System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0578, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0578 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0578 - **State**: PUBLISHED - **Published Date**: February 04, 2000 at 05:00 UTC - **Last Updated**: August 01, 2024 at 16:41 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/228)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26358, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26358 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26358 - **State**: PUBLISHED - **Published Date**: February 12, 2025 at 13:28 UTC - **Last Updated**: February 17, 2025 at 10:09 UTC - **Reserved Date**: February 07, 2025 at 09:03 UTC - **Assigned By**: Nozomi ### Vulnerability Description A CWE-20 "Improper Input Validation" in ldbMT.so in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to modify system configuration via crafted HTTP requests. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Q-Free - MaxTime** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26358) ### Credits - Diego Giubertoni of Nozomi Networks found this bug during a security research activity. - Q-Free
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-1252, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-1252 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-1252 - **State**: PUBLISHED - **Published Date**: June 25, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:51 UTC - **Reserved Date**: May 01, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Network Associates PGP Keyserver 7.0 allows remote attackers to bypass authentication and access the administrative web interface via URLs that directly access cgi-bin instead of keyserver/cgi-bin for the programs (1) console, (2) cs, (3) multi_config and (4) directory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1955](http://www.osvdb.org/1955) 2. [20010928 SNS-43: PGP Keyserver Permissions Misconfiguration](http://archives.neohapsis.com/archives/bugtraq/2001-09/0230.html) 3. [](http://www.pgp.com/support/product-advisories/keyserver.asp) 4. [4193](http://www.osvdb.org/4193) 5. [pgp-keyserver-http-dos(7203)](http://www.iss.net/security_center/static/7203.php) 6. [3375](http://www.securityfocus.com/bid/3375)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47928, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47928 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47928 - **State**: PUBLISHED - **Published Date**: December 22, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 15:02 UTC - **Reserved Date**: December 22, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In MISP before 2.4.167, there is XSS in the template file uploads in app/View/Templates/upload_file.ctp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/MISP/MISP/commit/684d3e51398d4ea032b06fa4a1cd2bdf7d8b0ede) 2. [](https://zigrin.com/advisories/misp-reflected-xss-in-uploadfile-action-of-the-templates-controllermisp/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41154, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41154 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41154 - **State**: PUBLISHED - **Published Date**: September 13, 2023 at 00:00 UTC - **Last Updated**: September 26, 2024 at 13:15 UTC - **Reserved Date**: August 24, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://webmin.com/tags/webmin-changelog/) 2. [](https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41154)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19148, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19148 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19148 - **State**: PUBLISHED - **Published Date**: November 10, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 11:30 UTC - **Reserved Date**: November 10, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Caddy through 0.11.0 sends incorrect certificates for certain invalid requests, making it easier for attackers to enumerate hostnames. Specifically, when unable to match a Host header with a vhost in its configuration, it serves the X.509 certificate for a randomly selected vhost in its configuration. Repeated requests (with a nonexistent hostname in the Host header) permit full enumeration of all certificates on the server. This generally permits an attacker to easily and accurately discover the existence of and relationships among hostnames that weren't meant to be public, though this information could likely have been discovered via other methods with additional effort. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/mholt/caddy/pull/2015) 2. [](https://github.com/mholt/caddy/issues/1303) 3. [](https://github.com/mholt/caddy/issues/2334)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37473, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37473 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37473 - **State**: PUBLISHED - **Published Date**: July 26, 2021 at 17:11 UTC - **Last Updated**: August 04, 2024 at 01:22 UTC - **Reserved Date**: July 26, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In NavigateCMS version 2.9.4 and below, function in `product.php` is vulnerable to sql injection on parameter `products-order` through a post request, which results in arbitrary sql query execution in the backend database. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/victomteng1997/ed429fed7de46651c89f05e7591fd4fe) 2. [](https://github.com/NavigateCMS/Navigate-CMS) 3. [](https://github.com/NavigateCMS/Navigate-CMS/issues/26)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42118, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42118 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42118 - **State**: PUBLISHED - **Published Date**: July 30, 2024 at 07:46 UTC - **Last Updated**: May 04, 2025 at 09:23 UTC - **Reserved Date**: July 29, 2024 at 15:50 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Do not return negative stream id for array [WHY] resource_stream_to_stream_idx returns an array index and it return -1 when not found; however, -1 is not a valid array index number. [HOW] When this happens, call ASSERT(), and return a zero instead. This fixes an OVERRUN and an NEGATIVE_RETURNS issues reported by Coverity. ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 6.9.9 (Status: unaffected) - 6.10 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/a76fa9c4f0fc0aa6f517da3fa7d7c23e8a32c7d0) 2. [](https://git.kernel.org/stable/c/3ac31c9a707dd1c7c890b95333182f955e9dcb57)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0085, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0085 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0085 - **State**: PUBLISHED - **Published Date**: March 02, 2023 at 16:01 UTC - **Last Updated**: January 13, 2025 at 17:03 UTC - **Reserved Date**: January 05, 2023 at 14:15 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to reCaptcha Bypass in versions up to, and including, 3.2.1. This is due to insufficient server side checking on the captcha value submitted during a form submission. This makes it possible for unauthenticated attackers to bypass Captcha restrictions and for attackers to utilize bots to submit forms. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Affected Products **xpeedstudio - Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/69527d4b-49b6-47cd-93b6-39350f881ec9) 2. [](https://wordpress.org/plugins/metform/) 3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2868889%40metform&new=2868889%40metform&sfp_email=&sfph_mail=) ### Credits - Mohammed El Amin, Chemouri
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25314, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25314 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25314 - **State**: PUBLISHED - **Published Date**: February 18, 2022 at 04:25 UTC - **Last Updated**: May 05, 2025 at 16:23 UTC - **Reserved Date**: February 18, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/libexpat/libexpat/pull/560) 2. [[oss-security] 20220219 Expat 2.4.5 released, includes 5 security fixes](http://www.openwall.com/lists/oss-security/2022/02/19/1) 3. [DSA-5085](https://www.debian.org/security/2022/dsa-5085) 4. [FEDORA-2022-04f206996b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/) 5. [FEDORA-2022-3d9d67f558](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/) 6. [](https://www.oracle.com/security-alerts/cpuapr2022.html) 7. [](https://security.netapp.com/advisory/ntap-20220303-0008/) 8. [](https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf) 9. [GLSA-202209-24](https://security.gentoo.org/glsa/202209-24)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3051, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3051 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3051 - **State**: PUBLISHED - **Published Date**: September 23, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:53 UTC - **Reserved Date**: September 23, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in the ARJ plugin (arj.dll) 3.9.2.0 for 7-Zip 3.13, 4.23, and 4.26 BETA, as used in products including Turbo Searcher, allows remote attackers to execute arbitrary code via a large ARJ block. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [14925](http://www.securityfocus.com/bid/14925) 2. [](http://secunia.com/secunia_research/2005-45/advisory/) 3. [turbo-searcher-arj-bo(30438)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30438) 4. [ADV-2006-4603](http://www.vupen.com/english/advisories/2006/4603) 5. [1017261](http://securitytracker.com/id?1017261) 6. [](http://www.vuln.sg/turbosearcher330-en.html) 7. [21208](http://www.securityfocus.com/bid/21208) 8. [23004](http://secunia.com/advisories/23004) 9. [16664](http://secunia.com/advisories/16664/) 10. [20050923 Secunia Research: 7-Zip ARJ Archive Handling Buffer Overflow](http://marc.info/?l=bugtraq&m=112749134603258&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21436, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21436 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21436 - **State**: PUBLISHED - **Published Date**: March 12, 2024 at 16:58 UTC - **Last Updated**: May 03, 2025 at 00:47 UTC - **Reserved Date**: December 08, 2023 at 22:45 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Installer Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Installer Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21436)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27382, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27382 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27382 - **State**: PUBLISHED - **Published Date**: May 10, 2023 at 13:16 UTC - **Last Updated**: January 27, 2025 at 18:11 UTC - **Reserved Date**: March 04, 2023 at 04:00 UTC - **Assigned By**: intel ### Vulnerability Description Incorrect default permissions in the Audio Service for some Intel(R) NUC P14E Laptop Element software for Windows 10 before version 1.0.0.156 may allow an authenticated user to potentially enable escalation of privilege via local access. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-276: Security Weakness ### Affected Products **n/a - Intel(R) NUC P14E Laptop Element software for Windows 10** Affected versions: - before version 1.0.0.156 (Status: affected) ### References 1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00802.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00802.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8537, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8537 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8537 - **State**: PUBLISHED - **Published Date**: December 18, 2019 at 17:33 UTC - **Last Updated**: August 04, 2024 at 21:24 UTC - **Reserved Date**: February 18, 2019 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An access issue was addressed with improved memory management. This issue is fixed in macOS Mojave 10.14.4. A local user may be able to view a user’s locked notes. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/HT209600)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4399, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4399 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4399 - **State**: PUBLISHED - **Published Date**: December 04, 2010 at 23:00 UTC - **Last Updated**: September 16, 2024 at 18:08 UTC - **Reserved Date**: December 04, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in languages.inc.php in DynPG CMS 4.1.1 and 4.2.0, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the CHG_DYNPG_SET_LANGUAGE parameter to index.php. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226) 2. [45115](http://www.securityfocus.com/bid/45115) 3. [42380](http://secunia.com/advisories/42380) 4. [69539](http://osvdb.org/69539) 5. [](http://packetstormsecurity.org/files/view/96230/dynpg-lfisqldisclose.txt) 6. [](http://www.htbridge.ch/advisory/lfi_in_dynpg.html) 7. [15646](http://www.exploit-db.com/exploits/15646)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4794, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4794 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4794 - **State**: PUBLISHED - **Published Date**: May 02, 2006 at 18:00 UTC - **Last Updated**: August 08, 2024 at 00:01 UTC - **Reserved Date**: May 02, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cisco IP Phones 7902/7905/7912, ATA 186/188, Unity Express, ACNS, and Subscriber Edge Services Manager (SESM) allows remote attackers to cause a denial of service (crash or instability) via a compressed DNS packet with a label length byte with an incorrect offset. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [cisco-dns-dos(20712)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20712) 2. [1014044](http://securitytracker.com/id?1014044) 3. [1014043](http://securitytracker.com/id?1014043) 4. [13729](http://www.securityfocus.com/bid/13729) 5. [15472](http://secunia.com/advisories/15472) 6. [](http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en) 7. [1014046](http://securitytracker.com/id?1014046) 8. [19003](http://www.osvdb.org/19003) 9. [1015975](http://securitytracker.com/id?1015975) 10. [20050524 Crafted DNS Packet Can Cause Denial Of Service](http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml) 11. [1014045](http://securitytracker.com/id?1014045) 12. [](http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1461, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1461 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1461 - **State**: PUBLISHED - **Published Date**: April 16, 2010 at 19:00 UTC - **Last Updated**: August 07, 2024 at 01:28 UTC - **Reserved Date**: April 16, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in the Photo Battle (com_photobattle) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via the view parameter to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [63800](http://osvdb.org/63800) 2. [39504](http://www.securityfocus.com/bid/39504) 3. [12232](http://www.exploit-db.com/exploits/12232) 4. [39469](http://secunia.com/advisories/39469)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39337, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39337 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39337 - **State**: PUBLISHED - **Published Date**: December 22, 2023 at 15:06 UTC - **Last Updated**: August 03, 2024 at 12:00 UTC - **Reserved Date**: September 02, 2022 at 14:16 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Hertzbeat is an open source, real-time monitoring system with custom-monitoring, high performance cluster, prometheus-like and agentless. Hertzbeat versions 1.20 and prior have a permission bypass vulnerability. System authentication can be bypassed and invoke interfaces without authorization. Version 1.2.1 contains a patch for this issue. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness - CWE-863: Incorrect Authorization ### Affected Products **dromara - hertzbeat** Affected versions: - <= 1.2.0 (Status: affected) ### References 1. [https://github.com/dromara/hertzbeat/security/advisories/GHSA-434f-f5cw-3rj6](https://github.com/dromara/hertzbeat/security/advisories/GHSA-434f-f5cw-3rj6) 2. [https://github.com/dromara/hertzbeat/issues/377](https://github.com/dromara/hertzbeat/issues/377) 3. [https://github.com/dromara/hertzbeat/pull/382](https://github.com/dromara/hertzbeat/pull/382) 4. [https://github.com/dromara/hertzbeat/commit/ac5970c6ceb64fafe237fc895243df5f21e40876](https://github.com/dromara/hertzbeat/commit/ac5970c6ceb64fafe237fc895243df5f21e40876)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4501, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4501 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4501 - **State**: PUBLISHED - **Published Date**: November 22, 2011 at 11:00 UTC - **Last Updated**: September 17, 2024 at 01:26 UTC - **Reserved Date**: November 22, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The UPnP IGD implementation in Edimax EdiLinux on the Edimax BR-6104K with firmware before 3.25, Edimax 6114Wg, Canyon-Tech CN-WF512 with firmware 1.83, Canyon-Tech CN-WF514 with firmware 2.08, Sitecom WL-153 with firmware before 1.39, and Sweex LB000021 with firmware 3.15 allows remote attackers to establish arbitrary port mappings by sending a UPnP AddPortMapping action in a SOAP request to the WAN interface, related to an "external forwarding" vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.upnp-hacks.org/devices.html) 2. [](http://www.upnp-hacks.org/suspect.html) 3. [VU#357851](http://www.kb.cert.org/vuls/id/357851)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-44607, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-44607 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-44607 - **State**: REJECTED - **Last Updated**: May 28, 2025 at 18:21 UTC - **Reserved Date**: December 07, 2022 at 04:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7810, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7810 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7810 - **State**: PUBLISHED - **Published Date**: November 22, 2019 at 14:23 UTC - **Last Updated**: August 06, 2024 at 07:58 UTC - **Reserved Date**: October 12, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description libbluray MountManager class has a time-of-check time-of-use (TOCTOU) race when expanding JAR files ### Affected Products **libbluray - libbluray** Affected versions: - 1 (Status: affected) ### References 1. [](https://security-tracker.debian.org/tracker/CVE-2015-7810) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-7810) 3. [](https://access.redhat.com/security/cve/cve-2015-7810) 4. [](http://www.securityfocus.com/bid/72769) 5. [](http://www.openwall.com/lists/oss-security/2015/10/12/7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6852, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6852 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6852 - **State**: PUBLISHED - **Published Date**: December 16, 2023 at 11:31 UTC - **Last Updated**: August 02, 2024 at 08:42 UTC - **Reserved Date**: December 15, 2023 at 16:38 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in kalcaddle KodExplorer up to 4.51.03. Affected is an unknown function of the file plugins/webodf/app.php. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.52.01 is able to address this issue. The name of the patch is 5cf233f7556b442100cf67b5e92d57ceabb126c6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-248220. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **kalcaddle - KodExplorer** Affected versions: - 4.51.03 (Status: affected) ### References 1. [](https://vuldb.com/?id.248220) 2. [](https://vuldb.com/?ctiid.248220) 3. [](https://note.zhaoj.in/share/P6lQNyqQn3zY) 4. [](https://github.com/kalcaddle/KodExplorer/commit/5cf233f7556b442100cf67b5e92d57ceabb126c6) 5. [](https://github.com/kalcaddle/KodExplorer/releases/tag/4.52.01) ### Credits - glzjin (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2970, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2970 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2970 - **State**: REJECTED - **Published Date**: July 31, 2014 at 01:00 UTC - **Last Updated**: July 31, 2014 at 01:57 UTC - **Reserved Date**: April 21, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-6569, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-6569 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-6569 - **State**: PUBLISHED - **Published Date**: June 20, 2013 at 15:00 UTC - **Last Updated**: September 17, 2024 at 02:36 UTC - **Reserved Date**: June 20, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to execute arbitrary code via a long URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194370.htm)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32883, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32883 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32883 - **State**: PUBLISHED - **Published Date**: January 02, 2024 at 02:49 UTC - **Last Updated**: June 03, 2025 at 14:46 UTC - **Reserved Date**: May 16, 2023 at 03:04 UTC - **Assigned By**: MediaTek ### Vulnerability Description In Engineer Mode, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08282249; Issue ID: ALPS08282249. ### Affected Products **MediaTek, Inc. - MT2713, MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798** Affected versions: - Android 12.0, 13.0 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/January-2024)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6164, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6164 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6164 - **State**: PUBLISHED - **Published Date**: November 29, 2007 at 01:00 UTC - **Last Updated**: August 07, 2024 at 15:54 UTC - **Reserved Date**: November 28, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in Eurologon CMS allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) reviews.php, (2) links.php and (3) articles.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4665](https://www.exploit-db.com/exploits/4665) 2. [26599](http://www.securityfocus.com/bid/26599) 3. [20071127 Eurologon CMS Multiple SQL Injection](http://www.securityfocus.com/archive/1/484275/100/0/threaded) 4. [eurologoncms-id-sql-injection(38656)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38656)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3409, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3409 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3409 - **State**: PUBLISHED - **Published Date**: October 10, 2013 at 10:00 UTC - **Last Updated**: September 16, 2024 at 20:37 UTC - **Reserved Date**: May 06, 2013 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The portal in Cisco Prime Central for Hosted Collaboration Solution (HCS) places cleartext credentials in temporary files, which allows local users to obtain sensitive information by leveraging weak file permissions to read these files, aka Bug IDs CSCuh33735 and CSCuh34230. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20131009 Cisco Prime Central for HCS Portal Credentials Access Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3409)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3004, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3004 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3004 - **State**: PUBLISHED - **Published Date**: June 13, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 18:16 UTC - **Reserved Date**: June 12, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Ez Ringtone Manager allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter in player.php and (2) keyword parameter when performing a search. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ezringtone-player-xss(27062)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27062) 2. [20530](http://secunia.com/advisories/20530) 3. [1097](http://securityreason.com/securityalert/1097) 4. [20060608 Ez Ringtone Manager from scriptez.net - XSS](http://www.securityfocus.com/archive/1/436424) 5. [18340](http://www.securityfocus.com/bid/18340) 6. [ADV-2006-2237](http://www.vupen.com/english/advisories/2006/2237)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1826, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1826 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1826 - **State**: PUBLISHED - **Published Date**: April 16, 2008 at 10:00 UTC - **Last Updated**: August 07, 2024 at 08:40 UTC - **Reserved Date**: April 15, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple unspecified vulnerabilities in Oracle E-Business Suite 11.5.10.2 have unknown impact and attack vectors related to (a) Advanced Pricing, aka (1) APP01 and (2) APP10; and (b) Applications Framework, aka (3) APP05. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oracle-cpu-april-2008(41858)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41858) 2. [ADV-2008-1267](http://www.vupen.com/english/advisories/2008/1267/references) 3. [ADV-2008-1233](http://www.vupen.com/english/advisories/2008/1233/references) 4. [oracle-ebusiness-advpricing-unspecified2(42055)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42055) 5. [1019855](http://www.securitytracker.com/id?1019855) 6. [oracle-ebusiness-advpricing-unspecified(42053)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42053) 7. [29829](http://secunia.com/advisories/29829) 8. [HPSBMA02133](http://www.securityfocus.com/archive/1/491024/100/0/threaded) 9. [](http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html) 10. [oracle-ebusiness-appframework-unspecified(42054)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42054) 11. [29874](http://secunia.com/advisories/29874) 12. [SSRT061201](http://www.securityfocus.com/archive/1/491024/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11440, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11440 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11440 - **State**: PUBLISHED - **Published Date**: July 23, 2020 at 13:59 UTC - **Last Updated**: August 04, 2024 at 11:28 UTC - **Reserved Date**: March 31, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description httpRpmFs in WebCLI in Wind River VxWorks 5.5 through 7 SR0640 has no check for an escape from the web root. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://windriver.com) 2. [](https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2020-11440)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0918, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0918 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0918 - **State**: PUBLISHED - **Published Date**: March 21, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 13:25 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description Gitlab Community Edition version 10.3 is vulnerable to a path traversal issue in the GitLab CI runner component resulting in remote code execution. ### Weakness Classification (CWE) - CWE-23: Security Weakness ### Affected Products **GitLab - GitLab Community and Enterprise Editions** Affected versions: - 8.4.0 - 10.1.5 Fixed in 10.1.6 (Status: affected) - 10.2.0 - 10.2.5 Fixed in 10.2.6 (Status: affected) - 10.3.0 - 10.3.3 Fixed in 10.3.4 (Status: affected) ### References 1. [DSA-4145](https://www.debian.org/security/2018/dsa-4145) 2. [](https://hackerone.com/reports/301432) 3. [](https://about.gitlab.com/2018/01/16/gitlab-10-dot-3-dot-4-released/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4946, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4946 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4946 - **State**: PUBLISHED - **Published Date**: July 22, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 07:24 UTC - **Reserved Date**: July 22, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in the Messaging (com_messaging) component before 1.5.1 for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the controller parameter in a messages action to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [messaging-index-file-include(49650)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49650) 2. [53195](http://osvdb.org/53195) 3. [34365](http://www.securityfocus.com/bid/34365) 4. [34562](http://secunia.com/advisories/34562)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28077, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28077 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28077 - **State**: PUBLISHED - **Published Date**: February 10, 2024 at 03:11 UTC - **Last Updated**: August 02, 2024 at 12:30 UTC - **Reserved Date**: March 10, 2023 at 05:10 UTC - **Assigned By**: dell ### Vulnerability Description Dell BSAFE SSL-J, versions prior to 6.5, and versions 7.0 and 7.1 contain a debug message revealing unnecessary information vulnerability. This may lead to disclosing sensitive information to a locally privileged user. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-1295: Security Weakness ### Affected Products **Dell - Dell BSAFE SSL-J ** Affected versions: - 6.0.x (Status: affected) - 7.0 (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000214287/dsa-2023-156-dell-bsafe-ssl-j-7-1-1-security-update)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5878, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5878 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5878 - **State**: PUBLISHED - **Published Date**: August 08, 2016 at 01:00 UTC - **Last Updated**: August 06, 2024 at 01:15 UTC - **Reserved Date**: June 29, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Open redirect vulnerability in IBM FileNet Workplace 4.0.2 before 4.0.2.14 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [92279](http://www.securityfocus.com/bid/92279) 2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21987721)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39894, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39894 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39894 - **State**: PUBLISHED - **Published Date**: October 05, 2021 at 12:33 UTC - **Last Updated**: August 04, 2024 at 02:20 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description In all versions of GitLab CE/EE since version 8.0, a DNS rebinding vulnerability exists in Fogbugz importer which may be used by attackers to exploit Server Side Request Forgery attacks. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N` ### Affected Products **GitLab - GitLab** Affected versions: - >=8.0, <14.1.7 (Status: affected) - >=14.2, <14.2.5 (Status: affected) - >=14.3, <14.3.1 (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/214399) 2. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39894.json) ### Credits - This vulnerability was discovered internally by the GitLab team.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31707, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31707 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31707 - **State**: PUBLISHED - **Published Date**: December 16, 2022 at 00:00 UTC - **Last Updated**: April 18, 2025 at 13:29 UTC - **Reserved Date**: May 25, 2022 at 00:00 UTC - **Assigned By**: vmware ### Vulnerability Description vRealize Operations (vROps) contains a privilege escalation vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.2. ### Affected Products **n/a - VMware vRealize Operations (vROps)** Affected versions: - VMware vRealize Operations (vROps) (Multiple Versions) (Status: affected) ### References 1. [](https://www.vmware.com/security/advisories/VMSA-2022-0034.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23060, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23060 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23060 - **State**: REJECTED - **Last Updated**: December 30, 2022 at 00:00 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3291, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3291 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3291 - **State**: PUBLISHED - **Published Date**: June 07, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 19:57 UTC - **Reserved Date**: June 07, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.infradead.org/openconnect/changelog.html) 2. [DSA-2495](http://www.debian.org/security/2012/dsa-2495) 3. [FEDORA-2012-6758](http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079747.html) 4. [oval:org.mitre.oval:def:17242](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17242) 5. [openSUSE-SU-2013:1072](http://lists.opensuse.org/opensuse-updates/2013-06/msg00186.html) 6. [](http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27821, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27821 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27821 - **State**: PUBLISHED - **Published Date**: December 08, 2020 at 21:33 UTC - **Last Updated**: August 04, 2024 at 16:25 UTC - **Reserved Date**: October 27, 2020 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **n/a - QEMU** Affected versions: - prior to 5.2.0 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1902651) 2. [[oss-security] 20201216 CVE-2020-27821 QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c](http://www.openwall.com/lists/oss-security/2020/12/16/6) 3. [](https://security.netapp.com/advisory/ntap-20210115-0006/) 4. [[debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update](https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29006 - **State**: PUBLISHED - **Published Date**: April 04, 2024 at 07:48 UTC - **Last Updated**: March 27, 2025 at 19:43 UTC - **Reserved Date**: March 13, 2024 at 22:56 UTC - **Assigned By**: apache ### Vulnerability Description By default the CloudStack management server honours the x-forwarded-for HTTP header and logs it as the source IP of an API request. This could lead to authentication bypass and other operational problems should an attacker decide to spoof their IP address this way. Users are recommended to upgrade to CloudStack version 4.18.1.1 or 4.19.0.1, which fixes this issue. ### Weakness Classification (CWE) - CWE-290: Security Weakness ### Affected Products **Apache Software Foundation - Apache CloudStack** Affected versions: - 4.11.0.0 (Status: affected) - 4.19.0.0 (Status: affected) ### References 1. [](https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp) ### Credits - Yuyang Xiao <superxyyang@gmail.com>
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54536, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54536 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54536 - **State**: PUBLISHED - **Published Date**: January 27, 2025 at 21:45 UTC - **Last Updated**: January 31, 2025 at 21:40 UTC - **Reserved Date**: December 03, 2024 at 22:50 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with improved validation of environment variables. This issue is fixed in macOS Sequoia 15.2. An app may be able to edit NVRAM variables. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/121839)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16216, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16216 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16216 - **State**: PUBLISHED - **Published Date**: September 18, 2019 at 11:08 UTC - **Last Updated**: August 05, 2024 at 01:10 UTC - **Reserved Date**: September 11, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Zulip server before 2.0.5 incompletely validated the MIME types of uploaded files. A user who is logged into the server could upload files of certain types to mount a stored cross-site scripting attack on other logged-in users. On a Zulip server using the default local uploads backend, the attack is only effective against browsers lacking support for Content-Security-Policy such as Internet Explorer 11. On a Zulip server using the S3 uploads backend, the attack is confined to the origin of the configured S3 uploads hostname and cannot reach the Zulip server itself. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.zulip.org/2019/09/11/zulip-server-2-0-5-security-release/) 2. [](https://github.com/zulip/zulip/commit/1195841dfb9aa26b3b0dabc6f05d72e4af25be3e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4554, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4554 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4554 - **State**: PUBLISHED - **Published Date**: November 11, 2012 at 11:00 UTC - **Last Updated**: September 17, 2024 at 00:00 UTC - **Reserved Date**: August 21, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The OpenID module in Drupal 7.x before 7.16 allows remote OpenID servers to read arbitrary files via a crafted DOCTYPE declaration in an XRDS file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://drupalcode.org/project/drupal.git/commit/b912710) 2. [[oss-security] 20121029 CVE request: Drupal SA-CORE-2012-003](http://www.openwall.com/lists/oss-security/2012/10/29/4) 3. [](http://drupal.org/node/1815912) 4. [[oss-security] 20121029 Re: CVE request: Drupal SA-CORE-2012-003](http://www.openwall.com/lists/oss-security/2012/10/30/5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5067, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5067 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5067 - **State**: PUBLISHED - **Published Date**: July 20, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 05:26 UTC - **Reserved Date**: January 03, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. ### Affected Products **n/a - Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions** Affected versions: - Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb18-21.html) 2. [1041250](http://www.securitytracker.com/id/1041250)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4159, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4159 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4159 - **State**: PUBLISHED - **Published Date**: August 03, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 14:46 UTC - **Reserved Date**: August 03, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description index.html in the HTTP administration interface in certain daemons in TIBCO Rendezvous (RV) 7.5.2 allows remote attackers to obtain sensitive information, such as a user name and IP addresses, via a direct request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1018512](http://www.securitytracker.com/id?1018512) 2. [20070730 Security Testing Enterprise Messaging Systems](http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0620.html) 3. [46993](http://osvdb.org/46993) 4. [](http://www.irmplc.com/content/pdfs/Security_Testing_Enterprise_Messaging_Systems.pdf) 5. [ADV-2007-2814](http://www.vupen.com/english/advisories/2007/2814)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0476, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0476 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0476 - **State**: PUBLISHED - **Published Date**: January 15, 2025 at 23:44 UTC - **Last Updated**: January 16, 2025 at 14:22 UTC - **Reserved Date**: January 14, 2025 at 20:51 UTC - **Assigned By**: Mattermost ### Vulnerability Description Mattermost Mobile Apps versions <=2.22.0 fail to properly handle specially crafted attachment names, which allows an attacker to crash the mobile app for any user who opened a channel containing the specially crafted attachment ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-1287: Security Weakness ### Affected Products **Mattermost - Mattermost** Affected versions: - 0 (Status: affected) - 2.23.0 (Status: unaffected) ### References 1. [](https://mattermost.com/security-updates) ### Credits - lsibilev
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1434, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1434 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1434 - **State**: PUBLISHED - **Published Date**: August 23, 2013 at 16:00 UTC - **Last Updated**: August 06, 2024 at 15:04 UTC - **Reserved Date**: January 26, 2013 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description Multiple SQL injection vulnerabilities in (1) api_poller.php and (2) utility.php in Cacti before 0.8.8b allow remote attackers to execute arbitrary SQL commands via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [54181](http://secunia.com/advisories/54181) 2. [61657](http://www.securityfocus.com/bid/61657) 3. [openSUSE-SU-2013:1377](http://lists.opensuse.org/opensuse-updates/2013-08/msg00053.html) 4. [DSA-2739](http://www.debian.org/security/2012/dsa-2739) 5. [54386](http://secunia.com/advisories/54386) 6. [](http://svn.cacti.net/viewvc?view=rev&revision=7394) 7. [1028893](http://www.securitytracker.com/id/1028893) 8. [](http://forums.cacti.net/viewtopic.php?f=21&t=50593) 9. [[oss-security] 20130807 Re: CVE request: SQL injection and shell escaping issues in Cacti < 0.8.8b](http://www.openwall.com/lists/oss-security/2013/08/07/15)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0107, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0107 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0107 - **State**: PUBLISHED - **Published Date**: February 18, 2019 at 17:00 UTC - **Last Updated**: September 16, 2024 at 19:01 UTC - **Reserved Date**: November 13, 2018 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Insufficient user prompt in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow a privileged user to potentially enable escalation of privilege via local access. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01) 2. [](https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html) 3. [107069](http://www.securityfocus.com/bid/107069)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1039, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1039 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1039 - **State**: PUBLISHED - **Published Date**: March 07, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 16:56 UTC - **Reserved Date**: March 07, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SAP Web Application Server (WebAS) Kernel before 7.0 allows remote attackers to inject arbitrary bytes into the HTTP response and obtain sensitive authentication information, or have other impacts, via a ";%20" followed by encoded HTTP headers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1015702](http://securitytracker.com/id?1015702) 2. [sap-was-url-obtain-information(25003)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25003) 3. [19085](http://secunia.com/advisories/19085) 4. [18006](http://www.securityfocus.com/bid/18006) 5. [20060301 SAP Web Application Server http request url parsing vulnerability](http://www.securityfocus.com/archive/1/426449/100/0/threaded) 6. [ADV-2006-0810](http://www.vupen.com/english/advisories/2006/0810)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5516, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5516 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5516 - **State**: PUBLISHED - **Published Date**: May 30, 2024 at 13:31 UTC - **Last Updated**: August 01, 2024 at 21:18 UTC - **Reserved Date**: May 30, 2024 at 06:17 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file massage.php. The manipulation of the argument bid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266587. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **itsourcecode - Online Blood Bank Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-266587 | itsourcecode Online Blood Bank Management System massage.php sql injection](https://vuldb.com/?id.266587) 2. [VDB-266587 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.266587) 3. [Submit #346223 | Itsourcecode Online Blood Bank Management System V1.0 SQL Injection](https://vuldb.com/?submit.346223) 4. [](https://github.com/ppp-src/ha/issues/3) ### Credits - roobes (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6807, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6807 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6807 - **State**: PUBLISHED - **Published Date**: March 25, 2020 at 21:13 UTC - **Last Updated**: August 04, 2024 at 09:11 UTC - **Reserved Date**: January 10, 2020 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description When a device was changed while a stream was about to be destroyed, the <code>stream-reinit</code> task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6. ### Affected Products **Mozilla - Thunderbird** Affected versions: - unspecified (Status: affected) **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) **Mozilla - Firefox ESR** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.mozilla.org/security/advisories/mfsa2020-08/) 2. [](https://www.mozilla.org/security/advisories/mfsa2020-10/) 3. [](https://www.mozilla.org/security/advisories/mfsa2020-09/) 4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1614971) 5. [USN-4328-1](https://usn.ubuntu.com/4328-1/) 6. [USN-4335-1](https://usn.ubuntu.com/4335-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2925, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2925 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2925 - **State**: PUBLISHED - **Published Date**: January 11, 2017 at 04:40 UTC - **Last Updated**: August 05, 2024 at 14:09 UTC - **Reserved Date**: December 02, 2016 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability in the JPEG XR codec. Successful exploitation could lead to arbitrary code execution. ### Affected Products **n/a - Adobe Flash Player 24.0.0.186 and earlier.** Affected versions: - Adobe Flash Player 24.0.0.186 and earlier. (Status: affected) ### References 1. [GLSA-201702-20](https://security.gentoo.org/glsa/201702-20) 2. [](https://helpx.adobe.com/security/products/flash-player/apsb17-02.html) 3. [RHSA-2017:0057](http://rhn.redhat.com/errata/RHSA-2017-0057.html) 4. [1037570](http://www.securitytracker.com/id/1037570) 5. [95350](http://www.securityfocus.com/bid/95350)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30776, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30776 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30776 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 10:54 UTC - **Last Updated**: March 27, 2025 at 18:56 UTC - **Reserved Date**: March 26, 2025 at 09:20 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webvitaly Sitekit allows Stored XSS. This issue affects Sitekit: from n/a through 1.8. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **webvitaly - Sitekit** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/sitekit/vulnerability/wordpress-sitekit-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - muhammad yudha (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3967, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3967 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3967 - **State**: PUBLISHED - **Published Date**: February 26, 2022 at 23:00 UTC - **Last Updated**: August 03, 2024 at 17:09 UTC - **Reserved Date**: November 17, 2021 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Improper Access Control in GitHub repository zulip/zulip prior to 4.10. ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **zulip - zulip/zulip** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/2928a625-0467-4a0a-b4e2-e27322786686) 2. [](https://github.com/zulip/zulip/commit/d5db254ca8167995a1654d1c45ffc74b2fade39a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7845, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7845 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7845 - **State**: PUBLISHED - **Published Date**: August 02, 2017 at 16:00 UTC - **Last Updated**: August 06, 2024 at 02:04 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description GigaCC OFFICE ver.2.3 and earlier allows remote attackers to upload arbitrary files as a user profile image, which may be exploited for unauthorized file sharing. ### Affected Products **WAM!NET Japan K.K. - GigaCC OFFICE** Affected versions: - ver.2.3 and earlier (Status: affected) ### References 1. [](https://asp.gigacc.com/user/publicurl/view.do%3Bjsessionid=28438FE401A764B7CEDB3664AB2AC67C.ap04?job=view&direct=true&TI=9l1sf6jfp0bafkv9bh2e5fs43k&ID=9qbnmp2qetc5u9vc8crqbl804s) 2. [95680](http://www.securityfocus.com/bid/95680) 3. [](https://jvn.jp/en/vu/JVNVU91417143/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34054, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34054 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34054 - **State**: PUBLISHED - **Published Date**: November 28, 2023 at 08:16 UTC - **Last Updated**: August 02, 2024 at 16:01 UTC - **Reserved Date**: May 25, 2023 at 17:21 UTC - **Assigned By**: vmware ### Vulnerability Description In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable if Reactor Netty HTTP Server built-in integration with Micrometer is enabled. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Affected Products **Spring - Reactor Netty** Affected versions: - 1.1.0 (Status: affected) - 1.0.0 (Status: affected) - older unsupported versions (Status: affected) ### References 1. [](https://spring.io/security/cve-2023-34054)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32828, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32828 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32828 - **State**: PUBLISHED - **Published Date**: September 23, 2022 at 18:59 UTC - **Last Updated**: May 22, 2025 at 14:29 UTC - **Reserved Date**: June 09, 2022 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, tvOS 15.6, macOS Monterey 12.5. An app may be able to disclose kernel memory. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213345) 2. [](https://support.apple.com/en-us/HT213342) 3. [](https://support.apple.com/en-us/HT213346)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11578, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11578 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11578 - **State**: PUBLISHED - **Published Date**: May 31, 2018 at 00:00 UTC - **Last Updated**: August 05, 2024 at 08:10 UTC - **Reserved Date**: May 30, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GifIndexToTrueColor in ngiflib.c in MiniUPnP ngiflib 0.4 has a Segmentation fault. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/miniupnp/ngiflib/issues/5) 2. [](https://github.com/Edward-L/fuzzing-pocs/tree/master/ngiflib)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2191, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2191 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2191 - **State**: PUBLISHED - **Published Date**: August 06, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 05:44 UTC - **Reserved Date**: June 24, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Format string vulnerability in Login Window in Apple Mac OS X 10.4.11 and 10.5 before 10.5.8 allows attackers to execute arbitrary code or cause a denial of service (application crash) via format string specifiers in an application name. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT3757) 2. [36096](http://secunia.com/advisories/36096) 3. [macosx-loginwindow-format-string(52428)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52428) 4. [APPLE-SA-2009-08-05-1](http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html) 5. [35954](http://www.securityfocus.com/bid/35954) 6. [ADV-2009-2172](http://www.vupen.com/english/advisories/2009/2172) 7. [TA09-218A](http://www.us-cert.gov/cas/techalerts/TA09-218A.html) 8. [56840](http://osvdb.org/56840)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26733, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26733 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26733 - **State**: PUBLISHED - **Published Date**: January 14, 2021 at 15:57 UTC - **Last Updated**: August 04, 2024 at 16:03 UTC - **Reserved Date**: October 07, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross Site Scripting (XSS) in Configuration page in SKYWORTH GN542VF Hardware Version 2.0 and Software Version 2.0.0.16 allows authenticated attacker to inject their own script into the page via DDNS Configuration Section. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/swzhouu/CVE-2020-26733)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6757, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6757 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6757 - **State**: PUBLISHED - **Published Date**: January 12, 2017 at 15:00 UTC - **Last Updated**: August 06, 2024 at 01:43 UTC - **Reserved Date**: August 11, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description An information disclosure vulnerability in Qualcomm components including the camera driver and video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-30148242. References: QC-CR#1052821. ### Affected Products **Google Inc. - Android** Affected versions: - Kernel-3.10 (Status: affected) - Kernel-3.18 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2016-12-01.html) 2. [94693](http://www.securityfocus.com/bid/94693)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31864, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31864 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31864 - **State**: PUBLISHED - **Published Date**: April 01, 2025 at 14:52 UTC - **Last Updated**: April 01, 2025 at 16:00 UTC - **Reserved Date**: April 01, 2025 at 13:21 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Out the Box Beam me up Scotty – Back to Top Button allows Stored XSS. This issue affects Beam me up Scotty – Back to Top Button: from n/a through 1.0.23. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Out the Box - Beam me up Scotty – Back to Top Button** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/beam-me-up-scotty/vulnerability/wordpress-beam-me-up-scotty-back-to-top-button-plugin-1-0-23-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Webula (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3637, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3637 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3637 - **State**: PUBLISHED - **Published Date**: August 08, 2017 at 15:00 UTC - **Last Updated**: October 04, 2024 at 17:02 UTC - **Reserved Date**: December 06, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: X Plugin). Supported versions that are affected are 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H). ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 5.7.18 and earlier (Status: affected) ### References 1. [1038928](http://www.securitytracker.com/id/1038928) 2. [RHSA-2017:2886](https://access.redhat.com/errata/RHSA-2017:2886) 3. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html) 4. [99748](http://www.securityfocus.com/bid/99748)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-2709, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-2709 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-2709 - **State**: PUBLISHED - **Published Date**: June 16, 2008 at 20:00 UTC - **Last Updated**: August 07, 2024 at 09:14 UTC - **Reserved Date**: June 16, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the BrSmRcvAndCheck function in the RCHMGR module on IBM OS/400 V5R4M0, V5R4M5, and V6R1M0 allows local users to cause a denial of service (task halt and main storage dump) via unspecified vectors involving the running of diagnostics on a modem port. NOTE: there might be limited attack scenarios. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [30554](http://secunia.com/advisories/30554) 2. [MA36741](http://www-1.ibm.com/support/docview.wss?uid=nas21f21bcbaa63f55268625745e003c6f64) 3. [ADV-2008-1799](http://www.vupen.com/english/advisories/2008/1799) 4. [29660](http://www.securityfocus.com/bid/29660) 5. [os400-brsmrcvandcheck-bo(42984)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42984)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14280, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14280 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14280 - **State**: PUBLISHED - **Published Date**: July 31, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 09:21 UTC - **Reserved Date**: July 16, 2018 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportAsFDF XFA function. The issue results from the lack of proper validation of user-supplied data, which can lead to writing arbitrary files into attacker controlled locations. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5619. ### Weakness Classification (CWE) - CWE-693: Security Weakness ### Affected Products **Foxit - Foxit Reader** Affected versions: - 9.0.1.1049 (Status: affected) ### References 1. [](https://zerodayinitiative.com/advisories/ZDI-18-740) 2. [](https://www.foxitsoftware.com/support/security-bulletins.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7715, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7715 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7715 - **State**: PUBLISHED - **Published Date**: September 01, 2020 at 09:20 UTC - **Last Updated**: September 16, 2024 at 20:58 UTC - **Reserved Date**: January 21, 2020 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description All versions of package deep-get-set are vulnerable to Prototype Pollution via the main function. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Affected Products **n/a - deep-get-set** Affected versions: - 0 (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-JS-DEEPGETSET-598666) ### Credits - NerdJS
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37018, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37018 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37018 - **State**: PUBLISHED - **Published Date**: May 31, 2024 at 00:35 UTC - **Last Updated**: February 13, 2025 at 15:59 UTC - **Reserved Date**: May 31, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The OpenDaylight 0.15.3 controller allows topology poisoning via API requests because an application can manipulate the path that is taken by discovery packets. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://jira.opendaylight.org/browse/DISCOVERY-2) 2. [](https://mvnrepository.com/artifact/org.opendaylight.controller) 3. [](https://dl.acm.org/doi/10.1145/3658644.3690345) 4. [](https://github.com/mzc796/marionette_onos) 5. [](https://github.com/mzc796/marionette_odl)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5728, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5728 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5728 - **State**: PUBLISHED - **Published Date**: April 17, 2020 at 18:29 UTC - **Last Updated**: August 04, 2024 at 08:39 UTC - **Reserved Date**: January 06, 2020 at 00:00 UTC - **Assigned By**: tenable ### Vulnerability Description OpenMRS 2.9 and prior copies "Referrer" header values into an html element named "redirectUrl" within many webpages (such as login.htm). There is insufficient validation for this parameter, which allows for the possibility of cross-site scripting. ### Affected Products **n/a - OpenMRS** Affected versions: - Versions 2.90 and prior (Status: affected) ### References 1. [](https://www.tenable.com/security/research/tra-2020-18)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0734, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0734 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0734 - **State**: PUBLISHED - **Published Date**: February 13, 2008 at 00:00 UTC - **Last Updated**: August 07, 2024 at 07:54 UTC - **Reserved Date**: February 12, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in class_auth.php in Limbo CMS 1.0.4.2, and possibly earlier versions, allows remote attackers to execute arbitrary SQL commands via the cuid cookie parameter to admin.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [5088](https://www.exploit-db.com/exploits/5088) 2. [27710](http://www.securityfocus.com/bid/27710) 3. [limbo-admin-sql-injection(40415)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40415)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33791, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33791 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33791 - **State**: PUBLISHED - **Published Date**: May 24, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 15:47 UTC - **Reserved Date**: May 22, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A stored cross-site scripting (XSS) vulnerability in the Create Provider Accounts (/circuits/provider-accounts/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/anhdq201/netbox/issues/4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30815, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30815 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30815 - **State**: PUBLISHED - **Published Date**: May 31, 2022 at 15:54 UTC - **Last Updated**: August 03, 2024 at 07:03 UTC - **Reserved Date**: May 16, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description elitecms 1.01 is vulnerable to SQL Injection via admin/edit_sidebar.php?page=2&sidebar= ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/k0xx11/bug_report/blob/main/elitecms-1.01/SQLi-4.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38786, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38786 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38786 - **State**: PUBLISHED - **Published Date**: January 19, 2022 at 11:53 UTC - **Last Updated**: August 04, 2024 at 01:51 UTC - **Reserved Date**: August 16, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description There is a NULL pointer dereference in media/libcedarc/vdecoder of Allwinner R818 SoC Android Q SDK V1.0, which could cause a media crash (denial of service). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.allwinnertech.com/index.php?c=product&a=index&id=92) 2. [](https://github.com/pokerfacett/MY_CVE_CREDIT/blob/master/Allwinner%20R818%20SoC%EF%BC%9AMedia%20vdecoder%20has%20Null%20Pointer%20Dereference%20Vulnerability.md) 3. [](https://www.cnvd.org.cn/flaw/show/CNVD-2021-49173) 4. [](https://vul.wangan.com/a/CNVD-2021-49173)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13545, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13545 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13545 - **State**: PUBLISHED - **Published Date**: July 09, 2018 at 06:00 UTC - **Last Updated**: August 05, 2024 at 09:07 UTC - **Reserved Date**: July 08, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The mintToken function of a smart contract implementation for HashShield, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/HashShield) 2. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1092, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1092 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1092 - **State**: PUBLISHED - **Published Date**: May 11, 2016 at 10:00 UTC - **Last Updated**: August 05, 2024 at 22:48 UTC - **Reserved Date**: December 22, 2015 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to obtain sensitive information from process memory via unspecified vectors, a different vulnerability than CVE-2016-1079. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1035828](http://www.securitytracker.com/id/1035828) 2. [90511](http://www.securityfocus.com/bid/90511) 3. [](https://helpx.adobe.com/security/products/acrobat/apsb16-14.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6656, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6656 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6656 - **State**: PUBLISHED - **Published Date**: December 20, 2006 at 02:00 UTC - **Last Updated**: September 17, 2024 at 03:43 UTC - **Reserved Date**: December 19, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in ptrace in NetBSD-current before 20061027, NetBSD 3.0 and 3.0.1 before 20061027, and NetBSD 2.x before 20061119 allows local users to read kernel memory and obtain sensitive information via certain manipulations of a PT_LWPINFO request, which leads to a memory leak and information leak. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [NetBSD-SA2006-025](ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2006-025.txt.asc) 2. [1017292](http://securitytracker.com/id?1017292)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2379, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2379 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2379 - **State**: PUBLISHED - **Published Date**: March 27, 2024 at 07:56 UTC - **Last Updated**: February 13, 2025 at 17:39 UTC - **Reserved Date**: March 11, 2024 at 14:39 UTC - **Assigned By**: curl ### Vulnerability Description libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems. ### Affected Products **curl - curl** Affected versions: - 8.6.0 (Status: affected) ### References 1. [json](https://curl.se/docs/CVE-2024-2379.json) 2. [www](https://curl.se/docs/CVE-2024-2379.html) 3. [issue](https://hackerone.com/reports/2410774) 4. [](http://www.openwall.com/lists/oss-security/2024/03/27/2) 5. [](https://security.netapp.com/advisory/ntap-20240531-0001/) 6. [](https://support.apple.com/kb/HT214119) 7. [](https://support.apple.com/kb/HT214118) 8. [](https://support.apple.com/kb/HT214120) 9. [](http://seclists.org/fulldisclosure/2024/Jul/20) 10. [](http://seclists.org/fulldisclosure/2024/Jul/18) 11. [](http://seclists.org/fulldisclosure/2024/Jul/19) ### Credits - Dexter Gerig - Daniel Stenberg
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7768 - **State**: PUBLISHED - **Published Date**: May 22, 2019 at 13:31 UTC - **Last Updated**: August 04, 2024 at 20:54 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. ### Affected Products **Adobe - Adobe Acrobat and Reader** Affected versions: - 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-18.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-50315, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-50315 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-50315 - **State**: PUBLISHED - **Published Date**: August 14, 2024 at 17:04 UTC - **Last Updated**: August 14, 2024 at 17:43 UTC - **Reserved Date**: December 07, 2023 at 01:29 UTC - **Assigned By**: ibm ### Vulnerability Description IBM WebSphere Application Server 8.5 and 9.0 could allow an attacker with access to the network to conduct spoofing attacks. An attacker could exploit this vulnerability using a certificate issued by a trusted authority to obtain sensitive information. IBM X-Force ID: 274714. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-295: Security Weakness ### Affected Products **IBM - WebSphere Application Server** Affected versions: - 8.5, 9.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7165511) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/274714)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3736, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3736 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3736 - **State**: PUBLISHED - **Published Date**: July 18, 2007 at 17:00 UTC - **Last Updated**: August 07, 2024 at 14:28 UTC - **Reserved Date**: July 12, 2007 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.5 allows remote attackers to inject arbitrary web script "into another site's context" via a "timing issue" involving the (1) addEventListener or (2) setTimeout function, probably by setting events that activate after the context has changed. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-490-1](http://www.ubuntu.com/usn/usn-490-1) 2. [26107](http://secunia.com/advisories/26107) 3. [oval:org.mitre.oval:def:11749](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11749) 4. [26179](http://secunia.com/advisories/26179) 5. [ADV-2007-4256](http://www.vupen.com/english/advisories/2007/4256) 6. [25589](http://secunia.com/advisories/25589) 7. [1018410](http://www.securitytracker.com/id?1018410) 8. [HPSBUX02153](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742) 9. [MDKSA-2007:152](http://www.mandriva.com/security/advisories?name=MDKSA-2007:152) 10. [GLSA-200708-09](http://www.gentoo.org/security/en/glsa/glsa-200708-09.xml) 11. [DSA-1339](http://www.debian.org/security/2007/dsa-1339) 12. [26151](http://secunia.com/advisories/26151) 13. [28135](http://secunia.com/advisories/28135) 14. [26216](http://secunia.com/advisories/26216) 15. [](http://www.mozilla.org/security/announce/2007/mfsa2007-19.html) 16. [26103](http://secunia.com/advisories/26103) 17. [26072](http://secunia.com/advisories/26072) 18. [26149](http://secunia.com/advisories/26149) 19. [103177](http://sunsolve.sun.com/search/document.do?assetkey=1-26-103177-1) 20. [ADV-2007-2564](http://www.vupen.com/english/advisories/2007/2564) 21. [DSA-1337](http://www.debian.org/security/2007/dsa-1337) 22. [26211](http://secunia.com/advisories/26211) 23. [26159](http://secunia.com/advisories/26159) 24. [SUSE-SA:2007:049](http://www.novell.com/linux/security/advisories/2007_49_mozilla.html) 25. [SSRT061181](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742) 26. [DSA-1338](http://www.debian.org/security/2007/dsa-1338) 27. [](ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt) 28. [](http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html) 29. [26095](http://secunia.com/advisories/26095) 30. [20070724 FLEA-2007-0033-1: firefox thunderbird](http://www.securityfocus.com/archive/1/474542/100/0/threaded) 31. [26258](http://secunia.com/advisories/26258) 32. [24946](http://www.securityfocus.com/bid/24946) 33. [26460](http://secunia.com/advisories/26460) 34. [26106](http://secunia.com/advisories/26106) 35. [20070701-01-P](ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc) 36. [RHSA-2007:0724](http://www.redhat.com/support/errata/RHSA-2007-0724.html) 37. [20070720 rPSA-2007-0148-1 firefox thunderbird](http://www.securityfocus.com/archive/1/474226/100/0/threaded) 38. [RHSA-2007:0723](http://www.redhat.com/support/errata/RHSA-2007-0723.html) 39. [mozilla-addeventlistener-settimeout-xss(35462)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35462) 40. [26271](http://secunia.com/advisories/26271) 41. [RHSA-2007:0722](http://www.redhat.com/support/errata/RHSA-2007-0722.html) 42. [201516](http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1) 43. [26204](http://secunia.com/advisories/26204) 44. [26205](http://secunia.com/advisories/26205)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31965, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31965 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31965 - **State**: PUBLISHED - **Published Date**: May 02, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 01:59 UTC - **Reserved Date**: April 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A vulnerability on Mitel 6800 Series and 6900 Series SIP Phones through 6.3 SP3 HF4, 6900w Series SIP Phone through 6.3.3, and 6970 Conference Unit through 5.1.1 SP8 allows an authenticated attacker with administrative privilege to conduct a path traversal attack due to insufficient input validation. A successful exploit could allow an attacker to access sensitive information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0008)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14381, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14381 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14381 - **State**: PUBLISHED - **Published Date**: July 30, 2019 at 12:41 UTC - **Last Updated**: August 05, 2024 at 00:19 UTC - **Reserved Date**: July 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description libopenmpt before 0.4.3 allows a crash due to a NULL pointer dereference when doing a portamento from an OPL instrument to an empty instrument note map slot. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://lib.openmpt.org/libopenmpt/2019/02/11/security-update-0.4.3/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2608, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2608 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2608 - **State**: PUBLISHED - **Published Date**: January 18, 2018 at 02:00 UTC - **Last Updated**: October 03, 2024 at 20:41 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: Security). The supported version that is affected is 2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. While the vulnerability is in Oracle Hospitality Simphony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Simphony accessible data. CVSS 3.0 Base Score 8.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). ### Affected Products **Oracle Corporation - Hospitality Simphony** Affected versions: - 2.7 (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html) 2. [102538](http://www.securityfocus.com/bid/102538)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14212, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14212 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14212 - **State**: PUBLISHED - **Published Date**: June 16, 2020 at 21:57 UTC - **Last Updated**: August 04, 2024 at 12:39 UTC - **Reserved Date**: June 16, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FFmpeg through 4.3 has a heap-based buffer overflow in avio_get_str in libavformat/aviobuf.c because dnn_backend_native.c calls ff_dnn_load_model_native and a certain index check is omitted. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://trac.ffmpeg.org/ticket/8716) 2. [](https://patchwork.ffmpeg.org/project/ffmpeg/list/?series=1463) 3. [GLSA-202007-58](https://security.gentoo.org/glsa/202007-58)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34155, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34155 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34155 - **State**: PUBLISHED - **Published Date**: July 18, 2023 at 13:41 UTC - **Last Updated**: September 25, 2024 at 16:32 UTC - **Reserved Date**: June 30, 2022 at 08:55 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Authentication vulnerability in miniOrange OAuth Single Sign On – SSO (OAuth Client) plugin allows Authentication Bypass.This issue affects OAuth Single Sign On – SSO (OAuth Client): from n/a through 6.23.3. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **miniOrange - OAuth Single Sign On – SSO (OAuth Client)** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/miniorange-login-with-eve-online-google-facebook/wordpress-oauth-single-sign-on-sso-oauth-client-plugin-6-23-3-broken-authentication-vulnerability?_s_id=cve) 2. [](https://lana.codes/lanavdb/071fa6eb-2e54-43a1-b37f-1e562988b7d4?_s_id=cve) ### Credits - Lana Codes (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4990, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4990 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4990 - **State**: PUBLISHED - **Published Date**: May 24, 2021 at 13:55 UTC - **Last Updated**: September 17, 2024 at 03:48 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Guardium 11.2 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 192710. ### Affected Products **IBM - Security Guardium** Affected versions: - 11.2 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6455265) 2. [ibm-guardium-cve20204990-sql-injection (192710)](https://exchange.xforce.ibmcloud.com/vulnerabilities/192710)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49465, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49465 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49465 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 02:13 UTC - **Last Updated**: May 21, 2025 at 08:44 UTC - **Reserved Date**: February 26, 2025 at 02:08 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: blk-throttle: Set BIO_THROTTLED when bio has been throttled 1.In current process, all bio will set the BIO_THROTTLED flag after __blk_throtl_bio(). 2.If bio needs to be throttled, it will start the timer and stop submit bio directly. Bio will submit in blk_throtl_dispatch_work_fn() when the timer expires.But in the current process, if bio is throttled. The BIO_THROTTLED will be set to bio after timer start. If the bio has been completed, it may cause use-after-free blow. BUG: KASAN: use-after-free in blk_throtl_bio+0x12f0/0x2c70 Read of size 2 at addr ffff88801b8902d4 by task fio/26380 dump_stack+0x9b/0xce print_address_description.constprop.6+0x3e/0x60 kasan_report.cold.9+0x22/0x3a blk_throtl_bio+0x12f0/0x2c70 submit_bio_checks+0x701/0x1550 submit_bio_noacct+0x83/0xc80 submit_bio+0xa7/0x330 mpage_readahead+0x380/0x500 read_pages+0x1c1/0xbf0 page_cache_ra_unbounded+0x471/0x6f0 do_page_cache_ra+0xda/0x110 ondemand_readahead+0x442/0xae0 page_cache_async_ra+0x210/0x300 generic_file_buffered_read+0x4d9/0x2130 generic_file_read_iter+0x315/0x490 blkdev_read_iter+0x113/0x1b0 aio_read+0x2ad/0x450 io_submit_one+0xc8e/0x1d60 __se_sys_io_submit+0x125/0x350 do_syscall_64+0x2d/0x40 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Allocated by task 26380: kasan_save_stack+0x19/0x40 __kasan_kmalloc.constprop.2+0xc1/0xd0 kmem_cache_alloc+0x146/0x440 mempool_alloc+0x125/0x2f0 bio_alloc_bioset+0x353/0x590 mpage_alloc+0x3b/0x240 do_mpage_readpage+0xddf/0x1ef0 mpage_readahead+0x264/0x500 read_pages+0x1c1/0xbf0 page_cache_ra_unbounded+0x471/0x6f0 do_page_cache_ra+0xda/0x110 ondemand_readahead+0x442/0xae0 page_cache_async_ra+0x210/0x300 generic_file_buffered_read+0x4d9/0x2130 generic_file_read_iter+0x315/0x490 blkdev_read_iter+0x113/0x1b0 aio_read+0x2ad/0x450 io_submit_one+0xc8e/0x1d60 __se_sys_io_submit+0x125/0x350 do_syscall_64+0x2d/0x40 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Freed by task 0: kasan_save_stack+0x19/0x40 kasan_set_track+0x1c/0x30 kasan_set_free_info+0x1b/0x30 __kasan_slab_free+0x111/0x160 kmem_cache_free+0x94/0x460 mempool_free+0xd6/0x320 bio_free+0xe0/0x130 bio_put+0xab/0xe0 bio_endio+0x3a6/0x5d0 blk_update_request+0x590/0x1370 scsi_end_request+0x7d/0x400 scsi_io_completion+0x1aa/0xe50 scsi_softirq_done+0x11b/0x240 blk_mq_complete_request+0xd4/0x120 scsi_mq_done+0xf0/0x200 virtscsi_vq_done+0xbc/0x150 vring_interrupt+0x179/0x390 __handle_irq_event_percpu+0xf7/0x490 handle_irq_event_percpu+0x7b/0x160 handle_irq_event+0xcc/0x170 handle_edge_irq+0x215/0xb20 common_interrupt+0x60/0x120 asm_common_interrupt+0x1e/0x40 Fix this by move BIO_THROTTLED set into the queue_lock. ### Affected Products **Linux - Linux** Affected versions: - 2a0f61e6ecd08d260054bde4b096ff207ce5350f (Status: affected) - 2a0f61e6ecd08d260054bde4b096ff207ce5350f (Status: affected) - 2a0f61e6ecd08d260054bde4b096ff207ce5350f (Status: affected) **Linux - Linux** Affected versions: - 3.11 (Status: affected) - 0 (Status: unaffected) - 5.17.14 (Status: unaffected) - 5.18.3 (Status: unaffected) - 5.19 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/0cfc8a0fb07cde61915e4a77c4794c47de3114a4) 2. [](https://git.kernel.org/stable/c/935fa666534d7b7185e8c6b0191cd06281be4290) 3. [](https://git.kernel.org/stable/c/5a011f889b4832aa80c2a872a5aade5c48d2756f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11479, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11479 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11479 - **State**: PUBLISHED - **Published Date**: June 18, 2019 at 23:34 UTC - **Last Updated**: September 16, 2024 at 23:22 UTC - **Reserved Date**: April 23, 2019 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363. ### Weakness Classification (CWE) - CWE-405: Security Weakness ### Affected Products **Linux - Linux kernel** Affected versions: - 4.4 (Status: affected) - 4.9 (Status: affected) - 4.14 (Status: affected) - 4.19 (Status: affected) - 5.1 (Status: affected) ### References 1. [108818](http://www.securityfocus.com/bid/108818) 2. [VU#905115](https://www.kb.cert.org/vuls/id/905115) 3. [RHSA-2019:1594](https://access.redhat.com/errata/RHSA-2019:1594) 4. [RHSA-2019:1602](https://access.redhat.com/errata/RHSA-2019:1602) 5. [[oss-security] 20190628 Re: linux-distros membership application - Microsoft](http://www.openwall.com/lists/oss-security/2019/06/28/2) 6. [USN-4041-2](https://usn.ubuntu.com/4041-2/) 7. [[oss-security] 20190706 Re: linux-distros membership application - Microsoft](http://www.openwall.com/lists/oss-security/2019/07/06/3) 8. [[oss-security] 20190706 Re: linux-distros membership application - Microsoft](http://www.openwall.com/lists/oss-security/2019/07/06/4) 9. [RHSA-2019:1699](https://access.redhat.com/errata/RHSA-2019:1699) 10. [USN-4041-1](https://usn.ubuntu.com/4041-1/) 11. [](https://www.oracle.com/security-alerts/cpujan2020.html) 12. [](https://www.oracle.com/security-alerts/cpuoct2020.html) 13. [](https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md) 14. [](https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic) 15. [](https://access.redhat.com/security/vulnerabilities/tcpsack) 16. [](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193) 17. [](https://www.synology.com/security/advisory/Synology_SA_19_28) 18. [](https://security.netapp.com/advisory/ntap-20190625-0001/) 19. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10287) 20. [](https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf) 21. [](https://www.us-cert.gov/ics/advisories/icsa-19-253-03) 22. [](http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt) 23. [](https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=5f3e2bf008c2221478101ee72f5cb4654b9fc363) 24. [](https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=967c05aee439e6e5d7d805e195b3a20ef5c433d6) 25. [](https://support.f5.com/csp/article/K35421172) 26. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0008) 27. [](https://support.f5.com/csp/article/K35421172?utm_source=f5support&amp%3Butm_medium=RSS) 28. [](https://www.us-cert.gov/ics/advisories/icsma-20-170-06) ### Credits - Jonathan Looney from Netflix
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7481 - **State**: PUBLISHED - **Published Date**: September 25, 2024 at 10:33 UTC - **Last Updated**: September 25, 2024 at 15:16 UTC - **Reserved Date**: August 05, 2024 at 08:46 UTC - **Assigned By**: TV ### Vulnerability Description Improper verification of cryptographic signature during installation of a Printer driver via the TeamViewer_service.exe component of TeamViewer Remote Clients prior version 15.58.4 for Windows allows an attacker with local unprivileged access on a Windows system to elevate their privileges and install drivers. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-347: Security Weakness ### Affected Products **TeamViewer - Remote Full Client** Affected versions: - 15.0.0 (Status: affected) - 14.0.0 (Status: affected) - 13.0.0 (Status: affected) - 12.0.0 (Status: affected) - 11.0.0 (Status: affected) **TeamViewer - Remote Host** Affected versions: - 15.0.0 (Status: affected) - 14.0.0 (Status: affected) - 13.0.0 (Status: affected) - 12.0.0 (Status: affected) - 11.0.0 (Status: affected) ### References 1. [](https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2024-1006/) ### Credits - Peter Gabaldon (https://pgj11.com/) working with Trend Micro Zero Day Initiative
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2090, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2090 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2090 - **State**: PUBLISHED - **Published Date**: June 07, 2019 at 19:31 UTC - **Last Updated**: August 04, 2024 at 18:42 UTC - **Reserved Date**: December 10, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In isPackageDeviceAdminOnAnyUser of PackageManagerService.java, there is a possible permissions bypass due to a missing permissions check. This could lead to local escalation of privilege, with no additional permissions required. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-128599183 ### Affected Products **Android - Android** Affected versions: - Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2019-06-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53359, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53359 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53359 - **State**: PUBLISHED - **Published Date**: May 20, 2025 at 00:00 UTC - **Last Updated**: May 20, 2025 at 18:00 UTC - **Reserved Date**: November 20, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in Zalo v23.09.01 allows attackers to obtain sensitive user information via a crafted GET request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.linkedin.com/in/le-anh-truong/) 2. [](https://github.com/crysalix4/CVE/tree/main/CVE-2024-53359)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36168, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36168 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36168 - **State**: PUBLISHED - **Published Date**: August 25, 2022 at 23:40 UTC - **Last Updated**: August 03, 2024 at 10:00 UTC - **Reserved Date**: July 18, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A directory traversal vulnerability was discovered in Wuzhicms 4.1.0. via /coreframe/app/attachment/admin/index.php: ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/wuzhicms/wuzhicms/issues/202) 2. [](https://github.com/Cigar-Fasion/CVE/issues/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30914, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30914 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30914 - **State**: PUBLISHED - **Published Date**: June 06, 2023 at 05:13 UTC - **Last Updated**: January 08, 2025 at 14:50 UTC - **Reserved Date**: April 21, 2023 at 08:42 UTC - **Assigned By**: Unisoc ### Vulnerability Description In email service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000** Affected versions: - Android10/Android11/Android12 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1664822361414762498)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1193, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1193 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1193 - **State**: PUBLISHED - **Published Date**: June 13, 2006 at 19:00 UTC - **Last Updated**: August 07, 2024 at 17:03 UTC - **Reserved Date**: March 13, 2006 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Microsoft Exchange Server 2000 SP1 through SP3, when running Outlook Web Access (OWA), allows user-assisted remote attackers to inject arbitrary HTML or web script via unknown vectors related to "HTML parsing." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1016280](http://securitytracker.com/id?1016280) 2. [20060614 SEC Consult SA-20060613-0 :: Outlook Web Access Cross Site Scripting Vulnerability](http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046892.html) 3. [26441](http://www.osvdb.org/26441) 4. [exchange-owa-xss(25550)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25550) 5. [TA06-164A](http://www.us-cert.gov/cas/techalerts/TA06-164A.html) 6. [18381](http://www.securityfocus.com/bid/18381) 7. [ADV-2006-2326](http://www.vupen.com/english/advisories/2006/2326) 8. [oval:org.mitre.oval:def:1161](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1161) 9. [oval:org.mitre.oval:def:1070](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1070) 10. [](http://www.sec-consult.com/fileadmin/Advisories/20060613-0_owa_xss_noexploit.txt) 11. [MS06-029](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-029) 12. [oval:org.mitre.oval:def:1315](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1315) 13. [VU#138188](http://www.kb.cert.org/vuls/id/138188) 14. [20634](http://secunia.com/advisories/20634)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51364, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51364 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51364 - **State**: PUBLISHED - **Published Date**: November 21, 2024 at 00:00 UTC - **Last Updated**: November 27, 2024 at 21:04 UTC - **Reserved Date**: October 28, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An arbitrary file upload vulnerability in ModbusMechanic v3.0 allows attackers to execute arbitrary code via uploading a crafted .xml file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://modbusmechanic.com) 2. [](https://github.com/Gelcon/PoC-ModbusMechanic-3.0-Insecure-Deserialization-and-RCE)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0344, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0344 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0344 - **State**: PUBLISHED - **Published Date**: January 09, 2024 at 21:00 UTC - **Last Updated**: May 14, 2025 at 19:03 UTC - **Reserved Date**: January 09, 2024 at 13:55 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in soxft TimeMail up to 1.1. Affected by this issue is some unknown functionality of the file check.php. The manipulation of the argument c leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250112. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **soxft - TimeMail** Affected versions: - 1.0 (Status: affected) - 1.1 (Status: affected) ### References 1. [](https://vuldb.com/?id.250112) 2. [](https://vuldb.com/?ctiid.250112) 3. [](https://note.zhaoj.in/share/VSutvlpgCJkD) ### Credits - glzjin (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4266, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4266 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4266 - **State**: REJECTED - **Published Date**: August 27, 2013 at 01:00 UTC - **Last Updated**: September 17, 2024 at 04:14 UTC - **Reserved Date**: June 12, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5755, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5755 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5755 - **State**: PUBLISHED - **Published Date**: February 19, 2019 at 17:00 UTC - **Last Updated**: August 04, 2024 at 20:01 UTC - **Reserved Date**: January 09, 2019 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Incorrect handling of negative zero in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [106767](http://www.securityfocus.com/bid/106767) 2. [RHSA-2019:0309](https://access.redhat.com/errata/RHSA-2019:0309) 3. [DSA-4395](https://www.debian.org/security/2019/dsa-4395) 4. [](https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html) 5. [](https://crbug.com/913296) 6. [FEDORA-2019-561eae4626](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/) 7. [FEDORA-2019-05a780936d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52328, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52328 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52328 - **State**: PUBLISHED - **Published Date**: January 23, 2024 at 20:42 UTC - **Last Updated**: May 30, 2025 at 14:18 UTC - **Reserved Date**: January 08, 2024 at 19:08 UTC - **Assigned By**: trendmicro ### Vulnerability Description Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers. Please note this vulnerability is similar, but not identical to CVE-2023-52329. ### Affected Products **Trend Micro, Inc. - Trend Micro Apex Central** Affected versions: - 2019 (Status: affected) ### References 1. [](https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-24-021/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5224, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5224 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5224 - **State**: PUBLISHED - **Published Date**: May 27, 2025 at 02:00 UTC - **Last Updated**: May 27, 2025 at 19:57 UTC - **Reserved Date**: May 26, 2025 at 17:51 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in Campcodes Online Hospital Management System 1.0. Affected is an unknown function of the file /admin/add-doctor.php. The manipulation of the argument Doctorspecialization leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **Campcodes - Online Hospital Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-310320 | Campcodes Online Hospital Management System add-doctor.php sql injection](https://vuldb.com/?id.310320) 2. [VDB-310320 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.310320) 3. [Submit #583029 | Campcodes Online Hospital Management System V1.0 SQL Injection](https://vuldb.com/?submit.583029) 4. [](https://github.com/kkive/cve/issues/1) 5. [](https://www.campcodes.com/) ### Credits - kangge (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-48414, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-48414 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-48414 - **State**: PUBLISHED - **Published Date**: May 21, 2025 at 11:40 UTC - **Last Updated**: May 21, 2025 at 15:17 UTC - **Reserved Date**: May 20, 2025 at 07:34 UTC - **Assigned By**: SEC-VLab ### Vulnerability Description There are several scripts in the web interface that are accessible via undocumented hard-coded credentials. The scripts provide access to additional administrative/debug functionality and are likely intended for debugging during development and provides an additional attack surface. ### Weakness Classification (CWE) - CWE-798: Cross-site Scripting (XSS) ### Affected Products **eCharge Hardy Barth - cPH2 / cPP2 charging stations** Affected versions: - <=2.2.0 (Status: affected) ### References 1. [](https://r.sec-consult.com/echarge) ### Credits - Stefan Viehböck | SEC Consult Vulnerability Lab