprocessing-card-payments/vulnerability/wordpress-total-processing-card-payments-for-woocommerce-plugin-7-1-3-arbitrary-file-download-vulnerability?_s_id=cve) ### Credits - LVT-tholv2k (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0857, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0857 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0857 - **State**: PUBLISHED - **Published Date**: August 20, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:03 UTC - **Reserved Date**: August 15, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Format string vulnerabilities in Oracle Listener Control utility (lsnrctl) for Oracle 9.2 and 9.0, 8.1, and 7.3.4, allow remote attackers to execute arbitrary code on the Oracle DBA system by placing format strings into certain entries in the listener.ora configuration file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://otn.oracle.com/deploy/security/pdf/2002alert40rev1.pdf) 2. [VU#301059](http://www.kb.cert.org/vuls/id/301059) 3. [1005037](http://securitytracker.com/id?1005037) 4. [5460](http://www.securityfocus.com/bid/5460) 5. [20020814 Oracle Listener Control Format String Vulnerabilities (#NISR14082002)](http://marc.info/?l=bugtraq&m=102933735716634&w=2) 6. [](http://www.ngssoftware.com/advisories/ora-lsnrfmtstr.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11102, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11102 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11102 - **State**: PUBLISHED - **Published Date**: April 06, 2020 at 15:39 UTC - **Last Updated**: August 04, 2024 at 11:21 UTC - **Reserved Date**: March 30, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://lists.gnu.org/archive/html/qemu-devel/2020-03/msg08322.html) 2. [[oss-security] 20200406 CVE-2020-11102 QEMU: tulip: OOB access in tulip_copy_tx_buffers](http://www.openwall.com/lists/oss-security/2020/04/06/1) 3. [](http://www.openwall.com/lists/oss-security/2020/04/06/1) 4. [GLSA-202005-02](https://security.gentoo.org/glsa/202005-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7069, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7069 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7069 - **State**: PUBLISHED - **Published Date**: July 24, 2024 at 15:31 UTC - **Last Updated**: August 01, 2024 at 21:52 UTC - **Reserved Date**: July 24, 2024 at 05:12 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. This issue affects some unknown processing of the file /employee_gatepass/classes/Master.php?f=delete_department. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272351. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Employee and Visitor Gate Pass Logging System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-272351 | SourceCodester Employee and Visitor Gate Pass Logging System sql injection](https://vuldb.com/?id.272351) 2. [VDB-272351 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.272351) 3. [Submit #378881 | sourcecodester Employee and Visitor Gate Pass Logging System v1.0 SQL Injection](https://vuldb.com/?submit.378881) 4. [](https://github.com/pineapple65/cve/blob/main/sql.md) ### Credits - pineapple65 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3546, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3546 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3546 - **State**: PUBLISHED - **Published Date**: July 13, 2006 at 00:00 UTC - **Last Updated**: August 07, 2024 at 18:30 UTC - **Reserved Date**: July 12, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Patrice Freydiere ImgSvr (aka ADA Image Server) allows remote attackers to cause a denial of service (daemon crash) via a long HTTP POST request. NOTE: this might be the same issue as CVE-2004-2463. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [imgsvr-http-post-dos(27613)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27613) 2. [1232](http://securityreason.com/securityalert/1232) 3. [20060703 imgsvr dos exploit by n00b](http://www.securityfocus.com/archive/1/438971/100/0/threaded) 4. [18784](http://www.securityfocus.com/bid/18784)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2478, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2478 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2478 - **State**: PUBLISHED - **Published Date**: January 16, 2019 at 19:00 UTC - **Last Updated**: October 02, 2024 at 16:30 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). ### Affected Products **Oracle Corporation - Outside In Technology** Affected versions: - 8.5.3 (Status: affected) - 8.5.4 (Status: affected) ### References 1. [106579](http://www.securityfocus.com/bid/106579) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2109, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2109 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2109 - **State**: PUBLISHED - **Published Date**: March 25, 2025 at 11:12 UTC - **Last Updated**: March 31, 2025 at 16:18 UTC - **Reserved Date**: March 07, 2025 at 21:15 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP Compress – Instant Performance & Speed Optimization plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.30.15 via the init() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query information from internal services. ### CVSS Metrics - **CVSS Base Score**: 5.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **smartersite - WP Compress – Instant Performance & Speed Optimization** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/10b9d703-de9d-472a-bdfb-bc9a41bf375e?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wp-compress-image-optimizer/tags/6.30.15/wp-compress-core.php#L994) 3. [](https://wordpress.org/plugins/wp-compress-image-optimizer/#developers) 4. [](https://plugins.trac.wordpress.org/changeset/3254259/) ### Credits - Michael Mazzolini
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6426, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6426 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6426 - **State**: PUBLISHED - **Published Date**: February 21, 2008 at 00:00 UTC - **Last Updated**: August 07, 2024 at 16:02 UTC - **Reserved Date**: December 18, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple heap-based buffer overflows in EMC RepliStor 6.2 SP2, and possibly earlier versions, allow remote attackers to execute arbitrary code via crafted compressed data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1019457](http://www.securitytracker.com/id?1019457) 2. [ADV-2008-0625](http://www.vupen.com/english/advisories/2008/0625) 3. [27915](http://www.securityfocus.com/bid/27915) 4. [20080219 EMC RepliStor Multiple Heap Overflow Vulnerabilities](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=664) 5. [20080220 Re: iDefense Security Advisory 02.19.08: EMC RepliStor Multiple Heap Overflow Vulnerabilities](http://www.securityfocus.com/archive/1/488419/100/0/threaded) 6. [29011](http://secunia.com/advisories/29011)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7518, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7518 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7518 - **State**: PUBLISHED - **Published Date**: May 24, 2018 at 20:00 UTC - **Last Updated**: September 16, 2024 at 22:41 UTC - **Reserved Date**: February 26, 2018 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description In TotalAlert Web Application in BeaconMedaes Scroll Medical Air Systems prior to v4107600010.23, an attacker with network access to the integrated web server could retrieve default or user defined credentials stored and transmitted in an insecure manner. ### Weakness Classification (CWE) - CWE-522: Security Weakness ### Affected Products **ICS-CERT - BeaconMed&#195;&#166;s TotalAlert Scroll Medical Air Systems web application** Affected versions: - All versions prior to version 4107600010.23 (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSMA-18-144-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11091 - **State**: PUBLISHED - **Published Date**: May 30, 2019 at 15:28 UTC - **Last Updated**: August 04, 2024 at 22:40 UTC - **Reserved Date**: April 11, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf ### Affected Products **Intel Corporation - Central Processing Units (CPUs)** Affected versions: - A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html) 2. [](https://www.synology.com/security/advisory/Synology_SA_19_24) 3. [FEDORA-2019-1f5832fc0e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OH73SGTJ575OBCPSJFX6LX7KP2KZIEN4/) 4. [openSUSE-SU-2019:1505](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html) 5. [RHSA-2019:1455](https://access.redhat.com/errata/RHSA-2019:1455) 6. [USN-3977-3](https://usn.ubuntu.com/3977-3/) 7. [[debian-lts-announce] 20190620 [SECURITY] [DLA 1789-2] intel-microcode security update](https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html) 8. [20190624 [SECURITY] [DSA 4447-2] intel-microcode security update](https://seclists.org/bugtraq/2019/Jun/28) 9. [20190624 [SECURITY] [DSA 4469-1] libvirt security update](https://seclists.org/bugtraq/2019/Jun/36) 10. [](http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt) 11. [](https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf) 12. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en) 13. [openSUSE-SU-2019:1805](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html) 14. [openSUSE-SU-2019:1806](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html) 15. [FreeBSD-SA-19:07](https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.asc) 16. [RHSA-2019:2553](https://access.redhat.com/errata/RHSA-2019:2553) 17. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10292) 18. [](https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf) 19. [20191112 [SECURITY] [DSA 4564-1] linux security update](https://seclists.org/bugtraq/2019/Nov/15) 20. [DSA-4602](https://www.debian.org/security/2020/dsa-4602) 21. [20200114 [SECURITY] [DSA 4602-1] xen security update](https://seclists.org/bugtraq/2020/Jan/21) 22. [GLSA-202003-56](https://security.gentoo.org/glsa/202003-56)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14769, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14769 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14769 - **State**: PUBLISHED - **Published Date**: August 08, 2019 at 01:36 UTC - **Last Updated**: August 05, 2024 at 00:26 UTC - **Reserved Date**: August 07, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Backdrop CMS 1.12.x before 1.12.8 and 1.13.x before 1.13.3 doesn't sufficiently filter output when displaying certain block labels created by administrators. An attacker could potentially craft a specialized label, then have an administrator execute scripting when administering a layout. (This issue is mitigated by the attacker needing permission to create custom blocks on the site, which is typically an administrative permission.) ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://backdropcms.org/security/backdrop-sa-core-2019-011)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2791, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2791 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2791 - **State**: PUBLISHED - **Published Date**: April 02, 2024 at 05:32 UTC - **Last Updated**: August 01, 2024 at 19:25 UTC - **Reserved Date**: March 21, 2024 at 17:14 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widgets in all versions up to, and including, 3.8.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **xpeedstudio - MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/0dad759d-9b44-47ca-8410-e39f65dc919c?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3061715/metform/trunk/widgets/file-upload/file-upload.php) ### Credits - Dau Hoang Tai
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-56049, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-56049 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-56049 - **State**: PUBLISHED - **Published Date**: December 18, 2024 at 18:46 UTC - **Last Updated**: December 18, 2024 at 19:16 UTC - **Reserved Date**: December 14, 2024 at 19:42 UTC - **Assigned By**: Patchstack ### Vulnerability Description Path Traversal: '.../...//' vulnerability in VibeThemes WPLMS allows Path Traversal.This issue affects WPLMS: from n/a before 1.9.9.5.2. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H` ### Weakness Classification (CWE) - CWE-35: Security Weakness ### Affected Products **VibeThemes - WPLMS** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wplms-plugin/vulnerability/wordpress-wplms-plugin-1-9-9-5-2-subscriber-arbitrary-file-deletion-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31245, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31245 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31245 - **State**: PUBLISHED - **Published Date**: May 20, 2022 at 14:20 UTC - **Last Updated**: August 03, 2024 at 07:11 UTC - **Reserved Date**: May 20, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description mailcow before 2022-05d allows a remote authenticated user to inject OS commands and escalate privileges to domain admin via the --debug option in conjunction with the ---PIPEMESS option in Sync Jobs. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/mailcow/mailcow-dockerized/releases/tag/2022-05d) 2. [](https://github.com/ly1g3/Mailcow-CVE-2022-31245)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16754, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16754 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16754 - **State**: PUBLISHED - **Published Date**: September 24, 2019 at 17:50 UTC - **Last Updated**: August 05, 2024 at 01:24 UTC - **Reserved Date**: September 24, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description RIOT 2019.07 contains a NULL pointer dereference in the MQTT-SN implementation (asymcute), potentially allowing an attacker to crash a network node running RIOT. This requires spoofing an MQTT server response. To do so, the attacker needs to know the MQTT MsgID of a pending MQTT protocol message and the ephemeral port used by RIOT's MQTT implementation. Additionally, the server IP address is required for spoofing the packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/RIOT-OS/RIOT/pull/12293)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4283, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4283 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4283 - **State**: PUBLISHED - **Published Date**: August 22, 2006 at 17:00 UTC - **Last Updated**: August 07, 2024 at 19:06 UTC - **Reserved Date**: August 22, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple PHP remote file inclusion vulnerabilities in SOLMETRA SPAW Editor 1.0.6 and 1.0.7 allow remote attackers to execute arbitrary PHP code via a URL in the spaw_dir parameter in dialogs/ scripts including (1) a.php, (2) collorpicker.php, (3) img.php, (4) img_library.php, (5) table.php, or (6) td.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060819 [Kurdish Security # 23] Spaw Editor Remote Include Vulnerability](http://www.securityfocus.com/archive/1/443752/100/0/threaded) 2. [19603](http://www.securityfocus.com/bid/19603) 3. [spaweditor-spawdir-file-include(28466)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28466) 4. [1432](http://securityreason.com/securityalert/1432)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-33278, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-33278 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-33278 - **State**: PUBLISHED - **Published Date**: March 07, 2023 at 04:43 UTC - **Last Updated**: August 03, 2024 at 08:01 UTC - **Reserved Date**: June 14, 2022 at 10:44 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory corruption due to buffer copy without checking the size of input in HLOS when input message size is larger than the buffer capacity. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - AQT1000 (Status: affected) - AR8035 (Status: affected) - CSRA6620 (Status: affected) - CSRA6640 (Status: affected) - QAM8295P (Status: affected) - QCA6390 (Status: affected) - QCA6391 (Status: affected) - QCA6420 (Status: affected) - QCA6421 (Status: affected) - QCA6426 (Status: affected) - QCA6430 (Status: affected) - QCA6431 (Status: affected) - QCA6436 (Status: affected) - QCA6574 (Status: affected) - QCA6574A (Status: affected) - QCA6574AU (Status: affected) - QCA6595 (Status: affected) - QCA6595AU (Status: affected) - QCA6696 (Status: affected) - QCA6698AQ (Status: affected) - QCA8081 (Status: affected) - QCA8337 (Status: affected) - QCC5100 (Status: affected) - QCM2290 (Status: affected) - QCM4290 (Status: affected) - QCM6125 (Status: affected) - QCM6490 (Status: affected) - QCN6024 (Status: affected) - QCN7606 (Status: affected) - QCN9024 (Status: affected) - QCS2290 (Status: affected) - QCS405 (Status: affected) - QCS4290 (Status: affected) - QCS6125 (Status: affected) - QCS6490 (Status: affected) - QSM8350 (Status: affected) - SA4150P (Status: affected) - SA4155P (Status: affected) - SA6145P (Status: affected) - SA6150P (Status: affected) - SA6155 (Status: affected) - SA6155P (Status: affected) - SA8145P (Status: affected) - SA8150P (Status: affected) - SA8155 (Status: affected) - SA8155P (Status: affected) - SA8195P (Status: affected) - SA8295P (Status: affected) - SA8540P (Status: affected) - SA9000P (Status: affected) - SD 675 (Status: affected) - SD 8 Gen1 5G (Status: affected) - SD 8cx Gen3 (Status: affected) - SD460 (Status: affected) - SD480 (Status: affected) - SD662 (Status: affected) - SD665 (Status: affected) - SD670 (Status: affected) - SD675 (Status: affected) - SD678 (Status: affected) - SD680 (Status: affected) - SD690 5G (Status: affected) - SD695 (Status: affected) - SD710 (Status: affected) - SD720G (Status: affected) - SD730 (Status: affected) - SD750G (Status: affected) - SD765 (Status: affected) - SD765G (Status: affected) - SD768G (Status: affected) - SD778G (Status: affected) - SD780G (Status: affected) - SD855 (Status: affected) - SD865 5G (Status: affected) - SD870 (Status: affected) - SD888 (Status: affected) - SD888 5G (Status: affected) - SDX50M (Status: affected) - SDX55M (Status: affected) - SDX65 (Status: affected) - SDXR1 (Status: affected) - SDXR2 5G (Status: affected) - SG4150P (Status: affected) - SM4125 (Status: affected) - SM6250 (Status: affected) - SM7250P (Status: affected) - SM7315 (Status: affected) - SM7325P (Status: affected) - Snapdragon 4 Gen 1 (Status: affected) - SSG2115P (Status: affected) - SSG2125P (Status: affected) - SW5100 (Status: affected) - SW5100P (Status: affected) - SXR1230P (Status: affected) - SXR2150P (Status: affected) - SXR2230P (Status: affected) - WCD9326 (Status: affected) - WCD9335 (Status: affected) - WCD9341 (Status: affected) - WCD9370 (Status: affected) - WCD9375 (Status: affected) - WCD9380 (Status: affected) - WCD9385 (Status: affected) - WCN3910 (Status: affected) - WCN3950 (Status: affected) - WCN3980 (Status: affected) - WCN3988 (Status: affected) - WCN3990 (Status: affected) - WCN3991 (Status: affected) - WCN3998 (Status: affected) - WCN6740 (Status: affected) - WCN6750 (Status: affected) - WCN6850 (Status: affected) - WCN6851 (Status: affected) - WCN6855 (Status: affected) - WCN6856 (Status: affected) - WCN7850 (Status: affected) - WCN7851 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) - WSA8830 (Status: affected) - WSA8832 (Status: affected) - WSA8835 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36580, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36580 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36580 - **State**: PUBLISHED - **Published Date**: August 31, 2022 at 19:44 UTC - **Last Updated**: August 03, 2024 at 10:07 UTC - **Reserved Date**: July 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An arbitrary file upload vulnerability in the component /admin/products/controller.php?action=add of Online Ordering System v2.3.2 allows attackers to execute arbitrary code via a crafted PHP file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Online-Ordering-System/Arbitrary-File-Upload-Vulnerability.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30234, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30234 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30234 - **State**: PUBLISHED - **Published Date**: March 19, 2025 at 00:00 UTC - **Last Updated**: March 19, 2025 at 13:25 UTC - **Reserved Date**: March 19, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SmartOS, as used in Triton Data Center and other products, has static host SSH keys in the 60f76fd2-143f-4f57-819b-1ae32684e81b image (a Debian 12 LX zone image from 2024-07-26). ### CVSS Metrics - **CVSS Base Score**: 8.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-321: Security Weakness ### Affected Products **MNX - SmartOS** Affected versions: - 60f76fd2-143f-4f57-819b-1ae32684e81b (Status: affected) ### References 1. [](https://security.tritondatacenter.com/tps-2025-002/) 2. [](https://smartos.topicbox.com/groups/smartos-discuss/Ta6f13072e6bedddc-M3702e993edd7d6ce8d78dfc8) 3. [](https://www.openwall.com/lists/oss-security/2025/03/13/10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1176, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1176 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1176 - **State**: PUBLISHED - **Published Date**: April 18, 2013 at 18:00 UTC - **Last Updated**: September 16, 2024 at 19:52 UTC - **Reserved Date**: January 11, 2013 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20130417 Cisco TelePresence Infrastructure Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0134, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0134 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0134 - **State**: PUBLISHED - **Published Date**: May 14, 2025 at 18:07 UTC - **Last Updated**: May 15, 2025 at 04:02 UTC - **Reserved Date**: December 20, 2024 at 23:23 UTC - **Assigned By**: palo_alto ### Vulnerability Description A code injection vulnerability in the Palo Alto Networks Cortex XDR® Broker VM allows an authenticated user to execute arbitrary code with root privileges on the host operating system running Broker VM. ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **Palo Alto Networks - Cortex XDR Broker VM** Affected versions: - 26.0.0 (Status: affected) ### References 1. [](https://security.paloaltonetworks.com/CVE-2025-0134) ### Credits - Christiaan van Aken
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4016, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4016 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4016 - **State**: PUBLISHED - **Published Date**: September 28, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 20:21 UTC - **Reserved Date**: July 12, 2012 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description The ATOK application before 1.0.4 for Android allows remote attackers to read the learning information file, and obtain sensitive input-string information, via a crafted application. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [55728](http://www.securityfocus.com/bid/55728) 2. [JVN#93344001](http://jvn.jp/en/jp/JVN93344001/index.html) 3. [85808](http://osvdb.org/85808) 4. [JVNDB-2012-000089](http://jvndb.jvn.jp/jvndb/JVNDB-2012-000089)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5525, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5525 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5525 - **State**: PUBLISHED - **Published Date**: June 01, 2018 at 14:00 UTC - **Last Updated**: September 17, 2024 at 04:29 UTC - **Reserved Date**: January 12, 2018 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description A local file vulnerability exists in the F5 BIG-IP Configuration utility on versions 13.0.0, 12.1.0-12.1.2, 11.6.1-11.6.3.1, 11.5.1-11.5.5, or 11.2.1 that exposes files containing F5-provided data only and do not include any configuration data, proxied traffic, or other potentially sensitive customer data. ### Affected Products **F5 Networks, Inc. - BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator)** Affected versions: - 13.0.0 (Status: affected) - 12.1.0-12.1.2 (Status: affected) - 11.6.1-11.6.3.1 (Status: affected) - 11.5.1-11.5.5 (Status: affected) - 11.2.1 (Status: affected) ### References 1. [](https://support.f5.com/csp/article/K00363258) 2. [1041018](http://www.securitytracker.com/id/1041018)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14668, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14668 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14668 - **State**: PUBLISHED - **Published Date**: August 15, 2019 at 17:31 UTC - **Last Updated**: August 05, 2024 at 09:38 UTC - **Reserved Date**: July 27, 2018 at 00:00 UTC - **Assigned By**: yandex ### Vulnerability Description In ClickHouse before 1.1.54388, "remote" table function allowed arbitrary symbols in "user", "password" and "default_database" fields which led to Cross Protocol Request Forgery Attacks. ### Affected Products **n/a - ClickHouse** Affected versions: - All versions prior to version 1.1.54388. (Status: affected) ### References 1. [](https://clickhouse.yandex/docs/en/security_changelog/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9687, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9687 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9687 - **State**: PUBLISHED - **Published Date**: March 16, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 13:55 UTC - **Reserved Date**: February 27, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openSUSE-SU-2016:0291](http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html) 2. [[oss-security] 20150227 Re: eCryptfs key wrapping help to crack user password](http://www.openwall.com/lists/oss-security/2015/02/28/3) 3. [[oss-security] 20150217 CVE request: Linux kernel ecryptfs 1-byte overwrite](http://www.openwall.com/lists/oss-security/2015/02/17/7) 4. [[oss-security] 20150210 Re: eCryptfs key wrapping help to crack user password](http://www.openwall.com/lists/oss-security/2015/02/10/16) 5. [](https://bugs.launchpad.net/ecryptfs/+bug/906550) 6. [USN-2524-1](http://www.ubuntu.com/usn/USN-2524-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1914, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1914 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1914 - **State**: PUBLISHED - **Published Date**: May 14, 2024 at 13:41 UTC - **Last Updated**: August 01, 2024 at 18:56 UTC - **Reserved Date**: February 27, 2024 at 02:10 UTC - **Assigned By**: ABB ### Vulnerability Description An attacker who successfully exploited these vulnerabilities could cause the robot to stop, make the robot controller inaccessible. The vulnerability could potentially be exploited to perform unauthorized actions by an attacker. This vulnerability arises under specific condition when specially crafted message is processed by the system. Below are reported vulnerabilities in the Robot Ware versions. * IRC5- RobotWare 6 < 6.15.06 except 6.10.10, and 6.13.07 * OmniCore- RobotWare 7 < 7.14 ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **ABB - RobotWare 6** Affected versions: - 6.0.0 (Status: affected) **ABB - RobotWare 7** Affected versions: - 7.0 (Status: affected) ### References 1. [](https://search.abb.com/library/Download.aspx?DocumentID=SI20330&LanguageCode=en&DocumentPartId=&Action=Launch) ### Credits - ABB thanks Yuncheng Wang, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China for responsibly reporting the vulnerabilities and working with us as we addressed them.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5836, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5836 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5836 - **State**: PUBLISHED - **Published Date**: October 16, 2013 at 17:31 UTC - **Last Updated**: August 06, 2024 at 17:22 UTC - **Reserved Date**: September 18, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote attackers to affect confidentiality via unknown vectors related to Business Interlink. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [98475](http://osvdb.org/98475) 2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html) 3. [63083](http://www.securityfocus.com/bid/63083)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28434, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28434 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28434 - **State**: PUBLISHED - **Published Date**: April 21, 2022 at 19:04 UTC - **Last Updated**: August 03, 2024 at 05:56 UTC - **Reserved Date**: April 04, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin.php?id=siteoptions&social=edit&sid=2. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/k0xx11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-47663, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-47663 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-47663 - **State**: PUBLISHED - **Published Date**: April 24, 2025 at 09:25 UTC - **Last Updated**: April 24, 2025 at 15:22 UTC - **Reserved Date**: March 17, 2025 at 08:25 UTC - **Assigned By**: CERTVDE ### Vulnerability Description Due to improper JSON Web Tokens implementation an unauthenticated remote attacker can guess a valid session ID and therefore impersonate a user to gain full access. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-613: Security Weakness ### Affected Products **Franka Robotics - Franka Emika Robot** Affected versions: - 0.0.0 (Status: affected) ### References 1. [](https://www.sciencedirect.com/science/article/pii/S2351978921001657) ### Credits - Siegfried Hollerer by TU Wien
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4874, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4874 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4874 - **State**: PUBLISHED - **Published Date**: May 18, 2025 at 12:00 UTC - **Last Updated**: May 19, 2025 at 14:17 UTC - **Reserved Date**: May 16, 2025 at 19:41 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in PHPGurukul News Portal Project 4.1 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/contactus.php. The manipulation of the argument pagetitle leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **PHPGurukul - News Portal Project** Affected versions: - 4.1 (Status: affected) ### References 1. [VDB-309416 | PHPGurukul News Portal Project contactus.php sql injection](https://vuldb.com/?id.309416) 2. [VDB-309416 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309416) 3. [Submit #576251 | PHPGurukul News Portal Project 4.1 SQL Injection](https://vuldb.com/?submit.576251) 4. [](https://github.com/Schatten-42/MyCVE/issues/7) 5. [](https://phpgurukul.com/) ### Credits - -Schatten- (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0956, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0956 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0956 - **State**: PUBLISHED - **Published Date**: September 28, 2012 at 15:00 UTC - **Last Updated**: September 16, 2024 at 19:35 UTC - **Reserved Date**: February 01, 2012 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description ubiquity-slideshow-ubuntu before 58.2, during installation, allows remote man-in-the-middle attackers to execute arbitrary web script or HTML and read arbitrary files via a crafted attribute in the <a> tag of a Twitter feed. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-1561-1](http://www.ubuntu.com/usn/USN-1561-1) 2. [](https://bugs.launchpad.net/ubuntu/%2Bsource/ubiquity-slideshow-ubuntu/%2Bbug/991982)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3447, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3447 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3447 - **State**: PUBLISHED - **Published Date**: April 21, 2016 at 10:00 UTC - **Last Updated**: October 15, 2024 at 19:04 UTC - **Reserved Date**: March 17, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect confidentiality and integrity via vectors related to OAF Core. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html) 2. [1035603](http://www.securitytracker.com/id/1035603)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2579, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2579 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2579 - **State**: PUBLISHED - **Published Date**: August 05, 2009 at 19:00 UTC - **Last Updated**: August 07, 2024 at 05:59 UTC - **Reserved Date**: July 23, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in reward_points.post.php in the Reward points addon in CS-Cart before 2.0.6 allows remote authenticated users to execute arbitrary SQL commands via the sort_order parameter in a reward_points.userlog action to index.php, a different vulnerability than CVE-2005-4429.2. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [35936](http://www.securityfocus.com/bid/35936) 2. [36112](http://secunia.com/advisories/36112) 3. [20090804 [BONSAI] SQL Injection in CS-Cart](http://www.securityfocus.com/archive/1/505492/100/0/threaded) 4. [](http://www.bonsai-sec.com/research/vulnerabilities/cs-cart_SQL-injection-0100.txt) 5. [](http://www.cs-cart.com/changelog206.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6527, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6527 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6527 - **State**: PUBLISHED - **Published Date**: March 09, 2017 at 19:00 UTC - **Last Updated**: August 05, 2024 at 15:33 UTC - **Reserved Date**: March 07, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in dnaTools dnaLIMS 4-2015s13. dnaLIMS is vulnerable to a NUL-terminated directory traversal attack allowing an unauthenticated attacker to access system files readable by the web server user (by using the viewAppletFsa.cgi seqID parameter). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [96823](http://www.securityfocus.com/bid/96823) 2. [](https://www.shorebreaksecurity.com/blog/product-security-advisory-psa0002-dnalims/) 3. [41578](https://www.exploit-db.com/exploits/41578/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11190, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11190 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11190 - **State**: PUBLISHED - **Published Date**: June 01, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 08:01 UTC - **Reserved Date**: May 16, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Quest DR Series Disk Backup software version before 4.0.3.1 allows privilege escalation (issue 2 of 6). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20180531 [CORE-2018-0002] - Quest DR Series Disk Backup Multiple Vulnerabilities](http://seclists.org/fulldisclosure/2018/May/71) 2. [](http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html) 3. [](https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3929, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3929 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3929 - **State**: PUBLISHED - **Published Date**: April 25, 2024 at 07:33 UTC - **Last Updated**: August 01, 2024 at 20:26 UTC - **Reserved Date**: April 17, 2024 at 16:52 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Content Views – Post Grid & Filter, Recent Posts, Category Posts, & More (Gutenberg Blocks and Shortcode) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Widget Post Overlay block in all versions up to, and including, 3.7.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **pt-guy - Content Views – Post Grid & Filter, Recent Posts, Category Posts, & More (Gutenberg Blocks and Shortcode)** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5666da4a-ffb6-47ed-8b48-a80f09dd2501?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3074758%40content-views-query-and-display-post-page&new=3074758%40content-views-query-and-display-post-page&sfp_email=&sfph_mail=) ### Credits - wesley
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36481 - **State**: PUBLISHED - **Published Date**: August 28, 2023 at 00:00 UTC - **Last Updated**: October 02, 2024 at 17:33 UTC - **Reserved Date**: June 22, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Samsung Exynos Mobile Processor and Wearable Processor 9810, 9610, 9820, 980, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, and W920. Improper handling of PPP length parameter inconsistency can cause an infinite loop. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://semiconductor.samsung.com/support/quality-support/product-security-updates/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30335, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30335 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30335 - **State**: PUBLISHED - **Published Date**: April 02, 2024 at 17:48 UTC - **Last Updated**: August 02, 2024 at 01:32 UTC - **Reserved Date**: March 26, 2024 at 18:52 UTC - **Assigned By**: zdi ### Vulnerability Description Foxit PDF Reader AcroForm Annotation Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22641. ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Foxit - PDF Reader** Affected versions: - 2023.2.0.21408 (Status: affected) ### References 1. [ZDI-24-304](https://www.zerodayinitiative.com/advisories/ZDI-24-304/) 2. [vendor-provided URL](https://www.foxit.com/support/security-bulletins.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1077, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1077 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1077 - **State**: PUBLISHED - **Published Date**: February 08, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:12 UTC - **Reserved Date**: February 08, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unknown vulnerability in UFS for Solaris 9 for SPARC, with logging enabled, allows local users to cause a denial of service (UFS file system hang). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1006233](http://www.securitytracker.com/id?1006233) 2. [7032](http://www.securityfocus.com/bid/7032) 3. [51300](http://sunsolve.sun.com/search/document.do?assetkey=1-26-51300-1) 4. [8234](http://secunia.com/advisories/8234/) 5. [solaris-ufs-logging-dos(11481)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11481)