System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32238, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32238 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32238 - **State**: PUBLISHED - **Published Date**: June 14, 2022 at 19:17 UTC - **Last Updated**: August 03, 2024 at 07:39 UTC - **Reserved Date**: June 02, 2022 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description When a user opens manipulated Encapsulated Post Script (.eps, ai.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **SAP SE - SAP 3D Visual Enterprise Viewer** Affected versions: - 9.0 (Status: affected) ### References 1. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html) 2. [](https://launchpad.support.sap.com/#/notes/3206271)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14890, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14890 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14890 - **State**: PUBLISHED - **Published Date**: September 21, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 09:46 UTC - **Reserved Date**: August 03, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Vectra Networks Cognito Brain and Sensor before 4.2 contains a cross-site scripting (XSS) vulnerability in the Web Management Console. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://vectra.ai/security-advisories)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0136, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0136 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0136 - **State**: PUBLISHED - **Published Date**: June 01, 2013 at 10:00 UTC - **Last Updated**: September 17, 2024 at 02:48 UTC - **Reserved Date**: December 06, 2012 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Multiple directory traversal vulnerabilities in the EditDocument servlet in the Frontend in Mutiny before 5.0-1.11 allow remote authenticated users to upload and execute arbitrary programs, read arbitrary files, or cause a denial of service (file deletion or renaming) via (1) the uploadPath parameter in an UPLOAD operation; the paths[] parameter in a (2) DELETE, (3) CUT, or (4) COPY operation; or the newPath parameter in a (5) CUT or (6) COPY operation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://community.rapid7.com/community/metasploit/blog/2013/05/15/new-1day-exploits-mutiny-vulnerabilities) 2. [VU#701572](http://www.kb.cert.org/vuls/id/701572)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1405, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1405 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1405 - **State**: PUBLISHED - **Published Date**: November 12, 2019 at 18:53 UTC - **Last Updated**: February 07, 2025 at 15:29 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creation, aka 'Windows UPnP Service Elevation of Privilege Vulnerability'. ### Affected Products **Microsoft - Windows** Affected versions: - 7 for 32-bit Systems Service Pack 1 (Status: affected) - 7 for x64-based Systems Service Pack 1 (Status: affected) - 8.1 for 32-bit systems (Status: affected) - 8.1 for x64-based systems (Status: affected) - RT 8.1 (Status: affected) - 10 for 32-bit Systems (Status: affected) - 10 for x64-based Systems (Status: affected) - 10 Version 1607 for 32-bit Systems (Status: affected) - 10 Version 1607 for x64-based Systems (Status: affected) - 10 Version 1709 for 32-bit Systems (Status: affected) - 10 Version 1709 for x64-based Systems (Status: affected) - 10 Version 1803 for 32-bit Systems (Status: affected) - 10 Version 1803 for x64-based Systems (Status: affected) - 10 Version 1803 for ARM64-based Systems (Status: affected) - 10 Version 1809 for 32-bit Systems (Status: affected) - 10 Version 1809 for x64-based Systems (Status: affected) - 10 Version 1809 for ARM64-based Systems (Status: affected) - 10 Version 1709 for ARM64-based Systems (Status: affected) **Microsoft - Windows Server** Affected versions: - 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected) - 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected) - 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) - 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected) - 2012 (Status: affected) - 2012 (Core installation) (Status: affected) - 2012 R2 (Status: affected) - 2012 R2 (Core installation) (Status: affected) - 2016 (Status: affected) - 2016 (Core installation) (Status: affected) - version 1803 (Core Installation) (Status: affected) - 2019 (Status: affected) - 2019 (Core installation) (Status: affected) - 2008 for Itanium-Based Systems Service Pack 2 (Status: affected) - 2008 for 32-bit Systems Service Pack 2 (Status: affected) - 2008 for x64-based Systems Service Pack 2 (Status: affected) - 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1405) 2. [](http://packetstormsecurity.com/files/155723/Microsoft-UPnP-Local-Privilege-Elevation.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4014, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4014 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4014 - **State**: PUBLISHED - **Published Date**: April 20, 2024 at 09:38 UTC - **Last Updated**: August 01, 2024 at 20:26 UTC - **Reserved Date**: April 19, 2024 at 20:04 UTC - **Assigned By**: Wordfence ### Vulnerability Description The hCaptcha for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's cf7-hcaptcha shortcode in all versions up to, and including, 4.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **hcaptcha - hCaptcha for WordPress** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5ce70e87-6dee-4d4a-b2fc-93fd4d50957d?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3072795/hcaptcha-for-forms-and-more/tags/4.0.1/src/php/CF7/CF7.php) ### Credits - haidv35
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5056, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5056 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5056 - **State**: PUBLISHED - **Published Date**: June 04, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 20:50 UTC - **Reserved Date**: September 21, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in ownCloud Server before 4.0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) readyCallback parameter to apps/files_odfviewer/src/webodf/webodf/flashput/PUT.swf, the (2) root parameter to apps/gallery/templates/index.php, or a (3) malformed query to lib/db.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://owncloud.org/about/security/advisories/CVE-2012-5056/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4565, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4565 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4565 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:42 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1174, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1174 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1174 - **State**: PUBLISHED - **Published Date**: February 11, 2025 at 05:00 UTC - **Last Updated**: February 11, 2025 at 15:17 UTC - **Reserved Date**: February 10, 2025 at 09:22 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in 1000 Projects Bookstore Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file process_book_add.php of the component Add Book Page. The manipulation of the argument Book Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. ### CVSS Metrics - **CVSS Base Score**: 2.4/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-94: Code Injection ### Affected Products **1000 Projects - Bookstore Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-295078 | 1000 Projects Bookstore Management System Add Book Page process_book_add.php cross site scripting](https://vuldb.com/?id.295078) 2. [VDB-295078 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.295078) 3. [Submit #495318 | 1000 Projects Bookstore Management System 1.0 Cross Site Scripting](https://vuldb.com/?submit.495318) 4. [](https://github.com/NeoVuln/CVE/issues/3) 5. [](https://1000projects.org/) ### Credits - Neo-O (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-29575, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-29575 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-29575 - **State**: PUBLISHED - **Published Date**: April 21, 2023 at 00:00 UTC - **Last Updated**: February 04, 2025 at 21:27 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42aac component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/axiomatic-systems/Bento4/issues/842) 2. [](https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42aac/readme.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1817, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1817 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1817 - **State**: PUBLISHED - **Published Date**: June 28, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:43 UTC - **Reserved Date**: June 29, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unknown vulnerability in Veritas Cluster Server (VCS) 1.2 for WindowsNT, Cluster Server 1.3.0 for Solaris, and Cluster Server 1.3.1 for HP-UX allows attackers to gain privileges via unknown attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [vcs-unauth-root-access(10082)](http://www.iss.net/security_center/static/10082.php) 2. [5688](http://www.securityfocus.com/bid/5688) 3. [1005204](http://securitytracker.com/id?1005204) 4. [](http://seer.support.veritas.com/docs/238143.htm)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2506, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2506 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2506 - **State**: PUBLISHED - **Published Date**: May 22, 2006 at 19:00 UTC - **Last Updated**: August 07, 2024 at 17:51 UTC - **Reserved Date**: May 22, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in search.php in Sphider allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO and (2) the category parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060516 Sphider Multiple Xss Vulnerabilities](http://www.securityfocus.com/archive/1/434119/100/0/threaded) 2. [25573](http://www.osvdb.org/25573) 3. [sphider-search-xss(26482)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26482) 4. [ADV-2006-1845](http://www.vupen.com/english/advisories/2006/1845) 5. [](http://soot.shabgard.org/bugs/Sphider.txt) 6. [17997](http://www.securityfocus.com/bid/17997) 7. [930](http://securityreason.com/securityalert/930)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6029, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6029 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6029 - **State**: PUBLISHED - **Published Date**: April 30, 2025 at 20:00 UTC - **Last Updated**: April 30, 2025 at 20:13 UTC - **Reserved Date**: June 14, 2024 at 23:39 UTC - **Assigned By**: zdi ### Vulnerability Description Tesla Model S Iris Modem Race Condition Firewall Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass the firewall on the Iris modem in affected Tesla Model S vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firewall service. The issue results from a failure to obtain the xtables lock. An attacker can leverage this vulnerability to bypass firewall rules. Was ZDI-CAN-23197. ### Weakness Classification (CWE) - CWE-367: Security Weakness ### Affected Products **Tesla - Model S** Affected versions: - 2023.44.29 with the AG525RGLAAR01A16M4G_OCPU_02.003.10.003 connectivity card (Status: affected) ### References 1. [ZDI-25-260](https://www.zerodayinitiative.com/advisories/ZDI-25-260/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6558, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6558 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6558 - **State**: PUBLISHED - **Published Date**: August 23, 2018 at 20:00 UTC - **Last Updated**: September 17, 2024 at 02:06 UTC - **Reserved Date**: February 02, 2018 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description The pam_fscrypt module in fscrypt before 0.2.4 may incorrectly restore primary and supplementary group IDs to the values associated with the root user, which allows attackers to gain privileges via a successful login through certain applications that use Linux-PAM (aka pam). ### Affected Products **The fscrypt Project - fscrypt** Affected versions: - before 0.2.4 (Status: affected) ### References 1. [](https://github.com/google/fscrypt/issues/77) 2. [](https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b) 3. [](https://github.com/google/fscrypt/commit/315f9b042237200174a1fb99427f74027e191d66) 4. [](https://launchpad.net/bugs/1787548)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3149, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3149 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3149 - **State**: PUBLISHED - **Published Date**: April 03, 2025 at 07:31 UTC - **Last Updated**: April 03, 2025 at 13:26 UTC - **Reserved Date**: April 02, 2025 at 20:48 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in itning Student Homework Management System up to 1.2.7. It has been classified as problematic. Affected is an unknown function of the file /shw_war/fileupload of the component Edit Job Page. The manipulation of the argument Course leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. ### CVSS Metrics - **CVSS Base Score**: 2.4/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-94: Code Injection ### Affected Products **itning - Student Homework Management System** Affected versions: - 1.2.0 (Status: affected) - 1.2.1 (Status: affected) - 1.2.2 (Status: affected) - 1.2.3 (Status: affected) - 1.2.4 (Status: affected) - 1.2.5 (Status: affected) - 1.2.6 (Status: affected) - 1.2.7 (Status: affected) ### References 1. [VDB-303054 | itning Student Homework Management System Edit Job Page fileupload cross site scripting](https://vuldb.com/?id.303054) 2. [VDB-303054 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.303054) 3. [Submit #525403 | itning Student-Homework-Management-System null Cross Site Scripting](https://vuldb.com/?submit.525403) 4. [](https://gitee.com/nwtmd5/cve/issues/IBVLXL) ### Credits - TTTlw1024 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2793, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2793 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2793 - **State**: PUBLISHED - **Published Date**: September 10, 2012 at 22:00 UTC - **Last Updated**: August 06, 2024 at 19:42 UTC - **Reserved Date**: May 19, 2012 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Unspecified vulnerability in the lag_decode_zero_run_line function in libavcodec/lagarith.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors related to "too many zeros." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?](http://www.openwall.com/lists/oss-security/2012/09/02/4) 2. [](http://libav.org/releases/libav-0.8.4.changelog) 3. [](http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=83c7803f55b3231faeb93c1a634399a70fae9480) 4. [55355](http://www.securityfocus.com/bid/55355) 5. [MDVSA-2013:079](http://www.mandriva.com/security/advisories?name=MDVSA-2013:079) 6. [[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?](http://www.openwall.com/lists/oss-security/2012/08/31/3) 7. [](http://ffmpeg.org/security.html) 8. [](http://libav.org/releases/libav-0.7.7.changelog) 9. [50468](http://secunia.com/advisories/50468) 10. [51257](http://secunia.com/advisories/51257)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15729, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15729 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15729 - **State**: PUBLISHED - **Published Date**: September 17, 2019 at 14:34 UTC - **Last Updated**: August 05, 2024 at 00:56 UTC - **Reserved Date**: August 28, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in GitLab Community and Enterprise Edition 8.18 through 12.2.1. An internal endpoint unintentionally disclosed information about the last pipeline that ran for a merge request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab-ce/issues/62073) 2. [](https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30205, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30205 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30205 - **State**: PUBLISHED - **Published Date**: July 12, 2022 at 22:37 UTC - **Last Updated**: January 02, 2025 at 19:24 UTC - **Reserved Date**: May 03, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Group Policy Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 6.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 21H1** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Group Policy Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30205)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21145, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21145 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21145 - **State**: PUBLISHED - **Published Date**: July 12, 2023 at 23:18 UTC - **Last Updated**: November 06, 2024 at 16:46 UTC - **Reserved Date**: November 03, 2022 at 22:37 UTC - **Assigned By**: google_android ### Vulnerability Description In updatePictureInPictureMode of ActivityRecord.java, there is a possible bypass of background launch restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - 13 (Status: affected) - 12L (Status: affected) - 12 (Status: affected) - 11 (Status: affected) ### References 1. [](https://android.googlesource.com/platform/frameworks/base/+/44aeef1b82ecf21187d4903c9e3666a118bdeaf3) 2. [](https://source.android.com/security/bulletin/2023-07-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-46349, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-46349 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-46349 - **State**: PUBLISHED - **Published Date**: April 29, 2025 at 17:11 UTC - **Last Updated**: April 29, 2025 at 18:01 UTC - **Reserved Date**: April 22, 2025 at 22:41 UTC - **Assigned By**: GitHub_M ### Vulnerability Description YesWiki is a wiki system written in PHP. Prior to version 4.5.4, YesWiki is vulnerable to reflected XSS in the file upload form. This vulnerability allows any malicious unauthenticated user to create a link that can be clicked on by the victim to perform arbitrary actions. This issue has been patched in version 4.5.4. ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **YesWiki - yeswiki** Affected versions: - < 4.5.4 (Status: affected) ### References 1. [https://github.com/YesWiki/yeswiki/security/advisories/GHSA-2f8p-qqx2-gwr2](https://github.com/YesWiki/yeswiki/security/advisories/GHSA-2f8p-qqx2-gwr2) 2. [https://github.com/YesWiki/yeswiki/pull/1264/commits/6edde40eb7eeb5d60619ac4d1e0a0422d92e9524](https://github.com/YesWiki/yeswiki/pull/1264/commits/6edde40eb7eeb5d60619ac4d1e0a0422d92e9524)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27939, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27939 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27939 - **State**: PUBLISHED - **Published Date**: March 26, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 05:41 UTC - **Reserved Date**: March 26, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description tcprewrite in Tcpreplay 4.4.1 has a reachable assertion in get_layer4_v6 in common/get.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/appneta/tcpreplay/issues/717) 2. [FEDORA-2022-680ea95f71](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECRCFJ6X3IVB7BT4KS6AHQMSL532YXYD/) 3. [FEDORA-2022-47484afa15](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5B75AFRJUGOYHCFG2ZV2JKSUPA6MSCT5/) 4. [FEDORA-2022-d31a521866](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWRZO7BG6DHA5NAC3COB45WFXLYRIERC/) 5. [GLSA-202210-08](https://security.gentoo.org/glsa/202210-08)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45305, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45305 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45305 - **State**: PUBLISHED - **Published Date**: November 29, 2022 at 00:00 UTC - **Last Updated**: April 25, 2025 at 14:32 UTC - **Reserved Date**: November 14, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Insecure permissions in Chocolatey Python3 package v3.11.0 and below grants all users in the Authenticated Users group write privileges for the subfolder C:\Python311 and all files located in that folder. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ycdxsb/Vuln/blob/main/python3-weak-permission-vuln/python3-weak-permission-vuln.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-5003, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-5003 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-5003 - **State**: PUBLISHED - **Published Date**: December 25, 2011 at 01:00 UTC - **Last Updated**: August 07, 2024 at 00:23 UTC - **Reserved Date**: December 24, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in the Phonetic Indexer (AvidPhoneticIndexer.exe) in Avid Media Composer 5.5.3 and earlier allows remote attackers to execute arbitrary code via a long request to TCP port 4659. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [18183](http://www.exploit-db.com/exploits/18183) 2. [77376](http://www.osvdb.org/77376) 3. [50843](http://www.securityfocus.com/bid/50843) 4. [avidmedia-avidphoneticindexer-bo(71514)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71514) 5. [47047](http://secunia.com/advisories/47047) 6. [](http://www.security-assessment.com/files/documents/advisory/Avid_Media_Composer-Phonetic_Indexer-Remote_Stack_Buffer_Overflow.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10106, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10106 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10106 - **State**: PUBLISHED - **Published Date**: January 03, 2017 at 06:34 UTC - **Last Updated**: August 06, 2024 at 03:07 UTC - **Reserved Date**: January 03, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in scgi-bin/platform.cgi on NETGEAR FVS336Gv3, FVS318N, FVS318Gv2, and SRX5308 devices with firmware before 4.3.3-8 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the thispage parameter, as demonstrated by reading the /etc/shadow file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://kb.netgear.com/30739/Path-Traversal-Attack-Security-Vulnerability) 2. [95204](http://www.securityfocus.com/bid/95204) 3. [1037548](http://www.securitytracker.com/id/1037548) 4. [](https://twitter.com/mantislesin/status/816618162770821120)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0163, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0163 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0163 - **State**: PUBLISHED - **Published Date**: March 22, 2010 at 17:23 UTC - **Last Updated**: August 07, 2024 at 00:37 UTC - **Reserved Date**: January 06, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Mozilla Thunderbird before 2.0.0.24 and SeaMonkey before 1.1.19 process e-mail attachments with a parser that performs casts and line termination incorrectly, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted message, related to message indexing. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [39001](http://secunia.com/advisories/39001) 2. [ADV-2010-0648](http://www.vupen.com/english/advisories/2010/0648) 3. [oval:org.mitre.oval:def:14259](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14259) 4. [RHSA-2010:0499](http://www.redhat.com/support/errata/RHSA-2010-0499.html) 5. [](https://bugzilla.mozilla.org/show_bug.cgi?id=505221) 6. [ADV-2010-1556](http://www.vupen.com/english/advisories/2010/1556) 7. [SUSE-SR:2010:013](http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html) 8. [38977](http://secunia.com/advisories/38977) 9. [thunderbird-messages-dos(56993)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56993) 10. [38831](http://www.securityfocus.com/bid/38831) 11. [USN-915-1](http://www.ubuntu.com/usn/USN-915-1) 12. [oval:org.mitre.oval:def:10805](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10805) 13. [](http://www.mozilla.org/security/announce/2010/mfsa2010-07.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26948, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26948 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26948 - **State**: PUBLISHED - **Published Date**: February 25, 2025 at 14:17 UTC - **Last Updated**: February 25, 2025 at 17:16 UTC - **Reserved Date**: February 17, 2025 at 11:51 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in NotFound Pie Register Premium. This issue affects Pie Register Premium: from n/a through 3.8.3.2. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **NotFound - Pie Register Premium** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/pie-register-premium/vulnerability/wordpress-pie-register-premium-plugin-3-8-3-2-broken-access-control-vulnerability?_s_id=cve) ### Credits - Ananda Dhakal (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14947, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14947 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14947 - **State**: PUBLISHED - **Published Date**: September 29, 2017 at 20:00 UTC - **Last Updated**: September 16, 2024 at 19:51 UTC - **Reserved Date**: September 29, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Artifex GSView 6.0 Beta on Windows allows attackers to execute arbitrary code or cause a denial of service via a crafted .xps file, related to a "Read Access Violation on Block Data Move starting at mupdfnet64!mIncrementalSaveFile+0x0000000000193359." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.ghostscript.com/show_bug.cgi?id=698551)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47338, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47338 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47338 - **State**: PUBLISHED - **Published Date**: April 11, 2023 at 11:09 UTC - **Last Updated**: February 10, 2025 at 17:25 UTC - **Reserved Date**: December 13, 2022 at 05:23 UTC - **Assigned By**: Unisoc ### Vulnerability Description In telecom service, there is a missing permission check. This could lead to local denial of service in telecom service. ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000** Affected versions: - Android10/Android11 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1645429273135218690)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-20134, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-20134 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-20134 - **State**: PUBLISHED - **Published Date**: December 02, 2024 at 03:07 UTC - **Last Updated**: December 03, 2024 at 04:55 UTC - **Reserved Date**: November 02, 2023 at 13:35 UTC - **Assigned By**: MediaTek ### Vulnerability Description In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09154589; Issue ID: MSV-1866. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **MediaTek, Inc. - MT6835, MT6878, MT6879, MT6895, MT6896, MT6897, MT6983, MT6985, MT6989, MT8755, MT8775, MT8796, MT8798** Affected versions: - Android 13.0, 14.0, 15.0 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/December-2024)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2553, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2553 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2553 - **State**: PUBLISHED - **Published Date**: August 12, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:30 UTC - **Reserved Date**: August 12, 2005 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The find_target function in ptrace32.c in the Linux kernel 2.4.x before 2.4.29 does not properly handle a NULL return value from another function, which allows local users to cause a denial of service (kernel crash/oops) by running a 32-bit ltrace program with the -i option on a 64-bit executable program. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19038](http://secunia.com/advisories/19038) 2. [18977](http://secunia.com/advisories/18977) 3. [18059](http://secunia.com/advisories/18059) 4. [FLSA:157459-2](http://www.securityfocus.com/archive/1/428058/100/0/threaded) 5. [MDKSA-2006:044](http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044) 6. [](http://lkml.org/lkml/2005/1/5/245) 7. [SUSE-SA:2006:012](http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html) 8. [DSA-921](http://www.debian.org/security/2005/dsa-921) 9. [17002](http://secunia.com/advisories/17002) 10. [14965](http://www.securityfocus.com/bid/14965) 11. [RHSA-2005:663](http://www.redhat.com/support/errata/RHSA-2005-663.html) 12. [ADV-2005-1878](http://www.vupen.com/english/advisories/2005/1878) 13. [](http://linux.bkbits.net:8080/linux-2.4/cset%4041dd3455GwQPufrGvBJjcUOXQa3WXA) 14. [oval:org.mitre.oval:def:9647](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9647)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-9035, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-9035 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-9035 - **State**: PUBLISHED - **Published Date**: February 23, 2019 at 12:00 UTC - **Last Updated**: August 04, 2024 at 21:38 UTC - **Reserved Date**: February 23, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is a stack-based buffer over-read in the function ReadNextStructField() in mat5.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/tbeu/matio/issues/103) 2. [](https://github.com/TeamSeri0us/pocs/tree/master/matio)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25904, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25904 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25904 - **State**: PUBLISHED - **Published Date**: December 21, 2022 at 01:21 UTC - **Last Updated**: April 16, 2025 at 14:42 UTC - **Reserved Date**: February 24, 2022 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description All versions of package safe-eval are vulnerable to Prototype Pollution which allows an attacker to add or modify properties of the Object.prototype.Consolidate when using the function safeEval. This is because the function uses vm variable, leading an attacker to modify properties of the Object.prototype. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P` ### Affected Products **n/a - safe-eval** Affected versions: - 0 (Status: affected) ### References 1. [](https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3175701) 2. [](https://github.com/hacksparrow/safe-eval/issues/26) ### Credits - Yuhan Gao
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40456, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40456 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40456 - **State**: PUBLISHED - **Published Date**: September 26, 2023 at 20:12 UTC - **Last Updated**: February 13, 2025 at 17:08 UTC - **Reserved Date**: August 14, 2023 at 20:56 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10. An app may be able to access edited photos saved to a temporary directory. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213938) 2. [](https://support.apple.com/en-us/HT213936) 3. [](https://support.apple.com/en-us/HT213937) 4. [](http://seclists.org/fulldisclosure/2023/Oct/10) 5. [](http://seclists.org/fulldisclosure/2023/Oct/8) 6. [](http://seclists.org/fulldisclosure/2023/Oct/9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33689, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33689 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33689 - **State**: PUBLISHED - **Published Date**: July 14, 2021 at 11:04 UTC - **Last Updated**: August 03, 2024 at 23:58 UTC - **Reserved Date**: May 28, 2021 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description When user with insufficient privileges tries to access any application in SAP NetWeaver Administrator (Administrator applications), version - 7.50, no security audit log is created. Therefore, security audit log Integrity is impacted. ### Weakness Classification (CWE) - CWE-778: Security Weakness ### Affected Products **SAP SE - SAP NetWeaver AS JAVA (Administrator applications)** Affected versions: - < 7.50 (Status: affected) ### References 1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506) 2. [](https://launchpad.support.sap.com/#/notes/3038594)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10582, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10582 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10582 - **State**: PUBLISHED - **Published Date**: November 15, 2024 at 05:30 UTC - **Last Updated**: November 15, 2024 at 18:09 UTC - **Reserved Date**: October 31, 2024 at 13:10 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Music Player for Elementor – Audio Player & Podcast Player plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the import_mpfe_template() function in all versions up to, and including, 2.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import templates. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **smartwpress - Music Player for Elementor – Audio Player & Podcast Player** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1f66cdcf-cbe5-43e0-ad18-c2b9c4491ed4?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3186359%40music-player-for-elementor%2Ftrunk&old=3174807%40music-player-for-elementor%2Ftrunk&sfp_email=&sfph_mail=) ### Credits - Tieu Pham Trong Nhan - tptNhan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27992, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27992 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27992 - **State**: PUBLISHED - **Published Date**: June 19, 2023 at 11:42 UTC - **Last Updated**: January 27, 2025 at 22:16 UTC - **Reserved Date**: March 09, 2023 at 08:44 UTC - **Assigned By**: Zyxel ### Vulnerability Description The pre-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior to V5.21(AAZF.14)C0, NAS540 firmware versions prior to V5.21(AATB.11)C0, and NAS542 firmware versions prior to V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands remotely by sending a crafted HTTP request. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Zyxel - NAS326 firmware** Affected versions: - < V5.21(AAZF.14)C0 (Status: affected) **Zyxel - NAS540 firmware** Affected versions: - < V5.21(AATB.11)C0 (Status: affected) **Zyxel - NAS542 firmware** Affected versions: - < V5.21(ABAG.11)C0 (Status: affected) ### References 1. [](https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-pre-authentication-command-injection-vulnerability-in-nas-products)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15655, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15655 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15655 - **State**: PUBLISHED - **Published Date**: January 31, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 19:57 UTC - **Reserved Date**: October 19, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple buffer overflow vulnerabilities exist in the HTTPd server in Asus asuswrt version <=3.0.0.4.376.X. All have been fixed in version 3.0.0.4.378, but this vulnerability was not previously disclosed. Some end-of-life routers have this version as the newest and thus are vulnerable at this time. This vulnerability allows for RCE with administrator rights when the administrator visits several pages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://sploit.tech/2018/01/16/ASUS-part-I.html) 2. [20180116 Multiple vulnerabilities in all versions of ASUS routers](http://seclists.org/fulldisclosure/2018/Jan/63) 3. [](http://packetstormsecurity.com/files/145921/ASUSWRT-3.0.0.4.382.18495-Session-Hijacking-Information-Disclosure.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0750, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0750 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0750 - **State**: PUBLISHED - **Published Date**: March 09, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:30 UTC - **Reserved Date**: October 12, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cisco IOS 12.1(2)T, 12.1(3)T allow remote attackers to cause a denial of service (reload) via a connection to TCP ports 3100-3999, 5100-5999, 7100-7999 and 10100-10999. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [cisco-ios-tcp-dos(6589)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6589) 2. [20010524 IOS Reload after Scanning Vulnerability](http://www.cisco.com/warp/public/707/ios-tcp-scanner-reload-pub.shtml) 3. [800](http://www.osvdb.org/800) 4. [2804](http://www.securityfocus.com/bid/2804)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1587, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1587 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1587 - **State**: PUBLISHED - **Published Date**: April 19, 2023 at 18:39 UTC - **Last Updated**: February 05, 2025 at 16:15 UTC - **Reserved Date**: March 22, 2023 at 22:17 UTC - **Assigned By**: NLOK ### Vulnerability Description Avast and AVG Antivirus for Windows were susceptible to a NULL pointer dereference issue via RPC-interface. The issue was fixed with Avast and AVG Antivirus version 22.11 ### CVSS Metrics - **CVSS Base Score**: 5.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **AVAST - Avast Antivirus** Affected versions: - 22.5 (Status: affected) **AVG - AVG Antivirus** Affected versions: - 22.5 (Status: affected) ### References 1. [](https://support.norton.com/sp/static/external/tools/security-advisories.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36171, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36171 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36171 - **State**: PUBLISHED - **Published Date**: March 01, 2022 at 18:05 UTC - **Last Updated**: October 25, 2024 at 13:35 UTC - **Reserved Date**: July 06, 2021 at 00:00 UTC - **Assigned By**: fortinet ### Vulnerability Description The use of a cryptographically weak pseudo-random number generator in the password reset feature of FortiPortal before 6.0.6 may allow a remote unauthenticated attacker to predict parts of or the whole newly generated password within a given time frame. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C` ### Affected Products **Fortinet - Fortinet FortiPortal** Affected versions: - FortiPortal before 6.0.6 (Status: affected) ### References 1. [](https://fortiguard.com/psirt/FG-IR-21-099)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7498, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7498 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7498 - **State**: PUBLISHED - **Published Date**: October 20, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:47 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Space Cinema (aka it.thespacecinema.android) application 2.0.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#148393](http://www.kb.cert.org/vuls/id/148393) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12190, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12190 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12190 - **State**: PUBLISHED - **Published Date**: November 22, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 18:28 UTC - **Reserved Date**: August 01, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition. ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **n/a - Linux kernel through v4.14-rc5** Affected versions: - Linux kernel through v4.14-rc5 (Status: affected) ### References 1. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058) 2. [101911](http://www.securityfocus.com/bid/101911) 3. [[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update](https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html) 4. [USN-3583-2](https://usn.ubuntu.com/3583-2/) 5. [RHSA-2018:1854](https://access.redhat.com/errata/RHSA-2018:1854) 6. [USN-3582-1](https://usn.ubuntu.com/3582-1/) 7. [](http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8) 8. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95d78c28b5a85bacbc29b8dba7c04babb9b0d467) 9. [RHSA-2018:1062](https://access.redhat.com/errata/RHSA-2018:1062) 10. [](https://github.com/torvalds/linux/commit/95d78c28b5a85bacbc29b8dba7c04babb9b0d467) 11. [RHSA-2018:0654](https://access.redhat.com/errata/RHSA-2018:0654) 12. [USN-3583-1](https://usn.ubuntu.com/3583-1/) 13. [](https://bugzilla.redhat.com/show_bug.cgi?id=1495089) 14. [](https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058) 15. [](http://seclists.org/oss-sec/2017/q4/52) 16. [RHSA-2018:0676](https://access.redhat.com/errata/RHSA-2018:0676) 17. [USN-3582-2](https://usn.ubuntu.com/3582-2/) 18. [RHSA-2019:1170](https://access.redhat.com/errata/RHSA-2019:1170) 19. [RHSA-2019:1190](https://access.redhat.com/errata/RHSA-2019:1190) 20. [](https://support.f5.com/csp/article/K93472064?utm_source=f5support&amp%3Butm_medium=RSS)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8738, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8738 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8738 - **State**: PUBLISHED - **Published Date**: September 13, 2017 at 01:00 UTC - **Last Updated**: September 16, 2024 at 18:49 UTC - **Reserved Date**: May 03, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764. ### Affected Products **Microsoft Corporation - Microsoft Edge** Affected versions: - Microsoft Windows 10 Gold, 1511, 1607, and Windows Server 2016. (Status: affected) ### References 1. [1039342](http://www.securitytracker.com/id/1039342) 2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8738) 3. [100759](http://www.securityfocus.com/bid/100759)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-47393, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-47393 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-47393 - **State**: PUBLISHED - **Published Date**: November 22, 2023 at 00:00 UTC - **Last Updated**: September 04, 2024 at 18:42 UTC - **Reserved Date**: November 06, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An access control issue in Mercedes me IOS APP v1.34.0 and below allows attackers to view the maintenance orders of other users and access sensitive user information via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/wwwziziyu/7dbf7fd43f9e304ce0819f8a9784d2c6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4989, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4989 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4989 - **State**: PUBLISHED - **Published Date**: November 01, 2011 at 22:00 UTC - **Last Updated**: August 07, 2024 at 04:09 UTC - **Reserved Date**: November 01, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in main.asp in Ziggurat Farsi CMS allows remote attackers to execute arbitrary SQL commands via the grp parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ziggurat-main-sql-inection(60065)](https://exchange.xforce.ibmcloud.com/vulnerabilities/60065) 2. [14192](http://www.exploit-db.com/exploits/14192) 3. [ADV-2010-1688](http://www.vupen.com/english/advisories/2010/1688)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39927, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39927 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39927 - **State**: REJECTED - **Last Updated**: December 15, 2022 at 00:00 UTC - **Reserved Date**: September 05, 2022 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7200, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7200 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7200 - **State**: PUBLISHED - **Published Date**: November 05, 2015 at 02:00 UTC - **Last Updated**: August 06, 2024 at 07:43 UTC - **Reserved Date**: September 16, 2015 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description The CryptoKey interface implementation in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lacks status checking, which allows attackers to have an unspecified impact via vectors related to a cryptographic key. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1034069](http://www.securitytracker.com/id/1034069) 2. [DSA-3410](http://www.debian.org/security/2015/dsa-3410) 3. [SUSE-SU-2015:2081](http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html) 4. [GLSA-201512-10](https://security.gentoo.org/glsa/201512-10) 5. [77411](http://www.securityfocus.com/bid/77411) 6. [SUSE-SU-2015:1981](http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html) 7. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1204155) 8. [openSUSE-SU-2015:2229](http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html) 9. [RHSA-2015:2519](http://rhn.redhat.com/errata/RHSA-2015-2519.html) 10. [USN-2785-1](http://www.ubuntu.com/usn/USN-2785-1) 11. [SUSE-SU-2015:1926](http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html) 12. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html) 13. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html) 14. [RHSA-2015:1982](http://rhn.redhat.com/errata/RHSA-2015-1982.html) 15. [USN-2819-1](http://www.ubuntu.com/usn/USN-2819-1) 16. [](http://www.mozilla.org/security/announce/2015/mfsa2015-131.html) 17. [openSUSE-SU-2015:1942](http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html) 18. [DSA-3393](http://www.debian.org/security/2015/dsa-3393) 19. [openSUSE-SU-2015:2245](http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html) 20. [SUSE-SU-2015:1978](http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3322, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3322 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3322 - **State**: PUBLISHED - **Published Date**: October 28, 2022 at 09:25 UTC - **Last Updated**: May 05, 2025 at 20:15 UTC - **Reserved Date**: September 26, 2022 at 16:41 UTC - **Assigned By**: cloudflare ### Vulnerability Description Lock Warp switch is a feature of Zero Trust platform which, when enabled, prevents users of enrolled devices from disabling WARP client. Due to insufficient policy verification by WARP iOS client, this feature could be bypassed by using the "Disable WARP" quick action. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Cloudflare - WARP** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/cloudflare/advisories/security/advisories/GHSA-76pg-rp9h-wmcj) ### Credits - Josh (joshmotionfans)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2360, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2360 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2360 - **State**: PUBLISHED - **Published Date**: July 24, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 10:14 UTC - **Reserved Date**: March 13, 2014 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [68797](http://www.securityfocus.com/bid/68797) 2. [](http://ics-cert.us-cert.gov/advisories/ICSA-14-202-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17668, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17668 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17668 - **State**: PUBLISHED - **Published Date**: March 20, 2018 at 14:00 UTC - **Last Updated**: August 05, 2024 at 20:59 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Memory write mechanism in NCR S1 Dispenser controller before firmware version 0x0156 allows an unauthenticated user to upgrade or downgrade the firmware of the device, including to older versions with known vulnerabilities. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.ncr.com/sites/default/files/ncr_security_alert_-_2018-04_v3.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6242, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6242 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6242 - **State**: PUBLISHED - **Published Date**: January 11, 2024 at 14:32 UTC - **Last Updated**: June 03, 2025 at 14:07 UTC - **Reserved Date**: November 21, 2023 at 14:06 UTC - **Assigned By**: Wordfence ### Vulnerability Description The EventON - WordPress Virtual Event Calendar Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.5.4 (for Pro) & 2.2.7 (for Free). This is due to missing or incorrect nonce validation on the evo_eventpost_update_meta function. This makes it possible for unauthenticated attackers to update arbitrary post metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N` ### Affected Products **ashanjay - EventON** Affected versions: - * (Status: affected) **EventON - EventON Pro** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c8e9a333-a6b7-4b5e-93c1-b95566e5d6fb?source=cve) 2. [](https://docs.myeventon.com/documentations/eventon-changelog/) 3. [](https://plugins.trac.wordpress.org/changeset/3017578/eventon-lite/trunk/includes/admin/class-admin-ajax.php) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25667, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25667 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25667 - **State**: PUBLISHED - **Published Date**: February 20, 2025 at 00:00 UTC - **Last Updated**: February 21, 2025 at 17:22 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the urls parameter in the function get_parentControl_list_Info. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/jangfan/my-vuln/blob/main/Tenda/AC8V4/saveParentControlInfo.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10904, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10904 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10904 - **State**: PUBLISHED - **Published Date**: December 15, 2017 at 14:00 UTC - **Last Updated**: August 05, 2024 at 17:50 UTC - **Reserved Date**: July 04, 2017 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Qt for Android prior to 5.9.0 allows remote attackers to execute arbitrary OS commands via unspecified vectors. ### Affected Products **The Qt Company - Qt for Android** Affected versions: - prior to 5.9.0 (Status: affected) ### References 1. [JVN#67389262](https://jvn.jp/en/jp/JVN67389262/index.html) 2. [](https://blog.qt.io/blog/2017/11/22/security-advisory-qt-android/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0961, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0961 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0961 - **State**: PUBLISHED - **Published Date**: January 22, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:37 UTC - **Reserved Date**: November 24, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in IMAP server in Netscape Messaging Server 4.15 Patch 2 allows local users to execute arbitrary commands via a long LIST command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1721](http://www.securityfocus.com/bid/1721) 2. [20000928 commercial products and security [ + new bug ]](http://archives.neohapsis.com/archives/bugtraq/2000-09/0334.html) 3. [netscape-messaging-list-dos(5292)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5292)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8116, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8116 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8116 - **State**: PUBLISHED - **Published Date**: April 12, 2018 at 01:00 UTC - **Last Updated**: August 05, 2024 at 06:46 UTC - **Reserved Date**: March 14, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A denial of service vulnerability exists in the way that Windows handles objects in memory, aka "Microsoft Graphics Component Denial of Service Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. ### Affected Products **Microsoft - Windows 7** Affected versions: - 32-bit Systems Service Pack 1 (Status: affected) - x64-based Systems Service Pack 1 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - (Server Core installation) (Status: affected) **Microsoft - Windows RT 8.1** Affected versions: - Windows RT 8.1 (Status: affected) **Microsoft - Windows Server 2008** Affected versions: - 32-bit Systems Service Pack 2 (Status: affected) - 32-bit Systems Service Pack 2 (Server Core installation) (Status: affected) - Itanium-Based Systems Service Pack 2 (Status: affected) - x64-based Systems Service Pack 2 (Status: affected) - x64-based Systems Service Pack 2 (Server Core installation) (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - (Server Core installation) (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 32-bit systems (Status: affected) - x64-based systems (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - (Server Core installation) (Status: affected) **Microsoft - Windows Server 2008 R2** Affected versions: - Itanium-Based Systems Service Pack 1 (Status: affected) - x64-based Systems Service Pack 1 (Status: affected) - x64-based Systems Service Pack 1 (Server Core installation) (Status: affected) **Microsoft - Windows 10** Affected versions: - 32-bit Systems (Status: affected) - Version 1511 for 32-bit Systems (Status: affected) - Version 1511 for x64-based Systems (Status: affected) - Version 1607 for 32-bit Systems (Status: affected) - Version 1607 for x64-based Systems (Status: affected) - Version 1703 for 32-bit Systems (Status: affected) - Version 1703 for x64-based Systems (Status: affected) - Version 1709 for 32-bit Systems (Status: affected) - Version 1709 for x64-based Systems (Status: affected) - x64-based Systems (Status: affected) **Microsoft - Windows 10 Servers** Affected versions: - version 1709 (Server Core Installation) (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8116) 2. [103705](http://www.securityfocus.com/bid/103705) 3. [1040656](http://www.securitytracker.com/id/1040656)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21947, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21947 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21947 - **State**: PUBLISHED - **Published Date**: April 01, 2022 at 06:40 UTC - **Last Updated**: September 16, 2024 at 19:20 UTC - **Reserved Date**: December 16, 2021 at 00:00 UTC - **Assigned By**: suse ### Vulnerability Description A Exposure of Resource to Wrong Sphere vulnerability in Rancher Desktop of SUSE allows attackers in the local network to connect to the Dashboard API (steve) to carry out arbitrary actions. This issue affects: SUSE Rancher Desktop versions prior to V. ### CVSS Metrics - **CVSS Base Score**: 8.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L` ### Weakness Classification (CWE) - CWE-668: Security Weakness ### Affected Products **SUSE - Rancher** Affected versions: - Desktop (Status: affected) ### References 1. [](https://bugzilla.suse.com/show_bug.cgi?id=1197491)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8467, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8467 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8467 - **State**: PUBLISHED - **Published Date**: September 05, 2024 at 12:55 UTC - **Last Updated**: September 05, 2024 at 13:18 UTC - **Reserved Date**: September 05, 2024 at 08:26 UTC - **Assigned By**: INCIBE ### Vulnerability Description SQL injection vulnerability, by which an attacker could send a specially designed query through id parameter in /jobportal/admin/category/index.php, and retrieve all the information stored in it. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **PHPGurukul - Job Portal** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-job-portal) ### Credits - Rafael Pedrero
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25106, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25106 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25106 - **State**: PUBLISHED - **Published Date**: July 06, 2023 at 14:53 UTC - **Last Updated**: November 14, 2024 at 16:13 UTC - **Reserved Date**: February 02, 2023 at 20:42 UTC - **Assigned By**: talos ### Vulnerability Description Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_gre function with the local_virtual_ip and the local_virtual_mask variables. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Milesight - UR32L** Affected versions: - v32.3.0.5 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716) ### Credits - Discovered by Francesco Benvenuto of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8909, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8909 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8909 - **State**: PUBLISHED - **Published Date**: November 04, 2016 at 21:00 UTC - **Last Updated**: August 06, 2024 at 02:35 UTC - **Reserved Date**: October 24, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20161024 Re: CVE request Qemu: audio: intel-hda: infinite loop in processing dma buffer stream](http://www.openwall.com/lists/oss-security/2016/10/24/4) 2. [GLSA-201611-11](https://security.gentoo.org/glsa/201611-11) 3. [[oss-security] 20161024 CVE request Qemu: audio: intel-hda: infinite loop in processing dma buffer stream](http://www.openwall.com/lists/oss-security/2016/10/24/1) 4. [RHSA-2017:2392](https://access.redhat.com/errata/RHSA-2017:2392) 5. [openSUSE-SU-2016:3237](http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html) 6. [[qemu-devel] 20161020 [PATCH] audio: intel-hda: check stream entry count during transfer](https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg04682.html) 7. [[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html) 8. [RHSA-2017:2408](https://access.redhat.com/errata/RHSA-2017:2408) 9. [93842](http://www.securityfocus.com/bid/93842)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4120, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4120 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4120 - **State**: PUBLISHED - **Published Date**: October 28, 2010 at 20:00 UTC - **Last Updated**: August 07, 2024 at 03:34 UTC - **Reserved Date**: October 28, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the TAM console in IBM Tivoli Access Manager for e-business 6.1.0 before 6.1.0-TIV-TAM-FP0006 allow remote attackers to inject arbitrary web script or HTML via (1) the parm1 parameter to ivt/ivtserver, or the method parameter to (2) acl, (3) domain, (4) group, (5) gso, (6) gsogroup, (7) os, (8) pop, (9) rule, (10) user, or (11) webseal in ibm/wpm/. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [68892](http://osvdb.org/68892) 2. [68891](http://osvdb.org/68891) 3. [68885](http://osvdb.org/68885) 4. [ADV-2010-2774](http://www.vupen.com/english/advisories/2010/2774) 5. [IZ84918](http://www-01.ibm.com/support/docview.wss?uid=swg1IZ84918) 6. [68890](http://osvdb.org/68890) 7. [68884](http://osvdb.org/68884) 8. [68893](http://osvdb.org/68893) 9. [tivoli-ebusiness-parm1-xss(62750)](https://exchange.xforce.ibmcloud.com/vulnerabilities/62750) 10. [44382](http://www.securityfocus.com/bid/44382) 11. [68886](http://osvdb.org/68886) 12. [1024633](http://securitytracker.com/id?1024633) 13. [68889](http://osvdb.org/68889) 14. [68888](http://osvdb.org/68888) 15. [68894](http://osvdb.org/68894) 16. [68887](http://osvdb.org/68887) 17. [41974](http://secunia.com/advisories/41974)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-20936, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-20936 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-20936 - **State**: PUBLISHED - **Published Date**: April 08, 2025 at 04:39 UTC - **Last Updated**: April 09, 2025 at 04:00 UTC - **Reserved Date**: November 06, 2024 at 02:30 UTC - **Assigned By**: SamsungMobile ### Vulnerability Description Improper access control in HDCP trustlet prior to SMR Apr-2025 Release 1 allows local attackers with shell privilege to escalate their privileges to root. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H` ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - SMR Apr-2025 Release in Select Android 13, 14, 15 devices (Status: unaffected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2025&month=04)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12939, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12939 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12939 - **State**: PUBLISHED - **Published Date**: August 18, 2017 at 13:00 UTC - **Last Updated**: August 05, 2024 at 18:51 UTC - **Reserved Date**: August 18, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Remote Code Execution vulnerability was identified in all Windows versions of Unity Editor, e.g., before 5.3.8p2, 5.4.x before 5.4.5p5, 5.5.x before 5.5.4p3, 5.6.x before 5.6.3p1, and 2017.x before 2017.1.0p4. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [100444](http://www.securityfocus.com/bid/100444) 2. [](https://unity3d.com/security#issues) 3. [](https://twitter.com/0x09AL/status/898635999185711108)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45464, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45464 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45464 - **State**: PUBLISHED - **Published Date**: October 08, 2024 at 08:40 UTC - **Last Updated**: December 10, 2024 at 13:53 UTC - **Reserved Date**: August 29, 2024 at 11:28 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Siemens - Teamcenter Visualization V14.2** Affected versions: - 0 (Status: affected) **Siemens - Teamcenter Visualization V14.3** Affected versions: - 0 (Status: affected) **Siemens - Teamcenter Visualization V2312** Affected versions: - 0 (Status: affected) **Siemens - Tecnomatix Plant Simulation V2302** Affected versions: - 0 (Status: affected) **Siemens - Tecnomatix Plant Simulation V2404** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/html/ssa-583523.html) 2. [](https://cert-portal.siemens.com/productcert/html/ssa-645131.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13204, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13204 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13204 - **State**: PUBLISHED - **Published Date**: January 09, 2025 at 02:00 UTC - **Last Updated**: January 10, 2025 at 12:58 UTC - **Reserved Date**: January 08, 2025 at 14:58 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in kurniaramadhan E-Commerce-PHP 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /blog-details.php. The manipulation of the argument blog_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **kurniaramadhan - E-Commerce-PHP** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-290797 | kurniaramadhan E-Commerce-PHP blog-details.php sql injection](https://vuldb.com/?id.290797) 2. [VDB-290797 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.290797) 3. [](https://www.websecurityinsights.my.id/2024/12/ecommerce-php-by-kurniaramadhan-sql.html?m=1) ### Credits - Maloy Roy Orko - MaloyRoyOrko (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8659, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8659 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8659 - **State**: PUBLISHED - **Published Date**: March 04, 2020 at 20:43 UTC - **Last Updated**: August 04, 2024 at 10:03 UTC - **Reserved Date**: February 06, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CNCF Envoy through 1.13.0 may consume excessive amounts of memory when proxying HTTP/1.1 requests or responses with many small (i.e. 1 byte) chunks. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history) 2. [](https://github.com/envoyproxy/envoy/security/advisories/GHSA-jwcm-4pwp-c2qv) 3. [RHSA-2020:0734](https://access.redhat.com/errata/RHSA-2020:0734) 4. [[debian-lts-announce] 20220518 [SECURITY] [DLA 3014-1] elog security update](https://lists.debian.org/debian-lts-announce/2022/05/msg00025.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22668, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22668 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22668 - **State**: PUBLISHED - **Published Date**: February 27, 2023 at 00:00 UTC - **Last Updated**: March 12, 2025 at 13:52 UTC - **Reserved Date**: January 05, 2022 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A logic issue was addressed with improved restrictions. This issue is fixed in iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3. A malicious application may be able to leak sensitive user information. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213182) 2. [](https://support.apple.com/en-us/HT213183)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38154, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38154 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38154 - **State**: PUBLISHED - **Published Date**: August 13, 2024 at 17:30 UTC - **Last Updated**: May 21, 2025 at 21:07 UTC - **Reserved Date**: June 11, 2024 at 22:36 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38154)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2499, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2499 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2499 - **State**: PUBLISHED - **Published Date**: August 05, 2022 at 15:09 UTC - **Last Updated**: August 03, 2024 at 00:39 UTC - **Reserved Date**: July 20, 2022 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description An issue has been discovered in GitLab EE affecting all versions starting from 13.10 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. GitLab's Jira integration has an insecure direct object reference vulnerability that may be exploited by an attacker to leak Jira issues. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N` ### Affected Products **GitLab - GitLab** Affected versions: - >=13.10, <15.0.5 (Status: affected) - >=15.1, <15.1.4 (Status: affected) - >=15.2, <15.2.1 (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/360800) 2. [](https://hackerone.com/reports/1538068) 3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2499.json) ### Credits - Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3243, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3243 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3243 - **State**: PUBLISHED - **Published Date**: July 25, 2017 at 18:00 UTC - **Last Updated**: August 06, 2024 at 05:39 UTC - **Reserved Date**: April 10, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [75298](http://www.securityfocus.com/bid/75298) 2. [1032885](http://www.securitytracker.com/id/1032885) 3. [[oss-security] 20150620 Re: CVE-2015-3243 rsyslog: some log files are created world-readable](http://www.openwall.com/lists/oss-security/2015/06/20/3) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=1232826) 5. [[oss-security] 20150618 CVE-2015-3243 rsyslog: some log files are created world-readable](http://www.openwall.com/lists/oss-security/2015/06/18/12)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6323, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6323 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6323 - **State**: PUBLISHED - **Published Date**: November 11, 2014 at 22:00 UTC - **Last Updated**: August 06, 2024 at 12:10 UTC - **Reserved Date**: September 11, 2014 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 7 through 11 allows remote attackers to obtain sensitive clipboard information via a crafted web site, aka "Internet Explorer Clipboard Information Disclosure Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1031185](http://www.securitytracker.com/id/1031185) 2. [MS14-065](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065) 3. [70947](http://www.securityfocus.com/bid/70947)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2201, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2201 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2201 - **State**: PUBLISHED - **Published Date**: June 02, 2023 at 03:36 UTC - **Last Updated**: December 23, 2024 at 16:23 UTC - **Reserved Date**: April 20, 2023 at 21:51 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Web Directory Free for WordPress is vulnerable to SQL Injection via the ‘post_id’ parameter in versions up to, and including, 1.6.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **mihail-chepovskiy - Web Directory Free** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/d831fa81-4714-4757-b75d-0a8f5edda910?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/web-directory-free/tags/1.6.6/search/plugin/classes/search/search_forms_manager.php#L1425) ### Credits - Marco Wotschka
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21624, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21624 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21624 - **State**: PUBLISHED - **Published Date**: January 07, 2025 at 15:46 UTC - **Last Updated**: January 07, 2025 at 17:02 UTC - **Reserved Date**: December 29, 2024 at 03:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description ClipBucket V5 provides open source video hosting with PHP. Prior to 5.5.1 - 239, a file upload vulnerability exists in the Manage Playlist functionality of the application, specifically surrounding the uploading of playlist cover images. Without proper checks, an attacker can upload a PHP script file instead of an image file, thus allowing a webshell or other malicious files to be stored and executed on the server. This attack vector exists in both the admin area and low-level user area. This vulnerability is fixed in 5.5.1 - 239. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **MacWarrior - clipbucket-v5** Affected versions: - < 5.5.1 - 239 (Status: affected) ### References 1. [https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-98vm-2xqm-xrcc](https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-98vm-2xqm-xrcc) 2. [https://github.com/MacWarrior/clipbucket-v5/commit/893bfb0f1236c4a59b5e2843ab8d27a1e491b12b](https://github.com/MacWarrior/clipbucket-v5/commit/893bfb0f1236c4a59b5e2843ab8d27a1e491b12b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9083, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9083 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9083 - **State**: PUBLISHED - **Published Date**: May 19, 2017 at 16:00 UTC - **Last Updated**: August 05, 2024 at 16:55 UTC - **Reserved Date**: May 19, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.freedesktop.org/show_bug.cgi?id=101084) 2. [GLSA-201801-17](https://security.gentoo.org/glsa/201801-17)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46428, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46428 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46428 - **State**: PUBLISHED - **Published Date**: November 01, 2023 at 00:00 UTC - **Last Updated**: September 12, 2024 at 19:56 UTC - **Reserved Date**: October 23, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An arbitrary file upload vulnerability in HadSky v7.12.10 allows attackers to execute arbitrary code via a crafted file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/fenglon/CVE/blob/main/analyse.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39125, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39125 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39125 - **State**: PUBLISHED - **Published Date**: August 17, 2023 at 00:00 UTC - **Last Updated**: October 08, 2024 at 14:35 UTC - **Reserved Date**: July 25, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description NTSC-CRT 2.2.1 has an integer overflow and out-of-bounds write in loadBMP in bmp_rw.c because a file's width, height, and BPP are not validated. NOTE: the vendor's perspective is "this main application was not intended to be a well tested program, it's just something to demonstrate it works and for the user to see how to integrate it into their own programs." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/LMP88959/NTSC-CRT/issues/32)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23619, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23619 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23619 - **State**: PUBLISHED - **Published Date**: March 03, 2025 at 13:30 UTC - **Last Updated**: March 03, 2025 at 15:59 UTC - **Reserved Date**: January 16, 2025 at 11:27 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Catch Duplicate Switcher allows Reflected XSS. This issue affects Catch Duplicate Switcher: from n/a through 2.0. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **NotFound - Catch Duplicate Switcher** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/catch-duplicate-switcher/vulnerability/wordpress-catch-duplicate-switcher-plugin-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Le Ngoc Anh (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-44415, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-44415 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-44415 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 02:13 UTC - **Last Updated**: September 18, 2024 at 18:30 UTC - **Reserved Date**: September 28, 2023 at 18:02 UTC - **Assigned By**: zdi ### Vulnerability Description D-Link Multiple Routers cli Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1260 and DIR-2150 routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the CLI service, which listens on TCP port 23. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-19946. ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **D-Link - DIR-2150** Affected versions: - D-Link DIR-1260 version 1.02B06 Hotfix, D-Link DIR-2150 version 1.02 (Status: affected) ### References 1. [ZDI-23-1513](https://www.zerodayinitiative.com/advisories/ZDI-23-1513/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47459, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47459 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47459 - **State**: PUBLISHED - **Published Date**: October 17, 2024 at 14:59 UTC - **Last Updated**: October 17, 2024 at 15:57 UTC - **Reserved Date**: September 24, 2024 at 17:40 UTC - **Assigned By**: adobe ### Vulnerability Description Substance3D - Sampler versions 4.5 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS) condition. An attacker could exploit this vulnerability to crash the application, resulting in a DoS. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **Adobe - Substance3D - Sampler** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/substance3d-sampler/apsb24-65.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32132, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32132 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32132 - **State**: PUBLISHED - **Published Date**: September 13, 2021 at 14:32 UTC - **Last Updated**: August 03, 2024 at 23:17 UTC - **Reserved Date**: May 07, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The abst_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gpac/gpac/issues/1753) 2. [](https://github.com/gpac/gpac/commit/e74be5976a6fee059c638050a237893f7e9a3b23)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11239, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11239 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11239 - **State**: PUBLISHED - **Published Date**: November 15, 2024 at 13:31 UTC - **Last Updated**: November 15, 2024 at 20:21 UTC - **Reserved Date**: November 15, 2024 at 07:11 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in Landray EKP up to 16.0 and classified as critical. This vulnerability affects the function deleteFile of the file /sys/common/import.do?method=deleteFile of the component API Interface. The manipulation of the argument folder leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Landray - EKP** Affected versions: - 16.0 (Status: affected) ### References 1. [VDB-284674 | Landray EKP API Interface import.do deleteFile path traversal](https://vuldb.com/?id.284674) 2. [VDB-284674 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.284674) 3. [Submit #438784 | Shenzhen Landray Software Co.,LTD. EKP <= v16.0 Directory traversal](https://vuldb.com/?submit.438784) 4. [](https://github.com/CoinIsMoney/TempGuide/blob/main/LL-exp-03.pdf) ### Credits - CoinIsMoney (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20655, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20655 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20655 - **State**: PUBLISHED - **Published Date**: November 15, 2024 at 15:56 UTC - **Last Updated**: November 15, 2024 at 21:00 UTC - **Reserved Date**: November 02, 2021 at 13:28 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H` ### Affected Products **Cisco - Cisco IOS XR Software** Affected versions: - N/A (Status: affected) **Cisco - Cisco Virtual Topology System (VTS)** Affected versions: - N/A (Status: affected) **Cisco - Cisco Network Services Orchestrator** Affected versions: - N/A (Status: affected) **Cisco - Cisco Enterprise NFV Infrastructure Software** Affected versions: - N/A (Status: affected) **Cisco - Cisco Catalyst SD-WAN** Affected versions: - N/A (Status: affected) **Cisco - Cisco Catalyst SD-WAN Manager** Affected versions: - N/A (Status: affected) **Cisco - Cisco IOS XE Catalyst SD-WAN** Affected versions: - N/A (Status: affected) **Cisco - Cisco SD-WAN vEdge Router** Affected versions: - N/A (Status: affected) **Cisco - Cisco Ultra Gateway Platform** Affected versions: - N/A (Status: affected) **Cisco - Cisco Carrier Packet Transport** Affected versions: - 3.5 (Status: affected) - 3.1 (Status: affected) - 3.2 (Status: affected) - 2.5 (Status: affected) - 2.0 (Status: affected) - 9.2.2 (Status: affected) - 1.4.0 (Status: affected) - 1.0 (Status: affected) - 1.1 (Status: affected) - 1.2 (Status: affected) - 2.1.0 (Status: affected) - 2.3.0 (Status: affected) - 2.3.3 (Status: affected) - 2.3.5 (Status: affected) - 2.3.4 (Status: affected) - 2.0.1 (Status: affected) - 2.0.0 (Status: affected) - 2.0.3 (Status: affected) - 2.0.4 (Status: affected) - 2.0.5 (Status: affected) - 2.4.0 (Status: affected) - 2.2.2 (Status: affected) - 2.2.3 (Status: affected) - 10.8.0 (Status: affected) - 7.0.3 (Status: affected) - 7.0.1 (Status: affected) - 1.0.2 (Status: affected) - 1.1.1 (Status: affected) - 1.1.2 (Status: affected) - 4.1 (Status: affected) - 4.0 (Status: affected) - 12.1.0 (Status: affected) - 9.8.1 (Status: affected) - 9.8.0 (Status: affected) - 4.1.82 (Status: affected) - 4.1.4 (Status: affected) - 4.6.1 (Status: affected) - 4.0.4 (Status: affected) - 4.0.3 (Status: affected) - 6.2.4 (Status: affected) - 3.0.5 (Status: affected) - 3.0.6 (Status: affected) - 3.0.7 (Status: affected) - 3.0.3 (Status: affected) - 3.0.0 (Status: affected) - 9.5.0 (Status: affected) - 9.5.3 (Status: affected) - 9.5.1 (Status: affected) - 9.5.2 (Status: affected) - 9.7.0 (Status: affected) - 9.521 (Status: affected) - 4.5.0 (Status: affected) - 4.7.0 (Status: affected) - 3.2.0 (Status: affected) - 3.2.1 (Status: affected) - 3.1.0 (Status: affected) ### References 1. [cisco-sa-cli-cmdinj-4MttWZPB](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB) 2. [cisco-sa-confdcli-cmdinj-wybQDSSh](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4586, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4586 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4586 - **State**: PUBLISHED - **Published Date**: June 23, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 06:18 UTC - **Reserved Date**: June 15, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in Alcatel-Lucent CellPipe 7130 RG 5Ae.M2013 HOL with firmware 1.0.0.20h.HOL allows remote attackers to hijack the authentication of administrators for requests that create a user account via an add_user action in a request to password.cmd. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [75384](http://www.securityfocus.com/bid/75384) 2. [](http://packetstormsecurity.com/files/132324/CellPipe-7130-Cross-Site-Request-Forgery.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12845, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12845 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12845 - **State**: PUBLISHED - **Published Date**: July 03, 2019 at 19:42 UTC - **Last Updated**: August 04, 2024 at 23:32 UTC - **Reserved Date**: June 15, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The generated Kotlin DSL settings allowed usage of an unencrypted connection for resolving artifacts. The issue was fixed in JetBrains TeamCity 2018.2.3. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2254, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2254 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2254 - **State**: PUBLISHED - **Published Date**: September 16, 2020 at 13:20 UTC - **Last Updated**: August 04, 2024 at 07:01 UTC - **Reserved Date**: December 05, 2019 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins Blue Ocean Plugin 1.23.2 and earlier provides an undocumented feature flag that, when enabled, allows an attacker with Job/Configure or Job/Create permission to read arbitrary files on the Jenkins controller file system. ### Affected Products **Jenkins project - Jenkins Blue Ocean Plugin** Affected versions: - unspecified (Status: affected) - 1.19.2 (Status: unaffected) ### References 1. [](https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956) 2. [[oss-security] 20200916 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2020/09/16/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-7248, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-7248 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-7248 - **State**: PUBLISHED - **Published Date**: December 16, 2009 at 01:00 UTC - **Last Updated**: August 07, 2024 at 11:56 UTC - **Reserved Date**: December 11, 2009 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20091128 CVE request: Ruby on Rails: CSRF circumvention (from 2008)](http://www.openwall.com/lists/oss-security/2009/11/28/1) 2. [](http://www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.html) 3. [36600](http://secunia.com/advisories/36600) 4. [](http://pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/) 5. [](http://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1) 6. [ADV-2009-2544](http://www.vupen.com/english/advisories/2009/2544) 7. [](http://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en) 8. [SUSE-SR:2010:006](http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html) 9. [[oss-security] 20091202 Re: CVE request: Ruby on Rails: CSRF circumvention (from 2008)](http://www.openwall.com/lists/oss-security/2009/12/02/2) 10. [38915](http://secunia.com/advisories/38915)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3216, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3216 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3216 - **State**: PUBLISHED - **Published Date**: June 16, 2016 at 01:00 UTC - **Last Updated**: August 05, 2024 at 23:47 UTC - **Reserved Date**: March 15, 2016 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description GDI32.dll in the Graphics component in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "Windows Graphics Component Information Disclosure Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS16-074](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-074) 2. [39990](https://www.exploit-db.com/exploits/39990/) 3. [1036101](http://www.securitytracker.com/id/1036101)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2328, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2328 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2328 - **State**: PUBLISHED - **Published Date**: July 05, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 05:44 UTC - **Reserved Date**: July 05, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description admin/edit_user.php in KerviNet Forum 1.1 and earlier does not require administrative authentication, which allows remote attackers to delete arbitrary accounts and conduct SQL injection attacks via the del_user_id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [9068](http://www.exploit-db.com/exploits/9068)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-32559, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-32559 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-32559 - **State**: PUBLISHED - **Published Date**: April 18, 2024 at 10:07 UTC - **Last Updated**: August 02, 2024 at 02:13 UTC - **Reserved Date**: April 15, 2024 at 09:14 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hwk-fr WP 404 Auto Redirect to Similar Post allows Reflected XSS.This issue affects WP 404 Auto Redirect to Similar Post: from n/a through 1.0.4. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **hwk-fr - WP 404 Auto Redirect to Similar Post** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-404-auto-redirect-to-similar-post/wordpress-wp-404-auto-redirect-to-similar-post-plugin-1-0-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - AtaTurk1925 (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-47032, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-47032 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-47032 - **State**: PUBLISHED - **Published Date**: February 28, 2024 at 08:13 UTC - **Last Updated**: May 04, 2025 at 07:02 UTC - **Reserved Date**: February 27, 2024 at 18:42 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: mt76: mt7915: fix tx skb dma unmap The first pointer in the txp needs to be unmapped as well, otherwise it will leak DMA mapping entries ### Affected Products **Linux - Linux** Affected versions: - 27d5c528a7ca08dcd44877fdd9fc08b76630bf77 (Status: affected) - 27d5c528a7ca08dcd44877fdd9fc08b76630bf77 (Status: affected) - 27d5c528a7ca08dcd44877fdd9fc08b76630bf77 (Status: affected) - 27d5c528a7ca08dcd44877fdd9fc08b76630bf77 (Status: affected) **Linux - Linux** Affected versions: - 5.10 (Status: affected) - 0 (Status: unaffected) - 5.10.37 (Status: unaffected) - 5.11.21 (Status: unaffected) - 5.12.4 (Status: unaffected) - 5.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/4e7914ce23306b28d377ec395e00e5fde0e6f96e) 2. [](https://git.kernel.org/stable/c/4a9dcd6efb2a268fc5707dcfb3b0c412975c4462) 3. [](https://git.kernel.org/stable/c/e2cdc9cb33c5963efe1a7c022753386f9463d1b7) 4. [](https://git.kernel.org/stable/c/7dcf3c04f0aca746517a77433b33d40868ca4749)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28265, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28265 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28265 - **State**: PUBLISHED - **Published Date**: May 11, 2022 at 17:56 UTC - **Last Updated**: September 16, 2024 at 16:38 UTC - **Reserved Date**: March 30, 2022 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Adobe - Acrobat Reader** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb22-16.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5275, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5275 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5275 - **State**: PUBLISHED - **Published Date**: November 28, 2008 at 18:26 UTC - **Last Updated**: August 07, 2024 at 10:49 UTC - **Reserved Date**: November 28, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple directory traversal vulnerabilities in the (a) "Unzip archive" and (b) "Upload files and archives" functionality in net2ftp 0.96 stable and 0.97 beta allow remote attackers to create, read, or delete arbitrary files via a .. (dot dot) in a filename within a (1) TAR or (2) ZIP archive. NOTE: this can be leveraged for code execution by creating a .php file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [net2ftp-requesthandling-code-execution(42994)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42994) 2. [](http://vuln.sg/net2ftp096-en.html) 3. [29664](http://www.securityfocus.com/bid/29664) 4. [30611](http://secunia.com/advisories/30611)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0269, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0269 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0269 - **State**: PUBLISHED - **Published Date**: September 18, 2020 at 15:07 UTC - **Last Updated**: August 04, 2024 at 05:55 UTC - **Reserved Date**: October 17, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In Android Auto Settings, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-151645626 ### Affected Products **n/a - Android** Affected versions: - Android-11 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/android-11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0315, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0315 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0315 - **State**: PUBLISHED - **Published Date**: January 28, 2009 at 11:00 UTC - **Last Updated**: August 07, 2024 at 04:31 UTC - **Reserved Date**: January 27, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=481560) 2. [[oss-security] 20090126 CVE request -- Python < 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)](http://www.openwall.com/lists/oss-security/2009/01/26/2) 3. [33444](http://www.securityfocus.com/bid/33444) 4. [MDVSA-2009:059](http://www.mandriva.com/security/advisories?name=MDVSA-2009:059)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30564, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30564 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30564 - **State**: PUBLISHED - **Published Date**: April 18, 2024 at 00:00 UTC - **Last Updated**: August 22, 2024 at 15:52 UTC - **Reserved Date**: March 27, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue inandrei-tatar nora-firebase-common between v.1.0.41 and v.1.12.2 allows a remote attacker to execute arbitrary code via a crafted script to the updateState parameter of the updateStateInternal method. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/andrei-tatar/nora-firebase-common/commit/bf30b75d51be04f6c1f884561a223226c890f01b) 2. [](https://gist.github.com/mestrtee/5dc2c948c2057f98d3de0a9790903c6c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6880, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6880 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6880 - **State**: PUBLISHED - **Published Date**: January 10, 2025 at 17:51 UTC - **Last Updated**: January 10, 2025 at 18:12 UTC - **Reserved Date**: July 18, 2024 at 11:50 UTC - **Assigned By**: CERT-PL ### Vulnerability Description During MegaBIP installation process, a user is encouraged to change a default path to administrative portal, as keeping it secret is listed by the author as one of the protection mechanisms.  Publicly available source code of "/registered.php" discloses that path, allowing an attacker to attempt further attacks.   This issue affects MegaBIP software versions below 5.15 ### Weakness Classification (CWE) - CWE-538: Security Weakness ### Affected Products **Jan Syski - MegaBIP** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert.pl/en/posts/2024/09/CVE-2024-6680) 2. [](https://megabip.pl/) 3. [](https://www.gov.pl/web/cyfryzacja/rekomendacja-pelnomocnika-rzadu-ds-cyberbezpieczenstwa-dotyczaca-biuletynow-informacji-publicznej)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-29214, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-29214 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-29214 - **State**: PUBLISHED - **Published Date**: March 20, 2025 at 00:00 UTC - **Last Updated**: March 21, 2025 at 18:54 UTC - **Reserved Date**: March 11, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda AX12 v22.03.01.46_CN was discovered to contain a stack overflow via the sub_42F69C function at /goform/setMacFilterCfg. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/isstabber/my_VulnHub/blob/main/Tenda/AX12/tenda_ax12_setMacFilterCfg_stack_overflow_en.pdf) 2. [](https://gist.github.com/isstabber/85fe01ed47ad7ef820f86bfbd64a022c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48864, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48864 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48864 - **State**: PUBLISHED - **Published Date**: July 16, 2024 at 12:25 UTC - **Last Updated**: May 04, 2025 at 08:24 UTC - **Reserved Date**: July 16, 2024 at 11:38 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: vdpa/mlx5: add validation for VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command When control vq receives a VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command request from the driver, presently there is no validation against the number of queue pairs to configure, or even if multiqueue had been negotiated or not is unverified. This may lead to kernel panic due to uninitialized resource for the queues were there any bogus request sent down by untrusted driver. Tie up the loose ends there. ### Affected Products **Linux - Linux** Affected versions: - 52893733f2c5886fc74be6c386d12b59a3f581df (Status: affected) - 52893733f2c5886fc74be6c386d12b59a3f581df (Status: affected) - 52893733f2c5886fc74be6c386d12b59a3f581df (Status: affected) **Linux - Linux** Affected versions: - 5.15 (Status: affected) - 0 (Status: unaffected) - 5.15.29 (Status: unaffected) - 5.16.15 (Status: unaffected) - 5.17 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/e7e118416465f2ba8b55007e5b789823e101421e) 2. [](https://git.kernel.org/stable/c/9f6effca75626c7a7c7620dabcb1a254ca530230) 3. [](https://git.kernel.org/stable/c/ed0f849fc3a63ed2ddf5e72cdb1de3bdbbb0f8eb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33528, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33528 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33528 - **State**: PUBLISHED - **Published Date**: March 28, 2024 at 00:00 UTC - **Last Updated**: March 28, 2025 at 19:01 UTC - **Reserved Date**: May 22, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description halo v1.6.0 is vulnerable to Cross Site Scripting (XSS). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/halo-dev/halo/releases/tag/v1.6.0) 2. [](https://gist.github.com/alert-moyan/be0bd087d85c1416829b8e9659e8b66c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10878, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10878 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10878 - **State**: PUBLISHED - **Published Date**: April 05, 2019 at 04:31 UTC - **Last Updated**: August 04, 2024 at 22:32 UTC - **Reserved Date**: April 05, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Teeworlds 0.7.2, there is a failed bounds check in CDataFileReader::GetData() and CDataFileReader::ReplaceData() and related functions in engine/shared/datafile.cpp that can lead to an arbitrary free and out-of-bounds pointer write, possibly resulting in remote code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/teeworlds/teeworlds/issues/2073) 2. [FEDORA-2019-d29e04fa11](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5KCS2CFDYJFBLZ4QKVPNJWHOZEGQ2LBC/) 3. [openSUSE-SU-2019:1793](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00046.html) 4. [openSUSE-SU-2019:1999](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00077.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16004, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16004 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16004 - **State**: PUBLISHED - **Published Date**: January 18, 2019 at 17:00 UTC - **Last Updated**: August 05, 2024 at 10:10 UTC - **Reserved Date**: August 28, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [106161](http://www.securityfocus.com/bid/106161) 2. [](https://helpx.adobe.com/security/products/acrobat/apsb18-41.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5591, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5591 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5591 - **State**: PUBLISHED - **Published Date**: June 05, 2020 at 10:05 UTC - **Last Updated**: August 04, 2024 at 08:30 UTC - **Reserved Date**: January 06, 2020 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description XACK DNS 1.11.0 to 1.11.4, 1.10.0 to 1.10.8, 1.8.0 to 1.8.23, 1.7.0 to 1.7.18, and versions before 1.7.0 allow remote attackers to cause a denial of service condition resulting in degradation of the recursive resolver's performance or compromising the recursive resolver as a reflector in a reflection attack. ### Affected Products **XACK, Inc. - XACK DNS** Affected versions: - 1.11.0 to 1.11.4, 1.10.0 to 1.10.8, 1.8.0 to 1.8.23, 1.7.0 to 1.7.18, and versions before 1.7.0 (Status: affected) ### References 1. [](https://xack.co.jp/info/?ID=622) 2. [](https://jvn.jp/en/jp/JVN40208370/index.html)