System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-13183, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-13183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13183
- **State**: PUBLISHED
- **Published Date**: January 10, 2025 at 07:21 UTC
- **Last Updated**: January 10, 2025 at 14:50 UTC
- **Reserved Date**: January 07, 2025 at 22:36 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘title_tag’ parameter in all versions up to, and including, 2.10.43 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**themeisle - Orbit Fox by ThemeIsle**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/d0f6be2b-5eb6-4828-ae95-7f2253700ee9?source=cve)
2. [](https://wordpress.org/plugins/themeisle-companion/#developers)
3. [](https://plugins.trac.wordpress.org/browser/themeisle-companion/trunk/obfx_modules/elementor-extra-widgets/widgets/elementor/pricing-table.php#L118)
4. [](https://plugins.trac.wordpress.org/changeset/3219568/)
5. [](https://github.com/Codeinwp/themeisle-companion/commit/47a17c86934cebbfc3f1a812f1afcaa20515c1f7)
### Credits
- Ankit Patel
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-4601, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-4601 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4601
- **State**: PUBLISHED
- **Published Date**: May 16, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 16, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032709](http://www.securitytracker.com/id/1032709)
2. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html)
3. [](http://php.net/ChangeLog-5.php)
4. [](http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=0c136a2abd49298b66acb0cad504f0f972f5bfe8)
5. [75246](http://www.securityfocus.com/bid/75246)
6. [[oss-security] 20150616 Re: CVE Request: various issues in PHP](http://www.openwall.com/lists/oss-security/2015/06/16/12)
7. [RHSA-2015:1135](http://rhn.redhat.com/errata/RHSA-2015-1135.html)
8. [RHSA-2015:1218](http://rhn.redhat.com/errata/RHSA-2015-1218.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-0723, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-0723 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0723
- **State**: PUBLISHED
- **Published Date**: February 26, 2022 at 10:45 UTC
- **Last Updated**: August 02, 2024 at 23:40 UTC
- **Reserved Date**: February 22, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.11.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**microweber - microweber/microweber**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5)
2. [](https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-1761, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-1761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1761
- **State**: PUBLISHED
- **Published Date**: March 24, 2014 at 19:00 UTC
- **Last Updated**: February 10, 2025 at 19:30 UTC
- **Reserved Date**: January 29, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS14-017](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-017)
2. [](http://technet.microsoft.com/security/advisory/2953095)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-14269, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-14269 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14269
- **State**: PUBLISHED
- **Published Date**: September 11, 2017 at 09:00 UTC
- **Last Updated**: August 05, 2024 at 19:20 UTC
- **Reserved Date**: September 11, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
EE 4GEE WiFi MBB (before EE60_00_05.00_31) devices allow remote attackers to obtain sensitive information via a JSONP endpoint, as demonstrated by passwords and SMS content.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://seclists.org/fulldisclosure/2017/Sep/13)
2. [](https://blog.jameshemmings.co.uk/2017/08/24/ee-4gee-mobile-wifi-router-multiple-security-vulnerabilities-writeup)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-0446, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-0446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0446
- **State**: PUBLISHED
- **Published Date**: September 29, 1999 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:41 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [7051](http://www.osvdb.org/7051)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-5643, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-5643 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5643
- **State**: PUBLISHED
- **Published Date**: February 05, 2024 at 09:49 UTC
- **Last Updated**: May 15, 2025 at 19:47 UTC
- **Reserved Date**: October 18, 2023 at 15:56 UTC
- **Assigned By**: Arm
### Vulnerability Description
Out-of-bounds Write vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations. Depending on the configuration of the Mali GPU Kernel Driver, and if the system’s memory is carefully prepared by the user, then this in turn could write to memory outside of buffer bounds.This issue affects Bifrost GPU Kernel Driver: from r41p0 through r45p0; Valhall GPU Kernel Driver: from r41p0 through r45p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r45p0.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Arm Ltd - Bifrost GPU Kernel Driver**
Affected versions:
- r41p0 (Status: affected)
**Arm Ltd - Valhall GPU Kernel Driver**
Affected versions:
- r41p0 (Status: affected)
**Arm Ltd - Arm 5th Gen GPU Architecture Kernel Driver**
Affected versions:
- r41p0 (Status: affected)
### References
1. [](https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-19076, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-19076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19076
- **State**: PUBLISHED
- **Published Date**: November 07, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 11:30 UTC
- **Reserved Date**: November 07, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The FTP and RTSP services make it easier for attackers to conduct brute-force authentication attacks, because failed-authentication limits apply only to HTTP (not FTP or RTSP).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-4099, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-4099 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4099
- **State**: PUBLISHED
- **Published Date**: September 10, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 11:04 UTC
- **Reserved Date**: June 12, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1030818](http://www.securitytracker.com/id/1030818)
2. [69607](http://www.securityfocus.com/bid/69607)
3. [MS14-052](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052)
4. [ms-ie-cve20144099-code-exec(95529)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95529)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-11591, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-11591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11591
- **State**: PUBLISHED
- **Published Date**: July 24, 2017 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 18:12 UTC
- **Reserved Date**: July 23, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that will lead to a remote denial of service attack via crafted input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3852-1](https://usn.ubuntu.com/3852-1/)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1473888)
3. [[debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update](https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-21508, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-21508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21508
- **State**: PUBLISHED
- **Published Date**: April 11, 2024 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 22:20 UTC
- **Reserved Date**: December 22, 2023 at 12:33 UTC
- **Assigned By**: snyk
### Vulnerability Description
Versions of the package mysql2 before 3.9.4 are vulnerable to Remote Code Execution (RCE) via the readCodeFor function due to improper validation of the supportBigNumbers and bigNumberStrings values.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P`
### Affected Products
**n/a - mysql2**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591085)
2. [](https://blog.slonser.info/posts/mysql2-attacker-configuration/)
3. [](https://github.com/sidorares/node-mysql2/blob/1609b5393516d72a4ae47196837317fbe75e0c13/lib/parsers/text_parser.js%23L14C10-L14C21)
4. [](https://github.com/sidorares/node-mysql2/pull/2572)
5. [](https://github.com/sidorares/node-mysql2/commit/74abf9ef94d76114d9a09415e28b496522a94805)
6. [](https://github.com/sidorares/node-mysql2/releases/tag/v3.9.4)
### Credits
- Vsevolod Kokorin
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-3562, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-3562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3562
- **State**: PUBLISHED
- **Published Date**: October 19, 2010 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 03:11 UTC
- **Reserved Date**: September 20, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is a double free vulnerability in IndexColorModel that allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.avaya.com/css/P8/documents/100114327)
2. [RHSA-2010:0865](http://www.redhat.com/support/errata/RHSA-2010-0865.html)
3. [](http://support.avaya.com/css/P8/documents/100114315)
4. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml)
5. [HPSBMU02799](http://marc.info/?l=bugtraq&m=134254866602253&w=2)
6. [SUSE-SA:2010:061](http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html)
7. [RHSA-2010:0770](http://www.redhat.com/support/errata/RHSA-2010-0770.html)
8. [SSRT100333](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748)
9. [RHSA-2010:0768](http://www.redhat.com/support/errata/RHSA-2010-0768.html)
10. [FEDORA-2010-16240](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html)
11. [USN-1010-1](http://www.ubuntu.com/usn/USN-1010-1)
12. [RHSA-2010:0987](http://www.redhat.com/support/errata/RHSA-2010-0987.html)
13. [](https://bugzilla.redhat.com/show_bug.cgi?id=639897)
14. [RHSA-2010:0986](http://www.redhat.com/support/errata/RHSA-2010-0986.html)
15. [44954](http://secunia.com/advisories/44954)
16. [RHSA-2011:0880](http://www.redhat.com/support/errata/RHSA-2011-0880.html)
17. [](http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html)
18. [oval:org.mitre.oval:def:11893](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11893)
19. [RHSA-2010:0873](http://www.redhat.com/support/errata/RHSA-2010-0873.html)
20. [oval:org.mitre.oval:def:12450](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12450)
21. [](http://www.vmware.com/security/advisories/VMSA-2011-0003.html)
22. [42974](http://secunia.com/advisories/42974)
23. [41972](http://secunia.com/advisories/41972)
24. [HPSBUX02608](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748)
25. [](http://support.avaya.com/css/P8/documents/100123193)
26. [RHSA-2010:0786](http://www.redhat.com/support/errata/RHSA-2010-0786.html)
27. [SUSE-SR:2010:019](http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html)
28. [](http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html)
29. [20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX](http://www.securityfocus.com/archive/1/516397/100/0/threaded)
30. [41967](http://secunia.com/advisories/41967)
31. [RHSA-2010:0807](http://www.redhat.com/support/errata/RHSA-2010-0807.html)
32. [43979](http://www.securityfocus.com/bid/43979)
33. [FEDORA-2010-16312](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html)
34. [ADV-2010-2745](http://www.vupen.com/english/advisories/2010/2745)
35. [FEDORA-2010-16294](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-29553, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-29553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29553
- **State**: PUBLISHED
- **Published Date**: May 14, 2021 at 19:10 UTC
- **Last Updated**: August 03, 2024 at 22:11 UTC
- **Reserved Date**: March 30, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an end-to-end open source platform for machine learning. An attacker can read data outside of bounds of heap allocated buffer in `tf.raw_ops.QuantizeAndDequantizeV3`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/11ff7f80667e6490d7b5174aa6bf5e01886e770f/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L237) does not validate the value of user supplied `axis` attribute before using it to index in the array backing the `input` argument. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 2.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- < 2.1.4 (Status: affected)
- >= 2.2.0, < 2.2.3 (Status: affected)
- >= 2.3.0, < 2.3.3 (Status: affected)
- >= 2.4.0, < 2.4.2 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h9px-9vqg-222h)
2. [](https://github.com/tensorflow/tensorflow/commit/99085e8ff02c3763a0ec2263e44daec416f6a387)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-4951, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-4951 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4951
- **State**: PUBLISHED
- **Published Date**: September 14, 2023 at 16:43 UTC
- **Last Updated**: September 25, 2024 at 14:16 UTC
- **Reserved Date**: September 13, 2023 at 19:40 UTC
- **Assigned By**: GreenRocketSecurity
### Vulnerability Description
A cross site scripting issue was discovered with the pagination function on the "Client-based Authentication Policy Configuration" screen of the GreenRADIUS web admin interface. This issue is found in GreenRADIUS v5.1.1.1 and prior. A fix was included in v5.1.2.2.
### CVSS Metrics
- **CVSS Base Score**: 2/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Green Rocket Security - GreenRADIUS**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://greenrocketsecurity.com/cve-2023-4951/)
### Credits
- Jay Sharma, Application Security Analyst, Qualys, Inc.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-0873, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-0873 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0873
- **State**: PUBLISHED
- **Published Date**: March 16, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 09:27 UTC
- **Reserved Date**: January 06, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) Data Stewardship, (2) Business Admin, and (3) Product interfaces in IBM InfoSphere Master Data Management (MDM) Server 8.5 before 8.5.0.82, 9.0.1 before 9.0.1.38, 9.0.2 before 9.0.2.35, 10.0 before 10.0.0.0.26, and 10.1 before 10.1.0.0.15 allow remote attackers to hijack the authentication of arbitrary users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21666462)
2. [ibm-infosphere-cve20140873-csrf(90994)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90994)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-1831, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-1831 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1831
- **State**: PUBLISHED
- **Published Date**: June 20, 2022 at 10:26 UTC
- **Last Updated**: August 03, 2024 at 00:17 UTC
- **Reserved Date**: May 23, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WPlite WordPress plugin through 1.3.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - WPlite**
Affected versions:
- 1.3.1 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/91c44a4f-b599-46c0-a8df-d1fb87472abe)
### Credits
- Daniel Ruf
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-8291, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-8291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8291
- **State**: PUBLISHED
- **Published Date**: July 11, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 06:54 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8287, CVE-2018-8288, CVE-2018-8296, CVE-2018-8298.
### Affected Products
**Microsoft - ChakraCore**
Affected versions:
- ChakraCore (Status: affected)
**Microsoft - Internet Explorer 11**
Affected versions:
- Windows 10 for 32-bit Systems (Status: affected)
- Windows 10 for x64-based Systems (Status: affected)
- Windows 10 Version 1607 for 32-bit Systems (Status: affected)
- Windows 10 Version 1607 for x64-based Systems (Status: affected)
- Windows 10 Version 1703 for 32-bit Systems (Status: affected)
- Windows 10 Version 1703 for x64-based Systems (Status: affected)
- Windows 10 Version 1709 for 32-bit Systems (Status: affected)
- Windows 10 Version 1709 for x64-based Systems (Status: affected)
- Windows 10 Version 1803 for 32-bit Systems (Status: affected)
- Windows 10 Version 1803 for x64-based Systems (Status: affected)
- Windows 7 for 32-bit Systems Service Pack 1 (Status: affected)
- Windows 7 for x64-based Systems Service Pack 1 (Status: affected)
- Windows 8.1 for 32-bit systems (Status: affected)
- Windows 8.1 for x64-based systems (Status: affected)
- Windows RT 8.1 (Status: affected)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- Windows Server 2012 R2 (Status: affected)
- Windows Server 2016 (Status: affected)
**Microsoft - Microsoft Edge**
Affected versions:
- Windows 10 for 32-bit Systems (Status: affected)
- Windows 10 for x64-based Systems (Status: affected)
- Windows 10 Version 1607 for 32-bit Systems (Status: affected)
- Windows 10 Version 1607 for x64-based Systems (Status: affected)
- Windows 10 Version 1703 for 32-bit Systems (Status: affected)
- Windows 10 Version 1703 for x64-based Systems (Status: affected)
- Windows 10 Version 1709 for 32-bit Systems (Status: affected)
- Windows 10 Version 1709 for x64-based Systems (Status: affected)
- Windows 10 Version 1803 for 32-bit Systems (Status: affected)
- Windows 10 Version 1803 for x64-based Systems (Status: affected)
- Windows Server 2016 (Status: affected)
### References
1. [104637](http://www.securityfocus.com/bid/104637)
2. [1041256](http://www.securitytracker.com/id/1041256)
3. [1041258](http://www.securitytracker.com/id/1041258)
4. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8291)
5. [45215](https://www.exploit-db.com/exploits/45215/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-46704, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-46704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46704
- **State**: PUBLISHED
- **Published Date**: February 27, 2023 at 00:00 UTC
- **Last Updated**: March 11, 2025 at 14:29 UTC
- **Reserved Date**: December 07, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.1, macOS Big Sur 11.7.2, macOS Monterey 12.6.2. An app may be able to modify protected parts of the file system.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213532)
2. [](https://support.apple.com/en-us/HT213534)
3. [](https://support.apple.com/en-us/HT213533)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-5913, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-5913 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5913
- **State**: PUBLISHED
- **Published Date**: October 09, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 07:06 UTC
- **Reserved Date**: August 06, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Heimdal, as used in Apple OS X before 10.11, allows remote attackers to conduct replay attacks against the SMB server via packet data that represents a Kerberos authenticated request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1033703](http://www.securitytracker.com/id/1033703)
2. [APPLE-SA-2015-09-30-3](http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html)
3. [](https://support.apple.com/HT205267)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-45880, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-45880 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45880
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 00:00 UTC
- **Last Updated**: September 03, 2024 at 15:18 UTC
- **Reserved Date**: October 15, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GibbonEdu Gibbon through version 25.0.0 allows Directory Traversal via the report template builder. An attacker can create a new Asset Component. The templateFileDestination parameter can be set to an arbitrary pathname (and extension). This allows creation of PHP files outside of the uploads directory, directly in the webroot.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://herolab.usd.de/security-advisories/usd-2023-0022/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-47775, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-47775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47775
- **State**: PUBLISHED
- **Published Date**: May 14, 2025 at 15:18 UTC
- **Last Updated**: May 14, 2025 at 15:42 UTC
- **Reserved Date**: May 09, 2025 at 19:49 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Bullfrog is a GithHb Action to block unauthorized outbound traffic in GitHub workflows. Prior to version 0.8.4, using tcp breaks blocking and allows DNS exfiltration. This can result in sandbox bypass. Version 0.8.4 fixes the issue.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-201: Improper Input Validation
### Affected Products
**bullfrogsec - bullfrog**
Affected versions:
- < 0.8.4 (Status: affected)
### References
1. [https://github.com/bullfrogsec/bullfrog/security/advisories/GHSA-m32f-fjw2-37v3](https://github.com/bullfrogsec/bullfrog/security/advisories/GHSA-m32f-fjw2-37v3)
2. [https://github.com/bullfrogsec/bullfrog/commit/ae7744ae4b3a6f8ffc2e49f501e30bf1a43d4671](https://github.com/bullfrogsec/bullfrog/commit/ae7744ae4b3a6f8ffc2e49f501e30bf1a43d4671)
3. [https://github.com/bullfrogsec/bullfrog/releases/tag/v0.8.4](https://github.com/bullfrogsec/bullfrog/releases/tag/v0.8.4)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-20579, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-20579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20579
- **State**: PUBLISHED
- **Published Date**: February 13, 2024 at 19:32 UTC
- **Last Updated**: March 14, 2025 at 17:21 UTC
- **Reserved Date**: October 27, 2022 at 18:53 UTC
- **Assigned By**: AMD
### Vulnerability Description
Improper
Access Control in the AMD SPI protection feature may allow a user with Ring0
(kernel mode) privileged access to bypass protections potentially resulting in
loss of integrity and availability.
### Affected Products
**AMD - AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics **
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ 7000 Series Desktop Processor **
Affected versions:
- Various (Status: affected)
**AMD - AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics **
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics **
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics **
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics**
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics **
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics **
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ 7045 Series Mobile Processors **
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics **
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ Embedded V2000**
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ Embedded V3000**
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics **
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ 7035 Series Mobile Processors with Radeon™ Graphics **
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics**
Affected versions:
- various (Status: affected)
### References
1. [](https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7009)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-23535, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-23535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23535
- **State**: PUBLISHED
- **Published Date**: April 19, 2024 at 01:10 UTC
- **Last Updated**: August 01, 2024 at 23:06 UTC
- **Reserved Date**: January 18, 2024 at 01:04 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
### Affected Products
**Ivanti - Avalanche**
Affected versions:
- 6.4.3 (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-25281, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-25281 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25281
- **State**: PUBLISHED
- **Published Date**: March 16, 2023 at 00:00 UTC
- **Last Updated**: February 26, 2025 at 16:35 UTC
- **Reserved Date**: February 06, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stack overflow vulnerability exists in pingV4Msg component in D-Link DIR820LA1_FW105B03, allows attackers to cause a denial of service via the nextPage parameter to ping.ccp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dlink.com/en/security-bulletin/)
2. [](https://github.com/migraine-sudo/D_Link_Vuln/tree/main/stackoverflow%20cancelPing)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-39209, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-39209 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39209
- **State**: PUBLISHED
- **Published Date**: September 15, 2022 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 17:10 UTC
- **Reserved Date**: September 02, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. In versions prior to 0.29.0.gfm.6 a polynomial time complexity issue in cmark-gfm's autolink extension may lead to unbounded resource exhaustion and subsequent denial of service. Users may verify the patch by running `python3 -c 'print("
2. [](https://github.com/github/cmark-gfm/commit/9d57d8a23142b316282bdfc954cb0ecda40a8655)
3. [](https://en.wikipedia.org/wiki/Time_complexity)
4. [FEDORA-2022-6bcee2cc93](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMGP65NANDVKPDMXMKYO2ZV2H2HZJY4P/)
5. [FEDORA-2022-f1aed93db8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIUCZN3PEKUCT2JQYQTYOVIJG2KSD6G7/)
6. [FEDORA-2022-dc6d6d9d6c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEAAAI4OULDYQ2TA3HOXH54PC3DCBFZS/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-1152, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-1152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1152
- **State**: PUBLISHED
- **Published Date**: May 25, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:35 UTC
- **Reserved Date**: April 18, 2005 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
popauth.c in qpopper 4.0.5 and earlier does not properly set the umask, which may cause qpopper to create files with group or world-writable permissions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugs.gentoo.org/attachment.cgi?id=58329&action=view)
2. [15505](http://secunia.com/advisories/15505)
3. [15478](http://secunia.com/advisories/15478)
4. [](http://bugs.gentoo.org/show_bug.cgi?id=90622)
5. [DSA-728](http://www.debian.org/security/2005/dsa-728)
6. [15475](http://secunia.com/advisories/15475)
7. [GLSA-200505-17](http://www.gentoo.org/security/en/glsa/glsa-200505-17.xml)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-44739, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-44739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44739
- **State**: PUBLISHED
- **Published Date**: May 22, 2023 at 09:46 UTC
- **Last Updated**: January 08, 2025 at 22:07 UTC
- **Reserved Date**: November 04, 2022 at 16:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in ThingsForRestaurants Quick Restaurant Reservations plugin <= 1.5.4 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**ThingsForRestaurants - Quick Restaurant Reservations**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/quick-restaurant-reservations/wordpress-quick-restaurant-reservations-plugin-1-5-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- thiennv (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-43506, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-43506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43506
- **State**: PUBLISHED
- **Published Date**: November 17, 2022 at 22:45 UTC
- **Last Updated**: April 16, 2025 at 17:42 UTC
- **Reserved Date**: October 31, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
SQL Injection in
HandlerTag_KID.ashx
in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Delta Electronics - DIAEnergie**
Affected versions:
- All (Status: affected)
### References
1. [https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-06](https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-06)
### Credits
- Michael Heinzl reported these vulnerabilities to CISA.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-3600, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-3600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3600
- **State**: PUBLISHED
- **Published Date**: November 26, 2019 at 00:07 UTC
- **Last Updated**: August 06, 2024 at 23:37 UTC
- **Reserved Date**: September 21, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The /webtools/control/xmlrpc endpoint in OFBiz XML-RPC event handler is exposed to External Entity Injection by passing DOCTYPE declarations with executable payloads that discloses the contents of files in the filesystem. In addition, it can also be used to probe for open network ports, and figure out from returned error messages whether a file exists or not. This affects OFBiz 16.11.01 to 16.11.04.
### Affected Products
**OFBiz - OFBiz**
Affected versions:
- 16.11.01 to 16.11.04 (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2011-3600)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3600)
3. [](https://access.redhat.com/security/cve/cve-2011-3600)
4. [](https://lists.apache.org/thread.html/7793319ae80ec350f7b82a8763460944f120ebe447f14a12155d0550%40%3Ccommits.ofbiz.apache.org%3E)
5. [](http://mail-archives.apache.org/mod_mbox/ofbiz-user/201810.mbox/%3Cfad45546-af86-0293-9ea7-014553474b30%40apache.org%3E)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-27746, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-27746 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27746
- **State**: PUBLISHED
- **Published Date**: April 13, 2023 at 00:00 UTC
- **Last Updated**: February 07, 2025 at 16:17 UTC
- **Reserved Date**: March 05, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BlackVue DR750-2CH LTE v.1.012_2022.10.26 was discovered to contain a weak default passphrase which can be easily cracked via a brute force attack if the WPA2 handshake is intercepted.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/eyJhb/blackvue-cve-2022)
2. [](https://shop.blackvue.com/product/dr750-2ch-ir-lte/)
3. [](https://blackvue.com)
4. [](https://github.com/eyJhb/blackvue-cve-2023)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-3098, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-3098 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3098
- **State**: PUBLISHED
- **Published Date**: August 20, 2010 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 17:13 UTC
- **Reserved Date**: August 20, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in IoRush Software FTP Rush 1.1.3 and possibly earlier allows remote FTP servers to overwrite arbitrary files via a "..\" (dot dot backslash) in a filename.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [40900](http://secunia.com/advisories/40900)
2. [](http://www.htbridge.ch/advisory/directory_traversal_in_ftp_rush.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-3495, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-3495 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3495
- **State**: PUBLISHED
- **Published Date**: November 04, 2005 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 23:17 UTC
- **Reserved Date**: November 03, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ar-blog 5.2 and earlier allows remote attackers to bypass authentication by modifying cookies.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17307](http://secunia.com/advisories/17307)
2. [15203](http://www.securityfocus.com/bid/15203)
3. [1015100](http://securitytracker.com/id?1015100)
4. [20051024 Fwd: Vulnerability in Ar-blog ver 5.2 and prior versions](http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038133.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2001-0984, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2001-0984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0984
- **State**: PUBLISHED
- **Published Date**: February 02, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:37 UTC
- **Reserved Date**: January 31, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Password Safe 1.7(1) leaves cleartext passwords in memory when a user copies the password to the clipboard and minimizes Password Safe with the "Clear the password when minimized" and "Lock password database on minimize and prompt on restore" options enabled, which could allow an attacker with access to the memory (e.g. an administrator) to read the passwords.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [counterpane-password-access(7123)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7123)
2. [3337](http://www.securityfocus.com/bid/3337)
3. [20010913 leak of information in counterpane/Bruce Schneier's Password Safe program](http://www.securityfocus.com/archive/1/213931)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-15881, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-15881 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15881
- **State**: PUBLISHED
- **Published Date**: October 24, 2017 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 20:04 UTC
- **Reserved Date**: October 24, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-Site Scripting vulnerability in KeystoneJS before 4.0.0-beta.7 allows remote authenticated administrators to inject arbitrary web script or HTML via the "content brief" or "content extended" field, a different vulnerability than CVE-2017-15878.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [101541](http://www.securityfocus.com/bid/101541)
2. [](http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/)
3. [](https://github.com/keystonejs/keystone/issues/4437)
4. [](https://github.com/keystonejs/keystone/pull/4478)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-19527, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-19527 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19527
- **State**: PUBLISHED
- **Published Date**: December 03, 2019 at 15:41 UTC
- **Last Updated**: August 05, 2024 at 02:16 UTC
- **Reserved Date**: December 03, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10)
2. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9c09b214f30e3c11f9b0b03f89442df03643794d)
3. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49)
4. [[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3](http://www.openwall.com/lists/oss-security/2019/12/03/4)
5. [[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update](https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html)
6. [[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html)
7. [openSUSE-SU-2020:0336](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-4350, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-4350 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4350
- **State**: PUBLISHED
- **Published Date**: December 20, 2005 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 23:38 UTC
- **Reserved Date**: December 19, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in WBEM Services A.01.x before A.01.05.12 and A.02.x before A.02.00.08 on HP-UX B.11.00 through B.11.23 allows remote attackers to cause an unspecified denial of service via unknown attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT051026](http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00582373)
2. [15930](http://www.securityfocus.com/bid/15930)
3. [18160](http://secunia.com/advisories/18160)
4. [HPSBMA02088](http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00582373)
5. [ADV-2005-3001](http://www.vupen.com/english/advisories/2005/3001)
6. [1015377](http://securitytracker.com/alerts/2005/Dec/1015377.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-20083, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-20083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20083
- **State**: PUBLISHED
- **Published Date**: November 01, 2023 at 17:16 UTC
- **Last Updated**: August 02, 2024 at 08:57 UTC
- **Reserved Date**: October 27, 2022 at 18:47 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in ICMPv6 inspection when configured with the Snort 2 detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the CPU of an affected device to spike to 100 percent, which could stop all traffic processing and result in a denial of service (DoS) condition. FTD management traffic is not affected by this vulnerability. This vulnerability is due to improper error checking when parsing fields within the ICMPv6 header. An attacker could exploit this vulnerability by sending a crafted ICMPv6 packet through an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition. Note: To recover from the DoS condition, the Snort 2 Detection Engine or the Cisco FTD device may need to be restarted.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Affected Products
**Cisco - Cisco Firepower Threat Defense Software**
Affected versions:
- 6.2.3 (Status: affected)
- 6.2.3.1 (Status: affected)
- 6.2.3.2 (Status: affected)
- 6.2.3.3 (Status: affected)
- 6.2.3.4 (Status: affected)
- 6.2.3.5 (Status: affected)
- 6.2.3.6 (Status: affected)
- 6.2.3.7 (Status: affected)
- 6.2.3.8 (Status: affected)
- 6.2.3.10 (Status: affected)
- 6.2.3.11 (Status: affected)
- 6.2.3.9 (Status: affected)
- 6.2.3.12 (Status: affected)
- 6.2.3.13 (Status: affected)
- 6.2.3.14 (Status: affected)
- 6.2.3.15 (Status: affected)
- 6.2.3.16 (Status: affected)
- 6.2.3.17 (Status: affected)
- 6.2.3.18 (Status: affected)
- 6.6.0 (Status: affected)
- 6.6.0.1 (Status: affected)
- 6.6.1 (Status: affected)
- 6.6.3 (Status: affected)
- 6.6.4 (Status: affected)
- 6.6.5 (Status: affected)
- 6.6.5.1 (Status: affected)
- 6.6.5.2 (Status: affected)
- 6.6.7 (Status: affected)
- 6.6.7.1 (Status: affected)
- 6.4.0 (Status: affected)
- 6.4.0.1 (Status: affected)
- 6.4.0.3 (Status: affected)
- 6.4.0.2 (Status: affected)
- 6.4.0.4 (Status: affected)
- 6.4.0.5 (Status: affected)
- 6.4.0.6 (Status: affected)
- 6.4.0.7 (Status: affected)
- 6.4.0.8 (Status: affected)
- 6.4.0.9 (Status: affected)
- 6.4.0.10 (Status: affected)
- 6.4.0.11 (Status: affected)
- 6.4.0.12 (Status: affected)
- 6.4.0.13 (Status: affected)
- 6.4.0.14 (Status: affected)
- 6.4.0.15 (Status: affected)
- 6.4.0.16 (Status: affected)
- 6.4.0.17 (Status: affected)
- 6.7.0 (Status: affected)
- 6.7.0.1 (Status: affected)
- 6.7.0.2 (Status: affected)
- 6.7.0.3 (Status: affected)
- 7.0.0 (Status: affected)
- 7.0.0.1 (Status: affected)
- 7.0.1 (Status: affected)
- 7.0.1.1 (Status: affected)
- 7.0.2 (Status: affected)
- 7.0.2.1 (Status: affected)
- 7.0.3 (Status: affected)
- 7.0.4 (Status: affected)
- 7.0.5 (Status: affected)
- 7.1.0 (Status: affected)
- 7.1.0.1 (Status: affected)
- 7.1.0.2 (Status: affected)
- 7.1.0.3 (Status: affected)
- 7.2.0 (Status: affected)
- 7.2.0.1 (Status: affected)
- 7.2.1 (Status: affected)
- 7.2.2 (Status: affected)
- 7.2.3 (Status: affected)
- 7.3.0 (Status: affected)
- 7.3.1 (Status: affected)
- 7.3.1.1 (Status: affected)
### References
1. [cisco-sa-ftd-icmpv6-dos-4eMkLuN](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-icmpv6-dos-4eMkLuN)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-26737, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-26737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26737
- **State**: PUBLISHED
- **Published Date**: April 03, 2024 at 17:00 UTC
- **Last Updated**: May 04, 2025 at 08:55 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel
The following race is possible between bpf_timer_cancel_and_free
and bpf_timer_cancel. It will lead a UAF on the timer->timer.
bpf_timer_cancel();
spin_lock();
t = timer->time;
spin_unlock();
bpf_timer_cancel_and_free();
spin_lock();
t = timer->timer;
timer->timer = NULL;
spin_unlock();
hrtimer_cancel(&t->timer);
kfree(t);
/* UAF on t */
hrtimer_cancel(&t->timer);
In bpf_timer_cancel_and_free, this patch frees the timer->timer
after a rcu grace period. This requires a rcu_head addition
to the "struct bpf_hrtimer". Another kfree(t) happens in bpf_timer_init,
this does not need a kfree_rcu because it is still under the
spin_lock and timer->timer has not been visible by others yet.
In bpf_timer_cancel, rcu_read_lock() is added because this helper
can be used in a non rcu critical section context (e.g. from
a sleepable bpf prog). Other timer->timer usages in helpers.c
have been audited, bpf_timer_cancel() is the only place where
timer->timer is used outside of the spin_lock.
Another solution considered is to mark a t->flag in bpf_timer_cancel
and clear it after hrtimer_cancel() is done. In bpf_timer_cancel_and_free,
it busy waits for the flag to be cleared before kfree(t). This patch
goes with a straight forward solution and frees timer->timer after
a rcu grace period.
### Affected Products
**Linux - Linux**
Affected versions:
- b00628b1c7d595ae5b544e059c27b1f5828314b4 (Status: affected)
- b00628b1c7d595ae5b544e059c27b1f5828314b4 (Status: affected)
- b00628b1c7d595ae5b544e059c27b1f5828314b4 (Status: affected)
- b00628b1c7d595ae5b544e059c27b1f5828314b4 (Status: affected)
- b00628b1c7d595ae5b544e059c27b1f5828314b4 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15 (Status: affected)
- 0 (Status: unaffected)
- 5.15.150 (Status: unaffected)
- 6.1.80 (Status: unaffected)
- 6.6.19 (Status: unaffected)
- 6.7.7 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/5268bb02107b9eedfdcd51db75b407d10043368c)
2. [](https://git.kernel.org/stable/c/addf5e297e6cbf5341f9c07720693ca9ba0057b5)
3. [](https://git.kernel.org/stable/c/8327ed12e8ebc5436bfaa1786c49988894f9c8a6)
4. [](https://git.kernel.org/stable/c/7d80a9e745fa5b47da3bca001f186c02485c7c33)
5. [](https://git.kernel.org/stable/c/0281b919e175bb9c3128bd3872ac2903e9436e3f)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-1230, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-1230 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1230
- **State**: PUBLISHED
- **Published Date**: December 15, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:46 UTC
- **Reserved Date**: December 14, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Gadu-Gadu allows remote attackers to gain sensitive information and read files from the _cache directory of other users via a DCC connection and a CTCP packet that contains a 1 as the type and a 4 as the subtype.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20041213 Gadu-Gadu several vulnerabilities](http://marc.info/?l=bugtraq&m=110295777306493&w=2)
2. [gadu-gadu-dcc-ctcp-obtain-files(18461)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18461)
3. [](http://www.man.poznan.pl/~security/gg-adv.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-38729, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-38729 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38729
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 12:01 UTC
- **Last Updated**: January 02, 2025 at 16:24 UTC
- **Reserved Date**: June 19, 2024 at 11:16 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in MBE Worldwide S.p.A. MBE eShip allows Cross Site Request Forgery.This issue affects MBE eShip: from n/a through 2.1.2.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**MBE Worldwide S.p.A. - MBE eShip**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/mail-boxes-etc/vulnerability/wordpress-mbe-eship-plugin-2-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Joshua Chan (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-22015, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-22015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22015
- **State**: PUBLISHED
- **Published Date**: May 10, 2022 at 20:33 UTC
- **Last Updated**: January 02, 2025 at 18:58 UTC
- **Reserved Date**: December 16, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Remote Desktop client for Windows Desktop**
Affected versions:
- 1.2.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22015)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-45219, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-45219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45219
- **State**: PUBLISHED
- **Published Date**: October 16, 2024 at 07:55 UTC
- **Last Updated**: October 16, 2024 at 14:48 UTC
- **Reserved Date**: August 23, 2024 at 20:40 UTC
- **Assigned By**: apache
### Vulnerability Description
Account users in Apache CloudStack by default are allowed to upload and register templates for deploying instances and volumes for attaching them as data disks to their existing instances. Due to missing validation checks for KVM-compatible templates or volumes in CloudStack 4.0.0 through 4.18.2.3 and 4.19.0.0 through 4.19.1.1, an attacker that can upload or register templates and volumes, can use them to deploy malicious instances or attach uploaded volumes to their existing instances on KVM-based environments and exploit this to gain access to the host filesystems that could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of KVM-based infrastructure managed by CloudStack.
Users are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue.
Additionally, all user-uploaded or registered KVM-compatible templates and volumes can be scanned and checked that they are flat files that should not be using any additional or unnecessary features. For example, operators can run this on their secondary storage(s) and inspect output. An empty output for the disk being validated means it has no references to the host filesystems; on the other hand, if the output for the disk being validated is not empty, it might indicate a compromised disk.
for file in $(find /path/to/storage/ -type f -regex [a-f0-9\-]*.*); do echo "Retrieving file [$file] info. If the output is not empty, that might indicate a compromised disk; check it carefully."; qemu-img info -U $file | grep file: ; printf "\n\n"; done
The command can also be run for the file-based primary storages; however, bear in mind that (i) volumes created from templates will have references for the templates at first and (ii) volumes can be consolidated while migrating, losing their references to the templates. Therefore, the command execution for the primary storages can show both false positives and false negatives.
For checking the whole template/volume features of each disk, operators can run the following command:
for file in $(find /path/to/storage/ -type f -regex [a-f0-9\-]*.*); do echo "Retrieving file [$file] info."; qemu-img info -U $file; printf "\n\n"; done
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Apache Software Foundation - Apache CloudStack**
Affected versions:
- 4.0.0 (Status: affected)
- 4.19.0.0 (Status: affected)
### References
1. [](https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2)
2. [](https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo)
3. [](https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-4-and-4-19-1-2/)
### Credits
- Daniel Augusto Veronezi Salvador <gutoveronezi@apache.org>
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-30772, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-30772 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30772
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 13:47 UTC
- **Last Updated**: August 03, 2024 at 22:40 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.5. A malicious application may be able to gain root privileges.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/kb/HT212603)
2. [](https://support.apple.com/kb/HT212600)
3. [](https://support.apple.com/en-us/HT212602)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-13479, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-13479 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13479
- **State**: PUBLISHED
- **Published Date**: February 19, 2025 at 11:10 UTC
- **Last Updated**: February 19, 2025 at 14:36 UTC
- **Reserved Date**: January 16, 2025 at 18:57 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The LTL Freight Quotes – SEFL Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 3.2.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**enituretechnology - LTL Freight Quotes – SEFL Edition**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/8322fe81-2c2f-4aa6-b08f-fa5c16e62218?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3242634%40ltl-freight-quotes-sefl-edition&new=3242634%40ltl-freight-quotes-sefl-edition&sfp_email=&sfph_mail=)
### Credits
- Colin Xu
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-8024, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-8024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8024
- **State**: PUBLISHED
- **Published Date**: June 29, 2020 at 07:45 UTC
- **Last Updated**: September 17, 2024 at 01:21 UTC
- **Reserved Date**: January 27, 2020 at 00:00 UTC
- **Assigned By**: suse
### Vulnerability Description
A Incorrect Default Permissions vulnerability in the packaging of hylafax+ of openSUSE Leap 15.2, openSUSE Leap 15.1, openSUSE Factory allows local attackers to escalate from user uucp to users calling hylafax binaries. This issue affects: openSUSE Leap 15.2 hylafax+ versions prior to 7.0.2-lp152.2.1. openSUSE Leap 15.1 hylafax+ version 5.6.1-lp151.3.7 and prior versions. openSUSE Factory hylafax+ versions prior to 7.0.2-2.1.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**openSUSE - openSUSE Leap 15.2**
Affected versions:
- hylafax+ (Status: affected)
**openSUSE - openSUSE Leap 15.1**
Affected versions:
- hylafax+ (Status: affected)
**openSUSE - openSUSE Factory**
Affected versions:
- hylafax+ (Status: affected)
### References
1. [](https://bugzilla.suse.com/show_bug.cgi?id=1172731)
2. [openSUSE-SU-2020:0958](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00022.html)
### Credits
- Matthias Gerstner
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-9066, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-9066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9066
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 02:42 UTC
- **Reserved Date**: October 27, 2016 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
### Affected Products
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [DSA-3730](https://www.debian.org/security/2016/dsa-3730)
2. [1037298](http://www.securitytracker.com/id/1037298)
3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1299686)
4. [GLSA-201701-15](https://security.gentoo.org/glsa/201701-15)
5. [94336](http://www.securityfocus.com/bid/94336)
6. [](https://www.mozilla.org/security/advisories/mfsa2016-93/)
7. [RHSA-2016:2780](http://rhn.redhat.com/errata/RHSA-2016-2780.html)
8. [](https://www.mozilla.org/security/advisories/mfsa2016-89/)
9. [](https://www.mozilla.org/security/advisories/mfsa2016-90/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-24869, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-24869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24869
- **State**: PUBLISHED
- **Published Date**: March 14, 2023 at 16:55 UTC
- **Last Updated**: January 01, 2025 at 00:48 UTC
- **Reserved Date**: January 31, 2023 at 20:32 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Remote Procedure Call Runtime Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Remote Procedure Call Runtime Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24869)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-29002, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-29002 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-29002
- **State**: PUBLISHED
- **Published Date**: November 24, 2020 at 05:38 UTC
- **Last Updated**: August 04, 2024 at 16:48 UTC
- **Reserved Date**: November 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phabricator.wikimedia.org/T267278)
2. [](https://gerrit.wikimedia.org/r/q/Ie798a4f16d0ac2a4871aefeb593d962966aeb6b0)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-27825, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-27825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27825
- **State**: PUBLISHED
- **Published Date**: May 13, 2024 at 23:00 UTC
- **Last Updated**: February 13, 2025 at 17:46 UTC
- **Reserved Date**: February 26, 2024 at 15:32 UTC
- **Assigned By**: apple
### Vulnerability Description
A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Sonoma 14.5. An app may be able to bypass certain Privacy preferences.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT214106)
2. [](https://support.apple.com/kb/HT214106)
3. [](http://seclists.org/fulldisclosure/2024/May/12)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-46255, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-46255 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46255
- **State**: PUBLISHED
- **Published Date**: October 31, 2023 at 15:25 UTC
- **Last Updated**: September 05, 2024 at 20:16 UTC
- **Reserved Date**: October 19, 2023 at 20:34 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
SpiceDB is an open source, Google Zanzibar-inspired database for creating and managing security-critical application permissions. Prior to version 1.27.0-rc1, when the provided datastore URI is malformed (e.g. by having a password which contains `:`) the full URI (including the provided password) is printed, so that the password is shown in the logs. Version 1.27.0-rc1 patches this issue.
### CVSS Metrics
- **CVSS Base Score**: 4.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-532: Security Weakness
### Affected Products
**authzed - spicedb**
Affected versions:
- < 1.27.0-rc1 (Status: affected)
### References
1. [https://github.com/authzed/spicedb/security/advisories/GHSA-jg7w-cxjv-98c2](https://github.com/authzed/spicedb/security/advisories/GHSA-jg7w-cxjv-98c2)
2. [https://github.com/authzed/spicedb/commit/ae50421b80f895e4c98d999b18e06b6f1e6f1cf8](https://github.com/authzed/spicedb/commit/ae50421b80f895e4c98d999b18e06b6f1e6f1cf8)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-13056, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-13056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13056
- **State**: PUBLISHED
- **Published Date**: December 27, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 18:58 UTC
- **Reserved Date**: August 21, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The launchURL function in PDF-XChange Viewer 2.5 (Build 314.0) might allow remote attackers to execute arbitrary code via a crafted PDF file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/143912/PDF-XChange-Viewer-2.5-Build-314.0-Code-Execution.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-2912, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-2912 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2912
- **State**: PUBLISHED
- **Published Date**: June 07, 2012 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 23:15 UTC
- **Reserved Date**: July 27, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2011-12370](http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html)
2. [[oss-security] 20120810 CVE request: libmodplug: multiple vulnerabilities reported in <= 0.8.8.3](http://www.openwall.com/lists/oss-security/2011/08/10/4)
3. [DSA-2415](http://www.debian.org/security/2012/dsa-2415)
4. [](http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/)
5. [GLSA-201203-16](http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml)
6. [FEDORA-2011-10503](http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html)
7. [45131](http://secunia.com/advisories/45131)
8. [[oss-security] 20120812 Re: CVE request: libmodplug: multiple vulnerabilities reported in <= 0.8.8.3](http://www.openwall.com/lists/oss-security/2011/08/12/4)
9. [48058](http://secunia.com/advisories/48058)
10. [46032](http://secunia.com/advisories/46032)
11. [46793](http://secunia.com/advisories/46793)
12. [48439](http://secunia.com/advisories/48439)
13. [45742](http://secunia.com/advisories/45742)
14. [USN-1255-1](http://ubuntu.com/usn/usn-1255-1)
15. [](http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=f4e5295658fff000379caa122e75c9200205fe20)
16. [openSUSE-SU-2011:0943](http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html)
17. [48434](http://secunia.com/advisories/48434)
18. [libmodplug-s3m-bo(68984)](https://exchange.xforce.ibmcloud.com/vulnerabilities/68984)
19. [48979](http://www.securityfocus.com/bid/48979)
20. [GLSA-201203-14](http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml)
21. [45901](http://secunia.com/advisories/45901)
22. [RHSA-2011:1264](http://rhn.redhat.com/errata/RHSA-2011-1264.html)
23. [46043](http://secunia.com/advisories/46043)
24. [](http://jira.atheme.org/browse/AUDPLUG-394)
25. [74209](http://www.osvdb.org/74209)
26. [45658](http://secunia.com/advisories/45658)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-44268, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-44268 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44268
- **State**: REJECTED
- **Published Date**: October 26, 2023 at 22:04 UTC
- **Last Updated**: January 02, 2024 at 19:08 UTC
- **Reserved Date**: September 27, 2023 at 15:01 UTC
- **Assigned By**: Fluid Attacks
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-4563, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-4563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4563
- **State**: PUBLISHED
- **Published Date**: July 02, 2014 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 11:20 UTC
- **Reserved Date**: June 23, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in go.php in the URL Cloak & Encrypt (url-cloak-encrypt) plugin 2.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the url parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://codevigilant.com/disclosure/wp-plugin-url-cloak-encrypt-a3-cross-site-scripting-xss)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-0441, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-0441 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0441
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 15:37 UTC
- **Last Updated**: February 19, 2025 at 16:56 UTC
- **Reserved Date**: January 23, 2023 at 13:24 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Gallery Blocks with Lightbox WordPress plugin before 3.0.8 has an AJAX endpoint that can be accessed by any authenticated users, such as subscriber. The callback function allows numerous actions, the most serious one being reading and updating the WordPress options which could be used to enable registration with a default administrator user role.
### Weakness Classification (CWE)
- CWE-862 Missing Authorization: Missing Authorization
### Affected Products
**Unknown - Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/11703e49-c042-4eb6-9a5f-6e006e3725a0)
### Credits
- dc11
- WPScan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-1403, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-1403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1403
- **State**: PUBLISHED
- **Published Date**: February 03, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 04:40 UTC
- **Reserved Date**: January 27, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the Content Rating extension 1.0.3 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [71984](http://www.securityfocus.com/bid/71984)
2. [[oss-security] 20150111 CVE request: TYPO3-EXT-SA-2015-001, TYPO3-EXT-SA-2015-002, TYPO3-EXT-SA-2015-003](http://www.openwall.com/lists/oss-security/2015/01/11/7)
3. [](http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-002/)
4. [[oss-security] 20150127 Re: CVE request: TYPO3-EXT-SA-2015-001, TYPO3-EXT-SA-2015-002, TYPO3-EXT-SA-2015-003](http://www.openwall.com/lists/oss-security/2015/01/27/31)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-14793, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-14793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14793
- **State**: REJECTED
- **Published Date**: May 22, 2018 at 20:00 UTC
- **Last Updated**: May 22, 2018 at 19:57 UTC
- **Reserved Date**: September 27, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-20028, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-20028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20028
- **State**: PUBLISHED
- **Published Date**: February 09, 2022 at 22:05 UTC
- **Last Updated**: August 03, 2024 at 01:55 UTC
- **Reserved Date**: October 12, 2021 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198663; Issue ID: ALPS06198663.
### Affected Products
**MediaTek, Inc. - MT8167, MT8175, MT8183, MT8362A, MT8365, MT8385**
Affected versions:
- Android 8.1, 9.0, 10.0, 11.0, 12.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/February-2022)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-47224, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-47224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47224
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 00:00 UTC
- **Last Updated**: November 05, 2024 at 21:05 UTC
- **Reserved Date**: September 22, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability in the AWV (Audio, Web and Video Conferencing) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a CRLF injection attack due to inadequate encoding of user input in URLs. A successful exploit could allow an attacker to perform a phishing attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0025)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-11444, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-11444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11444
- **State**: PUBLISHED
- **Published Date**: December 06, 2024 at 08:24 UTC
- **Last Updated**: December 06, 2024 at 14:18 UTC
- **Reserved Date**: November 19, 2024 at 16:43 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The CLUEVO LMS, E-Learning Platform plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.13.2. This is due to missing or incorrect nonce validation on the cluevo_render_module_ui() function. This makes it possible for unauthenticated attackers to delete modules via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**cluevo - CLUEVO LMS, E-Learning Platform**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2a3056d4-5ee9-4b31-9ef8-0e55f470ad23?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/cluevo-lms/tags/1.13.2/functions/functions.module-management.inc.php#L925)
3. [](https://plugins.trac.wordpress.org/browser/cluevo-lms/tags/1.13.2/functions/functions.module-management.inc.php#L928)
### Credits
- Peter Thaleikis
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-14644, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-14644 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14644
- **State**: PUBLISHED
- **Published Date**: November 09, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 09:38 UTC
- **Reserved Date**: July 27, 2018 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**[UNKNOWN] - pdns**
Affected versions:
- 4.0.9 (Status: affected)
- 4.1.5 (Status: affected)
### References
1. [](https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-6393, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-6393 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6393
- **State**: PUBLISHED
- **Published Date**: October 05, 2016 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 01:29 UTC
- **Reserved Date**: July 26, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The AAA service in Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.1 through 3.18 and 16.2 allows remote attackers to cause a denial of service (device reload) via a failed SSH connection attempt that is mishandled during generation of an error-log message, aka Bug ID CSCuy87667.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [93196](http://www.securityfocus.com/bid/93196)
2. [1036914](http://www.securitytracker.com/id/1036914)
3. [20160928 Cisco IOS and IOS XE Software AAA Login Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-aaados)
4. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-287-04)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-1000031, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-1000031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000031
- **State**: PUBLISHED
- **Published Date**: July 13, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 21:53 UTC
- **Reserved Date**: July 10, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in graph_templates_inputs.php in Cacti 0.8.8b allows remote attackers to execute arbitrary SQL commands via the graph_template_input_id and graph_template_id parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-007/?fid=7789)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-9033, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-9033 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9033
- **State**: PUBLISHED
- **Published Date**: June 13, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 08:36 UTC
- **Reserved Date**: April 18, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In all Android releases from CAF using the Linux kernel, a QTEE system call fails to validate a pointer.
### Affected Products
**Qualcomm, Inc. - All Qualcomm products**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-06-01)
2. [98874](http://www.securityfocus.com/bid/98874)
3. [1038623](http://www.securitytracker.com/id/1038623)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-1938, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-1938 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1938
- **State**: PUBLISHED
- **Published Date**: February 29, 2024 at 00:25 UTC
- **Last Updated**: February 13, 2025 at 17:32 UTC
- **Reserved Date**: February 27, 2024 at 17:36 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Type Confusion in V8 in Google Chrome prior to 122.0.6261.94 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 122.0.6261.94 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_27.html)
2. [](https://issues.chromium.org/issues/324596281)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6KJCEJWJR5Z54Z75LRJGELDNMFDKLZG/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWSP5MIK7CDWJQHN2SJJX2YGSSS7E4O/)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTGM2WHYSZAUUPENB7YO6E5ONAKE6AKJ/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-4858, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-4858 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4858
- **State**: PUBLISHED
- **Published Date**: May 18, 2025 at 04:00 UTC
- **Last Updated**: May 19, 2025 at 14:27 UTC
- **Reserved Date**: May 16, 2025 at 18:54 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in D-Link DAP-2695 120b36r137_ALL_en_20210528. It has been declared as problematic. This vulnerability affects unknown code of the file /adv_arpspoofing.php of the component ARP Spoofing Prevention Page. The manipulation of the argument harp_mac leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer.
### CVSS Metrics
- **CVSS Base Score**: 2.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**D-Link - DAP-2695**
Affected versions:
- 120b36r137_ALL_en_20210528 (Status: affected)
### References
1. [VDB-309400 | D-Link DAP-2695 ARP Spoofing Prevention Page adv_arpspoofing.php cross site scripting](https://vuldb.com/?id.309400)
2. [VDB-309400 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309400)
3. [Submit #575100 | D-Link DAP-2695 firmware 20210528 Cross Site Scripting](https://vuldb.com/?submit.575100)
4. [](https://github.com/fizz-is-on-the-way/Iot_vuls/tree/main/DAP-2695/XSS_ARP_Spoofing_Prevention)
5. [](https://www.dlink.com/)
### Credits
- lcyf-fizz (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-32324, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-32324 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32324
- **State**: PUBLISHED
- **Published Date**: April 25, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 02:06 UTC
- **Reserved Date**: April 12, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow vulnerability in Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v.3.2 allows a local attacker to execute arbitrary code via the vpn_client_ip variable of the config_vpn_pptp function in rc program.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/teamoever/CVE/blob/main/LBT-T300-T400.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-2555, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-2555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2555
- **State**: PUBLISHED
- **Published Date**: July 21, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 05:52 UTC
- **Reserved Date**: July 21, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2009/07/stable-beta-update-bug-fixes.html)
2. [](http://code.google.com/p/chromium/issues/detail?id=14719)
3. [35722](http://www.securityfocus.com/bid/35722)
4. [googlechrome-javascript-bo(51801)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51801)
5. [35844](http://secunia.com/advisories/35844)
6. [](http://codereview.chromium.org/141042)
7. [](http://codereview.chromium.org/141042/diff/6/1004)
8. [ADV-2009-1924](http://www.vupen.com/english/advisories/2009/1924)
9. [55939](http://www.osvdb.org/55939)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-3905, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-3905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3905
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 10:31 UTC
- **Last Updated**: August 01, 2024 at 20:26 UTC
- **Reserved Date**: April 17, 2024 at 05:42 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been classified as critical. This affects the function R7WebsSecurityHandler of the file /goform/execCommand. The manipulation of the argument password leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261141 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Tenda - AC500**
Affected versions:
- 2.0.1.9(1307) (Status: affected)
### References
1. [VDB-261141 | Tenda AC500 execCommand R7WebsSecurityHandler stack-based overflow](https://vuldb.com/?id.261141)
2. [VDB-261141 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.261141)
3. [Submit #313790 | Tenda AC500 V2.0.1.9(1307) buffer overflow](https://vuldb.com/?submit.313790)
4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/R7WebsSecurityHandler.md)
### Credits
- wxhwxhwxh_mie (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-51969, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-51969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51969
- **State**: PUBLISHED
- **Published Date**: January 10, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 22:48 UTC
- **Reserved Date**: December 26, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the function getIptvInfo.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-getIptvInfo-f5918cc2828c49e78554f456bf7d4b36)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-45672, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-45672 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45672
- **State**: PUBLISHED
- **Published Date**: December 26, 2021 at 00:24 UTC
- **Last Updated**: August 04, 2024 at 04:47 UTC
- **Reserved Date**: December 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by Stored XSS. This affects D6200 before 1.1.00.40, D7000 before 1.0.1.78, R6020 before 1.0.0.48, R6080 before 1.0.0.48, R6120 before 1.0.0.76, R6220 before 1.1.0.110, R6230 before 1.1.0.110, R6260 before 1.1.0.78, R6800 before 1.2.0.76, R6900v2 before 1.2.0.76, R6700v2 before 1.2.0.76, R6850 before 1.1.0.78, R7200 before 1.2.0.76, R7350 before 1.2.0.76, R7400 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, AC2400 before 1.2.0.76, AC2600 before 1.2.0.76, and RAX40 before 1.0.3.62.
### CVSS Metrics
- **CVSS Base Score**: 4.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:L/A:N/C:L/I:L/PR:H/S:C/UI:R`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000064075/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-PSV-2019-0244)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-2947, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-2947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2947
- **State**: PUBLISHED
- **Published Date**: June 02, 2012 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 19:50 UTC
- **Reserved Date**: May 29, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
chan_iax2.c in the IAX2 channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1, when a certain mohinterpret setting is enabled, allows remote attackers to cause a denial of service (daemon crash) by placing a call on hold.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-2493](http://www.debian.org/security/2012/dsa-2493)
2. [1027102](http://www.securitytracker.com/id?1027102)
3. [20120529 AST-2012-007: Remote crash vulnerability in IAX2 channel driver.](http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html)
4. [](http://downloads.asterisk.org/pub/security/AST-2012-007.html)
5. [49303](http://secunia.com/advisories/49303)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-1456, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-1456 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1456
- **State**: PUBLISHED
- **Published Date**: July 15, 2016 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 22:55 UTC
- **Reserved Date**: January 04, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The CLI in Cisco IOS XR 6.x through 6.0.1 allows local users to execute arbitrary OS commands in a privileged context by leveraging unspecified container access, aka Bug ID CSCuz62721.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [91785](http://www.securityfocus.com/bid/91785)
2. [1036311](http://www.securitytracker.com/id/1036311)
3. [20160714 Cisco IOS XR Software Command Injection Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-ios-xr)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-0568, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-0568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0568
- **State**: PUBLISHED
- **Published Date**: June 10, 2009 at 17:37 UTC
- **Last Updated**: August 07, 2024 at 04:40 UTC
- **Reserved Date**: February 12, 2009 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The RPC Marshalling Engine (aka NDR) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly maintain its internal state, which allows remote attackers to overwrite arbitrary memory locations via a crafted RPC message that triggers incorrect pointer reading, related to "IDL interfaces containing a non-conformant varying array" and FC_SMVARRAY, FC_LGVARRAY, FC_VARIABLE_REPEAT, and FC_VARIABLE_OFFSET, aka "RPC Marshalling Engine Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2009-1545](http://www.vupen.com/english/advisories/2009/1545)
2. [](http://blogs.technet.com/srd/archive/2009/06/09/ms09-026-how-a-developer-can-know-if-their-rpc-interface-is-affected.aspx)
3. [1022357](http://www.securitytracker.com/id?1022357)
4. [54936](http://osvdb.org/54936)
5. [MS09-026](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-026)
6. [TA09-160A](http://www.us-cert.gov/cas/techalerts/TA09-160A.html)
7. [35219](http://www.securityfocus.com/bid/35219)
8. [oval:org.mitre.oval:def:6227](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6227)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-4536, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-4536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4536
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-38342, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-38342 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38342
- **State**: PUBLISHED
- **Published Date**: August 30, 2021 at 18:05 UTC
- **Last Updated**: September 17, 2024 at 00:56 UTC
- **Reserved Date**: August 09, 2021 at 00:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Nested Pages WordPress plugin <= 3.1.15 was vulnerable to Cross-Site Request Forgery via the `npBulkAction`s and `npBulkEdit` `admin_post` actions, which allowed attackers to trash or permanently purge arbitrary posts as well as changing their status, reassigning their ownership, and editing other metadata.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Kyle Phillips - Nested Pages**
Affected versions:
- 3.1.15 (Status: affected)
### References
1. [](https://www.wordfence.com/blog/2021/08/nested-pages-pat%E2%80%A6on-vulnerability/)
### Credits
- Ramuel Gall, Wordfence
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-0414, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-0414 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0414
- **State**: PUBLISHED
- **Published Date**: October 14, 2020 at 13:05 UTC
- **Last Updated**: August 04, 2024 at 06:02 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In AudioFlinger::RecordThread::threadLoop of audioflinger/Threads.cpp, there is a possible non-silenced audio buffer due to a permissions bypass. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-157708122
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2020-10-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-13181, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-13181 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13181
- **State**: PUBLISHED
- **Published Date**: July 05, 2018 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 08:52 UTC
- **Reserved Date**: July 04, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for Troo, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/Troo)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-5408, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-5408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5408
- **State**: PUBLISHED
- **Published Date**: December 09, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 10:49 UTC
- **Reserved Date**: December 08, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the data management protocol in Symantec Backup Exec for Windows Servers 11.0 (aka 11d) builds 6235 and 7170, 12.0 build 1364, and 12.5 build 2213 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors. NOTE: this can be exploited by unauthenticated remote attackers by leveraging CVE-2008-5407.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1021246](http://www.securitytracker.com/id?1021246)
2. [](http://seer.entsupport.symantec.com/docs/314528.htm)
3. [ADV-2008-3209](http://www.vupen.com/english/advisories/2008/3209)
4. [32810](http://secunia.com/advisories/32810)
5. [](http://securityresponse.symantec.com/avcenter/security/Content/2008.11.19.html)
6. [backupexec-dataprotocol-bo(46731)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46731)
7. [32346](http://www.securityfocus.com/bid/32346)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-33355, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-33355 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33355
- **State**: PUBLISHED
- **Published Date**: May 25, 2023 at 00:00 UTC
- **Last Updated**: January 16, 2025 at 14:49 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IceCMS v1.0.0 has Insecure Permissions. There is unauthorized access to the API, resulting in the disclosure of sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Thecosy/IceCMS/issues/7)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-52925, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-52925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52925
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 00:00 UTC
- **Last Updated**: February 26, 2025 at 15:50 UTC
- **Reserved Date**: November 18, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In OPSWAT MetaDefender Kiosk before 4.7.0, arbitrary code execution can be performed by an attacker via the MD Kiosk Unlock Device feature for software encrypted USB drives.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**OPSWAT - MetaDefender Kiosk**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.opswat.com/docs/mdkiosk/release-notes/cve-2024-52925)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-3655, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-3655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3655
- **State**: PUBLISHED
- **Published Date**: July 25, 2012 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 20:13 UTC
- **Reserved Date**: June 19, 2012 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT5485)
2. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html)
3. [](http://support.apple.com/kb/HT5503)
4. [APPLE-SA-2012-09-12-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html)
5. [APPLE-SA-2012-07-25-1](http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html)
6. [](http://support.apple.com/kb/HT5400)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-2366, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-2366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2366
- **State**: PUBLISHED
- **Published Date**: March 14, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 04:14 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Business Process Automation (BPA) By Redwood, 9.0, 9.1, allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs.
### Affected Products
**SAP SE - SAP Business Process Automation (BPA) By Redwood**
Affected versions:
- 9.0 (Status: affected)
- 9.1 (Status: affected)
### References
1. [103371](http://www.securityfocus.com/bid/103371)
2. [](https://blogs.sap.com/2018/03/13/sap-security-patch-day-march-2018/)
3. [](https://launchpad.support.sap.com/#/notes/2555667)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-3258, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-3258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3258
- **State**: PUBLISHED
- **Published Date**: June 27, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 14:14 UTC
- **Reserved Date**: June 19, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
calendar.php in Calendarix 0.7.20070307 allows remote attackers to obtain sensitive information via large values to the (1) year and (2) month parameters, which causes negative values to be passed to the mktime library call, and reveals the installation path in the error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070625 Calendarix version 0.7. 20070307 Multiple Path Disclosure](http://marc.info/?l=bugtraq&m=118279128017628&w=2)
2. [](http://www.netvigilance.com/advisory0035)
3. [calendarix-calendar-path-disclosure(35047)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35047)
4. [35371](http://www.osvdb.org/35371)
5. [20070625 Calendarix version 0.7. 20070307 Multiple Path Disclosure](http://marc.info/?l=full-disclosure&m=118279031307874&w=2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-44960, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-44960 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44960
- **State**: PUBLISHED
- **Published Date**: February 15, 2022 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 04:32 UTC
- **Reserved Date**: December 13, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In SVGPP SVG++ library 1.3.0, the XMLDocument::getRoot function in the renderDocument function handled the XMLDocument object improperly, returning a null pointer in advance at the second if, resulting in a null pointer reference behind the renderDocument function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/svgpp/svgpp/issues/101)
2. [](https://github.com/svgpp/svgpp/issues/101.aa)
3. [[debian-lts-announce] 20230401 [SECURITY] [DLA 3376-1] svgpp security update](https://lists.debian.org/debian-lts-announce/2023/04/msg00001.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-6735, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-6735 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6735
- **State**: PUBLISHED
- **Published Date**: December 22, 2013 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 17:46 UTC
- **Reserved Date**: November 08, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere Portal 6.0.0.x through 6.0.0.1, 6.0.1.x through 6.0.1.7, 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.0.0.x through 7.0.0.2 CF26, and 8.0.0.x through 8.0.0.1 CF08 allows remote attackers to obtain sensitive Java Content Repository (JCR) information via a modified Web Content Manager (WCM) URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [56161](http://secunia.com/advisories/56161)
2. [20131227 SEC Consult SA-20131227-0 :: IBM Web Content Manager (WCM) XPath Injection](http://www.securityfocus.com/archive/1/530552/100/0/threaded)
3. [64496](http://www.securityfocus.com/bid/64496)
4. [ibm-wsportal-cve20136735-jcr(89591)](https://exchange.xforce.ibmcloud.com/vulnerabilities/89591)
5. [101255](http://osvdb.org/101255)
6. [](http://www-01.ibm.com/support/docview.wss?uid=swg21660289)
7. [PI07777](http://www-01.ibm.com/support/docview.wss?uid=swg1PI07777)
8. [](https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_fix_available_for_unauthorized_information_retrieval_security_vulnerability_in_ibm_websphere_portal_cve_2013_6735)
9. [1029539](http://www.securitytracker.com/id/1029539)
10. [](http://packetstormsecurity.com/files/124611/IBM-Web-Content-Manager-XPath-Injection.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-2617, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-2617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2617
- **State**: PUBLISHED
- **Published Date**: April 30, 2024 at 12:57 UTC
- **Last Updated**: August 01, 2024 at 19:18 UTC
- **Reserved Date**: March 18, 2024 at 17:44 UTC
- **Assigned By**: Hitachi Energy
### Vulnerability Description
A vulnerability exists in the RTU500 that allows for authenticated and authorized users to bypass secure update. If a
malicious actor successfully exploits this vulnerability, they
could use it to update the RTU500 with unsigned firmware.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Hitachi Energy - RTU500 series CMU firmware**
Affected versions:
- 13.2.1 (Status: affected)
- 13.4.1 (Status: affected)
- 13.5.1 (Status: affected)
### References
1. [](https://publisher.hitachienergy.com/preview?DocumentId=8DBD000199&languageCode=en&Preview=true)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-6338, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-6338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6338
- **State**: PUBLISHED
- **Published Date**: December 07, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 20:19 UTC
- **Reserved Date**: December 06, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unrestricted file upload vulnerability in upload/index.php in deV!L`z Clanportal (DZCP) before 1.3.6.1 allows remote attackers to upload and execute arbitrary .php files by embedding PHP code in a JPEG or GIF file that is uploaded to inc/images/uploads/userpics/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-4821](http://www.vupen.com/english/advisories/2006/4821)
2. [20061201 deV!L`z Clanportal - Arbitrary File Upload [061124b]](http://www.securityfocus.com/archive/1/453178/100/0/threaded)
3. [21389](http://www.securityfocus.com/bid/21389)
4. [dzcp-index-file-upload(30653)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30653)
5. [23194](http://secunia.com/advisories/23194)
6. [20061201 deV!L`z Clanportal - Arbitrary File Upload [061124b]](http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051022.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-11117, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-11117 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11117
- **State**: PUBLISHED
- **Published Date**: June 13, 2019 at 15:36 UTC
- **Last Updated**: August 04, 2024 at 22:48 UTC
- **Reserved Date**: April 11, 2019 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper permissions in the installer for Intel(R) Omni-Path Fabric Manager GUI before version 10.9.2.1.1 may allow an authenticated user to potentially enable escalation of privilege via local attack.
### Affected Products
**n/a - Intel(R) Omni-Path Fabric Manager GUI**
Affected versions:
- Version before 10.9.2.1.1 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/in)
2. [108788](http://www.securityfocus.com/bid/108788)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-11084, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-11084 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11084
- **State**: PUBLISHED
- **Published Date**: July 14, 2020 at 21:15 UTC
- **Last Updated**: August 04, 2024 at 11:21 UTC
- **Reserved Date**: March 30, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
In iPear, the manual execution of the eval() function can lead to command injection. Only PCs where commands are manually executed via "For Developers" are affected. This function allows executing any PHP code within iPear which may change, damage, or steal data (files) from the PC.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**yaBobJonez - iPear**
Affected versions:
- >= 0.6.14, <= 0.6.15 (Status: affected)
- = 0.7.0 (Status: affected)
### References
1. [](https://github.com/yaBobJonez/iPear/security/advisories/GHSA-4xvp-35fx-hjjj)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-24361, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-24361 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24361
- **State**: PUBLISHED
- **Published Date**: June 21, 2021 at 19:18 UTC
- **Last Updated**: August 03, 2024 at 19:28 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
In the Location Manager WordPress plugin before 2.1.0.10, the AJAX action gd_popular_location_list did not properly sanitise or validate some of its POST parameters, which are then used in a SQL statement, leading to unauthenticated SQL Injection issues.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**AyeCode Ltd - Location Manager**
Affected versions:
- 2.1.0.10 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/5aff50fc-ac96-4076-a07c-bb145ae37025)
2. [](https://wpgeodirectory.com/downloads/location-manager/)
### Credits
- Rafal Goryl
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-4190, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-4190 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4190
- **State**: PUBLISHED
- **Published Date**: October 12, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 20:28 UTC
- **Reserved Date**: August 08, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The FT2FontEntry::CreateFontEntry function in FreeType, as used in the Android build of Mozilla Firefox before 16.0.1 on CyanogenMod 10, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [firefox-freetype-code-execution(79208)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79208)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=790139)
3. [](http://www.mozilla.org/security/announce/2012/mfsa2012-88.html)
4. [1027653](http://www.securitytracker.com/id?1027653)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-15956, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-15956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15956
- **State**: PUBLISHED
- **Published Date**: October 12, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 10:10 UTC
- **Reserved Date**: August 28, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier versions (Status: affected)
### References
1. [1041809](http://www.securitytracker.com/id/1041809)
2. [105439](http://www.securityfocus.com/bid/105439)
3. [](https://helpx.adobe.com/security/products/acrobat/apsb18-30.html)
4. [](https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-36406, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-36406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36406
- **State**: REJECTED
- **Last Updated**: May 28, 2025 at 17:22 UTC
- **Reserved Date**: August 10, 2022 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-16741, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-16741 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16741
- **State**: REJECTED
- **Published Date**: December 20, 2021 at 22:50 UTC
- **Last Updated**: December 20, 2021 at 22:50 UTC
- **Reserved Date**: August 04, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-1265, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-1265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1265
- **State**: PUBLISHED
- **Published Date**: March 06, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 12:50 UTC
- **Reserved Date**: March 04, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
KMail 1.9.5 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents KMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[gnupg-users] 20070306 [Announce] Multiple Messages Problem in GnuPG and GPGME](http://lists.gnupg.org/pipermail/gnupg-users/2007-March/030514.html)
2. [2353](http://securityreason.com/securityalert/2353)
3. [20070305 CORE-2007-0115: GnuPG and GnuPG clients unsigned data injection vulnerability](http://www.securityfocus.com/archive/1/461958/30/7710/threaded)
4. [](http://www.coresecurity.com/?action=item&id=1687)
5. [20070305 CORE-2007-0115: GnuPG and GnuPG clients unsigned data injection vulnerability](http://www.securityfocus.com/archive/1/461958/100/0/threaded)
6. [24413](http://secunia.com/advisories/24413)
7. [22759](http://www.securityfocus.com/bid/22759)
8. [1017727](http://www.securitytracker.com/id?1017727)
9. [ADV-2007-0835](http://www.vupen.com/english/advisories/2007/0835)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-4708, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-4708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4708
- **State**: PUBLISHED
- **Published Date**: October 01, 2013 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 01:15 UTC
- **Reserved Date**: June 26, 2013 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.seil.jp/support/security/a01388.html)
2. [JVN#40079308](http://jvn.jp/en/jp/JVN40079308/index.html)
3. [97619](http://osvdb.org/97619)
4. [JVNDB-2013-000091](http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-52646, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-52646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52646
- **State**: PUBLISHED
- **Published Date**: April 26, 2024 at 12:19 UTC
- **Last Updated**: May 04, 2025 at 07:40 UTC
- **Reserved Date**: March 06, 2024 at 09:52 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
aio: fix mremap after fork null-deref
Commit e4a0d3e720e7 ("aio: Make it possible to remap aio ring") introduced
a null-deref if mremap is called on an old aio mapping after fork as
mm->ioctx_table will be set to NULL.
[jmoyer@redhat.com: fix 80 column issue]
### Affected Products
**Linux - Linux**
Affected versions:
- e4a0d3e720e7e508749c1439b5ba3aff56c92976 (Status: affected)
- e4a0d3e720e7e508749c1439b5ba3aff56c92976 (Status: affected)
- e4a0d3e720e7e508749c1439b5ba3aff56c92976 (Status: affected)
- e4a0d3e720e7e508749c1439b5ba3aff56c92976 (Status: affected)
- e4a0d3e720e7e508749c1439b5ba3aff56c92976 (Status: affected)
- e4a0d3e720e7e508749c1439b5ba3aff56c92976 (Status: affected)
- e4a0d3e720e7e508749c1439b5ba3aff56c92976 (Status: affected)
**Linux - Linux**
Affected versions:
- 3.19 (Status: affected)
- 0 (Status: unaffected)
- 4.14.306 (Status: unaffected)
- 4.19.273 (Status: unaffected)
- 5.4.232 (Status: unaffected)
- 5.10.169 (Status: unaffected)
- 5.15.95 (Status: unaffected)
- 6.1.13 (Status: unaffected)
- 6.2 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/808f1e4b5723ae4eda724d2ad6f6638905eefd95)
2. [](https://git.kernel.org/stable/c/d8dca1bfe9adcae38b35add64977818c0c13dd22)
3. [](https://git.kernel.org/stable/c/4326d0080f7e84fba775da41d158f46cf9d3f1c2)
4. [](https://git.kernel.org/stable/c/c261f798f7baa8080cf0214081d43d5f86bb073f)
5. [](https://git.kernel.org/stable/c/178993157e8c50aef7f35d7d6d3b44bb428199e1)
6. [](https://git.kernel.org/stable/c/af126acf01a12bdb04986fd26fc2eb3b40249e0d)
7. [](https://git.kernel.org/stable/c/81e9d6f8647650a7bead74c5f926e29970e834d1)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-4305, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-4305 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4305
- **State**: PUBLISHED
- **Published Date**: August 30, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 19:06 UTC
- **Reserved Date**: August 22, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in SAP DB and MaxDB before 7.6.00.30 allows remote attackers to execute arbitrary code via a long database name when connecting via a WebDBM client.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [maxdb-webdbm-bo(28636)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28636)
2. [](http://www.symantec.com/enterprise/research/SYMSA-2006-009.txt)
3. [DSA-1190](http://www.debian.org/security/2006/dsa-1190)
4. [20060828 SYMSA-2006-009](http://www.securityfocus.com/archive/1/444601/100/0/threaded)
5. [21677](http://secunia.com/advisories/21677)
6. [22518](http://secunia.com/advisories/22518)
7. [](http://dev.mysql.com/doc/maxdb/changes/changes_7.6.00.32.html)
8. [1016766](http://securitytracker.com/id?1016766)
9. [ADV-2006-3410](http://www.vupen.com/english/advisories/2006/3410)
10. [19660](http://www.securityfocus.com/bid/19660)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-2583, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-2583 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2583
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 16:34 UTC
- **Last Updated**: September 30, 2024 at 16:31 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
### Affected Products
**Oracle Corporation - Java**
Affected versions:
- Java SE: 7u241, 8u231, 11.0.5, 13.0.1 (Status: affected)
- Java SE Embedded: 8u231 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2020.html)
2. [RHSA-2020:0128](https://access.redhat.com/errata/RHSA-2020:0128)
3. [RHSA-2020:0122](https://access.redhat.com/errata/RHSA-2020:0122)
4. [DSA-4605](https://www.debian.org/security/2020/dsa-4605)
5. [20200120 [SECURITY] [DSA 4605-1] openjdk-11 security update](https://seclists.org/bugtraq/2020/Jan/24)
6. [RHSA-2020:0157](https://access.redhat.com/errata/RHSA-2020:0157)
7. [RHSA-2020:0196](https://access.redhat.com/errata/RHSA-2020:0196)
8. [](https://security.netapp.com/advisory/ntap-20200122-0003/)
9. [openSUSE-SU-2020:0113](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html)
10. [openSUSE-SU-2020:0147](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html)
11. [RHSA-2020:0232](https://access.redhat.com/errata/RHSA-2020:0232)
12. [RHSA-2020:0231](https://access.redhat.com/errata/RHSA-2020:0231)
13. [RHSA-2020:0202](https://access.redhat.com/errata/RHSA-2020:0202)
14. [USN-4257-1](https://usn.ubuntu.com/4257-1/)
15. [RHSA-2020:0465](https://access.redhat.com/errata/RHSA-2020:0465)
16. [RHSA-2020:0470](https://access.redhat.com/errata/RHSA-2020:0470)
17. [RHSA-2020:0467](https://access.redhat.com/errata/RHSA-2020:0467)
18. [RHSA-2020:0469](https://access.redhat.com/errata/RHSA-2020:0469)
19. [RHSA-2020:0468](https://access.redhat.com/errata/RHSA-2020:0468)
20. [DSA-4621](https://www.debian.org/security/2020/dsa-4621)
21. [20200216 [SECURITY] [DSA 4621-1] openjdk-8 security update](https://seclists.org/bugtraq/2020/Feb/22)
22. [RHSA-2020:0541](https://access.redhat.com/errata/RHSA-2020:0541)
23. [RHSA-2020:0632](https://access.redhat.com/errata/RHSA-2020:0632)
24. [[debian-lts-announce] 20200229 [SECURITY] [DLA 2128-1] openjdk-7 security update](https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html)
25. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10315)
26. [GLSA-202101-19](https://security.gentoo.org/glsa/202101-19)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.