System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-5778, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-5778 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5778
- **State**: PUBLISHED
- **Published Date**: November 07, 2006 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 20:04 UTC
- **Reserved Date**: November 07, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ftpd in linux-ftpd 0.17, and possibly other versions, performs a chdir before setting the UID, which allows local users to bypass intended access restrictions by redirecting their home directory to a restricted directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384454)
2. [GLSA-200611-05](http://security.gentoo.org/glsa/glsa-200611-05.xml)
3. [20060825 ftpd chdir() while root](http://lists.grok.org.uk/pipermail/full-disclosure/2006-August/049014.html)
4. [21000](http://www.securityfocus.com/bid/21000)
5. [22997](http://secunia.com/advisories/22997)
6. [DSA-1217](http://www.debian.org/security/2006/dsa-1217)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-5375, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-5375 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5375
- **State**: PUBLISHED
- **Published Date**: November 24, 2013 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 17:06 UTC
- **Reserved Date**: August 22, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Unspecified vulnerability in IBM Java SDK 7.0.0 before SR6, 6.0.1 before SR7, 6.0.0 before SR15, and 5.0.0 before SR16 FP4 allows remote attackers to access restricted classes via unspecified vectors related to XML and XSL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [IV51090](http://www-01.ibm.com/support/docview.wss?uid=swg1IV51090)
2. [ibm-xslt-cve20135375-security-bypass(86901)](https://exchange.xforce.ibmcloud.com/vulnerabilities/86901)
3. [](http://www-01.ibm.com/support/docview.wss?uid=swg21655202)
4. [RHSA-2013:1508](http://rhn.redhat.com/errata/RHSA-2013-1508.html)
5. [SUSE-SU-2013:1677](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html)
6. [](http://www-01.ibm.com/support/docview.wss?uid=swg21655201)
7. [](https://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2013)
8. [RHSA-2013:1793](http://rhn.redhat.com/errata/RHSA-2013-1793.html)
9. [RHSA-2013:1509](http://rhn.redhat.com/errata/RHSA-2013-1509.html)
10. [RHSA-2013:1507](http://rhn.redhat.com/errata/RHSA-2013-1507.html)
11. [56338](http://secunia.com/advisories/56338)
12. [IV51089](http://www-01.ibm.com/support/docview.wss?uid=swg1IV51089)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-4337, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-4337 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4337
- **State**: PUBLISHED
- **Published Date**: May 06, 2025 at 04:24 UTC
- **Last Updated**: May 06, 2025 at 14:18 UTC
- **Reserved Date**: May 05, 2025 at 15:45 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The AHAthat Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6. This is due to missing or incorrect nonce validation on the aha_plugin_page() function. This makes it possible for unauthenticated attackers to delete AHA pages via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**mitchelllevy - AHAthat Plugin**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/af15ae80-dbce-4899-9604-82fdca222bf5?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/ahathat/trunk/includes/class-aha-admin-menu.php#L42)
### Credits
- Régis SENET
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-0618, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-0618 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0618
- **State**: PUBLISHED
- **Published Date**: January 31, 2007 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 12:26 UTC
- **Reserved Date**: January 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22262](http://www.securityfocus.com/bid/22262)
2. [aix-mailservices-rlogin-security-bypass(31875)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31875)
3. [ADV-2007-0382](http://www.vupen.com/english/advisories/2007/0382)
4. [](ftp://aix.software.ibm.com/aix/efixes/security/README)
5. [IY93084](http://www-1.ibm.com/support/search.wss?rs=0&q=IY93084&apar=only)
6. [23957](http://secunia.com/advisories/23957)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-49507, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-49507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-49507
- **State**: PUBLISHED
- **Published Date**: June 10, 2025 at 12:42 UTC
- **Last Updated**: June 10, 2025 at 13:37 UTC
- **Reserved Date**: June 06, 2025 at 10:33 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Deserialization of Untrusted Data vulnerability in LoftOcean CozyStay allows Object Injection.This issue affects CozyStay: from n/a before 1.7.1.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**LoftOcean - CozyStay**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/theme/cozystay/vulnerability/wordpress-cozystay-1-7-1-php-object-injection-vulnerability?_s_id=cve)
### Credits
- Bonds (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-0215, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-0215 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0215
- **State**: PUBLISHED
- **Published Date**: July 12, 2012 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 16:53 UTC
- **Reserved Date**: December 14, 2011 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
model/modelstorage.py in the Tryton application framework (trytond) before 2.4.0 for Python does not properly restrict access to the Many2Many field in the relation model, which allows remote authenticated users to modify the privileges of arbitrary users via a (1) create, (2) write, (3) delete, or (4) copy rpc call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-2444](http://www.debian.org/security/2012/dsa-2444)
2. [](https://bugs.tryton.org/issue2476)
3. [](http://hg.tryton.org/trytond/rev/8e64d52ecea4)
4. [](http://news.tryton.org/2012/03/security-releases-for-all-supported.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-2670, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-2670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2670
- **State**: PUBLISHED
- **Published Date**: January 05, 2007 at 02:00 UTC
- **Last Updated**: August 08, 2024 at 01:36 UTC
- **Reserved Date**: January 04, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in mod.php in eNdonesia 8.3 allow remote attackers to inject arbitrary web script or HTML via (1) the mod parameter in a viewcat operation or (2) the query parameter in a search operation in the publisher module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20040804 Multiple vulnerabilities in eNdonesia CMS](http://www.securityfocus.com/archive/1/370855)
2. [12231](http://secunia.com/advisories/12231)
3. [](http://echo.or.id/adv/adv02-y3dips-2004.txt)
4. [1010864](http://securitytracker.com/id?1010864)
5. [8506](http://www.securityfocus.com/bid/8506)
6. [endonesia-mod-xss(13041)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13041)
7. [10856](http://www.securityfocus.com/bid/10856)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-4894, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-4894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4894
- **State**: PUBLISHED
- **Published Date**: October 21, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 06:25 UTC
- **Reserved Date**: June 24, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Mobile Server component in Oracle Database Mobile/Lite Server 10.3.0.3, 11.3.0.2, and 12.1.0.0 allows remote authenticated users to affect integrity and availability via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1033883](http://www.securitytracker.com/id/1033883)
2. [77131](http://www.securityfocus.com/bid/77131)
3. [](http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-9316, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-9316 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9316
- **State**: REJECTED
- **Published Date**: April 06, 2018 at 16:00 UTC
- **Last Updated**: April 06, 2018 at 15:57 UTC
- **Reserved Date**: April 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-9667, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-9667 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9667
- **State**: PUBLISHED
- **Published Date**: November 05, 2024 at 08:31 UTC
- **Last Updated**: November 05, 2024 at 13:30 UTC
- **Reserved Date**: October 08, 2024 at 23:03 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Seriously Simple Podcasting plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.5.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**podcastmotor - Seriously Simple Podcasting**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/f4232656-2e97-4888-8dde-14039d8c2f9d?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/seriously-simple-podcasting/trunk/php/classes/handlers/class-options-handler.php#L101)
3. [](https://wordpress.org/plugins/seriously-simple-podcasting/#developers)
4. [](https://plugins.trac.wordpress.org/changeset/3181485/)
### Credits
- Craig Smith
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-36461, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-36461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36461
- **State**: PUBLISHED
- **Published Date**: August 08, 2021 at 05:13 UTC
- **Last Updated**: August 04, 2024 at 17:30 UTC
- **Reserved Date**: August 08, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the noise_search crate through 2020-12-10 for Rust. There are unconditional implementations of Send and Sync for MvccRwLock.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2020-0141.html)
2. [](https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/noise_search/RUSTSEC-2020-0141.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-40146, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-40146 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40146
- **State**: PUBLISHED
- **Published Date**: September 22, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 12:14 UTC
- **Reserved Date**: September 07, 2022 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to access files using a Jar url. This issue affects Apache XML Graphics Batik 1.14.
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**Apache Software Foundation - Apache XML Graphics**
Affected versions:
- Batik 1.14 (Status: affected)
### References
1. [](https://lists.apache.org/thread/hxtddqjty2sbs12y97c8g7xfh17jzxsx)
2. [[debian-lts-announce] 20231014 [SECURITY] [DLA 3619-1] batik security update](https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html)
3. [GLSA-202401-11](https://security.gentoo.org/glsa/202401-11)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-0240, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-0240 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0240
- **State**: PUBLISHED
- **Published Date**: July 21, 2011 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 21:51 UTC
- **Reserved Date**: December 23, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT4981)
2. [APPLE-SA-2011-10-11-1](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html)
3. [](http://support.apple.com/kb/HT4808)
4. [APPLE-SA-2011-07-20-1](http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-5320, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-5320 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-5320
- **State**: PUBLISHED
- **Published Date**: January 03, 2015 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 18:03 UTC
- **Reserved Date**: January 02, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in MemHT Portal 4.0.1 allow remote attackers to hijack the authentication of administrators for requests that (1) modify settings via a configuration action to admin.php, (2) modify articles via an articles action to admin.php, or (3) modify credentials via a users action to admin.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.htbridge.com/advisory/HTB22662)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-23468, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-23468 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23468
- **State**: PUBLISHED
- **Published Date**: December 09, 2022 at 17:49 UTC
- **Last Updated**: April 23, 2025 at 16:30 UTC
- **Reserved Date**: January 19, 2022 at 21:23 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).
xrdp < v0.9.21 contain a buffer over flow in xrdp_login_wnd_create() function. There are no known workarounds for this issue. Users are advised to upgrade.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**neutrinolabs - xrdp**
Affected versions:
- < 0.9.21 (Status: affected)
### References
1. [https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8c2f-mw8m-qpx6](https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8c2f-mw8m-qpx6)
2. [](https://www.debian.org/security/2023/dsa-5502)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-3699, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-3699 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3699
- **State**: PUBLISHED
- **Published Date**: October 24, 2023 at 20:48 UTC
- **Last Updated**: September 17, 2024 at 14:17 UTC
- **Reserved Date**: October 26, 2022 at 14:21 UTC
- **Assigned By**: lenovo
### Vulnerability Description
A privilege escalation vulnerability was reported in the Lenovo HardwareScanPlugin prior to version 1.3.1.2 and Lenovo Diagnostics prior to version 4.45
that could allow a local user to execute code with elevated privileges.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Lenovo - HardwareScanPlugin **
Affected versions:
- (Status: affected)
**Lenovo - Diagnostics**
Affected versions:
- (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/product_security/LEN-94532)
2. [](https://support.lenovo.com/us/en/product_security/LEN-102365)
### Credits
- Lenovo thanks Mike Alfaro at Nephosec for reporting this issue.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-39354, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-39354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39354
- **State**: PUBLISHED
- **Published Date**: November 11, 2024 at 14:59 UTC
- **Last Updated**: November 11, 2024 at 16:07 UTC
- **Reserved Date**: July 16, 2024 at 16:12 UTC
- **Assigned By**: icscert
### Vulnerability Description
If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in CEtherIPTagItem can be exploited, allowing the attacker to remotely execute arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Delta Electronics - DIAScreen**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-312-02)
2. [](https://www.deltaww.com/en-US/Cybersecurity_Advisory)
### Credits
- Natnael Samson working with Trend Micro Zero Day Initiative reported these vulnerabilities to CISA.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-9459, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-9459 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9459
- **State**: PUBLISHED
- **Published Date**: February 28, 2020 at 20:51 UTC
- **Last Updated**: August 04, 2024 at 10:26 UTC
- **Reserved Date**: February 28, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple Stored Cross-site scripting (XSS) vulnerabilities in the Webnus Modern Events Calendar Lite plugin through 5.1.6 for WordPress allows remote authenticated users (with minimal permissions) to inject arbitrary JavaScript, HTML, or CSS via Ajax actions. This affects mec_save_notifications and import_settings.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/10100)
2. [](https://www.wordfence.com/blog/2020/02/site-takeover-campaign-exploits-multiple-zero-day-vulnerabilities/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-12004, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-12004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12004
- **State**: PUBLISHED
- **Published Date**: December 11, 2024 at 08:57 UTC
- **Last Updated**: December 11, 2024 at 15:15 UTC
- **Reserved Date**: November 29, 2024 at 19:33 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WPC Order Notes for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.2. This is due to missing or incorrect nonce validation on the ajax_update_order_note() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**wpclever - WPC Order Notes for WooCommerce**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/05f40082-30ed-45f7-81d5-d5334a51fcea?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/woo-order-notes/trunk/wpc-order-notes.php#L416)
3. [](https://wordpress.org/plugins/woo-order-notes/#developers)
4. [](https://plugins.trac.wordpress.org/changeset/3205072/)
### Credits
- Dale Mavers
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-8283, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-8283 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8283
- **State**: PUBLISHED
- **Published Date**: April 26, 2017 at 05:28 UTC
- **Last Updated**: August 05, 2024 at 16:34 UTC
- **Reserved Date**: April 25, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [98064](http://www.securityfocus.com/bid/98064)
2. [](http://www.openwall.com/lists/oss-security/2017/04/20/2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-47628, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-47628 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47628
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 00:33 UTC
- **Last Updated**: September 03, 2024 at 14:35 UTC
- **Reserved Date**: November 07, 2023 at 16:57 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
DataHub is an open-source metadata platform. DataHub Frontend's sessions are configured using Play Framework's default settings for stateless session which do not set an expiration time for a cookie. Due to this, if a session cookie were ever leaked, it would be valid forever. DataHub uses a stateless session cookie that is not invalidated on logout, it is just removed from the browser forcing the user to login again. However, if an attacker extracted a cookie from an authenticated user it would continue to be valid as there is no validation on a time window the session token is valid for due to a combination of the usage of LegacyCookiesModule from Play Framework and using default settings which do not set an expiration time. All DataHub instances prior to the patch that have removed the datahub user, but not the default policies applying to that user are affected. Users are advised to update to version 0.12.1 which addresses the issue. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-613: Security Weakness
### Affected Products
**datahub-project - datahub**
Affected versions:
- < 0.12.1 (Status: affected)
### References
1. [https://github.com/datahub-project/datahub/security/advisories/GHSA-75p8-rgh2-r9mx](https://github.com/datahub-project/datahub/security/advisories/GHSA-75p8-rgh2-r9mx)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-2043, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-2043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2043
- **State**: PUBLISHED
- **Published Date**: February 25, 2015 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 05:02 UTC
- **Reserved Date**: February 20, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Visualware MyConnection Server 8.2b allow remote attackers to inject arbitrary web script or HTML via the (1) bt, (2) variable, or (3) et parameter to myspeed/db/historyitem.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/130490/MyConnection-Server-8.2b-Cross-Site-Scripting.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-3001, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-3001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3001
- **State**: PUBLISHED
- **Published Date**: June 14, 2023 at 07:40 UTC
- **Last Updated**: March 05, 2025 at 18:57 UTC
- **Reserved Date**: May 31, 2023 at 06:57 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-502: Deserialization of Untrusted Data vulnerability exists in the Dashboard module that
could cause an interpretation of malicious payload data, potentially leading to remote code
execution when an attacker gets the user to open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Schneider Electric - IGSS Dashboard (DashBoard.exe)**
Affected versions:
- v16.0.0.23130 and prior (Status: affected)
### References
1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-164-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-164-02.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-26390, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-26390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26390
- **State**: PUBLISHED
- **Published Date**: September 09, 2022 at 14:40 UTC
- **Last Updated**: September 17, 2024 at 04:09 UTC
- **Reserved Date**: March 03, 2022 at 00:00 UTC
- **Assigned By**: Baxter
### Vulnerability Description
The Baxter Spectrum Wireless Battery Module (WBM) stores network credentials and PHI (only applicable to Spectrum IQ pumps using auto programming) in unencrypted form. An attacker with physical access to a device that hasn't had all data and settings erased may be able to extract sensitive information.
### CVSS Metrics
- **CVSS Base Score**: 4.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**Baxter - Baxter Spectrum Wireless Battery Module (WBM)**
Affected versions:
- 16 (Status: affected)
- 16D38 (Status: affected)
- 17 (Status: affected)
- 17D19 (Status: affected)
- 20D29 (Status: affected)
- 20D30 (Status: affected)
- 20D31 (Status: affected)
- 20D32 (Status: affected)
- 22D19 (Status: affected)
- 22D20 (Status: affected)
- 22D21 (Status: affected)
- 22D22 (Status: affected)
- 22D23 (Status: affected)
- 22D24 (Status: affected)
- 22D25 (Status: affected)
- 22D26 (Status: affected)
- 22D27 (Status: affected)
- 22D28 (Status: affected)
### References
1. [](https://www.us-cert.gov/ics/advisories/icsma-22-xxx-xx)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-7123, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-7123 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7123
- **State**: PUBLISHED
- **Published Date**: October 19, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:40 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Brevir Harian V2 (aka com.brevir.harian.v) application 2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#709481](http://www.kb.cert.org/vuls/id/709481)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-45615, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-45615 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45615
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 22:44 UTC
- **Last Updated**: August 30, 2024 at 17:23 UTC
- **Reserved Date**: October 09, 2023 at 16:22 UTC
- **Assigned By**: hpe
### Vulnerability Description
There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Hewlett Packard Enterprise (HPE) - Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; **
Affected versions:
- ArubaOS 10.5.x.x: 10.5.0.0 and below (Status: affected)
- ArubaOS 10.4.x.x: 10.4.0.2 and below (Status: affected)
- InstantOS 8.11.x.x: 8.11.1.2 and below (Status: affected)
- InstantOS 8.10.x.x: 8.10.0.8 and below (Status: affected)
- InstantOS 8.6.x.x: 8.6.0.22 and below (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt)
### Credits
- Chancen
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2000-0473, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2000-0473 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0473
- **State**: PUBLISHED
- **Published Date**: July 12, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:21 UTC
- **Reserved Date**: July 11, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in AnalogX SimpleServer 1.05 allows a remote attacker to cause a denial of service via a long GET request for a program in the cgi-bin directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.analogx.com/contents/download/network/sswww.htm)
2. [1349](http://www.securityfocus.com/bid/1349)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-38325, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-38325 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38325
- **State**: PUBLISHED
- **Published Date**: July 14, 2023 at 00:00 UTC
- **Last Updated**: October 30, 2024 at 16:00 UTC
- **Reserved Date**: July 14, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The cryptography package before 41.0.2 for Python mishandles SSH certificates that have critical options.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/pyca/cryptography/issues/9207)
2. [](https://github.com/pyca/cryptography/pull/9208)
3. [](https://pypi.org/project/cryptography/#history)
4. [](https://github.com/pyca/cryptography/compare/41.0.1...41.0.2)
5. [FEDORA-2023-2b0f2e4bc3](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMCCTYY3CSNQBFFYYC5DAV6KATHWCUZK/)
6. [](https://security.netapp.com/advisory/ntap-20230824-0010/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-10416, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-10416 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10416
- **State**: PUBLISHED
- **Published Date**: October 19, 2017 at 17:00 UTC
- **Last Updated**: October 04, 2024 at 16:41 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: Setup and Configuration). Supported versions that are affected are 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### Affected Products
**Oracle Corporation - Advanced Outbound Telephony**
Affected versions:
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
- 12.2.7 (Status: affected)
### References
1. [101303](http://www.securityfocus.com/bid/101303)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html)
3. [1039592](http://www.securitytracker.com/id/1039592)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-21455, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-21455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21455
- **State**: PUBLISHED
- **Published Date**: July 19, 2022 at 21:06 UTC
- **Last Updated**: September 24, 2024 at 20:04 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PAM Auth Plugin). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.28 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2022.html)
2. [](https://security.netapp.com/advisory/ntap-20220729-0004/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-8975, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-8975 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8975
- **State**: PUBLISHED
- **Published Date**: September 25, 2024 at 16:42 UTC
- **Last Updated**: September 26, 2024 at 16:22 UTC
- **Reserved Date**: September 18, 2024 at 14:51 UTC
- **Assigned By**: GRAFANA
### Vulnerability Description
Unquoted Search Path or Element vulnerability in Grafana Alloy on Windows allows Privilege Escalation from Local User to SYSTEM
This issue affects Alloy: before 1.3.3, from 1.4.0-rc.0 through 1.4.0-rc.1.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-428: Security Weakness
### Affected Products
**Grafana - Alloy**
Affected versions:
- 0 (Status: affected)
- 1.4.0-rc.0 (Status: affected)
### References
1. [](https://grafana.com/security/security-advisories/cve-2024-8975/)
2. [](https://grafana.com/blog/2024/09/25/grafana-alloy-and-grafana-agent-flow-security-release-high-severity-fix-for-cve-2024-8975-and-cve-2024-8996/)
3. [](https://github.com/grafana/alloy/releases/tag/v1.4.1)
4. [](https://github.com/grafana/alloy/releases/tag/v1.3.4)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-5786, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-5786 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5786
- **State**: PUBLISHED
- **Published Date**: August 25, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 06:59 UTC
- **Reserved Date**: August 06, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Apple QuickTime before 7.7.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file, a different vulnerability than CVE-2015-5785.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT205046)
2. [1033346](http://www.securitytracker.com/id/1033346)
3. [APPLE-SA-2015-08-20-1](http://lists.apple.com/archives/security-announce/2015/Aug/msg00004.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-33332, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-33332 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33332
- **State**: PUBLISHED
- **Published Date**: August 03, 2021 at 20:58 UTC
- **Last Updated**: August 03, 2024 at 23:50 UTC
- **Reserved Date**: May 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Portlet Configuration module in Liferay Portal 7.1.0 through 7.3.2, and Liferay DXP 7.1 before fix pack 19, and 7.2 before fix pack 7, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_portlet_configuration_css_web_portlet_PortletConfigurationCSSPortlet_portletResource parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/120748366)
2. [](https://issues.liferay.com/browse/LPE-17053)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-8779, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-8779 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8779
- **State**: PUBLISHED
- **Published Date**: May 04, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 16:48 UTC
- **Reserved Date**: May 04, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3759-2](https://usn.ubuntu.com/3759-2/)
2. [RHSA-2017:1267](https://access.redhat.com/errata/RHSA-2017:1267)
3. [USN-3759-1](https://usn.ubuntu.com/3759-1/)
4. [RHSA-2017:1262](https://access.redhat.com/errata/RHSA-2017:1262)
5. [](https://guidovranken.wordpress.com/2017/05/03/rpcbomb-remote-rpcbind-denial-of-service-patches/)
6. [RHSA-2017:1268](https://access.redhat.com/errata/RHSA-2017:1268)
7. [](https://github.com/drbothen/GO-RPCBOMB)
8. [RHBA-2017:1497](https://access.redhat.com/errata/RHBA-2017:1497)
9. [](https://github.com/guidovranken/rpcbomb/)
10. [](https://security.netapp.com/advisory/ntap-20180109-0001/)
11. [GLSA-201706-07](https://security.gentoo.org/glsa/201706-07)
12. [1038532](http://www.securitytracker.com/id/1038532)
13. [98325](http://www.securityfocus.com/bid/98325)
14. [](http://openwall.com/lists/oss-security/2017/05/03/12)
15. [](http://openwall.com/lists/oss-security/2017/05/04/1)
16. [RHSA-2017:1395](https://access.redhat.com/errata/RHSA-2017:1395)
17. [RHSA-2017:1263](https://access.redhat.com/errata/RHSA-2017:1263)
18. [41974](https://www.exploit-db.com/exploits/41974/)
19. [DSA-3845](http://www.debian.org/security/2017/dsa-3845)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-41466, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-41466 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41466
- **State**: PUBLISHED
- **Published Date**: July 24, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 04:46 UTC
- **Reserved Date**: July 18, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow vulnerability via the page parameter at ip/goform/NatStaticSetting.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/NatStaticSetting/README.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-28185, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-28185 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28185
- **State**: PUBLISHED
- **Published Date**: December 24, 2020 at 14:26 UTC
- **Last Updated**: August 04, 2024 at 16:33 UTC
- **Reserved Date**: November 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
User Enumeration vulnerability in TerraMaster TOS <= 4.2.06 allows remote unauthenticated attackers to identify valid users within the system via the username parameter to wizard/initialise.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.terra-master.com/)
2. [](https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-23192, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-23192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23192
- **State**: PUBLISHED
- **Published Date**: February 16, 2022 at 16:38 UTC
- **Last Updated**: April 23, 2025 at 19:04 UTC
- **Reserved Date**: January 12, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Illustrator**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/illustrator/apsb22-07.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-6203, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-6203 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6203
- **State**: PUBLISHED
- **Published Date**: December 18, 2023 at 20:07 UTC
- **Last Updated**: August 02, 2024 at 08:21 UTC
- **Reserved Date**: November 20, 2023 at 13:33 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Events Calendar WordPress plugin before 6.2.8.1 discloses the content of password protected posts to unauthenticated users via a crafted request
### Weakness Classification (CWE)
- CWE-287 Improper Authentication: Improper Authentication
### Affected Products
**Unknown - The Events Calendar**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/229273e6-e849-447f-a95a-0730969ecdae)
### Credits
- Krzysztof Zając (CERT PL)
- WPScan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-2321, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-2321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2321
- **State**: PUBLISHED
- **Published Date**: March 11, 2014 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 19:57 UTC
- **Reserved Date**: March 10, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
web_shell_cmd.gch on ZTE F460 and F660 cable modems allows remote attackers to obtain administrative access via sendcmd requests, as demonstrated by using "set TelnetCfg" commands to enable a TELNET service with specified credentials.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.myxzy.com/post-411.html)
2. [](https://community.rapid7.com/community/infosec/blog/2014/03/03/disclosure-r7-2013-18-zte-f460-and-zte-f660-webshellcmdgch-backdoor)
3. [VU#600724](http://www.kb.cert.org/vuls/id/600724)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-17629, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-17629 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17629
- **State**: PUBLISHED
- **Published Date**: December 13, 2017 at 09:00 UTC
- **Last Updated**: August 05, 2024 at 20:59 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Secure E-commerce Script 2.0.1 has SQL Injection via the category.php searchmain or searchcat parameter, or the single_detail.php sid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43287](https://www.exploit-db.com/exploits/43287/)
2. [](https://packetstormsecurity.com/files/145327/Secure-E-commerce-Script-2.0.1-SQL-Injection.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-3363, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-3363 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3363
- **State**: PUBLISHED
- **Published Date**: October 26, 2022 at 00:00 UTC
- **Last Updated**: May 07, 2025 at 18:29 UTC
- **Reserved Date**: September 29, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.0a7.
### Weakness Classification (CWE)
- CWE-840: Security Weakness
### Affected Products
**ikus060 - ikus060/rdiffweb**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/b8a40ba6-2452-4abe-a80a-2d065ee8891e)
2. [](https://github.com/ikus060/rdiffweb/commit/c27c46bac656b1da74f28eac1b52dfa5df76e6f2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-7241, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-7241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7241
- **State**: PUBLISHED
- **Published Date**: September 06, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 07:43 UTC
- **Reserved Date**: September 18, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
XML External Entity (XXE) vulnerability in SAP Netweaver before 7.01.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/133627/SAP-Netweaver-XML-External-Entity-Injection.html)
2. [20150921 SAP Netwaver - XML External Entity Injection](http://www.securityfocus.com/archive/1/536504/100/0/threaded)
3. [38261](https://www.exploit-db.com/exploits/38261/)
4. [76809](http://www.securityfocus.com/bid/76809)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2001-0711, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2001-0711 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0711
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:30 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cisco IOS 11.x and 12.0 with ATM support allows attackers to cause a denial of service via the undocumented Interim Local Management Interface (ILMI) SNMP community string.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [cisco-ios-modify-snmp(6169)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6169)
2. [20010207 Cisco IOS Software SNMP Read-Write ILMI Community String Vulnerability](http://www.cisco.com/warp/public/707/ios-snmp-ilmi-vuln-pub.shtml)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-15614, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-15614 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15614
- **State**: PUBLISHED
- **Published Date**: January 11, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 19:57 UTC
- **Reserved Date**: October 19, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-outif variable in the pptp_client.lua file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt)
2. [20180110 Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)](http://www.securityfocus.com/archive/1/541655/100/0/threaded)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-40417, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-40417 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40417
- **State**: PUBLISHED
- **Published Date**: September 26, 2023 at 20:12 UTC
- **Last Updated**: February 13, 2025 at 17:08 UTC
- **Reserved Date**: August 14, 2023 at 20:26 UTC
- **Assigned By**: apple
### Vulnerability Description
A window management issue was addressed with improved state management. This issue is fixed in Safari 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. Visiting a website that frames malicious content may lead to UI spoofing.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213938)
2. [](https://support.apple.com/en-us/HT213941)
3. [](https://support.apple.com/en-us/HT213940)
4. [](https://support.apple.com/en-us/HT213937)
5. [](http://seclists.org/fulldisclosure/2023/Oct/2)
6. [](http://seclists.org/fulldisclosure/2023/Oct/8)
7. [](http://seclists.org/fulldisclosure/2023/Oct/9)
8. [](http://seclists.org/fulldisclosure/2023/Oct/3)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-36130, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-36130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36130
- **State**: PUBLISHED
- **Published Date**: July 02, 2021 at 13:00 UTC
- **Last Updated**: August 04, 2024 at 00:47 UTC
- **Reserved Date**: July 02, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An XSS issue was discovered in the SocialProfile extension in MediaWiki through 1.36. Within several gift-related special pages, a privileged user with the awardmanage right could inject arbitrary HTML and JavaScript within various gift-related data fields. The attack could easily propagate across many pages for many users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phabricator.wikimedia.org/T281043)
2. [](https://gerrit.wikimedia.org/r/q/Id915eba45497a1a0dc1c4e00818a2fd4c0ce55d3)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-3895, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-3895 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3895
- **State**: PUBLISHED
- **Published Date**: November 11, 2011 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 23:53 UTC
- **Reserved Date**: October 01, 2011 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Heap-based buffer overflow in the Vorbis decoder in Google Chrome before 15.0.874.120 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted stream.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2012:076](http://www.mandriva.com/security/advisories?name=MDVSA-2012:076)
2. [MDVSA-2012:074](http://www.mandriva.com/security/advisories?name=MDVSA-2012:074)
3. [MDVSA-2012:075](http://www.mandriva.com/security/advisories?name=MDVSA-2012:075)
4. [](http://googlechromereleases.blogspot.com/2011/11/stable-channel-update.html)
5. [49089](http://secunia.com/advisories/49089)
6. [DSA-2471](http://www.debian.org/security/2012/dsa-2471)
7. [46933](http://secunia.com/advisories/46933)
8. [](http://code.google.com/p/chromium/issues/detail?id=101458)
9. [oval:org.mitre.oval:def:13551](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13551)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2000-0189, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2000-0189 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0189
- **State**: PUBLISHED
- **Published Date**: April 10, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:05 UTC
- **Reserved Date**: March 22, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ColdFusion Server 4.x allows remote attackers to determine the real pathname of the server via an HTTP request to the application.cfm or onrequestend.cfm files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1021](http://www.securityfocus.com/bid/1021)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-0584, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-0584 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0584
- **State**: PUBLISHED
- **Published Date**: February 20, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 04:17 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The image-upgrade implementation on Cisco Desktop Collaboration Experience (aka Collaboration Desk Experience or DX) DX650 endpoints allows local users to execute arbitrary OS commands via an unspecified parameter, aka Bug ID CSCus38947.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [72696](http://www.securityfocus.com/bid/72696)
2. [20150219 Cisco Collaboration Desk Experience Endpoints Command Injection Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0584)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-24657, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-24657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24657
- **State**: PUBLISHED
- **Published Date**: July 20, 2022 at 12:31 UTC
- **Last Updated**: August 03, 2024 at 04:20 UTC
- **Reserved Date**: February 07, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Goldshell ASIC Miners v2.1.x was discovered to contain hardcoded credentials which allow attackers to remotely connect via the SSH protocol (port 22).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/goldshellminer/firmware)
2. [](https://jamesachambers.com/cryptocurrency-asic-miners-security-and-hacking-audit/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-2512, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-2512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2512
- **State**: PUBLISHED
- **Published Date**: August 19, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 19:57 UTC
- **Reserved Date**: August 10, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mail.app in Mac OS 10.4.2 and earlier, when printing or forwarding an HTML message, loads remote images even when the user's preferences state otherwise, which could result in a privacy leak.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2005-08-15](http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html)
2. [APPLE-SA-2005-08-17](http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-47379, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-47379 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47379
- **State**: PUBLISHED
- **Published Date**: May 15, 2023 at 09:33 UTC
- **Last Updated**: March 05, 2025 at 19:01 UTC
- **Reserved Date**: December 14, 2022 at 06:03 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
An authenticated, remote attacker may use a out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into memory which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**CODESYS - CODESYS Control RTE (SL)**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Control RTE (for Beckhoff CX) SL**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Control Win (SL)**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Control Runtime System Toolkit**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Safety SIL2 Runtime Toolkit**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Safety SIL2 PSP**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS HMI (SL)**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Development System V3**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Control for BeagleBone SL**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Control for emPC-A/iMX6 SL**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Control for IOT2000 SL**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Control for Linux SL**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Control for PFC100 SL**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Control for PFC200 SL**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Control for PLCnext SL**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Control for Raspberry Pi SL**
Affected versions:
- V0.0.0.0 (Status: affected)
**CODESYS - CODESYS Control for WAGO Touch Panels 600 SL**
Affected versions:
- V0.0.0.0 (Status: affected)
### References
1. [](https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=)
### Credits
- Vladimir Tokarev, Microsoft
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-14906, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-14906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14906
- **State**: PUBLISHED
- **Published Date**: March 30, 2018 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 16:42 UTC
- **Reserved Date**: September 28, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android before 2018-01-05 on Qualcomm Snapdragon IoT, Snapdragon Mobile MDM9206, MDM9607, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, PKCS7 padding is not supported by the crypto storage APIs.
### Affected Products
**Qualcomm, Inc. - Snapdragon IoT, Snapdragon Mobile**
Affected versions:
- MDM9206, MDM9607, MSM8909W, SD 210/SD 212/SD 205, SD 410/12 (Status: affected)
### References
1. [102386](http://www.securityfocus.com/bid/102386)
2. [](https://source.android.com/security/bulletin/2018-01-01)
3. [1040106](http://www.securitytracker.com/id/1040106)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-26909, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-26909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26909
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 15:48 UTC
- **Last Updated**: March 27, 2025 at 16:17 UTC
- **Reserved Date**: February 17, 2025 at 11:50 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in John Darrel Hide My WP Ghost allows PHP Local File Inclusion.This issue affects Hide My WP Ghost: from n/a through 5.4.01.
### CVSS Metrics
- **CVSS Base Score**: 9.6/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-98: Security Weakness
### Affected Products
**John Darrel - Hide My WP Ghost**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/hide-my-wp/vulnerability/wordpress-hide-my-wp-ghost-plugin-5-4-01-local-file-inclusion-to-rce-vulnerability?_s_id=cve)
### Credits
- Dimas Maulana (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-9074, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-9074 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9074
- **State**: PUBLISHED
- **Published Date**: February 24, 2019 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 21:38 UTC
- **Reserved Date**: February 23, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=24235)
2. [](https://security.netapp.com/advisory/ntap-20190314-0003/)
3. [](https://support.f5.com/csp/article/K09092524)
4. [USN-4336-1](https://usn.ubuntu.com/4336-1/)
5. [openSUSE-SU-2020:1790](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html)
6. [openSUSE-SU-2020:1804](http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html)
7. [GLSA-202107-24](https://security.gentoo.org/glsa/202107-24)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-2787, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-2787 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2787
- **State**: PUBLISHED
- **Published Date**: August 03, 2011 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 23:15 UTC
- **Reserved Date**: July 20, 2011 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Google Chrome before 13.0.782.107 does not properly address re-entrancy issues associated with the GPU lock, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:14533](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14533)
2. [74237](http://osvdb.org/74237)
3. [](http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html)
4. [](http://code.google.com/p/chromium/issues/detail?id=84805)
5. [google-chrome-gpu-dos(68949)](https://exchange.xforce.ibmcloud.com/vulnerabilities/68949)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-27978, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-27978 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27978
- **State**: PUBLISHED
- **Published Date**: April 26, 2023 at 00:00 UTC
- **Last Updated**: February 03, 2025 at 18:36 UTC
- **Reserved Date**: March 28, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tooljet v1.6 does not properly handle missing values in the API, allowing attackers to arbitrarily reset passwords via a crafted HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://tooljet.com)
2. [](https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220320-tooljet.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-21104, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-21104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21104
- **State**: PUBLISHED
- **Published Date**: May 15, 2023 at 00:00 UTC
- **Last Updated**: January 24, 2025 at 17:53 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In applySyncTransaction of WindowOrganizer.java, a missing permission check could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-259938771
### Affected Products
**n/a - Android**
Affected versions:
- Android-12L Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2023-05-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-38674, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-38674 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38674
- **State**: PUBLISHED
- **Published Date**: February 06, 2023 at 05:27 UTC
- **Last Updated**: March 26, 2025 at 13:24 UTC
- **Reserved Date**: August 22, 2022 at 20:17 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In wlan driver, there is a possible missing params check. This could lead to local denial of service in wlan services.
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1621031430231134210)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-0122, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-0122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0122
- **State**: PUBLISHED
- **Published Date**: March 12, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 00:37 UTC
- **Reserved Date**: January 04, 2010 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Multiple SQL injection vulnerabilities in Employee Timeclock Software 0.99 allow remote attackers to execute arbitrary SQL commands via the (1) username or (2) password parameter to (a) auth.php or (b) login_action.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [38639](http://www.securityfocus.com/bid/38639)
2. [38739](http://secunia.com/advisories/38739)
3. [timeclock-auth-sql-injection(56799)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56799)
4. [](http://secunia.com/secunia_research/2010-11/)
5. [62832](http://www.osvdb.org/62832)
6. [62831](http://www.osvdb.org/62831)
7. [20100310 Secunia Research: Employee Timeclock Software SQL Injection Vulnerabilities](http://www.securityfocus.com/archive/1/509995/100/0/threaded)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10147, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10147
- **State**: PUBLISHED
- **Published Date**: January 18, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 03:14 UTC
- **Reserved Date**: January 18, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=48a992727d82cb7db076fa15d372178743b1f4cd)
2. [](https://github.com/torvalds/linux/commit/48a992727d82cb7db076fa15d372178743b1f4cd)
3. [[linux-crypto] 20161202 Crash in crypto mcryptd](http://marc.info/?l=linux-crypto-vger&m=148063683310477&w=2)
4. [[oss-security] 20170117 CVE request -- linux kernel: crash by spawning mcrypt(alg) with incompatible algorithm](http://www.openwall.com/lists/oss-security/2017/01/17/13)
5. [95677](http://www.securityfocus.com/bid/95677)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=1404200)
7. [](http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.15)
8. [RHSA-2017:2077](https://access.redhat.com/errata/RHSA-2017:2077)
9. [RHSA-2017:1842](https://access.redhat.com/errata/RHSA-2017:1842)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-5042, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-5042 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-5042
- **State**: PUBLISHED
- **Published Date**: December 30, 2011 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 00:23 UTC
- **Reserved Date**: December 30, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in inc/lib/lib.base.php in SASHA 0.2.0 allows remote attackers to inject arbitrary web script or HTML via the instructors parameter. NOTE: the original disclosure also mentions the section_title parameter, but this was disputed by the vendor and retracted by the original researcher.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/apps/mantisbt/sasha/view.php?id=13)
2. [20111218 SASHA v0.2.0 Mutiple XSS](http://archives.neohapsis.com/archives/bugtraq/2011-12/0123.html)
3. [sasha-multiple-xss(71874)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71874)
4. [](http://sasha.svn.sourceforge.net/viewvc/sasha/branches/SASHA_0.2/SASHA/inc/lib/lib.base.php?r1=95&r2=96&pathrev=96)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-22148, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-22148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22148
- **State**: PUBLISHED
- **Published Date**: February 01, 2024 at 09:37 UTC
- **Last Updated**: August 01, 2024 at 22:35 UTC
- **Reserved Date**: January 05, 2024 at 11:18 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Smart Editor JoomUnited allows Reflected XSS.This issue affects JoomUnited: from n/a through 1.3.3.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WP Smart Editor - JoomUnited**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-smart-editor/wordpress-wp-smart-editor-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Dimas Maulana (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-6519, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-6519 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6519
- **State**: PUBLISHED
- **Published Date**: February 02, 2018 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 06:10 UTC
- **Reserved Date**: February 01, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The SAML2 library before 1.10.4, 2.x before 2.3.5, and 3.x before 3.1.1 in SimpleSAMLphp has a Regular Expression Denial of Service vulnerability for fraction-of-seconds data in a timestamp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://simplesamlphp.org/security/201801-01)
2. [DSA-4127](https://www.debian.org/security/2018/dsa-4127)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-10090, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-10090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10090
- **State**: PUBLISHED
- **Published Date**: September 23, 2019 at 15:26 UTC
- **Last Updated**: August 04, 2024 at 22:10 UTC
- **Reserved Date**: March 26, 2019 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the plain editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
### Affected Products
**n/a - Apache JSPWiki**
Affected versions:
- Apache JSPWiki up to 2.11.0.M4 (Status: affected)
### References
1. [](https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10090)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-6068, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-6068 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6068
- **State**: PUBLISHED
- **Published Date**: November 14, 2024 at 16:22 UTC
- **Last Updated**: November 14, 2024 at 16:59 UTC
- **Reserved Date**: June 17, 2024 at 13:55 UTC
- **Assigned By**: Rockwell
### Vulnerability Description
A memory corruption vulnerability exists in the affected products when parsing DFT files. Local threat actors can exploit this issue to disclose information and to execute arbitrary code. To exploit this vulnerability a legitimate user must open a malicious DFT file.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-1284: Security Weakness
### Affected Products
**Rockwell Automation - Arena Input Analyzer**
Affected versions:
- <=16.20.03 (Status: affected)
### References
1. [](https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD17011.html)
### Credits
- Michael Heinzl
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-2547, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-2547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2547
- **State**: PUBLISHED
- **Published Date**: May 23, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:51 UTC
- **Reserved Date**: May 22, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the sapdba command in SAP with Informix before 700, and 700 up to patch 100, allows local users to execute arbitrary commands via unknown vectors related to "insecure environment variable" handling.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-1861](http://www.vupen.com/english/advisories/2006/1861)
2. [20180](http://secunia.com/advisories/20180)
3. [](http://www.cybsec.com/vuln/CYBSEC_Security_Pre-Advisory_Local_Privilege_Escalation_in_SAP_sapdba_Command.pdf)
4. [sap-sapdba-privilege-escalation(26526)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26526)
5. [1016122](http://securitytracker.com/id?1016122)
6. [20060518 CYBSEC - Security Pre-Advisory: Local Privilege Escalation in SAP sapdba Command](http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046130.html)
7. [20060519 CYBSEC - Security Pre-Advisory: Local Privilege Escalation in SAPsapdba Command](http://www.securityfocus.com/archive/1/434534/30/4890/threaded)
8. [941](http://securityreason.com/securityalert/941)
9. [18028](http://www.securityfocus.com/bid/18028)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-3479, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-3479 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3479
- **State**: PUBLISHED
- **Published Date**: March 25, 2019 at 16:01 UTC
- **Last Updated**: August 04, 2024 at 19:12 UTC
- **Reserved Date**: December 31, 2018 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
Mitigates a potential remote code execution issue in ArcSight Logger versions prior to 6.7.
### Affected Products
**n/a - ArcSight Logger**
Affected versions:
- Versions prior to 6.7 (Status: affected)
### References
1. [](https://softwaresupport.softwaregrp.com/doc/KM03355866)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2002-1856, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2002-1856 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1856
- **State**: PUBLISHED
- **Published Date**: June 28, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 22:15 UTC
- **Reserved Date**: June 28, 2005 at 04:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HP Application Server 8.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5119](http://www.securityfocus.com/bid/5119)
2. [webinf-dot-file-retrieval(9446)](http://www.iss.net/security_center/static/9446.php)
3. [](http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt)
4. [20020628 wp-02-0002: 'WEB-INF' Folder accessible in Multiple Web Application Servers](http://online.securityfocus.com/archive/1/279582)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-10103, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-10103 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10103
- **State**: PUBLISHED
- **Published Date**: March 05, 2020 at 00:37 UTC
- **Last Updated**: August 04, 2024 at 10:50 UTC
- **Reserved Date**: March 05, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An XSS issue was discovered in Zammad 3.0 through 3.2. Malicious code can be provided by a low-privileged user through the File Upload functionality in Zammad. The malicious JavaScript will execute within the browser of any user who opens a specially crafted link to the uploaded file with an active Zammad session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://zammad.com/news/security-advisory-zaa-2020-02)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-29534, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-29534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29534
- **State**: PUBLISHED
- **Published Date**: June 19, 2023 at 10:11 UTC
- **Last Updated**: December 11, 2024 at 16:05 UTC
- **Reserved Date**: April 07, 2023 at 19:49 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Different techniques existed to obscure the fullscreen notification in Firefox and Focus for Android. These could have led to potential user confusion and spoofing attacks.
*This bug only affects Firefox and Focus for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox for Android < 112 and Focus for Android < 112.
### Affected Products
**Mozilla - Firefox for Android**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Focus for Android**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1816007)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1816059)
3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1821155)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1821576)
5. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1821906)
6. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1822298)
7. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1822305)
8. [](https://www.mozilla.org/security/advisories/mfsa2023-13/)
### Credits
- Shaheen Fazim and Hafiizh
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-30244, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-30244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30244
- **State**: PUBLISHED
- **Published Date**: July 15, 2022 at 11:40 UTC
- **Last Updated**: August 03, 2024 at 06:40 UTC
- **Reserved Date**: May 04, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be store on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.scadafence.com)
2. [](https://www.honeywell.com/us/en/product-security)
3. [](https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-3790, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-3790 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3790
- **State**: PUBLISHED
- **Published Date**: April 15, 2024 at 14:12 UTC
- **Last Updated**: August 01, 2024 at 20:20 UTC
- **Reserved Date**: April 15, 2024 at 10:18 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
Vulnerability in WBSAirback 21.02.04, which consists of a stored Cross-Site Scripting (XSS) through /admin/SystemUsers, login / description fields, passwd1/ passwd2 parameters. Exploitation of this vulnerability could allow a remote user to send a specially crafted URL to the victim and steal their session data.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WBSAirback - White Bear Solutions**
Affected versions:
- 21.02.04 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions)
### Credits
- Alejandro Amorín Niño
- Guillermo Tuvilla Gómez
- Sergio Román Hurtado
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-22523, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-22523 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22523
- **State**: PUBLISHED
- **Published Date**: July 22, 2021 at 11:11 UTC
- **Last Updated**: August 03, 2024 at 18:44 UTC
- **Reserved Date**: January 05, 2021 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
XML External Entity vulnerability in Micro Focus Verastream Host Integrator, affecting version 7.8 Update 1 and earlier versions. The vulnerability could allow the control of web browser and hijacking user sessions.
### Affected Products
**n/a - Verastream Host Integrator.**
Affected versions:
- Version 7.8 Update 1 and earlier versions. (Status: affected)
### References
1. [](https://support.microfocus.com/kb/doc.php?id=7025169)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-28545, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-28545 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28545
- **State**: PUBLISHED
- **Published Date**: March 26, 2024 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 13:59 UTC
- **Reserved Date**: March 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AC18 V15.03.05.05 contains a command injection vulnerablility in the deviceName parameter of formsetUsbUnload function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-5282, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-5282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5282
- **State**: PUBLISHED
- **Published Date**: October 13, 2006 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 19:48 UTC
- **Reserved Date**: October 13, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in SH-News 3.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the scriptpath parameter to (1) report.php, (2) archive.php, (3) comments.php, (4) init.php, or (5) news.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2518](https://www.exploit-db.com/exploits/2518)
2. [shnews-multiple-file-include(29477)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29477)
3. [20070614 RFI In Script SH-News 3.1](http://www.securityfocus.com/archive/1/471413/100/0/threaded)
4. [20478](http://www.securityfocus.com/bid/20478)
5. [ADV-2006-4014](http://www.vupen.com/english/advisories/2006/4014)
6. [22316](http://secunia.com/advisories/22316)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-55075, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-55075 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-55075
- **State**: PUBLISHED
- **Published Date**: January 06, 2025 at 00:00 UTC
- **Last Updated**: January 06, 2025 at 21:13 UTC
- **Reserved Date**: December 06, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Grocy through 4.3.0 allows remote attackers to obtain sensitive information via direct requests to pages that are not shown in the UI, such as calendar and recipes.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-425: Security Weakness
### Affected Products
**Grocy project - Grocy**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://m10x.de/posts/2024/11/all-your-recipe-are-belong-to-us-part-1/3-stored-xss-csrf-and-broken-access-control-vulnerabilities-in-grocy/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-1135, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-1135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1135
- **State**: PUBLISHED
- **Published Date**: February 19, 2025 at 09:01 UTC
- **Last Updated**: February 19, 2025 at 14:55 UTC
- **Reserved Date**: February 08, 2025 at 04:11 UTC
- **Assigned By**: Gridware
### Vulnerability Description
A vulnerability exists in ChurchCRM 5.13.0. and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the BatchWinnerEntry functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion. Please note the vulnerability requires Administrator privileges.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**ChurchCRM - ChurchCRM**
Affected versions:
- ChurchCRM 5.13.0 and prior (Status: affected)
### References
1. [](https://github.com/ChurchCRM/CRM/issues/7254)
### Credits
- Michael McInerney
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-5017, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-5017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5017
- **State**: PUBLISHED
- **Published Date**: April 23, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 20:50 UTC
- **Reserved Date**: September 21, 2012 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco IOS before 15.1(1)SY1 allows remote authenticated users to cause a denial of service (device reload) by establishing a VPN session and then sending malformed IKEv2 packets, aka Bug ID CSCub39268.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-4524, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-4524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4524
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:41 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-0177, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-0177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0177
- **State**: PUBLISHED
- **Published Date**: January 30, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 14:18 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in widget/screen/ModelScreenWidget.java in Apache Open For Business Project (aka OFBiz) 10.04.x before 10.04.05, 11.04.01, and possibly 09.04.x allow remote authenticated users to inject arbitrary web script or HTML via the (1) Screenlet.title or (2) Image.alt Widget attribute, as demonstrated by the parentPortalPageId parameter to exampleext/control/ManagePortalPages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [89453](http://osvdb.org/89453)
2. [](http://ofbiz.apache.org/download.html#vulnerabilities)
3. [20130118 [CVE-2013-0177] Cross-Site Scripting (XSS) Vulnerability in Apache OFBiz](http://seclists.org/fulldisclosure/2013/Jan/148)
4. [89452](http://osvdb.org/89452)
5. [](http://packetstormsecurity.com/files/119673/Apache-OFBiz-Cross-Site-Scripting.html)
6. [](https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432395)
7. [apache-ofbiz-xss(81398)](https://exchange.xforce.ibmcloud.com/vulnerabilities/81398)
8. [51812](http://secunia.com/advisories/51812)
9. [](https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432850)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-1444, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-1444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1444
- **State**: REJECTED
- **Published Date**: January 24, 2020 at 21:14 UTC
- **Last Updated**: January 24, 2020 at 21:14 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-31235, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-31235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31235
- **State**: PUBLISHED
- **Published Date**: May 12, 2025 at 21:42 UTC
- **Last Updated**: May 13, 2025 at 13:19 UTC
- **Reserved Date**: March 27, 2025 at 16:13 UTC
- **Assigned By**: apple
### Vulnerability Description
A double free issue was addressed with improved memory management. This issue is fixed in iPadOS 17.7.7, macOS Ventura 13.7.6, macOS Sequoia 15.5, macOS Sonoma 14.7.6. An app may be able to cause unexpected system termination.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122716)
2. [](https://support.apple.com/en-us/122405)
3. [](https://support.apple.com/en-us/122717)
4. [](https://support.apple.com/en-us/122718)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-16847, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-16847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16847
- **State**: REJECTED
- **Last Updated**: December 02, 2022 at 00:00 UTC
- **Reserved Date**: September 24, 2019 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-27270, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-27270 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27270
- **State**: PUBLISHED
- **Published Date**: January 19, 2021 at 16:17 UTC
- **Last Updated**: August 04, 2024 at 16:11 UTC
- **Reserved Date**: October 19, 2020 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
SOOIL Developments CoLtd DiabecareRS, AnyDana-i ,AnyDana-A, communication protocol of the insulin pump & AnyDana-i,AnyDana-A mobile apps doesnt use adequate measures to protect encryption keys in transit which allows unauthenticated physically proximate attacker to sniff keys via (BLE).
### Affected Products
**n/a - SOOIL Developments CoLtd DiabecareRS,AnyDana-i,AnyDana-A**
Affected versions:
- Dana DiabecareRS,AnyDana-i,AnyDana-A,versions prior to 3.0 (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsma-21-012-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-3336, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-3336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3336
- **State**: PUBLISHED
- **Published Date**: January 29, 2021 at 04:58 UTC
- **Last Updated**: August 03, 2024 at 16:53 UTC
- **Reserved Date**: January 28, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DoTls13CertificateVerify in tls13.c in wolfSSL before 4.7.0 does not cease processing for certain anomalous peer behavior (sending an ED22519, ED448, ECC, or RSA signature without the corresponding certificate). The client side is affected because man-in-the-middle attackers can impersonate TLS 1.3 servers.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wolfSSL/wolfssl/pull/3676)
2. [](https://www.wolfssl.com/docs/security-vulnerabilities)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-7214, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-7214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7214
- **State**: PUBLISHED
- **Published Date**: November 10, 2016 at 06:16 UTC
- **Last Updated**: August 06, 2024 at 01:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to bypass the ASLR protection mechanism via a crafted application, aka "Win32k Information Disclosure Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1037251](http://www.securitytracker.com/id/1037251)
2. [MS16-135](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-135)
3. [93991](http://www.securityfocus.com/bid/93991)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-6256, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-6256 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6256
- **State**: PUBLISHED
- **Published Date**: May 12, 2020 at 17:51 UTC
- **Last Updated**: August 04, 2024 at 08:55 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Master Data Governance, versions - 748, 749, 750, 751, 752, 800, 801, 802, 803, 804, allows users to display change request details without having required authorizations, due to Missing Authorization Check.
### Affected Products
**SAP SE - SAP Master Data Governance**
Affected versions:
- < 748 (Status: affected)
- < 749 (Status: affected)
- < 750 (Status: affected)
- < 751 (Status: affected)
- < 752 (Status: affected)
- < 800 (Status: affected)
- < 801 (Status: affected)
- < 802 (Status: affected)
- < 803 (Status: affected)
- < 804 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=545396222)
2. [](https://launchpad.support.sap.com/#/notes/2912747)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-2374, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-2374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2374
- **State**: PUBLISHED
- **Published Date**: February 20, 2017 at 08:35 UTC
- **Last Updated**: August 05, 2024 at 13:55 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. GarageBand before 10.1.6 is affected. The issue involves the "Projects" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted GarageBand project file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [96171](http://www.securityfocus.com/bid/96171)
2. [](https://support.apple.com/HT207518)
3. [1037868](http://www.securitytracker.com/id/1037868)
4. [](http://www.talosintelligence.com/reports/TALOS-2017-0275/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-43030, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-43030 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43030
- **State**: PUBLISHED
- **Published Date**: December 20, 2021 at 20:08 UTC
- **Last Updated**: April 23, 2025 at 19:17 UTC
- **Reserved Date**: October 25, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Premiere Rush versions 1.5.16 (and earlier) allows access to an uninitialized pointer vulnerability that allows remote attackers to disclose arbitrary data on affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of MP4 files. The issue results from the lack of proper initialization of memory prior to accessing it.
### Weakness Classification (CWE)
- CWE-824: Security Weakness
### Affected Products
**Adobe - Premiere Rush**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/premiere_rush/apsb21-101.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-4317, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-4317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4317
- **State**: PUBLISHED
- **Published Date**: December 14, 2009 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 07:01 UTC
- **Reserved Date**: December 14, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in index.php in ScriptsEz Ez Cart allows remote attackers to inject arbitrary web script or HTML via the sid parameter in a showcat action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2009-3510](http://www.vupen.com/english/advisories/2009/3510)
2. [](http://packetstormsecurity.org/0912-exploits/ezcart-xss.txt)
3. [10405](http://www.exploit-db.com/exploits/10405)
4. [37693](http://secunia.com/advisories/37693)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-5229, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-5229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5229
- **State**: PUBLISHED
- **Published Date**: August 02, 2016 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 00:53 UTC
- **Reserved Date**: June 01, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Atlassian Bamboo before 5.11.4.1 and 5.12.x before 5.12.3.1 does not properly restrict permitted deserialized classes, which allows remote attackers to execute arbitrary code via vectors related to XStream Serialization.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20160726 July 2016 - Bamboo Server - Critical Security Advisory](http://www.securityfocus.com/archive/1/539003/100/0/threaded)
2. [](http://packetstormsecurity.com/files/138053/Bamboo-Deserialization-Issue.html)
3. [92057](http://www.securityfocus.com/bid/92057)
4. [](https://jira.atlassian.com/browse/BAM-17736)
5. [](https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-07-20-831660461.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2002-0744, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2002-0744 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0744
- **State**: PUBLISHED
- **Published Date**: July 26, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:56 UTC
- **Reserved Date**: July 25, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
namerslv in AIX 4.3.3 core dumps when called with a very long argument, possibly as a result of a buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [IY29517](http://archives.neohapsis.com/archives/aix/2002-q2/0005.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-1277, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-1277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1277
- **State**: PUBLISHED
- **Published Date**: March 10, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 08:17 UTC
- **Reserved Date**: March 10, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29277](http://secunia.com/advisories/29277)
2. [](http://aluigi.altervista.org/adv/maildisable-adv.txt)
3. [ADV-2008-0799](http://www.vupen.com/english/advisories/2008/0799/references)
4. [3724](http://securityreason.com/securityalert/3724)
5. [20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13](http://www.securityfocus.com/archive/1/489270/100/0/threaded)
6. [1019565](http://www.securitytracker.com/id?1019565)
7. [28145](http://www.securityfocus.com/bid/28145)
8. [mailenable-imapservice-dos(41059)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41059)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-0349, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-0349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0349
- **State**: PUBLISHED
- **Published Date**: May 09, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 13:03 UTC
- **Reserved Date**: November 23, 2016 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
All versions of the NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where a pointer passed from a user to the driver is not correctly validated before it is dereferenced for a write operation, may lead to denial of service or potential escalation of privileges.
### Affected Products
**Nvidia Corporation - GPU Display Driver**
Affected versions:
- All versions (Status: affected)
### References
1. [98513](http://www.securityfocus.com/bid/98513)
2. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4462)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-49056, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-49056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49056
- **State**: PUBLISHED
- **Published Date**: November 12, 2024 at 17:53 UTC
- **Last Updated**: January 30, 2025 at 00:09 UTC
- **Reserved Date**: October 11, 2024 at 20:57 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Authentication bypass by assumed-immutable data on airlift.microsoft.com allows an authorized attacker to elevate privileges over a network.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-302: Security Weakness
### Affected Products
**Microsoft - airlift.microsoft.com**
Affected versions:
- N/A (Status: affected)
### References
1. [Airlift.microsoft.com Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49056)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-20426, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-20426 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20426
- **State**: PUBLISHED
- **Published Date**: January 27, 2020 at 04:21 UTC
- **Last Updated**: August 05, 2024 at 02:39 UTC
- **Reserved Date**: January 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the Lustre file system before 2.12.3, the ptlrpc module has an out-of-bounds access and panic due to the lack of validation for specific fields of packets sent by a client. In the function ldlm_cancel_hpreq_check, there is no lock_count bounds check.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://wiki.lustre.org/Lustre_2.12.3_Changelog)
2. [](http://lustre.org/)
3. [](https://jira.whamcloud.com/browse/LU-12614)
4. [](https://review.whamcloud.com/#/c/36107/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-34566, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-34566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34566
- **State**: PUBLISHED
- **Published Date**: May 08, 2024 at 10:54 UTC
- **Last Updated**: August 02, 2024 at 02:59 UTC
- **Reserved Date**: May 06, 2024 at 19:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Johan van der Wijk Content Blocks (Custom Post Widget) allows Stored XSS.This issue affects Content Blocks (Custom Post Widget): from n/a through 3.3.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Johan van der Wijk - Content Blocks (Custom Post Widget)**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/custom-post-widget/wordpress-content-blocks-custom-post-widget-plugin-3-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- NGÔ THIÊN AN / ancorn_ from VNPT-VCI (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-2882, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-2882 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2882
- **State**: PUBLISHED
- **Published Date**: June 27, 2024 at 18:55 UTC
- **Last Updated**: August 01, 2024 at 19:25 UTC
- **Reserved Date**: March 25, 2024 at 22:24 UTC
- **Assigned By**: icscert
### Vulnerability Description
SDG Technologies PnPSCADA allows a remote attacker to attach various entities without requiring system authentication. This breach could potentially lead to unauthorized control, data manipulation, and access to sensitive information within the SCADA system.
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**SDG Technologies - PnPSCADA**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-02)
### Credits
- Momen Eldawakhly of Samurai Digital Security Ltd reported this vulnerability to CISA.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-1593, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-1593 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1593
- **State**: PUBLISHED
- **Published Date**: September 11, 2020 at 17:09 UTC
- **Last Updated**: August 04, 2024 at 06:39 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
<p>A remote code execution vulnerability exists when Windows Media Audio Decoder improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected system.</p>
<p>There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage.</p>
<p>The security update addresses the vulnerability by correcting how Windows Media Audio Decoder handles objects.</p>
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1593)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.