System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4566, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4566 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4566 - **State**: PUBLISHED - **Published Date**: January 14, 2011 at 22:00 UTC - **Last Updated**: August 07, 2024 at 03:51 UTC - **Reserved Date**: December 20, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The web authentication form in the NT4 authentication component in Citrix Access Gateway Enterprise Edition 9.2-49.8 and earlier, and the NTLM authentication component in Access Gateway Standard and Advanced Editions before Access Gateway 5.0, allows attackers to execute arbitrary commands via shell metacharacters in the password field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1024893](http://www.securitytracker.com/id?1024893) 2. [](http://www.vsecurity.com/resources/advisory/20101221-1) 3. [](http://support.citrix.com/article/CTX127613) 4. [8119](http://securityreason.com/securityalert/8119) 5. [70099](http://www.osvdb.org/70099) 6. [16916](http://www.exploit-db.com/exploits/16916)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16595, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16595 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16595 - **State**: PUBLISHED - **Published Date**: January 23, 2018 at 01:00 UTC - **Last Updated**: August 05, 2024 at 20:27 UTC - **Reserved Date**: November 06, 2017 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of NetGain Systems Enterprise Manager 7.2.730 build 1034. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the org.apache.jsp.u.jsp.reports.export_005fdownload_jsp servlet, which listens on TCP port 8081 by default. When parsing the filename parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of Administrator. Was ZDI-CAN-5118. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **NetGain Systems - NetGain Systems Enterprise Manager** Affected versions: - 7.2.730 build 1034 (Status: affected) ### References 1. [](https://zerodayinitiative.com/advisories/ZDI-17-960)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38512, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38512 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38512 - **State**: PUBLISHED - **Published Date**: July 26, 2024 at 19:45 UTC - **Last Updated**: August 02, 2024 at 04:12 UTC - **Reserved Date**: June 18, 2024 at 14:42 UTC - **Assigned By**: lenovo ### Vulnerability Description A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Lenovo - XClarity Controller** Affected versions: - various (Status: affected) ### References 1. [](https://support.lenovo.com/us/en/product_security/LEN-156781)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13642, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13642 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13642 - **State**: PUBLISHED - **Published Date**: January 30, 2025 at 06:41 UTC - **Last Updated**: January 30, 2025 at 15:08 UTC - **Reserved Date**: January 23, 2025 at 00:53 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Stratum – Elementor Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Hotspot widget in all versions up to, and including, 1.4.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **jetmonsters - Stratum – Elementor Widgets** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7ccaee26-277e-4730-8242-9b5e6a281fcc?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3228058#file6) ### Credits - D.Sim
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30549, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30549 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30549 - **State**: PUBLISHED - **Published Date**: June 15, 2021 at 21:40 UTC - **Last Updated**: August 03, 2024 at 22:32 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in Spell check in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2021/06/stable-channel-update-for-desktop.html) 2. [](https://crbug.com/1212498) 3. [GLSA-202107-06](https://security.gentoo.org/glsa/202107-06) 4. [FEDORA-2021-f94dadff78](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/) 5. [FEDORA-2021-ca58c57bdf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45022, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45022 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45022 - **State**: PUBLISHED - **Published Date**: September 11, 2024 at 15:13 UTC - **Last Updated**: May 04, 2025 at 09:31 UTC - **Reserved Date**: August 21, 2024 at 05:34 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0 The __vmap_pages_range_noflush() assumes its argument pages** contains pages with the same page shift. However, since commit e9c3cda4d86e ("mm, vmalloc: fix high order __GFP_NOFAIL allocations"), if gfp_flags includes __GFP_NOFAIL with high order in vm_area_alloc_pages() and page allocation failed for high order, the pages** may contain two different page shifts (high order and order-0). This could lead __vmap_pages_range_noflush() to perform incorrect mappings, potentially resulting in memory corruption. Users might encounter this as follows (vmap_allow_huge = true, 2M is for PMD_SIZE): kvmalloc(2M, __GFP_NOFAIL|GFP_X) __vmalloc_node_range_noprof(vm_flags=VM_ALLOW_HUGE_VMAP) vm_area_alloc_pages(order=9) ---> order-9 allocation failed and fallback to order-0 vmap_pages_range() vmap_pages_range_noflush() __vmap_pages_range_noflush(page_shift = 21) ----> wrong mapping happens We can remove the fallback code because if a high-order allocation fails, __vmalloc_node_range_noprof() will retry with order-0. Therefore, it is unnecessary to fallback to order-0 here. Therefore, fix this by removing the fallback code. ### Affected Products **Linux - Linux** Affected versions: - fe5c2bdcb14c8612eb5e7a09159801c7219e9ac4 (Status: affected) - e9c3cda4d86e56bf7fe403729f38c4f0f65d3860 (Status: affected) - e9c3cda4d86e56bf7fe403729f38c4f0f65d3860 (Status: affected) - e9c3cda4d86e56bf7fe403729f38c4f0f65d3860 (Status: affected) **Linux - Linux** Affected versions: - 6.3 (Status: affected) - 0 (Status: unaffected) - 6.1.107 (Status: unaffected) - 6.6.48 (Status: unaffected) - 6.10.7 (Status: unaffected) - 6.11 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/fd1ffbb50ef4da5e1378a46616b6d7407dc795da) 2. [](https://git.kernel.org/stable/c/de7bad86345c43cd040ed43e20d9fad78a3ee59f) 3. [](https://git.kernel.org/stable/c/c91618816f4d21fc574d7577a37722adcd4075b2) 4. [](https://git.kernel.org/stable/c/61ebe5a747da649057c37be1c37eb934b4af79ca)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0981, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0981 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0981 - **State**: PUBLISHED - **Published Date**: April 05, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:35 UTC - **Reserved Date**: April 05, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in AlstraSoft EPay Pro 2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) payment or (2) send parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [14802](http://secunia.com/advisories/14802) 2. [20050402 AlstraSoft EPay Pro v2.0 has file include and multiple xss](http://marc.info/?l=bugtraq&m=111247198021626&w=2) 3. [12974](http://www.securityfocus.com/bid/12974)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43796, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43796 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43796 - **State**: PUBLISHED - **Published Date**: October 31, 2023 at 16:52 UTC - **Last Updated**: February 13, 2025 at 17:13 UTC - **Reserved Date**: September 22, 2023 at 14:51 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Synapse is an open-source Matrix homeserver Prior to versions 1.95.1 and 1.96.0rc1, cached device information of remote users can be queried from Synapse. This can be used to enumerate the remote users known to a homeserver. System administrators are encouraged to upgrade to Synapse 1.95.1 or 1.96.0rc1 to receive a patch. As a workaround, the `federation_domain_whitelist` can be used to limit federation traffic with a homeserver. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **matrix-org - synapse** Affected versions: - < 1.95.1 (Status: affected) ### References 1. [https://github.com/matrix-org/synapse/security/advisories/GHSA-mp92-3jfm-3575](https://github.com/matrix-org/synapse/security/advisories/GHSA-mp92-3jfm-3575) 2. [https://github.com/matrix-org/synapse/commit/daec55e1fe120c564240c5386e77941372bf458f](https://github.com/matrix-org/synapse/commit/daec55e1fe120c564240c5386e77941372bf458f) 3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VH3RNC5ZPQZ4OKPSL4E6BBJSZOQLGDEY/) 4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2IDEEZMFJBDLTFHQUTZRJJNCOZGQ2ZVS/) 5. [](https://security.gentoo.org/glsa/202401-12)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-29239, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-29239 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-29239 - **State**: PUBLISHED - **Published Date**: December 02, 2020 at 16:37 UTC - **Last Updated**: August 04, 2024 at 16:48 UTC - **Reserved Date**: November 27, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Online Birth Certificate System Project V 1.0 is affected by cross-site scripting (XSS). This vulnerability can result in an attacker injecting the XSS payload in the User Registration section. When an admin visits the View Detail of Application section from the admin panel, the attacker can able to steal the cookie according to the crafted payload. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.exploit-db.com/exploits/49159)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40812, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40812 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40812 - **State**: PUBLISHED - **Published Date**: September 19, 2022 at 15:13 UTC - **Last Updated**: August 03, 2024 at 12:28 UTC - **Reserved Date**: September 19, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://pypi.org/project/democritus-file-system/) 2. [](https://github.com/democritus-project/d8s-pdfs/issues/6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2647, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2647 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2647 - **State**: PUBLISHED - **Published Date**: May 11, 2023 at 07:31 UTC - **Last Updated**: August 02, 2024 at 06:26 UTC - **Reserved Date**: May 11, 2023 at 05:32 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Weaver E-Office 9.5 and classified as critical. Affected by this issue is some unknown functionality of the file /webroot/inc/utility_all.php of the component File Upload Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228776. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-77: Security Weakness ### Affected Products **Weaver - E-Office** Affected versions: - 9.5 (Status: affected) ### References 1. [](https://vuldb.com/?id.228776) 2. [](https://vuldb.com/?ctiid.228776) 3. [](https://github.com/sunyixuan1228/cve/blob/main/weaver%20exec.md) ### Credits - sunyixuan1228 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21262, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21262 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21262 - **State**: PUBLISHED - **Published Date**: January 24, 2025 at 21:32 UTC - **Last Updated**: April 02, 2025 at 13:24 UTC - **Reserved Date**: December 10, 2024 at 23:54 UTC - **Assigned By**: microsoft ### Vulnerability Description User Interface (UI) Misrepresentation of Critical Information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-451: Security Weakness ### Affected Products **Microsoft - Microsoft Edge (Chromium-based)** Affected versions: - 1.0.0 (Status: affected) ### References 1. [Microsoft Edge (Chromium-based) Spoofing Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21262)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6765, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6765 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6765 - **State**: PUBLISHED - **Published Date**: September 28, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 12:24 UTC - **Reserved Date**: September 19, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The No Fuss Home Loans (aka com.soln.SA2CAA74BBC3AFEFE7C8BE3F3AAC499E7) application 1.0035.b0035 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#494937](http://www.kb.cert.org/vuls/id/494937) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-1235, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-1235 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-1235 - **State**: PUBLISHED - **Published Date**: July 14, 2005 at 04:00 UTC - **Last Updated**: September 16, 2024 at 23:11 UTC - **Reserved Date**: July 14, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The default configurations of (1) the port listener and (2) modplsql in Oracle Internet Application Server (IAS) 3.0.7 and earlier allow remote attackers to view privileged database information via HTTP requests for Database Access Descriptor (DAD) files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20001219 Oracle WebDb engine brain-damagse](http://archives.neohapsis.com/archives/bugtraq/2000-12/0339.html) 2. [20010110 Patch for Potential Vulnerability in Oracle Internet Application Server](http://online.securityfocus.com/archive/1/155881) 3. [oracle-webdb-admin-access(5818)](http://www.iss.net/security_center/static/5818.php) 4. [20001221 Re: Oracle WebDb engine brain-damagse](http://archives.neohapsis.com/archives/bugtraq/2000-12/0372.html) 5. [2150](http://www.securityfocus.com/bid/2150) 6. [20001223 Potential Vulnerabilities in Oracle Internet Application Server](http://archives.neohapsis.com/archives/bugtraq/2000-12/0463.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1638, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1638 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1638 - **State**: PUBLISHED - **Published Date**: April 14, 2015 at 20:00 UTC - **Last Updated**: August 06, 2024 at 04:47 UTC - **Reserved Date**: February 17, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Active Directory Federation Services (AD FS) 3.0 on Windows Server 2012 R2 does not properly handle logoff actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation, aka "Active Directory Federation Services Information Disclosure Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1032115](http://www.securitytracker.com/id/1032115) 2. [MS15-040](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-040)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4758, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4758 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4758 - **State**: PUBLISHED - **Published Date**: September 04, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 11:27 UTC - **Reserved Date**: July 09, 2014 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Business Process Manager (BPM) 7.5.x through 8.5.5 and WebSphere Lombardi Edition 7.2.x allow remote authenticated users to bypass intended access restrictions and send requests to internal services via a callService URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [JR50215](http://www-01.ibm.com/support/docview.wss?uid=swg1JR50215) 2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21680795) 3. [60851](http://secunia.com/advisories/60851) 4. [ibm-websphere-cve20144758-sec-bypass(94485)](https://exchange.xforce.ibmcloud.com/vulnerabilities/94485)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11250, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11250 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11250 - **State**: PUBLISHED - **Published Date**: May 19, 2018 at 17:00 UTC - **Last Updated**: August 05, 2024 at 18:05 UTC - **Reserved Date**: July 13, 2017 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, 11.0.22 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. ### Affected Products **n/a - Adobe Acrobat and Reader 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, 11.0.22 and earlier versions** Affected versions: - Adobe Acrobat and Reader 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, 11.0.22 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb17-36.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20213, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20213 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20213 - **State**: PUBLISHED - **Published Date**: January 24, 2023 at 00:00 UTC - **Last Updated**: April 02, 2025 at 15:23 UTC - **Reserved Date**: October 14, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In ApplicationsDetailsActivity of AndroidManifest.xml, there is a possible DoS due to a tapjacking/overlay attack. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-183410508 ### Affected Products **n/a - Android** Affected versions: - Android-10 Android-11 Android-12 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/aaos/2023-01-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0387, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0387 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0387 - **State**: PUBLISHED - **Published Date**: July 12, 2000 at 04:00 UTC - **Last Updated**: August 01, 2024 at 16:34 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A legacy credential caching mechanism used in Windows 95 and Windows 98 systems allows attackers to read plaintext network passwords. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS99-052](https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-052) 2. [Q168115](http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ168115) 3. [829](http://www.securityfocus.com/bid/829)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5182, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5182 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5182 - **State**: PUBLISHED - **Published Date**: October 06, 2023 at 23:28 UTC - **Last Updated**: September 19, 2024 at 16:41 UTC - **Reserved Date**: September 25, 2023 at 18:11 UTC - **Assigned By**: canonical ### Vulnerability Description Sensitive data could be exposed in logs of subiquity version 23.09.1 and earlier. An attacker in the adm group could use this information to find hashed passwords and possibly escalate their privilege. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **Canonical Ltd. - subiquity** Affected versions: - 0 (Status: affected) ### References 1. [](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5182) 2. [](https://github.com/canonical/subiquity/pull/1820/commits/62e126896fb063808767d74d00886001e38eaa1c) ### Credits - Patric Åhlin - Johan Hortling
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32574, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32574 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32574 - **State**: PUBLISHED - **Published Date**: July 17, 2021 at 17:28 UTC - **Last Updated**: August 03, 2024 at 23:25 UTC - **Reserved Date**: May 11, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HashiCorp Consul and Consul Enterprise 1.3.0 through 1.10.0 Envoy proxy TLS configuration does not validate destination service identity in the encoded subject alternative name. Fixed in 1.8.14, 1.9.8, and 1.10.1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.hashicorp.com/blog/category/consul) 2. [](https://github.com/hashicorp/consul/releases/tag/v1.10.1) 3. [](https://discuss.hashicorp.com/t/hcsec-2021-17-consul-s-envoy-tls-configuration-did-not-validate-destination-service-subject-alternative-names/26856) 4. [GLSA-202208-09](https://security.gentoo.org/glsa/202208-09)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29338, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29338 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29338 - **State**: PUBLISHED - **Published Date**: April 14, 2021 at 13:52 UTC - **Last Updated**: August 03, 2024 at 22:02 UTC - **Reserved Date**: March 29, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer Overflow in OpenJPEG v2.4.0 allows remote attackers to crash the application, causing a Denial of Service (DoS). This occurs when the attacker uses the command line option "-ImgDir" on a directory that contains 1048576 files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/uclouvain/openjpeg/issues/1338) 2. [FEDORA-2021-c1ac2ee5ee](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/) 3. [FEDORA-2021-e145f477df](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/) 4. [[debian-lts-announce] 20220410 [SECURITY] [DLA 2975-1] openjpeg2 security update](https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html) 5. [GLSA-202209-04](https://security.gentoo.org/glsa/202209-04)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3309, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3309 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3309 - **State**: REJECTED - **Published Date**: July 24, 2017 at 16:00 UTC - **Last Updated**: July 24, 2017 at 15:57 UTC - **Reserved Date**: September 13, 2010 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3704, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3704 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3704 - **State**: PUBLISHED - **Published Date**: December 01, 2005 at 02:02 UTC - **Last Updated**: August 07, 2024 at 23:24 UTC - **Reserved Date**: November 16, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description System log server in Mac OS X and OS X Server 10.4 through 10.4.3 allows remote attackers to spoof syslog messages in log files by injecting various control characters such as newline (NL). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [macos-syslog-forgery(23344)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23344) 2. [17813](http://secunia.com/advisories/17813) 3. [ADV-2005-2659](http://www.vupen.com/english/advisories/2005/2659) 4. [1015293](http://securitytracker.com/id?1015293) 5. [APPLE-SA-2005-11-29](http://docs.info.apple.com/article.html?artnum=302847) 6. [21277](http://www.osvdb.org/21277) 7. [15647](http://www.securityfocus.com/bid/15647)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21363, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21363 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21363 - **State**: PUBLISHED - **Published Date**: February 13, 2024 at 18:02 UTC - **Last Updated**: May 08, 2025 at 18:20 UTC - **Reserved Date**: December 08, 2023 at 22:45 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-843: Security Weakness ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21363)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3591, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3591 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3591 - **State**: PUBLISHED - **Published Date**: December 26, 2014 at 02:00 UTC - **Last Updated**: August 06, 2024 at 23:37 UTC - **Reserved Date**: September 21, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.4.x before 3.4.5 allow remote authenticated users to inject arbitrary web script or HTML via a crafted row that triggers an improperly constructed confirmation message after inline-editing and save operations, related to (1) js/functions.js and (2) js/tbl_structure.js. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/phpmyadmin/phpmyadmin/commit/bda213c58aec44925be661acb0e76c19483ea170) 2. [[oss-security] 20110930 Re: CVE Request --- phpMyAdmin -- Multiple XSS flaws in versions v3.4.0 to v3.4.4 (PMASA-2011-14)](http://www.openwall.com/lists/oss-security/2011/09/30/8) 3. [](http://www.phpmyadmin.net/home_page/security/PMASA-2011-14.php) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=738681)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8262, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8262 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8262 - **State**: PUBLISHED - **Published Date**: March 05, 2019 at 15:00 UTC - **Last Updated**: September 16, 2024 at 16:49 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: Kaspersky ### Vulnerability Description UltraVNC revision 1203 has multiple heap buffer overflow vulnerabilities in VNC client code inside Ultra decoder, which results in code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1204. ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **UltraVNC - UltraVNC** Affected versions: - 1.2.2.3 (Status: affected) ### References 1. [](https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-008-ultravnc-heap-based-buffer-overflow/) 2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf) 3. [](https://www.us-cert.gov/ics/advisories/icsa-20-161-06) 4. [](https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf) 5. [](https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf) 6. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0880, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0880 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0880 - **State**: PUBLISHED - **Published Date**: February 20, 2015 at 11:00 UTC - **Last Updated**: August 06, 2024 at 04:26 UTC - **Reserved Date**: January 08, 2015 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Buffer overflow in CREAR AL-Mail32 before 1.13d allows remote attackers to execute arbitrary code via a long filename of an attachment. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.almail.com/vulnerability.html) 2. [JVNDB-2015-000022](http://jvndb.jvn.jp/jvndb/JVNDB-2015-000022) 3. [JVN#93318392](http://jvn.jp/en/jp/JVN93318392/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43697, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43697 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43697 - **State**: PUBLISHED - **Published Date**: April 15, 2023 at 00:00 UTC - **Last Updated**: February 06, 2025 at 20:33 UTC - **Reserved Date**: October 24, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OX App Suite before 7.10.6-rev30 allows XSS via an activity tracking adapter defined by jslob. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://open-xchange.com) 2. [](https://seclists.org/fulldisclosure/2023/Feb/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-19725, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-19725 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-19725 - **State**: PUBLISHED - **Published Date**: August 22, 2023 at 00:00 UTC - **Last Updated**: October 04, 2024 at 16:07 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description There is a use-after-free vulnerability in file pdd_simplifier.cpp in Z3 before 4.8.8. It occurs when the solver attempt to simplify the constraints and causes unexpected memory access. It can cause segmentation faults or arbitrary code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Z3Prover/z3/issues/3363)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41962, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41962 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41962 - **State**: PUBLISHED - **Published Date**: August 01, 2024 at 16:30 UTC - **Last Updated**: August 01, 2024 at 17:45 UTC - **Reserved Date**: July 24, 2024 at 16:51 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Bostr is an nostr relay aggregator proxy that acts like a regular nostr relay. bostr let everyone in even having authorized_keys being set when noscraper is set to true. This vulnerability is fixed in 3.0.10. ### CVSS Metrics - **CVSS Base Score**: 4.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-285: Security Weakness ### Affected Products **Yonle - bostr** Affected versions: - < 3.0.10 (Status: affected) ### References 1. [https://github.com/Yonle/bostr/security/advisories/GHSA-5cf7-cxrf-mq73](https://github.com/Yonle/bostr/security/advisories/GHSA-5cf7-cxrf-mq73) 2. [https://github.com/Yonle/bostr/commit/49181f4ec9ae1472c6675cab56bbc01e723855af](https://github.com/Yonle/bostr/commit/49181f4ec9ae1472c6675cab56bbc01e723855af) 3. [https://github.com/Yonle/bostr/blob/8665374a66e2afb9f92d0414b0d6f420a95d5d2d/auth.js#L21](https://github.com/Yonle/bostr/blob/8665374a66e2afb9f92d0414b0d6f420a95d5d2d/auth.js#L21) 4. [https://github.com/Yonle/bostr/releases/tag/3.0.10](https://github.com/Yonle/bostr/releases/tag/3.0.10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1334, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1334 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1334 - **State**: PUBLISHED - **Published Date**: April 09, 2010 at 17:00 UTC - **Last Updated**: September 17, 2024 at 02:06 UTC - **Reserved Date**: April 09, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unrestricted file upload vulnerability in Pulse CMS Basic 1.2.4 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension followed by a safe extension, then accessing it via a direct request to the file in an unspecified directory, a different vulnerability than CVE-2010-0993. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [39046](http://secunia.com/advisories/39046)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1739, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1739 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1739 - **State**: PUBLISHED - **Published Date**: May 24, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:59 UTC - **Reserved Date**: May 24, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The XWD Decoder in ImageMagick before 6.2.2.3, and GraphicsMagick before 1.1.6-r1, allows remote attackers to cause a denial of service (infinite loop) via an image with a zero color mask. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [16775](http://www.osvdb.org/16775) 2. [GLSA-200505-16](http://security.gentoo.org/glsa/glsa-200505-16.xml) 3. [MDKSA-2005:107](http://www.mandriva.com/security/advisories?name=MDKSA-2005:107) 4. [13705](http://www.securityfocus.com/bid/13705) 5. [16774](http://www.osvdb.org/16774) 6. [RHSA-2005:480](http://www.redhat.com/support/errata/RHSA-2005-480.html) 7. [USN-132-1](https://usn.ubuntu.com/132-1/) 8. [oval:org.mitre.oval:def:960](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A960) 9. [](http://bugs.gentoo.org/show_bug.cgi?id=90423) 10. [15429](http://secunia.com/advisories/15429) 11. [15446](http://secunia.com/advisories/15446) 12. [15453](http://secunia.com/advisories/15453) 13. [oval:org.mitre.oval:def:11667](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11667)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4254, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4254 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4254 - **State**: PUBLISHED - **Published Date**: November 24, 2011 at 11:00 UTC - **Last Updated**: September 16, 2024 at 19:36 UTC - **Reserved Date**: November 01, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via a crafted RTSP SETUP request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://service.real.com/realplayer/security/11182011_player/en/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-40670, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-40670 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-40670 - **State**: PUBLISHED - **Published Date**: January 28, 2025 at 19:13 UTC - **Last Updated**: January 28, 2025 at 21:04 UTC - **Reserved Date**: July 08, 2024 at 18:54 UTC - **Assigned By**: google_android ### Vulnerability Description In TBD of TBD, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - Android SoC (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2024-10-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45188, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45188 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45188 - **State**: PUBLISHED - **Published Date**: August 23, 2024 at 19:14 UTC - **Last Updated**: November 25, 2024 at 12:42 UTC - **Reserved Date**: August 22, 2024 at 07:56 UTC - **Assigned By**: JFROG ### Vulnerability Description Mage AI allows remote users with the "Viewer" role to leak arbitrary files from the Mage server due to a path traversal in the "File Content" request ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Unknown - Unknown** Affected versions: - 0 (Status: affected) ### References 1. [](https://research.jfrog.com/vulnerabilities/mage-ai-file-content-request-remote-arbitrary-file-leak-jfsa-2024-001039603/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3137, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3137 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3137 - **State**: PUBLISHED - **Published Date**: October 25, 2014 at 22:00 UTC - **Last Updated**: August 06, 2024 at 10:35 UTC - **Reserved Date**: May 01, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Bottle 0.10.x before 0.10.12, 0.11.x before 0.11.7, and 0.12.x before 0.12.6 does not properly limit content types, which allows remote attackers to bypass intended access restrictions via an accepted Content-Type followed by a ; (semi-colon) and a Content-Type that would not be accepted, as demonstrated in YouCompleteMe to execute arbitrary code. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/defnull/bottle/issues/616) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1093255) 3. [[oss-security] 20140501 Re: CVE request: Python Bottle JSON content-type not restrictive enough](http://www.openwall.com/lists/oss-security/2014/05/01/15) 4. [DSA-2948](http://www.debian.org/security/2014/dsa-2948)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22384, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22384 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22384 - **State**: PUBLISHED - **Published Date**: October 17, 2023 at 00:43 UTC - **Last Updated**: September 13, 2024 at 16:16 UTC - **Reserved Date**: January 03, 2022 at 22:29 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Verify Privilege On-Premises 11.5 could allow an attacker to modify messages returned from the server due to hazardous input validation. IBM X-Force ID: 221961. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **IBM - Security Verify Privilege** Affected versions: - 11.5 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7047202) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/221961)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-7015, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-7015 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-7015 - **State**: PUBLISHED - **Published Date**: March 13, 2024 at 15:27 UTC - **Last Updated**: August 02, 2024 at 08:50 UTC - **Reserved Date**: December 20, 2023 at 15:39 UTC - **Assigned By**: Wordfence ### Vulnerability Description The File Manager Pro plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tb' parameter in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **File Manager - File Manager Pro** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/94750424-bb52-4236-962e-aa8cbdeb1459?source=cve) 2. [](https://filemanagerpro.io/changelog/) ### Credits - Tobias Weißhaar
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24430, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24430 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24430 - **State**: PUBLISHED - **Published Date**: February 11, 2025 at 17:37 UTC - **Last Updated**: April 15, 2025 at 16:04 UTC - **Reserved Date**: January 21, 2025 at 17:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could result in a security feature bypass. An attacker could exploit this race condition to alter a condition after it has been checked but before it is used, potentially bypassing rate limiting mechanisms. Exploitation of this issue does not require user interaction. ### CVSS Metrics - **CVSS Base Score**: 3.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-367: Security Weakness ### Affected Products **Adobe - Adobe Commerce** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/magento/apsb25-08.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6057, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6057 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6057 - **State**: PUBLISHED - **Published Date**: October 14, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 07:06 UTC - **Reserved Date**: August 14, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Edge allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Microsoft Edge Information Disclosure Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033802](http://www.securitytracker.com/id/1033802) 2. [MS15-107](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-107)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2175, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2175 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2175 - **State**: PUBLISHED - **Published Date**: June 23, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 00:32 UTC - **Reserved Date**: June 22, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Buffer Over-read in GitHub repository vim/vim prior to 8.2. ### Weakness Classification (CWE) - CWE-126: Security Weakness ### Affected Products **vim - vim/vim** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/7f0481c2-8b57-4324-b47c-795d1ea67e55) 2. [](https://github.com/vim/vim/commit/6046aded8da002b08d380db29de2ba0268b6616e) 3. [FEDORA-2022-719f3ec21b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/) 4. [FEDORA-2022-bb7f3cacbf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/) 5. [GLSA-202208-32](https://security.gentoo.org/glsa/202208-32) 6. [GLSA-202305-16](https://security.gentoo.org/glsa/202305-16)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2816, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2816 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2816 - **State**: PUBLISHED - **Published Date**: September 07, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:45 UTC - **Reserved Date**: September 07, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Greymatter allows remote attackers to inject arbitrary web script or HTML via a post comment, which is recorded in a log file but not properly handled when the administrator uses "View Control Panel Log" to read the log file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050831 XSS in GreyMatter blog](http://marc.info/?l=bugtraq&m=112551307528929&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41601, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41601 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41601 - **State**: PUBLISHED - **Published Date**: September 06, 2023 at 00:00 UTC - **Last Updated**: September 26, 2024 at 20:48 UTC - **Reserved Date**: August 30, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in install/index.php of CSZ CMS v1.3.0 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Database Username or Database Host parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.cszcms.com/) 2. [](https://github.com/al3zx/csz_cms_1_3_0_xss_in_install_page/blob/main/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14402, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14402 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14402 - **State**: PUBLISHED - **Published Date**: September 13, 2017 at 03:00 UTC - **Last Updated**: August 05, 2024 at 19:27 UTC - **Reserved Date**: September 12, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The EyesOfNetwork web interface (aka eonweb) 5.1-0 has SQL injection via the user_name parameter to module/admin_user/add_modify_user.php in the "ACCOUNT CREATION" section, related to lack of input validation in include/function.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.sstrunk.com/cve/eonweb_include_function.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5028, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5028 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5028 - **State**: PUBLISHED - **Published Date**: September 17, 2023 at 11:00 UTC - **Last Updated**: August 02, 2024 at 07:44 UTC - **Reserved Date**: September 16, 2023 at 17:05 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as problematic, has been found in China Unicom TEWA-800G 4.16L.04_CT2015_Yueme. Affected by this issue is some unknown functionality. The manipulation leads to information exposure through debug log file. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. VDB-239870 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 2/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-534: Security Weakness ### Affected Products **China Unicom - TEWA-800G** Affected versions: - 4.16L.04_CT2015_Yueme (Status: affected) ### References 1. [](https://vuldb.com/?id.239870) 2. [](https://vuldb.com/?ctiid.239870) 3. [](https://github.com/pinglan123/-/wiki/%E4%B8%AD%E5%9B%BD%E8%81%94%E9%80%9A%E5%AE%B6%E7%94%A8%E7%BD%91%E5%85%B3) ### Credits - pinglan0_9 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-1507, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-1507 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-1507 - **State**: PUBLISHED - **Published Date**: July 14, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:58 UTC - **Reserved Date**: July 14, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OpenSSH before 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote attackers to login unchallenged. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.openbsd.org/errata30.html#sshd) 2. [20011119 OpenSSH 3.0.1 (fwd)](http://msgs.securepoint.com/cgi-bin/get/bugtraq0111/114.html) 3. [3560](http://www.securityfocus.com/bid/3560) 4. [openssh-kerberos-elevate-privileges(7598)](http://www.iss.net/security_center/static/7598.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0148, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0148 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0148 - **State**: PUBLISHED - **Published Date**: February 07, 2022 at 15:47 UTC - **Last Updated**: August 02, 2024 at 23:18 UTC - **Reserved Date**: January 07, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs WordPress plugin before 2.0.4 was vulnerable to reflected XSS on the my-sticky-elements-leads admin page. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs – My Sticky Elements** Affected versions: - 2.0.4 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/37665ee1-c57f-4445-9596-df4f7d72c8cd) 2. [](https://plugins.trac.wordpress.org/changeset/2654453/mystickyelements) ### Credits - Krzysztof Zając
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-42985, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-42985 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-42985 - **State**: PUBLISHED - **Published Date**: November 17, 2022 at 00:00 UTC - **Last Updated**: April 25, 2025 at 20:42 UTC - **Reserved Date**: October 17, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The ScratchLogin extension through 1.1 for MediaWiki does not escape verification failure messages, which allows users with administrator privileges to perform cross-site scripting (XSS). ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:N/C:L/I:L/PR:H/S:C/UI:R` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/InternationalScratchWiki/mediawiki-scratch-login/pull/22) 2. [](https://github.com/InternationalScratchWiki/mediawiki-scratch-login/blob/4d2c1229b558b9cd685961274f20b621d114f4db/ScratchLogin.common.php#L104)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1792, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1792 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1792 - **State**: PUBLISHED - **Published Date**: June 12, 2015 at 00:00 UTC - **Last Updated**: August 06, 2024 at 04:54 UTC - **Reserved Date**: February 17, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SU-2015:1184](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html) 2. [SSRT102180](http://marc.info/?l=bugtraq&m=143880121627664&w=2) 3. [DSA-3287](http://www.debian.org/security/2015/dsa-3287) 4. [SUSE-SU-2015:1150](http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html) 5. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10122) 6. [](http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015) 7. [HPSBMU03409](http://marc.info/?l=bugtraq&m=144050155601375&w=2) 8. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965) 9. [](https://openssl.org/news/secadv/20150611.txt) 10. [RHSA-2015:1115](http://rhn.redhat.com/errata/RHSA-2015-1115.html) 11. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html) 12. [](http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html) 13. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html) 14. [SUSE-SU-2015:1182](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html) 15. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888) 16. [SUSE-SU-2015:1143](http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html) 17. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351) 18. [](http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html) 19. [openSUSE-SU-2016:0640](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html) 20. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html) 21. [1032564](http://www.securitytracker.com/id/1032564) 22. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380) 23. [](http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015) 24. [FEDORA-2015-10108](http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html) 25. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) 26. [20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl) 27. [openSUSE-SU-2015:1277](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html) 28. [APPLE-SA-2015-08-13-2](http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html) 29. [USN-2639-1](http://www.ubuntu.com/usn/USN-2639-1) 30. [](http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015) 31. [75154](http://www.securityfocus.com/bid/75154) 32. [GLSA-201506-02](https://security.gentoo.org/glsa/201506-02) 33. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044) 34. [91787](http://www.securityfocus.com/bid/91787) 35. [](https://github.com/openssl/openssl/commit/cd30f03ac5bf2962f44bd02ae8d88245dff2f12c) 36. [HPSBUX03388](http://marc.info/?l=bugtraq&m=143880121627664&w=2) 37. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763) 38. [FEDORA-2015-10047](http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html) 39. [](https://support.apple.com/kb/HT205031) 40. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html) 41. [](https://support.citrix.com/article/CTX216642) 42. [SUSE-SU-2015:1185](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html) 43. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694) 44. [openSUSE-SU-2015:1139](http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html) 45. [](https://bto.bluecoat.com/security-advisory/sa98) 46. [NetBSD-SA2015-008](http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc) 47. [](https://www.openssl.org/news/secadv_20150611.txt) 48. [HPSBGN03371](http://marc.info/?l=bugtraq&m=143654156615516&w=2) 49. [](https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25441, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25441 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25441 - **State**: PUBLISHED - **Published Date**: March 18, 2022 at 20:53 UTC - **Last Updated**: August 03, 2024 at 04:42 UTC - **Reserved Date**: February 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda AC9 v15.03.2.21 was discovered to contain a remote command execution (RCE) vulnerability via the vlanid parameter in the SetIPTVCfg function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/12)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37326, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37326 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37326 - **State**: PUBLISHED - **Published Date**: August 15, 2021 at 15:06 UTC - **Last Updated**: August 04, 2024 at 01:16 UTC - **Reserved Date**: July 21, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description NetSarang Xshell 7 before Build 0077 includes unintended code strings in paste operations. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.netsarang.com/en/xshell-update-history/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-49231, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-49231 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-49231 - **State**: PUBLISHED - **Published Date**: March 29, 2024 at 00:00 UTC - **Last Updated**: October 28, 2024 at 16:02 UTC - **Reserved Date**: November 24, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An authentication bypass vulnerability was found in Stilog Visual Planning 8. It allows an unauthenticated attacker to receive an administrative API token. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.visual-planning.com/en/support-portal/updates) 2. [](https://www.schutzwerk.com/advisories/SCHUTZWERK-SA-2023-003.txt) 3. [](https://www.schutzwerk.com/blog/schutzwerk-sa-2023-003/) 4. [20240405 SCHUTZWERK-SA-2023-003: Authentication Bypass in Visual Planning REST API](http://seclists.org/fulldisclosure/2024/Apr/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20989, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20989 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20989 - **State**: PUBLISHED - **Published Date**: August 26, 2019 at 17:17 UTC - **Last Updated**: August 05, 2024 at 12:19 UTC - **Reserved Date**: August 25, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the untrusted crate before 0.6.2 for Rust. Error handling can trigger an integer underflow and panic. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rustsec.org/advisories/RUSTSEC-2018-0001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26066, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26066 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26066 - **State**: PUBLISHED - **Published Date**: November 18, 2024 at 16:23 UTC - **Last Updated**: November 18, 2024 at 17:20 UTC - **Reserved Date**: September 24, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web UI of Cisco&nbsp;SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by persuading a user to import a crafted XML file with malicious entries. A successful exploit could allow the attacker to read and write files within the affected application.Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. ### Affected Products **Cisco - Cisco Catalyst SD-WAN Manager** Affected versions: - 20.1.12 (Status: affected) - 19.2.1 (Status: affected) - 18.4.4 (Status: affected) - 18.4.5 (Status: affected) - 20.1.1.1 (Status: affected) - 20.1.1 (Status: affected) - 19.3.0 (Status: affected) - 19.2.2 (Status: affected) - 19.2.099 (Status: affected) - 18.3.6 (Status: affected) - 18.3.7 (Status: affected) - 19.2.0 (Status: affected) - 18.3.8 (Status: affected) - 19.0.0 (Status: affected) - 19.1.0 (Status: affected) - 18.4.302 (Status: affected) - 18.4.303 (Status: affected) - 19.2.097 (Status: affected) - 19.2.098 (Status: affected) - 17.2.10 (Status: affected) - 18.3.6.1 (Status: affected) - 19.0.1a (Status: affected) - 18.2.0 (Status: affected) - 18.4.3 (Status: affected) - 18.4.1 (Status: affected) - 17.2.8 (Status: affected) - 18.3.3.1 (Status: affected) - 18.4.0 (Status: affected) - 18.3.1 (Status: affected) - 17.2.6 (Status: affected) - 17.2.9 (Status: affected) - 18.3.4 (Status: affected) - 17.2.5 (Status: affected) - 18.3.1.1 (Status: affected) - 18.3.5 (Status: affected) - 18.4.0.1 (Status: affected) - 18.3.3 (Status: affected) - 17.2.7 (Status: affected) - 17.2.4 (Status: affected) - 18.3.0 (Status: affected) - 19.2.3 (Status: affected) - 18.4.501_ES (Status: affected) - 20.3.1 (Status: affected) - 19.2.929 (Status: affected) - 19.2.31 (Status: affected) ### References 1. [cisco-sa-vmanx3-vrZbOqqD](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanx3-vrZbOqqD)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28789, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28789 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28789 - **State**: PUBLISHED - **Published Date**: May 03, 2022 at 19:42 UTC - **Last Updated**: August 03, 2024 at 06:03 UTC - **Reserved Date**: April 07, 2022 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Unprotected activities in Voice Note prior to version 21.3.51.11 allows attackers to record voice without user interaction. The patch adds proper permission for vulnerable activities. ### CVSS Metrics - **CVSS Base Score**: 6.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Samsung Mobile - Voice Note** Affected versions: - - (Status: affected) ### References 1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1940, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1940 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1940 - **State**: PUBLISHED - **Published Date**: July 17, 2019 at 20:25 UTC - **Last Updated**: November 21, 2024 at 19:18 UTC - **Reserved Date**: December 06, 2018 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Web Services Management Agent (WSMA) feature of Cisco Industrial Network Director (IND) could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid X.509 certificate. The vulnerability is due to insufficient X.509 certificate validation when establishing a WSMA connection. An attacker could exploit this vulnerability by supplying a crafted X.509 certificate during the WSMA connection setup phase. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on WSMA connections to the affected software. At the time of publication, this vulnerability affected Cisco IND Software releases prior to 1.7. ### Weakness Classification (CWE) - CWE-310: Security Weakness ### Affected Products **Cisco - Cisco Industrial Network Director** Affected versions: - unspecified (Status: affected) ### References 1. [20190717 Cisco Industrial Network Director Web Services Management Agent Unauthorized Information Disclosure Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-wsma-info) 2. [109296](http://www.securityfocus.com/bid/109296)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4820, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4820 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4820 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:43 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2120, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2120 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2120 - **State**: PUBLISHED - **Published Date**: January 20, 2021 at 14:50 UTC - **Last Updated**: September 26, 2024 at 18:14 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). ### CVSS Metrics - **CVSS Base Score**: 6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N` ### Affected Products **Oracle Corporation - VM VirtualBox** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2021.html) 2. [GLSA-202101-15](https://security.gentoo.org/glsa/202101-15)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3162, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3162 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3162 - **State**: PUBLISHED - **Published Date**: April 26, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 14:16 UTC - **Reserved Date**: December 05, 2016 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description HDFS clients interact with a servlet on the DataNode to browse the HDFS namespace. The NameNode is provided as a query parameter that is not validated in Apache Hadoop before 2.7.0. ### Affected Products **Apache Software Foundation - Apache Hadoop** Affected versions: - 2.6.x and earlier (Status: affected) ### References 1. [98017](http://www.securityfocus.com/bid/98017) 2. [[hadoop-common-dev] 20170425 CVE-2017-3162: Apache Hadoop DataNode web UI vulnerability](https://s.apache.org/k2ss) 3. [[hadoop-user] 20200604 Re: CVE-2017-3161 & CVE-2017-3162 | WhiteSource](https://lists.apache.org/thread.html/r127f75748fcabc63bc5a1bec6885753eb9b2bed803b6ed7bd46f965b%40%3Cuser.hadoop.apache.org%3E) 4. [[flink-user] 20210703 Re: owasp-dependency-check is flagging flink 1.13 for scala 2.12.7](https://lists.apache.org/thread.html/r66de86b9a608c1da70b2d27d765c11ec88edf6e5dd6f379ab33e072a%40%3Cuser.flink.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-37885, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-37885 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-37885 - **State**: PUBLISHED - **Published Date**: October 07, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 10:37 UTC - **Reserved Date**: August 08, 2022 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities. ### Affected Products **n/a - Aruba Access Points; 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series;** Affected versions: - Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below (Status: affected) - Aruba InstantOS 6.5.x: 6.5.4.23 and below (Status: affected) - Aruba InstantOS 8.6.x: 8.6.0.18 and below (Status: affected) - Aruba InstantOS 8.7.x: 8.7.1.9 and below (Status: affected) - Aruba InstantOS 8.10.x: 8.10.0.1 and below (Status: affected) - ArubaOS 10.3.x: 10.3.1.0 and below (Status: affected) ### References 1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-014.txt) 2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7040, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7040 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7040 - **State**: PUBLISHED - **Published Date**: January 21, 2020 at 20:03 UTC - **Last Updated**: August 04, 2024 at 09:18 UTC - **Reserved Date**: January 14, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBackup.lock pathname, which allows symlink attacks that possibly lead to privilege escalation. (Local users can also create a plain file named /tmp/storeBackup.lock to block use of storeBackup until an admin manually deletes that file.) ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-7040) 2. [](http://www.openwall.com/lists/oss-security/2020/01/20/3) 3. [[oss-security] CVE-2020-7040: storeBackup: denial of service and symlink attack vector via fixed lockfile path /tmp/storeBackup.lock](https://seclists.org/oss-sec/2020/q1/20) 4. [[oss-security] 20200121 Re: CVE-2020-7040: storeBackup: denial of service and symlink attack vector via fixed lockfile path /tmp/storeBackup.lock](http://www.openwall.com/lists/oss-security/2020/01/21/2) 5. [[oss-security] 20200122 Re: CVE-2020-7040: storeBackup: denial of service and symlink attack vector via fixed lockfile path /tmp/storeBackup.lock](http://www.openwall.com/lists/oss-security/2020/01/22/2) 6. [[oss-security] 20200122 Re: CVE-2020-7040: storeBackup: denial of service and symlink attack vector via fixed lockfile path /tmp/storeBackup.lock](http://www.openwall.com/lists/oss-security/2020/01/22/3) 7. [[oss-security] 20200123 Re: CVE-2020-7040: storeBackup: denial of service and symlink attack vector via fixed lockfile path /tmp/storeBackup.lock](http://www.openwall.com/lists/oss-security/2020/01/23/1) 8. [openSUSE-SU-2020:0119](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00054.html) 9. [[debian-lts-announce] 20200205 [SECURITY] [DLA 2095-1] storebackup security update](https://lists.debian.org/debian-lts-announce/2020/02/msg00003.html) 10. [USN-4508-1](https://usn.ubuntu.com/4508-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2843, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2843 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2843 - **State**: PUBLISHED - **Published Date**: June 06, 2006 at 20:03 UTC - **Last Updated**: August 07, 2024 at 18:06 UTC - **Reserved Date**: June 05, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in Redaxo 2.7.4 allows remote attackers to execute arbitrary PHP code via a URL in the (1) REX[INCLUDE_PATH] parameter in (a) addons/import_export/pages/index.inc.php and (b) pages/community.inc.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1016213](http://securitytracker.com/id?1016213) 2. [ADV-2006-2109](http://www.vupen.com/english/advisories/2006/2109) 3. [20408](http://secunia.com/advisories/20408) 4. [redaxo-rex-file-include(26887)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26887) 5. [18229](http://www.securityfocus.com/bid/18229) 6. [1861](https://www.exploit-db.com/exploits/1861) 7. [20060602 Redaxo CMS <= 3.2 Remote File Include](http://www.securityfocus.com/archive/1/435733/100/0/threaded) 8. [1043](http://securityreason.com/securityalert/1043)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35770, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35770 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35770 - **State**: PUBLISHED - **Published Date**: June 21, 2024 at 13:10 UTC - **Last Updated**: August 02, 2024 at 03:14 UTC - **Reserved Date**: May 17, 2024 at 10:10 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Dave Kiss Vimeography: Vimeo Video Gallery WordPress Plugin.This issue affects Vimeography: Vimeo Video Gallery WordPress Plugin: from n/a through 2.4.1. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Dave Kiss - Vimeography: Vimeo Video Gallery WordPress Plugin** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/vimeography/wordpress-vimeography-plugin-2-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - thiennv (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-5101, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-5101 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-5101 - **State**: PUBLISHED - **Published Date**: September 13, 2011 at 19:00 UTC - **Last Updated**: August 07, 2024 at 07:24 UTC - **Reserved Date**: September 13, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Pentaho BI Server 1.7.0.1062 and earlier includes the session ID (JSESSIONID) in the URL, which allows attackers to obtain it from session history, referer headers, or sniffing of web traffic. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://antisnatchor.com/2009/06/20/pentaho-1701062-multiple-vulnerabilities/) 2. [20091013 [AntiSnatchOr] Pentaho Bi-server multiple vulnerabilities](http://www.securityfocus.com/archive/1/507168/100/0/threaded) 3. [](http://jira.pentaho.com/browse/BISERVER-3245)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1552, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1552 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1552 - **State**: PUBLISHED - **Published Date**: September 01, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:26 UTC - **Reserved Date**: March 04, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Novell eDirectory (eDir) 8.6.2 and Netware 5.1 eDir 85.x allows users with expired passwords to gain inappropriate permissions when logging in from Remote Manager. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20021112 NOVL-2002-2963827 - Remote Manager Security Issue - NW5.1](http://marc.info/?l=bugtraq&m=103712790808781&w=2) 2. [novell-edirectory-expired-accounts(10604)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10604) 3. [20021112 NOVL-2002-2963767 - Remote Manager Security Issue - eDir 8.6.2](http://marc.info/?l=bugtraq&m=103712498905027&w=2) 4. [6163](http://www.securityfocus.com/bid/6163)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0061, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0061 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0061 - **State**: PUBLISHED - **Published Date**: January 03, 2008 at 22:00 UTC - **Last Updated**: August 07, 2024 at 07:32 UTC - **Reserved Date**: January 03, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MaraDNS 1.0 before 1.0.41, 1.2 before 1.2.12.08, and 1.3 before 1.3.07.04 allows remote attackers to cause a denial of service via a crafted DNS packet that prevents an authoritative name (CNAME) record from resolving, aka "improper rotation of resource records." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-0026](http://www.vupen.com/english/advisories/2008/0026) 2. [28334](http://secunia.com/advisories/28334) 3. [28329](http://secunia.com/advisories/28329) 4. [28650](http://secunia.com/advisories/28650) 5. [GLSA-200801-16](http://security.gentoo.org/glsa/glsa-200801-16.xml) 6. [](http://bugs.gentoo.org/show_bug.cgi?id=204351) 7. [DSA-1445](http://www.debian.org/security/2008/dsa-1445) 8. [](http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html) 9. [](http://www.maradns.org/changelog.html) 10. [27124](http://www.securityfocus.com/bid/27124)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0785, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0785 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0785 - **State**: PUBLISHED - **Published Date**: March 12, 2020 at 15:48 UTC - **Last Updated**: August 04, 2024 at 06:11 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks, aka 'Windows User Profile Service Elevation of Privilege Vulnerability'. ### Affected Products **Microsoft - Windows** Affected versions: - 10 Version 1803 for 32-bit Systems (Status: affected) - 10 Version 1803 for x64-based Systems (Status: affected) - 10 Version 1803 for ARM64-based Systems (Status: affected) - 10 Version 1809 for 32-bit Systems (Status: affected) - 10 Version 1809 for x64-based Systems (Status: affected) - 10 Version 1809 for ARM64-based Systems (Status: affected) - 10 Version 1709 for 32-bit Systems (Status: affected) - 10 Version 1709 for x64-based Systems (Status: affected) - 10 Version 1709 for ARM64-based Systems (Status: affected) - 10 for 32-bit Systems (Status: affected) - 10 for x64-based Systems (Status: affected) - 10 Version 1607 for 32-bit Systems (Status: affected) - 10 Version 1607 for x64-based Systems (Status: affected) - 7 for 32-bit Systems Service Pack 1 (Status: affected) - 7 for x64-based Systems Service Pack 1 (Status: affected) - 8.1 for 32-bit systems (Status: affected) - 8.1 for x64-based systems (Status: affected) - RT 8.1 (Status: affected) **Microsoft - Windows Server** Affected versions: - version 1803 (Core Installation) (Status: affected) - 2019 (Status: affected) - 2019 (Core installation) (Status: affected) - 2016 (Status: affected) - 2016 (Core installation) (Status: affected) - 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected) - 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) - 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected) - 2012 (Status: affected) - 2012 (Core installation) (Status: affected) - 2012 R2 (Status: affected) - 2012 R2 (Core installation) (Status: affected) **Microsoft - Windows 10 Version 1909 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1909 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1909 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1909 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0785)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13210, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13210 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13210 - **State**: PUBLISHED - **Published Date**: July 05, 2018 at 02:00 UTC - **Last Updated**: August 05, 2024 at 09:00 UTC - **Reserved Date**: July 04, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The sell function of a smart contract implementation for Providence Crypto Casino (PVE) (Contract Name: ProvidenceCasinoToken), an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/ProvidenceCasinoToken) 2. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/ETHEREUMBLACK/sell%20integer%20overflow.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5799, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5799 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5799 - **State**: PUBLISHED - **Published Date**: December 31, 2008 at 11:00 UTC - **Last Updated**: August 07, 2024 at 11:04 UTC - **Reserved Date**: December 30, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Wir ber uns (fsmi_people) extension 0.0.24 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [wirberuns-unspecified-xss(46471)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46471) 2. [](http://typo3.org/teams/security/security-bulletins/typo3-20081110-2/) 3. [32237](http://www.securityfocus.com/bid/32237)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30088, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30088 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30088 - **State**: PUBLISHED - **Published Date**: June 11, 2024 at 16:59 UTC - **Last Updated**: June 05, 2025 at 01:08 UTC - **Reserved Date**: March 22, 2024 at 23:12 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Kernel Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-367: Security Weakness ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) ### References 1. [Windows Kernel Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30088)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22827, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22827 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22827 - **State**: PUBLISHED - **Published Date**: January 28, 2022 at 19:09 UTC - **Last Updated**: August 03, 2024 at 18:51 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: schneider ### Vulnerability Description A CWE-20: Improper Input Validation vulnerability exists that could cause arbitrary code execution when the user visits a page containing the injected payload. This CVE is unique from CVE-2021-22826. Affected Product: EcoStruxure� Power Monitoring Expert 9.0 and prior versions ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-03)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11315, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11315 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11315 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:45 UTC - **Last Updated**: December 20, 2021 at 22:45 UTC - **Reserved Date**: March 31, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28722, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28722 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28722 - **State**: PUBLISHED - **Published Date**: January 19, 2024 at 20:03 UTC - **Last Updated**: September 12, 2024 at 18:40 UTC - **Reserved Date**: April 13, 2023 at 03:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper buffer restrictions for some Intel NUC BIOS firmware before version IN0048 may allow a privileged user to potentially enable escalation of privilege via local access. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H` ### Weakness Classification (CWE) - CWE-92: Security Weakness ### Affected Products **n/a - Intel NUC BIOS firmware** Affected versions: - before version IN0048 (Status: affected) ### References 1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01009.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01009.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11286, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11286 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11286 - **State**: PUBLISHED - **Published Date**: July 31, 2020 at 19:40 UTC - **Last Updated**: September 16, 2024 at 23:46 UTC - **Reserved Date**: April 18, 2019 at 00:00 UTC - **Assigned By**: pivotal ### Vulnerability Description VMware GemFire versions prior to 9.10.0, 9.9.1, 9.8.5, and 9.7.5, and VMware Tanzu GemFire for VMs versions prior to 1.11.0, 1.10.1, 1.9.2, and 1.8.2, contain a JMX service available to the network which does not properly restrict input. A remote authenticated malicious user may request against the service with a crafted set of credentials leading to remote code execution. ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **VMware Tanzu - VMware GemFire** Affected versions: - 9.7 (Status: affected) - 9.8 (Status: affected) - 9.9 (Status: affected) - 9.10 (Status: affected) **VMware Tanzu - VMware Tanzu GemFire for VMs** Affected versions: - 1.9 (Status: affected) - 1.10 (Status: affected) - 1.8 (Status: affected) - 1.11 (Status: affected) ### References 1. [](https://tanzu.vmware.com/security/cve-2019-11286)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6631, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6631 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6631 - **State**: PUBLISHED - **Published Date**: January 04, 2008 at 00:00 UTC - **Last Updated**: August 07, 2024 at 16:11 UTC - **Reserved Date**: January 03, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple buffer overflows in LScube libnemesi 0.6.4-rc1 and earlier allow remote attackers to execute arbitrary code via (1) a reply that begins with a long version string, which triggers an overflow in handle_rtsp_pkt in rtsp_handlers.c; long headers that trigger overflows in (2) send_pause_request, (3) send_play_request, (4) send_setup_request, or (5) send_teardown_request in rtsp_send.c, as demonstrated by the Content-Base header; or a long Transport header, which triggers an overflow in (6) get_transport_str_sctp, (7) get_transport_str_tcp, or (8) get_transport_str_udp in rtsp_transport.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [42820](http://osvdb.org/42820) 2. [20071227 Multiple vulnerabilities in libnemesi 0.6.4-rc1](http://www.securityfocus.com/archive/1/485575/100/0/threaded) 3. [3513](http://securityreason.com/securityalert/3513) 4. [42822](http://osvdb.org/42822) 5. [ADV-2008-0010](http://www.vupen.com/english/advisories/2008/0010) 6. [27048](http://www.securityfocus.com/bid/27048) 7. [42821](http://osvdb.org/42821) 8. [](http://aluigi.altervista.org/adv/libnemesibof-adv.txt) 9. [](http://aluigi.org/poc/libnemesibof.zip)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20922, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20922 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20922 - **State**: PUBLISHED - **Published Date**: September 30, 2020 at 12:30 UTC - **Last Updated**: August 05, 2024 at 03:00 UTC - **Reserved Date**: September 30, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.npmjs.com/advisories/1300) 2. [](https://snyk.io/vuln/SNYK-JS-HANDLEBARS-480388) 3. [](https://github.com/handlebars-lang/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3751, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3751 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3751 - **State**: PUBLISHED - **Published Date**: July 20, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 18:39 UTC - **Reserved Date**: July 20, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in popups/ImageManager/config.inc.php in the HTMLArea3 Addon Component (com_htmlarea3_xtd-c) for ImageManager 1.5 allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060712 [ECHO_ADV_38$2006] Multiple Mambo/Joomla Component Remote File Include Vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2006-07/0180.html) 2. [1249](http://securityreason.com/securityalert/1249) 3. [](http://advisories.echo.or.id/adv/adv38-matdhule-2006.txt) 4. [2027](https://www.exploit-db.com/exploits/2027) 5. [19047](http://www.securityfocus.com/bid/19047) 6. [imagemanager-configinc-file-include(27721)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27721)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7197, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7197 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7197 - **State**: PUBLISHED - **Published Date**: December 04, 2019 at 16:45 UTC - **Last Updated**: August 04, 2024 at 20:38 UTC - **Reserved Date**: January 29, 2019 at 00:00 UTC - **Assigned By**: qnap ### Vulnerability Description A stored cross-site scripting (XSS) vulnerability has been reported to affect multiple versions of QTS. If exploited, this vulnerability may allow an attacker to inject and execute scripts on the administrator console. To fix this vulnerability, QNAP recommend updating QTS to the latest version. ### Affected Products **n/a - QNAP NAS devices** Affected versions: - QTS 4.4.1: before build 20190918, QTS 4.3.6: before build 20190919, QTS 4.3.4: before build 20190921, QTS 4.3.3: before build 20190921, QTS 4.2.6: before build 20190921 (Status: affected) ### References 1. [](https://www.qnap.com/zh-tw/security-advisory/nas-201911-26)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2586, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2586 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2586 - **State**: PUBLISHED - **Published Date**: March 18, 2024 at 13:53 UTC - **Last Updated**: April 10, 2025 at 20:24 UTC - **Reserved Date**: March 18, 2024 at 11:08 UTC - **Assigned By**: INCIBE ### Vulnerability Description Vulnerability in AMSS++ version 4.31 that allows SQL injection through /amssplus/index.php, in the 'username' parameter. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the DB. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Amssplus - AMSS++** Affected versions: - 4.31 (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss) ### Credits - Rafael Pedrero
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1897, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1897 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1897 - **State**: PUBLISHED - **Published Date**: May 18, 2020 at 21:30 UTC - **Last Updated**: August 04, 2024 at 06:53 UTC - **Reserved Date**: December 02, 2019 at 00:00 UTC - **Assigned By**: facebook ### Vulnerability Description A use-after-free is possible due to an error in lifetime management in the request adaptor when a malicious client invokes request error handling in a specific sequence. This issue affects versions of proxygen prior to v2020.05.18.00. ### Affected Products **Facebook - proxygen** Affected versions: - unspecified (Status: affected) - v2020.05.18.00 (Status: unaffected) ### References 1. [](https://www.facebook.com/security/advisories/cve-2020-1897)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31052 - **State**: PUBLISHED - **Published Date**: June 28, 2022 at 17:10 UTC - **Last Updated**: April 23, 2025 at 18:05 UTC - **Reserved Date**: May 18, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Synapse is an open source home server implementation for the Matrix chat network. In versions prior to 1.61.1 URL previews of some web pages can exhaust the available stack space for the Synapse process due to unbounded recursion. This is sometimes recoverable and leads to an error for the request causing the problem, but in other cases the Synapse process may crash altogether. It is possible to exploit this maliciously, either by malicious users on the homeserver, or by remote users sending URLs that a local user's client may automatically request a URL preview for. Remote users are not able to exploit this directly, because the URL preview endpoint is authenticated. Deployments with `url_preview_enabled: false` set in configuration are not affected. Deployments with `url_preview_enabled: true` set in configuration **are** affected. Deployments with no configuration value set for `url_preview_enabled` are not affected, because the default is `false`. Administrators of homeservers with URL previews enabled are advised to upgrade to v1.61.1 or higher. Users unable to upgrade should set `url_preview_enabled` to false. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-674: Security Weakness ### Affected Products **matrix-org - synapse** Affected versions: - < 1.61.1 (Status: affected) ### References 1. [](https://github.com/matrix-org/synapse/security/advisories/GHSA-22p3-qrh9-cx32) 2. [](https://github.com/matrix-org/synapse/commit/fa1308061802ac7b7d20e954ba7372c5ac292333) 3. [](https://spec.matrix.org/v1.2/client-server-api/#get_matrixmediav3preview_url) 4. [FEDORA-2022-45bf6d4b88](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EARKKJZ2W7WUITFDT4EG4NVATFYJQHF/) 5. [FEDORA-2022-1a2312e4d6](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGSDQ4YAITCUACAB7SXQZDJIU3IQ4CJD/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4499, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4499 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4499 - **State**: PUBLISHED - **Published Date**: February 14, 2014 at 19:00 UTC - **Last Updated**: August 06, 2024 at 16:45 UTC - **Reserved Date**: June 12, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Bean module 7.x-1.x before 7.x-1.5 for Drupal allows remote attackers to inject arbitrary web script or HTML via the bean title. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [drupal-bean-unspecified-xss(88278)](https://exchange.xforce.ibmcloud.com/vulnerabilities/88278) 2. [](https://drupal.org/node/2118873) 3. [](https://drupal.org/node/2118867)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21708, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21708 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21708 - **State**: PUBLISHED - **Published Date**: February 27, 2022 at 08:00 UTC - **Last Updated**: September 17, 2024 at 03:18 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: php ### Vulnerability Description In PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16, and 8.1.x below 8.1.3, when using filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits, if the filter fails, there is a possibility to trigger use of allocated memory after free, which can result it crashes, and potentially in overwrite of other memory chunks and RCE. This issue affects: code that uses FILTER_VALIDATE_FLOAT with min/max limits. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **PHP Group - PHP** Affected versions: - 7.4.x (Status: affected) - 8.0.X (Status: affected) - 8.1.X (Status: affected) ### References 1. [](https://bugs.php.net/bug.php?id=81708) 2. [](https://security.netapp.com/advisory/ntap-20220325-0004/) 3. [GLSA-202209-20](https://security.gentoo.org/glsa/202209-20) ### Credits - dukk at softdev dot online
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16543, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16543 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16543 - **State**: PUBLISHED - **Published Date**: November 21, 2019 at 14:11 UTC - **Last Updated**: August 05, 2024 at 01:17 UTC - **Reserved Date**: September 20, 2019 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins Spira Importer Plugin 3.2.2 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. ### Affected Products **Jenkins project - Jenkins Spira Importer Plugin** Affected versions: - 3.2.2 and earlier (Status: affected) ### References 1. [](https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1554) 2. [[oss-security] 20191121 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/11/21/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-35813, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-35813 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-35813 - **State**: PUBLISHED - **Published Date**: June 17, 2023 at 00:00 UTC - **Last Updated**: December 17, 2024 at 16:20 UTC - **Reserved Date**: June 17, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple Sitecore products allow remote code execution. This affects Experience Manager, Experience Platform, and Experience Commerce through 10.3. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1002979)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29753, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29753 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29753 - **State**: PUBLISHED - **Published Date**: April 05, 2024 at 20:02 UTC - **Last Updated**: March 25, 2025 at 16:05 UTC - **Reserved Date**: March 19, 2024 at 15:05 UTC - **Assigned By**: Google_Devices ### Vulnerability Description In tmu_set_control_temp_step of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2024-04-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7988, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7988 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7988 - **State**: PUBLISHED - **Published Date**: April 25, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 16:19 UTC - **Reserved Date**: April 20, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Joomla! 1.6.0 through 3.6.5 (fixed in 3.7.0), inadequate filtering of form contents allows overwriting the author of an article. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [98022](http://www.securityfocus.com/bid/98022) 2. [](https://developer.joomla.org/security-centre/688-20170406-core-acl-violations)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13328, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13328 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13328 - **State**: PUBLISHED - **Published Date**: September 29, 2020 at 16:09 UTC - **Last Updated**: August 04, 2024 at 12:18 UTC - **Reserved Date**: May 21, 2020 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description An issue has been discovered in GitLab affecting versions prior to 13.1.2, 13.0.8 and 12.10.13. GitLab was vulnerable to a stored XSS by using the PyPi files API. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **GitLab - GitLab** Affected versions: - >=12.0, <12.10.13 (Status: affected) - >=13.0, <13.0.8 (Status: affected) - >=13.1, <13.1.2 (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/215640) 2. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13328.json) ### Credits - Thanks [@vakzz](https://hackerone.com/vakzz) for responsibly reporting this vulnerability to us.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36797 - **State**: PUBLISHED - **Published Date**: February 16, 2023 at 20:00 UTC - **Last Updated**: January 27, 2025 at 18:14 UTC - **Reserved Date**: July 28, 2022 at 03:00 UTC - **Assigned By**: intel ### Vulnerability Description Protection mechanism failure in the Intel(R) Ethernet 500 Series Controller drivers for VMware before version 1.10.0.1 may allow an authenticated user to potentially enable denial of service via local access. ### CVSS Metrics - **CVSS Base Score**: 3.3/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Affected Products **n/a - Intel(R) Ethernet 500 Series Controller drivers for VMware** Affected versions: - before version 1.10.0.1 (Status: affected) ### References 1. [http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00750.html](http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00750.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4201, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4201 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4201 - **State**: PUBLISHED - **Published Date**: November 21, 2012 at 11:00 UTC - **Last Updated**: August 06, 2024 at 20:28 UTC - **Reserved Date**: August 08, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-1638-3](http://www.ubuntu.com/usn/USN-1638-3) 2. [51370](http://secunia.com/advisories/51370) 3. [USN-1638-2](http://www.ubuntu.com/usn/USN-1638-2) 4. [openSUSE-SU-2012:1586](http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html) 5. [USN-1636-1](http://www.ubuntu.com/usn/USN-1636-1) 6. [openSUSE-SU-2013:0175](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html) 7. [RHSA-2012:1483](http://rhn.redhat.com/errata/RHSA-2012-1483.html) 8. [DSA-2584](http://www.debian.org/security/2012/dsa-2584) 9. [RHSA-2012:1482](http://rhn.redhat.com/errata/RHSA-2012-1482.html) 10. [51434](http://secunia.com/advisories/51434) 11. [openSUSE-SU-2012:1583](http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html) 12. [51439](http://secunia.com/advisories/51439) 13. [51440](http://secunia.com/advisories/51440) 14. [USN-1638-1](http://www.ubuntu.com/usn/USN-1638-1) 15. [oval:org.mitre.oval:def:15995](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15995) 16. [](http://www.mozilla.org/security/announce/2012/mfsa2012-93.html) 17. [SUSE-SU-2012:1592](http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html) 18. [51359](http://secunia.com/advisories/51359) 19. [MDVSA-2012:173](http://www.mandriva.com/security/advisories?name=MDVSA-2012:173) 20. [56618](http://www.securityfocus.com/bid/56618) 21. [openSUSE-SU-2012:1585](http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html) 22. [87594](http://osvdb.org/87594) 23. [51381](http://secunia.com/advisories/51381) 24. [DSA-2583](http://www.debian.org/security/2012/dsa-2583) 25. [51369](http://secunia.com/advisories/51369) 26. [firefox-evalinsandbox-sec-bypass(80171)](https://exchange.xforce.ibmcloud.com/vulnerabilities/80171) 27. [51360](http://secunia.com/advisories/51360) 28. [](https://bugzilla.mozilla.org/show_bug.cgi?id=747607) 29. [DSA-2588](http://www.debian.org/security/2012/dsa-2588)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5732, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5732 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5732 - **State**: PUBLISHED - **Published Date**: October 09, 2019 at 14:17 UTC - **Last Updated**: September 16, 2024 at 18:19 UTC - **Reserved Date**: January 17, 2018 at 00:00 UTC - **Assigned By**: isc ### Vulnerability Description Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0 ### Affected Products **ISC - ISC DHCP** Affected versions: - ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0 (Status: affected) ### References 1. [](https://kb.isc.org/docs/aa-01565) ### Credits - ISC would like to thank Felix Wilhelm, Google Security Team, for reporting this vulnerability.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1361, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1361 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1361 - **State**: PUBLISHED - **Published Date**: January 21, 2014 at 18:00 UTC - **Last Updated**: August 06, 2024 at 14:57 UTC - **Reserved Date**: January 14, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Untrusted search path vulnerability in Lenovo Thinkpad Bluetooth with Enhanced Data Rate Software 6.4.0.2900 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse DLL that is located in the same folder as a file that is processed by Lenovo Bluetooth. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [lenovo-bluetooth-code-exec(81428)](https://exchange.xforce.ibmcloud.com/vulnerabilities/81428) 2. [89483](http://www.osvdb.org/89483) 3. [](http://technet.microsoft.com/en-us/security/msvr/msvr13-001) 4. [51846](http://secunia.com/advisories/51846) 5. [57504](http://www.securityfocus.com/bid/57504)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0652, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0652 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0652 - **State**: PUBLISHED - **Published Date**: March 06, 2019 at 00:00 UTC - **Last Updated**: August 04, 2024 at 17:51 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0590, CVE-2019-0591, CVE-2019-0593, CVE-2019-0605, CVE-2019-0607, CVE-2019-0610, CVE-2019-0640, CVE-2019-0642, CVE-2019-0644, CVE-2019-0651, CVE-2019-0655. ### Affected Products **Microsoft - Microsoft Edge** Affected versions: - Windows 10 for 32-bit Systems (Status: affected) - Windows 10 for x64-based Systems (Status: affected) - Windows Server 2016 (Status: affected) - Windows 10 Version 1607 for 32-bit Systems (Status: affected) - Windows 10 Version 1607 for x64-based Systems (Status: affected) - Windows 10 Version 1703 for 32-bit Systems (Status: affected) - Windows 10 Version 1703 for x64-based Systems (Status: affected) - Windows 10 Version 1709 for 32-bit Systems (Status: affected) - Windows 10 Version 1709 for x64-based Systems (Status: affected) - Windows 10 Version 1803 for 32-bit Systems (Status: affected) - Windows 10 Version 1803 for x64-based Systems (Status: affected) - Windows 10 Version 1803 for ARM64-based Systems (Status: affected) - Windows 10 Version 1809 for 32-bit Systems (Status: affected) - Windows 10 Version 1809 for x64-based Systems (Status: affected) - Windows 10 Version 1809 for ARM64-based Systems (Status: affected) - Windows Server 2019 (Status: affected) - Windows 10 Version 1709 for ARM64-based Systems (Status: affected) **Microsoft - ChakraCore** Affected versions: - unspecified (Status: affected) ### References 1. [106903](http://www.securityfocus.com/bid/106903) 2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0652)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5243, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5243 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5243 - **State**: PUBLISHED - **Published Date**: May 23, 2024 at 21:56 UTC - **Last Updated**: August 01, 2024 at 21:03 UTC - **Reserved Date**: May 22, 2024 at 20:59 UTC - **Assigned By**: zdi ### Vulnerability Description TP-Link Omada ER605 Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the handling of DNS names. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22523. ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **TP-Link - Omada ER605** Affected versions: - 2.6_2.2.2 Build 20231017 (Status: affected) ### References 1. [ZDI-24-502](https://www.zerodayinitiative.com/advisories/ZDI-24-502/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-50010, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-50010 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-50010 - **State**: PUBLISHED - **Published Date**: April 19, 2024 at 00:00 UTC - **Last Updated**: June 09, 2025 at 15:22 UTC - **Reserved Date**: December 04, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FFmpeg v.n6.1-3-g466799d4f5 allows a buffer over-read at ff_gradfun_blur_line_movdqa_sse2, as demonstrated by a call to the set_encoder_id function in /fftools/ffmpeg_enc.c component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://ffmpeg.org/) 2. [](https://trac.ffmpeg.org/ticket/10702) 3. [FEDORA-2024-92780a83f9](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/) 4. [FEDORA-2024-55e7e839f1](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/) 5. [FEDORA-2024-3a548f46a8](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/) 6. [](https://github.com/FFmpeg/FFmpeg/commit/e809c23786fe297797198a7b9f5d3392d581daf1) 7. [](https://github.com/FFmpeg/FFmpeg/commit/e4d2666bdc3dbd177a81bbf428654a5f2fa3787a) 8. [](https://git.ffmpeg.org/gitweb/ffmpeg.git/blobdiff/ab0fdaedd1e7224f7e84ea22fcbfaa4ca75a6c06..e4d2666bdc3dbd177a81bbf428654a5f2fa3787a:/libavfilter/vf_gradfun.c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6553, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6553 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6553 - **State**: PUBLISHED - **Published Date**: December 14, 2006 at 18:00 UTC - **Last Updated**: August 07, 2024 at 20:33 UTC - **Reserved Date**: December 14, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in includes/newssuite_constants.php in the NewsSuite 1.03 module for mxBB allows remote attackers to execute arbitrary PHP code via a URL in the mx_root_path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2925](https://www.exploit-db.com/exploits/2925) 2. [mxbbnewssuite-newssuite-file-include(30855)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30855) 3. [21573](http://www.securityfocus.com/bid/21573) 4. [ADV-2006-4981](http://www.vupen.com/english/advisories/2006/4981) 5. [23358](http://secunia.com/advisories/23358)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14084, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14084 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14084 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:43 UTC - **Last Updated**: December 20, 2021 at 22:43 UTC - **Reserved Date**: July 19, 2019 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3433, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3433 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3433 - **State**: PUBLISHED - **Published Date**: June 27, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 14:14 UTC - **Reserved Date**: June 26, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in Pharmacy System 2 and earlier allows remote attackers to execute arbitrary SQL commands via the ID parameter in an add action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [24602](http://www.securityfocus.com/bid/24602) 2. [38224](http://osvdb.org/38224) 3. [pharmacysystem-index-sql-injection(35010)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35010) 4. [ADV-2007-2308](http://www.vupen.com/english/advisories/2007/2308) 5. [4095](https://www.exploit-db.com/exploits/4095)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0922, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0922 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0922 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 04, 2003 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description No description available