System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1002209, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1002209 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1002209 - **State**: PUBLISHED - **Published Date**: July 25, 2018 at 17:00 UTC - **Last Updated**: September 16, 2024 at 19:25 UTC - **Reserved Date**: July 25, 2018 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description QuaZIP before 0.7.6 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **quazip - quazip** Affected versions: - unspecified (Status: affected) ### References 1. [](https://snyk.io/research/zip-slip-vulnerability) 2. [](https://github.com/snyk/zip-slip-vulnerability) 3. [](https://github.com/stachenov/quazip/blob/0.7.6/NEWS.txt) 4. [](https://github.com/stachenov/quazip/commit/5d2fc16a1976e5bf78d2927b012f67a2ae047a98)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6604, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6604 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6604 - **State**: PUBLISHED - **Published Date**: January 30, 2017 at 22:00 UTC - **Last Updated**: August 06, 2024 at 01:36 UTC - **Reserved Date**: August 05, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description NULL pointer dereference in Samsung Exynos fimg2d driver for Android L(5.0/5.1) and M(6.0) allows attackers to have unspecified impact via unknown vectors. The Samsung ID is SVE-2016-6382. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016) 2. [[oss-security] 20160817 Re: CVE Request - Samsung Exynos fimg2d NULL Pointer Dereference](http://www.openwall.com/lists/oss-security/2016/08/18/10) 3. [[oss-security] 20160805 CVE Request - Samsung Exynos fimg2d NULL Pointer Dereference](http://www.openwall.com/lists/oss-security/2016/08/05/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7646, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7646 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7646 - **State**: PUBLISHED - **Published Date**: May 07, 2020 at 16:34 UTC - **Last Updated**: August 04, 2024 at 09:33 UTC - **Reserved Date**: January 21, 2020 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description curlrequest through 1.0.1 allows reading any file by populating the file parameter with user input. ### Affected Products **n/a - curlrequest** Affected versions: - All versions including 1.0.1 (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-JS-CURLREQUEST-568274) 2. [](https://github.com/node-js-libs/curlrequest/blob/master/index.js#L239%2C)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3764, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3764 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3764 - **State**: PUBLISHED - **Published Date**: November 30, 2017 at 19:00 UTC - **Last Updated**: September 17, 2024 at 02:46 UTC - **Reserved Date**: December 16, 2016 at 00:00 UTC - **Assigned By**: lenovo ### Vulnerability Description A vulnerability was identified in Lenovo XClarity Administrator (LXCA) before 1.4.0 where LXCA user account names may be exposed to unauthenticated users with access to the LXCA web user interface. No password information of the user accounts is exposed. ### Affected Products **Lenovo Group Ltd. - xClarity Administrator** Affected versions: - Earlier than 1.4.0 (Status: affected) ### References 1. [](https://support.lenovo.com/us/en/product_security/LEN-16335)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4692, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4692 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4692 - **State**: PUBLISHED - **Published Date**: October 10, 2006 at 22:00 UTC - **Last Updated**: October 15, 2024 at 14:16 UTC - **Reserved Date**: September 11, 2006 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Argument injection vulnerability in the Windows Object Packager (packager.exe) in Microsoft Windows XP SP1 and SP2 and Server 2003 SP1 and earlier allows remote user-assisted attackers to execute arbitrary commands via a crafted file with a "/" (slash) character in the filename of the Command Line property, followed by a valid file extension, which causes the command before the slash to be executed, aka "Object Packager Dialogue Spoofing Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [29424](http://www.osvdb.org/29424) 2. [SSRT061264](http://www.securityfocus.com/archive/1/449179/100/0/threaded) 3. [VU#703936](http://www.kb.cert.org/vuls/id/703936) 4. [20318](http://www.securityfocus.com/bid/20318) 5. [MS06-065](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-065) 6. [ADV-2006-3984](http://www.vupen.com/english/advisories/2006/3984) 7. [](http://secunia.com/secunia_research/2006-54/advisory/) 8. [HPSBST02161](http://www.securityfocus.com/archive/1/449179/100/0/threaded) 9. [20061014 Re: Secunia Research: Microsoft Windows Object Packager Dialog Spoofing](http://www.securityfocus.com/archive/1/448696/100/0/threaded) 10. [20717](http://secunia.com/advisories/20717) 11. [oval:org.mitre.oval:def:496](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A496) 12. [20061011 Secunia Research: Microsoft Windows Object Packager Dialog Spoofing](http://www.securityfocus.com/archive/1/448273/100/0/threaded) 13. [1017037](http://securitytracker.com/id?1017037)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54465, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54465 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54465 - **State**: PUBLISHED - **Published Date**: December 11, 2024 at 22:56 UTC - **Last Updated**: December 21, 2024 at 04:56 UTC - **Reserved Date**: December 03, 2024 at 22:50 UTC - **Assigned By**: apple ### Vulnerability Description A logic issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.2. An app may be able to elevate privileges. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/121839)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29155, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29155 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29155 - **State**: PUBLISHED - **Published Date**: October 16, 2024 at 15:51 UTC - **Last Updated**: October 16, 2024 at 17:13 UTC - **Reserved Date**: March 18, 2024 at 06:11 UTC - **Assigned By**: Microchip ### Vulnerability Description On Microchip RN4870 devices, when more than one consecutive PairReqNoInputNoOutput request is received, the device becomes incapable of completing the pairing process. A third party can inject a second PairReqNoInputNoOutput request just after a real one, causing the pair request to be blocked. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Microchip - RN4870** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.microchip.com/en-us/product/rn4870) 2. [](https://ww1.microchip.com/downloads/aemDocuments/documents/WSG/ProductDocuments/SoftwareLibraries/Firmware/RN4870-71-Firmware-1.44.zip) ### Credits - Wu, Tianwei - Hussain Syed Rafiul - Ishtiaq, Abdullah Al - RASHID, SYED MD MUKIT - The Pennsylvania State University
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-33669, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-33669 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-33669 - **State**: PUBLISHED - **Published Date**: July 12, 2022 at 22:38 UTC - **Last Updated**: January 02, 2025 at 19:25 UTC - **Reserved Date**: June 14, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Azure Site Recovery Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C` ### Affected Products **Microsoft - Azure Site Recovery VMWare to Azure** Affected versions: - 9.0 (Status: affected) ### References 1. [Azure Site Recovery Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33669)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2876, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2876 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2876 - **State**: PUBLISHED - **Published Date**: September 19, 2018 at 18:00 UTC - **Last Updated**: September 16, 2024 at 22:08 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable buffer overflow vulnerability exists in the Multi-Camera interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted request on port 10000 can cause a buffer overflow resulting in overwriting arbitrary data. ### Affected Products **Foscam - Foscam C1 Indoor HD Camera** Affected versions: - Foscam Indoor IP Camera C1 Series.System Firmware Version: 1.9.3.18.Application Firmware Version: 2.52.2.43.Plug-In Version: 3.3.0.26 (Status: affected) ### References 1. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0383)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30625, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30625 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30625 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 12:54 UTC - **Last Updated**: June 06, 2025 at 16:02 UTC - **Reserved Date**: March 24, 2025 at 13:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matt Pramschufer AppBanners allows Stored XSS. This issue affects AppBanners: from n/a through 1.5.14. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Matt Pramschufer - AppBanners** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/appbanners/vulnerability/wordpress-appbanners-1-5-14-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Nabil Irawan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36191, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36191 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36191 - **State**: PUBLISHED - **Published Date**: August 17, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 10:00 UTC - **Reserved Date**: July 18, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A heap-buffer-overflow had occurred in function gf_isom_dovi_config_get of isomedia/avc_ext.c:2490, as demonstrated by MP4Box. This vulnerability was fixed in commit fef6242. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gpac/gpac/issues/2218) 2. [DSA-5411](https://www.debian.org/security/2023/dsa-5411)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3948, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3948 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3948 - **State**: PUBLISHED - **Published Date**: September 05, 2008 at 16:00 UTC - **Last Updated**: August 07, 2024 at 10:00 UTC - **Reserved Date**: September 05, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in admin/users/self-2.php in XRMS allows remote attackers to execute arbitrary SQL commands and modify name and email fields via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [xrms-self2-sql-injection(45048)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45048) 2. [20080904 Multiple Cross Site Scripting (XSS) and SQL injection Vulnerabilities in XRMS, CVE-2008-3664](http://www.securityfocus.com/archive/1/495981/100/0/threaded) 3. [4229](http://securityreason.com/securityalert/4229) 4. [31008](http://www.securityfocus.com/bid/31008)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6954, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6954 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6954 - **State**: PUBLISHED - **Published Date**: January 13, 2020 at 22:17 UTC - **Last Updated**: August 04, 2024 at 09:18 UTC - **Reserved Date**: January 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Cayin SMP-PRO4 devices. A user can discover a saved password by viewing the URL after a Connection String Test. This password is shown in the webpass parameter of a media_folder.cgi?apply_mode=ping_server URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://nileshsapariya.blogspot.com/2020/01/cayin-smp-pro4-signage-media-player.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7916, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7916 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7916 - **State**: PUBLISHED - **Published Date**: November 16, 2016 at 04:49 UTC - **Last Updated**: August 06, 2024 at 02:13 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://source.android.com/security/bulletin/2016-11-01.html) 2. [](https://bugzilla.kernel.org/show_bug.cgi?id=116461) 3. [](http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.4) 4. [USN-3159-1](http://www.ubuntu.com/usn/USN-3159-1) 5. [](https://forums.grsecurity.net/viewtopic.php?f=3&t=4363) 6. [USN-3159-2](http://www.ubuntu.com/usn/USN-3159-2) 7. [94138](http://www.securityfocus.com/bid/94138) 8. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8148a73c9901a8794a50f950083c00ccf97d43b3) 9. [](https://github.com/torvalds/linux/commit/8148a73c9901a8794a50f950083c00ccf97d43b3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3834, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3834 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3834 - **State**: PUBLISHED - **Published Date**: October 07, 2021 at 15:14 UTC - **Last Updated**: September 16, 2024 at 17:37 UTC - **Reserved Date**: September 27, 2021 at 00:00 UTC - **Assigned By**: INCIBE ### Vulnerability Description Integria IMS in its 5.0.92 version does not filter correctly some fields related to the login.php file. An attacker could exploit this vulnerability in order to perform a cross-site scripting attack (XSS). ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Ártica - Integria IMS** Affected versions: - 5.0.92 (Status: affected) ### References 1. [](https://integriaims.com/en/services/updates/) 2. [](https://www.incibe.es/en/incibe-cert/notices/aviso/integria-ims-vulnerable-cross-site-scripting-xss) ### Credits - Discovered by @_Barriuso (special mention to @nag0mez ).
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0525, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0525 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0525 - **State**: PUBLISHED - **Published Date**: February 11, 2025 at 09:53 UTC - **Last Updated**: March 24, 2025 at 16:29 UTC - **Reserved Date**: January 17, 2025 at 02:42 UTC - **Assigned By**: Octopus ### Vulnerability Description In affected versions of Octopus Server the preview import feature could be leveraged to identify the existence of a target file. This could provide an adversary with information that may aid in further attacks against the server. ### Affected Products **Octopus Deploy - Octopus Server** Affected versions: - 2020.6.4592 (Status: affected) - 2024.4.401 (Status: affected) ### References 1. [](https://advisories.octopus.com/post/2024/sa2025-02/) ### Credits - This vulnerability was found by Edward Prior (@JankhJankh)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4407, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4407 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4407 - **State**: PUBLISHED - **Published Date**: September 19, 2012 at 10:00 UTC - **Last Updated**: September 16, 2024 at 23:35 UTC - **Reserved Date**: August 21, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description lib/filelib.php in Moodle 2.1.x before 2.1.8, 2.2.x before 2.2.5, and 2.3.x before 2.3.2 does not properly check the publication state of blog files, which allows remote attackers to obtain sensitive information by reading a blog entry that references a non-public file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20120917 Moodle security notifications public](http://openwall.com/lists/oss-security/2012/09/17/1) 2. [](http://moodle.org/mod/forum/discuss.php?d=211557) 3. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-34585)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5134, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5134 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5134 - **State**: PUBLISHED - **Published Date**: June 11, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 05:26 UTC - **Reserved Date**: January 03, 2018 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description WebExtensions may use "view-source:" URLs to view local "file:" URL content, as well as content stored in "about:cache", bypassing restrictions that only allow WebExtensions to view specific content. This vulnerability affects Firefox < 59. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [103386](http://www.securityfocus.com/bid/103386) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1429379) 3. [1040514](http://www.securitytracker.com/id/1040514) 4. [USN-3596-1](https://usn.ubuntu.com/3596-1/) 5. [](https://www.mozilla.org/security/advisories/mfsa2018-06/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5445, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5445 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5445 - **State**: PUBLISHED - **Published Date**: August 08, 2024 at 22:04 UTC - **Last Updated**: January 07, 2025 at 19:48 UTC - **Reserved Date**: May 28, 2024 at 19:46 UTC - **Assigned By**: N-able ### Vulnerability Description Ecosystem Agent version 4 < 4.1.5.2597 and Ecosystem Agent version 5 < 5.1.4.2473 did not properly validate SSL/TLS certificates, which could allow a malicious actor to perform a Man-in-the-Middle and intercept traffic between the agent and N-able servers from a privileged network position. ### CVSS Metrics - **CVSS Base Score**: 3.8/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-295: Security Weakness ### Affected Products **N-able - Ecosystem Agent** Affected versions: - < 4.1.5.2597 (Status: affected) - < 5.1.4.2473 (Status: affected) ### References 1. [](https://me.n-able.com/s/article/How-to-check-Ecosystem-Agent-version-in-N-central) 2. [](https://me.n-able.com/s/article/How-to-check-Ecosystem-Agent-Version-in-N-sight) 3. [](https://me.n-able.com/s/security-advisory/aArVy0000000BhpKAE/cve20245445-ecosystem-agent-insufficient-transport-layer-security)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1567, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1567 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1567 - **State**: PUBLISHED - **Published Date**: April 17, 2013 at 12:10 UTC - **Last Updated**: August 06, 2024 at 15:04 UTC - **Reserved Date**: January 30, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle MySQL 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language, a different vulnerability than CVE-2013-2395. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [53372](http://secunia.com/advisories/53372) 2. [GLSA-201308-06](http://security.gentoo.org/glsa/glsa-201308-06.xml) 3. [](http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html) 4. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0054, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0054 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0054 - **State**: PUBLISHED - **Published Date**: October 09, 2019 at 19:26 UTC - **Last Updated**: September 17, 2024 at 00:36 UTC - **Reserved Date**: October 11, 2018 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected. ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-295: Security Weakness - CWE-300: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 15.1X49 (Status: affected) ### References 1. [](https://kb.juniper.net/JSA10952) 2. [](https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-application-identification-overview.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32618, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32618 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32618 - **State**: PUBLISHED - **Published Date**: April 11, 2025 at 08:42 UTC - **Last Updated**: April 11, 2025 at 14:54 UTC - **Reserved Date**: April 09, 2025 at 11:20 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PickPlugins Wishlist allows SQL Injection. This issue affects Wishlist: from n/a through 1.0.43. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **PickPlugins - Wishlist** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wishlist/vulnerability/wordpress-wishlist-plugin-1-0-43-sql-injection-vulnerability?_s_id=cve) ### Credits - NAWardRox (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4969, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4969 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4969 - **State**: PUBLISHED - **Published Date**: January 21, 2021 at 14:00 UTC - **Last Updated**: September 16, 2024 at 23:36 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Identity Governance and Intelligence 5.2.6 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. ### Affected Products **IBM - Security Identity Governance and Intelligence** Affected versions: - 5.2.6 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6403257) 2. [ibm-sig-cve20204969-info-disc (192428)](https://exchange.xforce.ibmcloud.com/vulnerabilities/192428)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1975, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1975 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1975 - **State**: PUBLISHED - **Published Date**: April 27, 2008 at 19:00 UTC - **Last Updated**: August 07, 2024 at 08:41 UTC - **Reserved Date**: April 27, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in E-RESERV 2.1 allows remote attackers to execute arbitrary SQL commands via the ID_loc parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-1345](http://www.vupen.com/english/advisories/2008/1345/references) 2. [ereserv-idloc-sql-injection(41970)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41970) 3. [28899](http://www.securityfocus.com/bid/28899) 4. [29914](http://secunia.com/advisories/29914) 5. [5487](https://www.exploit-db.com/exploits/5487)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1809, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1809 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1809 - **State**: PUBLISHED - **Published Date**: September 08, 2021 at 14:56 UTC - **Last Updated**: August 03, 2024 at 16:25 UTC - **Reserved Date**: December 08, 2020 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A memory corruption issue was addressed with improved validation. This issue is fixed in Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. A malicious application may be able to read restricted memory. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT212317) 2. [](https://support.apple.com/en-us/HT212323) 3. [](https://support.apple.com/en-us/HT212324) 4. [](https://support.apple.com/en-us/HT212325) 5. [](https://support.apple.com/en-us/HT212326) 6. [](https://support.apple.com/en-us/HT212327)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4815, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4815 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4815 - **State**: PUBLISHED - **Published Date**: April 27, 2010 at 15:00 UTC - **Last Updated**: August 07, 2024 at 07:17 UTC - **Reserved Date**: April 27, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in Serv-U before 9.2.0.1 allows remote authenticated users to read arbitrary files via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [37414](http://www.securityfocus.com/bid/37414) 2. [37847](http://secunia.com/advisories/37847) 3. [fileserver-unspecified-info-disclosure(54932)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54932) 4. [](http://www.serv-u.com/releasenotes/) 5. [ADV-2009-3595](http://www.vupen.com/english/advisories/2009/3595)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28124, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28124 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28124 - **State**: PUBLISHED - **Published Date**: April 19, 2023 at 00:00 UTC - **Last Updated**: February 05, 2025 at 15:25 UTC - **Reserved Date**: March 10, 2023 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description Improper usage of symmetric encryption in UI Desktop for Windows (Version 0.59.1.71 and earlier) could allow users with access to UI Desktop configuration files to decrypt their content.This vulnerability is fixed in Version 0.62.3 and later. ### Weakness Classification (CWE) - CWE-326: Security Weakness ### Affected Products **n/a - UI Desktop for Windows** Affected versions: - Fixed on Version 0.62.3 or later. (Status: affected) ### References 1. [](https://community.ui.com/releases/Security-Advisory-Bulletin-029-029/a47c68f2-1f3a-47c3-b577-eb70599644e4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6037, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6037 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6037 - **State**: PUBLISHED - **Published Date**: November 20, 2007 at 11:00 UTC - **Last Updated**: August 07, 2024 at 15:54 UTC - **Reserved Date**: November 19, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in ws/generic_api_call.pl in Citrix NetScaler 8.0 build 47.8 allows remote attackers to inject arbitrary web script or HTML via the standalone parameter and other unspecified parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [39009](http://osvdb.org/39009) 2. [1018981](http://www.securitytracker.com/id?1018981) 3. [27726](http://secunia.com/advisories/27726) 4. [3377](http://securityreason.com/securityalert/3377) 5. [ADV-2007-4065](http://www.vupen.com/english/advisories/2007/4065) 6. [20071119 Citrix NetScaler Web Management XSS](http://www.securityfocus.com/archive/1/483920/100/0/threaded) 7. [netscaler-standalone-xss(38563)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38563) 8. [26491](http://www.securityfocus.com/bid/26491)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2518, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2518 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2518 - **State**: PUBLISHED - **Published Date**: May 29, 2025 at 19:14 UTC - **Last Updated**: May 29, 2025 at 19:28 UTC - **Reserved Date**: March 19, 2025 at 13:25 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-789: OS Command Injection ### Affected Products **IBM - Db2 for Linux, UNIX and Windows** Affected versions: - 11.5.0 (Status: affected) - 12.1.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7235072)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7109, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7109 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7109 - **State**: PUBLISHED - **Published Date**: September 27, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 06:17 UTC - **Reserved Date**: February 15, 2018 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description HPE has addressed a remote arbitrary file modification vulnerability in HPE enhanced Internet Usage Manager (eIUM) v9.0FP1 with the cumulative patch for v9.0FP1 - eIUM90FP01XXX.YYYYMMDD-HHMM. ### Affected Products **Hewlett Packard Enterprise - HPE enhanced Internet Usage Manager (eIUM)** Affected versions: - v9.0FP1 (Status: affected) ### References 1. [105422](http://www.securityfocus.com/bid/105422) 2. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03896en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11480, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11480 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11480 - **State**: PUBLISHED - **Published Date**: April 14, 2020 at 02:10 UTC - **Last Updated**: September 16, 2024 at 20:46 UTC - **Reserved Date**: April 23, 2019 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description The pc-kernel snap build process hardcoded the --allow-insecure-repositories and --allow-unauthenticated apt options when creating the build chroot environment. This could allow an attacker who is able to perform a MITM attack between the build environment and the Ubuntu archive to install a malicious package within the build chroot. This issue affects pc-kernel versions prior to and including 2019-07-16 ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-353: Security Weakness ### Affected Products **Canonical - pc-kernel** Affected versions: - unspecified (Status: affected) ### References 1. [](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11480) 2. [](https://bugs.launchpad.net/bugs/1836041) ### Credits - Sachi King
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3157, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3157 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3157 - **State**: PUBLISHED - **Published Date**: June 22, 2006 at 22:00 UTC - **Last Updated**: August 07, 2024 at 18:16 UTC - **Reserved Date**: June 22, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in index.php in Thinkfactory UltimateGoogle 1.00 and earlier allows remote attackers to inject arbitrary web script or HTML via the REQ parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [18569](http://www.securityfocus.com/bid/18569) 2. [ADV-2006-2476](http://www.vupen.com/english/advisories/2006/2476) 3. [ultimategoogle-index-xss(27271)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27271) 4. [20742](http://secunia.com/advisories/20742) 5. [1016352](http://securitytracker.com/id?1016352) 6. [](http://pridels0.blogspot.com/2006/06/ultimategoogle-xss-vuln.html) 7. [26757](http://www.osvdb.org/26757)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2069, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2069 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2069 - **State**: PUBLISHED - **Published Date**: September 27, 2019 at 18:05 UTC - **Last Updated**: August 04, 2024 at 18:35 UTC - **Reserved Date**: December 10, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117832864 ### Affected Products **n/a - Android** Affected versions: - Android-10 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/android-10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2380, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2380 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2380 - **State**: PUBLISHED - **Published Date**: April 05, 2024 at 13:01 UTC - **Last Updated**: August 01, 2024 at 19:11 UTC - **Reserved Date**: March 11, 2024 at 14:51 UTC - **Assigned By**: Checkmk ### Vulnerability Description Stored XSS in graph rendering in Checkmk <2.3.0b4. ### CVSS Metrics - **CVSS Base Score**: 4.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-80: Security Weakness ### Affected Products **Checkmk GmbH - Checkmk** Affected versions: - 2.3.0 (Status: affected) ### References 1. [](https://checkmk.com/werk/16618)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7791, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7791 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7791 - **State**: PUBLISHED - **Published Date**: May 22, 2019 at 13:57 UTC - **Last Updated**: August 04, 2024 at 20:54 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. ### Affected Products **Adobe - Adobe Acrobat and Reader** Affected versions: - 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-18.html) 2. [108320](http://www.securityfocus.com/bid/108320)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23133 - **State**: PUBLISHED - **Published Date**: April 22, 2021 at 18:00 UTC - **Last Updated**: September 16, 2024 at 19:04 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: palo_alto ### Vulnerability Description A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-362: Security Weakness ### Affected Products **Linux Kernel - Linux Kernel** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.openwall.com/lists/oss-security/2021/04/18/2) 2. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b) 3. [FEDORA-2021-8cd093f639](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/) 4. [FEDORA-2021-e6b4847979](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/) 5. [FEDORA-2021-a963f04012](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/) 6. [[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets](http://www.openwall.com/lists/oss-security/2021/05/10/1) 7. [[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets](http://www.openwall.com/lists/oss-security/2021/05/10/2) 8. [[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets](http://www.openwall.com/lists/oss-security/2021/05/10/4) 9. [[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets](http://www.openwall.com/lists/oss-security/2021/05/10/3) 10. [](https://security.netapp.com/advisory/ntap-20210611-0008/) 11. [[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update](https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html) 12. [[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update](https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html) ### Credits - Or Cohen from Palo Alto Networks
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14378, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14378 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14378 - **State**: PUBLISHED - **Published Date**: July 29, 2019 at 10:05 UTC - **Last Updated**: August 05, 2024 at 00:19 UTC - **Reserved Date**: July 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210) 2. [[oss-security] 20190801 CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly](http://www.openwall.com/lists/oss-security/2019/08/01/2) 3. [FEDORA-2019-77bafc4454](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/) 4. [20190825 [SECURITY] [DSA 4506-1] qemu security update](https://seclists.org/bugtraq/2019/Aug/41) 5. [DSA-4506](https://www.debian.org/security/2019/dsa-4506) 6. [](https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/) 7. [](https://news.ycombinator.com/item?id=20799010) 8. [](http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html) 9. [openSUSE-SU-2019:2041](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html) 10. [DSA-4512](https://www.debian.org/security/2019/dsa-4512) 11. [20190902 [SECURITY] [DSA 4512-1] qemu security update](https://seclists.org/bugtraq/2019/Sep/3) 12. [openSUSE-SU-2019:2059](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html) 13. [](https://support.f5.com/csp/article/K25423748) 14. [[debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update](https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html) 15. [](https://support.f5.com/csp/article/K25423748?utm_source=f5support&amp%3Butm_medium=RSS) 16. [RHSA-2019:3179](https://access.redhat.com/errata/RHSA-2019:3179) 17. [RHSA-2019:3403](https://access.redhat.com/errata/RHSA-2019:3403) 18. [RHSA-2019:3494](https://access.redhat.com/errata/RHSA-2019:3494) 19. [RHSA-2019:3742](https://access.redhat.com/errata/RHSA-2019:3742) 20. [RHSA-2019:3787](https://access.redhat.com/errata/RHSA-2019:3787) 21. [USN-4191-2](https://usn.ubuntu.com/4191-2/) 22. [openSUSE-SU-2019:2510](http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html) 23. [USN-4191-1](https://usn.ubuntu.com/4191-1/) 24. [RHSA-2019:3968](https://access.redhat.com/errata/RHSA-2019:3968) 25. [RHSA-2019:4344](https://access.redhat.com/errata/RHSA-2019:4344) 26. [RHSA-2020:0366](https://access.redhat.com/errata/RHSA-2020:0366) 27. [RHSA-2020:0775](https://access.redhat.com/errata/RHSA-2020:0775)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31654, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31654 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31654 - **State**: PUBLISHED - **Published Date**: July 12, 2022 at 20:43 UTC - **Last Updated**: August 03, 2024 at 07:26 UTC - **Reserved Date**: May 25, 2022 at 00:00 UTC - **Assigned By**: vmware ### Vulnerability Description VMware vRealize Log Insight in versions prior to 8.8.2 contain a stored cross-site scripting vulnerability due to improper input sanitization in configurations. ### Affected Products **n/a - VMware vRealize Log Insight** Affected versions: - VMware vRealize Log Insight prior to 8.8.2 (Status: affected) ### References 1. [](https://www.vmware.com/security/advisories/VMSA-2022-0019.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7943, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7943 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7943 - **State**: PUBLISHED - **Published Date**: October 18, 2017 at 18:00 UTC - **Last Updated**: August 06, 2024 at 08:06 UTC - **Reserved Date**: October 23, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Open redirect vulnerability in the Overlay module in Drupal 7.x before 7.41, the jQuery Update module 7.x-2.x before 7.x-2.7 for Drupal, and the LABjs module 7.x-1.x before 7.x-1.8 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3233. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.drupal.org/node/2598434) 2. [77293](http://www.securityfocus.com/bid/77293) 3. [](https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2015-10-21/drupal-core-overlay-less-critical) 4. [](https://www.drupal.org/node/2598426) 5. [DSA-3897](http://www.debian.org/security/2017/dsa-3897)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-44754, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-44754 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-44754 - **State**: PUBLISHED - **Published Date**: December 17, 2022 at 03:33 UTC - **Last Updated**: April 17, 2025 at 15:19 UTC - **Reserved Date**: November 04, 2022 at 21:08 UTC - **Assigned By**: HCL ### Vulnerability Description HCL Domino is susceptible to a stack based buffer overflow vulnerability in lasr.dll in Micro Focus KeyView. This could allow a remote unauthenticated attacker to crash the application or execute arbitrary code via a crafted Lotus Ami Pro file. This is different from the vulnerability described in CVE-2022-44750.  This vulnerability applies to software previously licensed by IBM. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **HCL Software - Domino** Affected versions: - 9 (Status: affected) ### References 1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0102151)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3861, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3861 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3861 - **State**: PUBLISHED - **Published Date**: November 21, 2022 at 12:45 UTC - **Last Updated**: February 07, 2025 at 20:32 UTC - **Reserved Date**: November 04, 2022 at 13:47 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Betheme theme for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 26.5.1.4 via deserialization of untrusted input supplied via the import, mfn-items-import-page, and mfn-items-import parameters passed through the mfn_builder_import, mfn_builder_import_page, importdata, importsinglepage, and importfromclipboard functions. This makes it possible for authenticated attackers, with contributor level permissions and above to inject a PHP Object. The additional presence of a POP chain would make it possible for attackers to execute code, retrieve sensitive data, delete files, etc.. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/A:H/I:H/C:H/S:U/UI:N/PR:L/AC:L/AV:N` ### Affected Products **MuffinGroup - Betheme** Affected versions: - * (Status: affected) ### References 1. [](https://muffingroup.com/betheme/) 2. [](https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt) 3. [](https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3861) ### Credits - Julien Ahrens
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2823, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2823 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2823 - **State**: PUBLISHED - **Published Date**: August 12, 2014 at 21:00 UTC - **Last Updated**: August 06, 2024 at 10:28 UTC - **Reserved Date**: April 10, 2014 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2810, CVE-2014-2811, CVE-2014-2822, and CVE-2014-4057. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ms-ie-cve20142823-code-exec(94980)](https://exchange.xforce.ibmcloud.com/vulnerabilities/94980) 2. [1030715](http://www.securitytracker.com/id/1030715) 3. [MS14-051](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051) 4. [60670](http://secunia.com/advisories/60670) 5. [69119](http://www.securityfocus.com/bid/69119)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6901, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6901 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6901 - **State**: PUBLISHED - **Published Date**: December 17, 2023 at 14:00 UTC - **Last Updated**: August 02, 2024 at 08:42 UTC - **Reserved Date**: December 16, 2023 at 19:43 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in codelyfe Stupid Simple CMS up to 1.2.3. This affects an unknown part of the file /terminal/handle-command.php of the component HTTP POST Request Handler. The manipulation of the argument command with the input whoami leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248259. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **codelyfe - Stupid Simple CMS** Affected versions: - 1.2.0 (Status: affected) - 1.2.1 (Status: affected) - 1.2.2 (Status: affected) - 1.2.3 (Status: affected) ### References 1. [](https://vuldb.com/?id.248259) 2. [](https://vuldb.com/?ctiid.248259) 3. [](https://github.com/g1an123/POC/blob/main/README.md) ### Credits - ggbot (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39264, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39264 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39264 - **State**: PUBLISHED - **Published Date**: September 28, 2022 at 00:00 UTC - **Last Updated**: April 23, 2025 at 16:54 UTC - **Reserved Date**: September 02, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description nheko is a desktop client for the Matrix communication application. All versions below 0.10.2 are vulnerable homeservers inserting malicious secrets, which could lead to man-in-the-middle attacks. Users can upgrade to version 0.10.2 to protect against this issue. As a workaround, one may apply the patch manually, avoid doing verifications of one's own devices, and/or avoid pressing the request button in the settings menu. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-295: Security Weakness - CWE-287: Improper Authentication ### Affected Products **Nheko-Reborn - nheko** Affected versions: - < 0.10.2 (Status: affected) ### References 1. [](https://github.com/Nheko-Reborn/nheko/security/advisories/GHSA-8jcp-8jq4-5mm7) 2. [](https://github.com/Nheko-Reborn/nheko/commit/67bee15a389f9b8a9f6c3a340558d1e2319e7199) 3. [](https://github.com/Nheko-Reborn/nheko/releases/tag/v0.10.2) 4. [FEDORA-2022-959b529587](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YBOL6OOQGPZD2RLYT4EHAWTFXNIHLYEN/) 5. [FEDORA-2022-1fd94a54a1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TA6A5ADUVAYKD3ZFLF2JPZOTIOFJOEU7/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1532, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1532 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1532 - **State**: PUBLISHED - **Published Date**: April 26, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 01:28 UTC - **Reserved Date**: April 26, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [39348](http://www.securityfocus.com/bid/39348) 2. [39226](http://secunia.com/advisories/39226) 3. [](http://packetstormsecurity.org/1004-exploits/joomlapowermail-lfi.txt) 4. [12118](http://www.exploit-db.com/exploits/12118)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23558, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23558 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23558 - **State**: PUBLISHED - **Published Date**: April 15, 2024 at 21:00 UTC - **Last Updated**: November 01, 2024 at 18:35 UTC - **Reserved Date**: January 18, 2024 at 07:29 UTC - **Assigned By**: HCL ### Vulnerability Description HCL DevOps Deploy / HCL Launch does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Affected Products **HCL Software - DevOps Deploy / Launch** Affected versions: - 7.0 - 7.0.5.20, 7.1 - 7.1.2.16, 7.2 - 7.2.3.9, 7.3 - 7.3.2.4, 8.0 - 8.0.0.1 (Status: affected) ### References 1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111923)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4452, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4452 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4452 - **State**: PUBLISHED - **Published Date**: September 05, 2012 at 20:00 UTC - **Last Updated**: September 16, 2024 at 22:46 UTC - **Reserved Date**: November 15, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in the AdminUsers component in WikkaWiki 1.3.1 and 1.3.2 allows remote attackers to hijack the authentication of administrators for requests that remove arbitrary user accounts via a delete operation, as demonstrated by an {{image}} action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://wush.net/trac/wikka/changeset/1832) 2. [](http://wush.net/trac/wikka/ticket/1098) 3. [](http://wush.net/trac/wikka/changeset/1819) 4. [](http://wush.net/trac/wikka/ticket/1097)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-46769, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-46769 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-46769 - **State**: PUBLISHED - **Published Date**: January 09, 2023 at 10:14 UTC - **Last Updated**: April 09, 2025 at 19:26 UTC - **Reserved Date**: December 07, 2022 at 19:05 UTC - **Assigned By**: apache ### Vulnerability Description An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Sling App CMS version 1.1.2 and prior may allow an authenticated remote attacker to perform a reflected cross-site scripting (XSS) attack in the site group feature. Upgrade to Apache Sling App CMS >= 1.1.4 ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Apache Software Foundation - Apache Sling App CMS** Affected versions: - 0 (Status: affected) ### References 1. [](https://sling.apache.org/news.html) ### Credits - Apache Sling would like to thank Sam Bagheri for reporting this issue
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3102, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3102 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3102 - **State**: PUBLISHED - **Published Date**: September 28, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 23:01 UTC - **Reserved Date**: September 28, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The administrative interface in Movable Type allows attackers to upload files with arbitrary extensions under the web root. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20051103 Buggy blogging](http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0091.html) 2. [16899](http://secunia.com/advisories/16899)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3397, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3397 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3397 - **State**: PUBLISHED - **Published Date**: December 14, 2011 at 00:00 UTC - **Last Updated**: August 06, 2024 at 23:29 UTC - **Reserved Date**: September 09, 2011 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The Microsoft Time component in DATIME.DLL in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted web site that leverages an unspecified "binary behavior" in Internet Explorer, aka "Microsoft Time Remote Code Execution Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [TA11-347A](http://www.us-cert.gov/cas/techalerts/TA11-347A.html) 2. [oval:org.mitre.oval:def:14735](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14735) 3. [MS11-090](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-090)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-1301, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-1301 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-1301 - **State**: PUBLISHED - **Published Date**: April 02, 2003 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:51 UTC - **Reserved Date**: May 01, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description rcs2log, as used in Emacs 20.4, xemacs 21.1.10 and other versions before 21.4, and possibly other packages, allows local users to modify files of other users via a symlink attack on a temporary file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20010807 rcs2log](http://archives.neohapsis.com/archives/bugtraq/2001-08/0093.html) 2. [rcs2log-tmp-symlink(11210)](http://www.iss.net/security_center/static/11210.php) 3. [](http://savannah.gnu.org/cgi-bin/viewcvs/emacs/emacs/lib-src/rcs2log?only_with_tag=EMACS_PRETEST_21_0_95)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14204, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14204 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14204 - **State**: REJECTED - **Published Date**: March 06, 2020 at 23:50 UTC - **Last Updated**: March 06, 2020 at 23:50 UTC - **Reserved Date**: September 07, 2017 at 00:00 UTC - **Assigned By**: zephyr ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-44837, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-44837 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-44837 - **State**: PUBLISHED - **Published Date**: May 01, 2025 at 00:00 UTC - **Last Updated**: May 01, 2025 at 20:34 UTC - **Reserved Date**: April 22, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TOTOLINK CPE CP900 V6.3c.1144_B20190715 was discovered to contain a command injection vulnerability in the CloudSrvUserdataVersionCheck function via the url or magicid parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/n0wstr/IOTVuln/tree/main/CP900/CloudSrvUserdataVersionCheck)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1194, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1194 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1194 - **State**: PUBLISHED - **Published Date**: January 21, 2015 at 18:00 UTC - **Last Updated**: August 06, 2024 at 04:33 UTC - **Reserved Date**: January 18, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description pax 1:20140703 allows remote attackers to write to arbitrary files via a symlink attack in an archive. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20150118 Re: CVE request: pigz, kgb, pax: directory traversal](http://www.openwall.com/lists/oss-security/2015/01/18/3) 2. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774716)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25247, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25247 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25247 - **State**: PUBLISHED - **Published Date**: March 16, 2022 at 14:03 UTC - **Last Updated**: April 16, 2025 at 16:43 UTC - **Reserved Date**: February 16, 2022 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) may allow an attacker to send certain commands to a specific port without authentication. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to obtain full file-system access and remote code execution. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **PTC - Axeda agent** Affected versions: - All Versions (Status: affected) **PTC - Axeda Desktop Server for Windows** Affected versions: - All Versions (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-067-01) 2. [](https://www.ptc.com/en/support/article/CS363561) ### Credits - Yuval Shoshani and Elad Luz of CyberMDX and Vedere Labs reported these vulnerabilities to PTC
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9369, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9369 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9369 - **State**: PUBLISHED - **Published Date**: November 14, 2017 at 21:00 UTC - **Last Updated**: September 16, 2024 at 17:08 UTC - **Reserved Date**: June 02, 2017 at 00:00 UTC - **Assigned By**: blackberry ### Vulnerability Description In BlackBerry QNX Software Development Platform (SDP) 6.6.0 and 6.5.0 SP1 and earlier, an information disclosure vulnerability in the default configuration of the QNX SDP could allow an attacker to gain information relating to memory layout of higher privileged processes by manipulating environment variables that influence the loader. ### Affected Products **BlackBerry - QNX Software Development Platform (QNX SDP)** Affected versions: - 6.6.0 (Status: affected) - 6.5.0 SP1 and earlier (Status: affected) ### References 1. [](http://support.blackberry.com/kb/articleDetail?articleNumber=000046674)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-29595, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-29595 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-29595 - **State**: PUBLISHED - **Published Date**: December 07, 2020 at 18:49 UTC - **Last Updated**: August 04, 2024 at 16:55 UTC - **Reserved Date**: December 07, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PlugIns\IDE_ACDStd.apl in ACDSee Photo Studio Studio Professional 2021 14.0 Build 1705 has a User Mode Write AV starting at IDE_ACDStd!JPEGTransW+0x00000000000031aa. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/secluck/pentest/blob/main/000078.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24236, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24236 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24236 - **State**: PUBLISHED - **Published Date**: March 31, 2025 at 22:22 UTC - **Last Updated**: April 02, 2025 at 15:19 UTC - **Reserved Date**: January 17, 2025 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/122373) 2. [](https://support.apple.com/en-us/122374)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22582, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22582 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22582 - **State**: PUBLISHED - **Published Date**: February 27, 2023 at 00:00 UTC - **Last Updated**: March 11, 2025 at 17:12 UTC - **Reserved Date**: January 05, 2022 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. This issue is fixed in Security Update 2022-003 Catalina, macOS Big Sur 11.6.5, macOS Monterey 12.3. A local user may be able to write arbitrary files. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213183) 2. [](https://support.apple.com/en-us/HT213184) 3. [](https://support.apple.com/en-us/HT213185)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16239, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16239 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16239 - **State**: PUBLISHED - **Published Date**: November 14, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 20:20 UTC - **Reserved Date**: October 31, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In OpenStack Nova through 14.0.9, 15.x through 15.0.7, and 16.x through 16.0.2, by rebuilding an instance, an authenticated user may be able to circumvent the Filter Scheduler bypassing imposed filters (for example, the ImagePropertiesFilter or the IsolatedHostsFilter). All setups using Nova Filter Scheduler are affected. Because of the regression described in Launchpad Bug #1732947, the preferred fix is a 14.x version after 14.0.10, a 15.x version after 15.0.8, or a 16.x version after 16.0.3. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [101950](http://www.securityfocus.com/bid/101950) 2. [RHSA-2018:0369](https://access.redhat.com/errata/RHSA-2018:0369) 3. [RHSA-2018:0241](https://access.redhat.com/errata/RHSA-2018:0241) 4. [DSA-4056](https://www.debian.org/security/2017/dsa-4056) 5. [](https://launchpad.net/bugs/1664931) 6. [](https://security.openstack.org/ossa/OSSA-2017-005.html) 7. [RHSA-2018:0314](https://access.redhat.com/errata/RHSA-2018:0314)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2773, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2773 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2773 - **State**: PUBLISHED - **Published Date**: August 11, 2022 at 11:51 UTC - **Last Updated**: April 15, 2025 at 13:51 UTC - **Reserved Date**: August 11, 2022 at 00:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Apartment Visitor Management System. It has been classified as problematic. This affects an unknown part of the file profile.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-206169 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **SourceCodester - Apartment Visitor Management System** Affected versions: - n/a (Status: affected) ### References 1. [](https://vuldb.com/?id.206169)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45846, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45846 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45846 - **State**: PUBLISHED - **Published Date**: May 10, 2023 at 11:08 UTC - **Last Updated**: January 09, 2025 at 15:17 UTC - **Reserved Date**: November 23, 2022 at 07:45 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Nickys Image Map Pro for WordPress - Interactive SVG Image Map Builder plugin < 5.6.9 versions. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Nickys - Image Map Pro for WordPress - Interactive SVG Image Map Builder** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/image-map-pro-wordpress/wordpress-image-map-pro-premium-plugin-5-5-0-multiple-cross-site-request-forgery-csrf-vulnerabilities?_s_id=cve) ### Credits - Dave Jong (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6651, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6651 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6651 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: August 21, 2015 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0953, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0953 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0953 - **State**: PUBLISHED - **Published Date**: April 02, 2003 at 05:00 UTC - **Last Updated**: August 08, 2024 at 03:12 UTC - **Reserved Date**: August 16, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description globals.php in PHP Address before 0.2f, with the PHP allow_url_fopen and register_globals variables enabled, allows remote attackers to execute arbitrary PHP code via a URL to the code in the LangCookie parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20020617 PHP source injection in PHPAddress](http://archives.neohapsis.com/archives/bugtraq/2002-06/0182.html) 2. [20020619 Source Injection into PHPAddress](http://online.securityfocus.com/archive/1/277987) 3. [5039](http://www.securityfocus.com/bid/5039) 4. [phpaddress-include-remote-files(9379)](http://www.iss.net/security_center/static/9379.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11006 - **State**: PUBLISHED - **Published Date**: May 08, 2020 at 18:45 UTC - **Last Updated**: August 04, 2024 at 11:21 UTC - **Reserved Date**: March 30, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In Shopizer before version 2.11.0, a script can be injected in various forms and saved in the database, then executed when information is fetched from backend. This has been patched in version 2.11.0. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L` ### Affected Products **shopizer-ecommerce - shopizer** Affected versions: - < 2.11.0 (Status: affected) ### References 1. [](https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a) 2. [](https://github.com/shopizer-ecommerce/shopizer/security/advisories/GHSA-8pc4-gvfw-634p)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28431, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28431 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28431 - **State**: PUBLISHED - **Published Date**: March 22, 2023 at 20:11 UTC - **Last Updated**: February 25, 2025 at 14:51 UTC - **Reserved Date**: March 15, 2023 at 15:59 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Frontier is an Ethereum compatibility layer for Substrate. Frontier's `modexp` precompile uses `num-bigint` crate under the hood. In the implementation prior to pull request 1017, the cases for modulus being even and modulus being odd are treated separately. Odd modulus uses the fast Montgomery multiplication, and even modulus uses the slow plain power algorithm. This gas cost discrepancy was not accounted for in the `modexp` precompile, leading to possible denial of service attacks. No fixes for `num-bigint` are currently available, and thus this issue is fixed in the short term by raising the gas costs for even modulus, and in the long term fixing it in `num-bigint` or switching to another modexp implementation. The short-term fix for Frontier is deployed at pull request 1017. There are no known workarounds aside from applying the fix. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-682: Security Weakness ### Affected Products **paritytech - frontier** Affected versions: - <= 0.1.0 (Status: affected) ### References 1. [https://github.com/paritytech/frontier/security/advisories/GHSA-fcmm-54jp-7vf6](https://github.com/paritytech/frontier/security/advisories/GHSA-fcmm-54jp-7vf6) 2. [https://github.com/paritytech/frontier/pull/1017](https://github.com/paritytech/frontier/pull/1017) 3. [https://github.com/paritytech/frontier/commit/5af12e94d7dfc8a0208a290643a800f55de7b219](https://github.com/paritytech/frontier/commit/5af12e94d7dfc8a0208a290643a800f55de7b219) 4. [https://github.com/rust-num/num-bigint/blob/6f2b8e0fc218dbd0f49bebb8db2d1a771fe6bafa/src/biguint/power.rs#L134](https://github.com/rust-num/num-bigint/blob/6f2b8e0fc218dbd0f49bebb8db2d1a771fe6bafa/src/biguint/power.rs#L134)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49189, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49189 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49189 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 01:55 UTC - **Last Updated**: May 04, 2025 at 08:31 UTC - **Reserved Date**: February 26, 2025 at 01:49 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: clk: qcom: clk-rcg2: Update logic to calculate D value for RCG The display pixel clock has a requirement on certain newer platforms to support M/N as (2/3) and the final D value calculated results in underflow errors. As the current implementation does not check for D value is within the accepted range for a given M & N value. Update the logic to calculate the final D value based on the range. ### Affected Products **Linux - Linux** Affected versions: - 99cbd064b059f222c8839ba433a68b2d6ee33066 (Status: affected) - 99cbd064b059f222c8839ba433a68b2d6ee33066 (Status: affected) - 99cbd064b059f222c8839ba433a68b2d6ee33066 (Status: affected) - 99cbd064b059f222c8839ba433a68b2d6ee33066 (Status: affected) - 99cbd064b059f222c8839ba433a68b2d6ee33066 (Status: affected) - 99cbd064b059f222c8839ba433a68b2d6ee33066 (Status: affected) **Linux - Linux** Affected versions: - 3.16 (Status: affected) - 0 (Status: unaffected) - 5.4.189 (Status: unaffected) - 5.10.110 (Status: unaffected) - 5.15.33 (Status: unaffected) - 5.16.19 (Status: unaffected) - 5.17.2 (Status: unaffected) - 5.18 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/52592f9afbfe01bce8f8953e4f19cbe3bcbdbd3a) 2. [](https://git.kernel.org/stable/c/334720f418f57b1d969dad2117b21f9388cb9395) 3. [](https://git.kernel.org/stable/c/34dca60982e93e69ae442aa2d36ce61c9a3bb563) 4. [](https://git.kernel.org/stable/c/96888f0dcf351e758b9df57e015a48427ca709c1) 5. [](https://git.kernel.org/stable/c/a4e2e31971354790b0d1fa3e783452a9d135fcff) 6. [](https://git.kernel.org/stable/c/58922910add18583d5273c2edcdb9fd7bf4eca02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6522, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6522 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6522 - **State**: PUBLISHED - **Published Date**: December 24, 2007 at 20:00 UTC - **Last Updated**: August 07, 2024 at 16:11 UTC - **Reserved Date**: December 24, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The rich text editing functionality in Opera before 9.25 allows remote attackers to conduct cross-domain scripting attacks by using designMode to modify contents of pages in other domains. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.opera.com/docs/changelogs/windows/925/) 2. [](http://bugs.gentoo.org/show_bug.cgi?id=202770) 3. [](http://www.opera.com/docs/changelogs/linux/925/) 4. [1019131](http://www.securitytracker.com/id?1019131) 5. [28314](http://secunia.com/advisories/28314) 6. [26937](http://www.securityfocus.com/bid/26937) 7. [opera-plugins-security-bypass(39147)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39147) 8. [](http://www.opera.com/support/search/view/875/) 9. [SUSE-SA:2008:001](http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00001.html) 10. [GLSA-200712-22](http://security.gentoo.org/glsa/glsa-200712-22.xml) 11. [ADV-2007-4261](http://www.vupen.com/english/advisories/2007/4261) 12. [28169](http://secunia.com/advisories/28169) 13. [28290](http://secunia.com/advisories/28290)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3442, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3442 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3442 - **State**: PUBLISHED - **Published Date**: September 12, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 18:30 UTC - **Reserved Date**: July 07, 2006 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Unspecified vulnerability in Pragmatic General Multicast (PGM) in Microsoft Windows XP SP2 and earlier allows remote attackers to execute arbitrary code via a crafted multicast message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19922](http://www.securityfocus.com/bid/19922) 2. [MS06-052](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-052) 3. [ADV-2006-3563](http://www.vupen.com/english/advisories/2006/3563) 4. [oval:org.mitre.oval:def:457](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A457) 5. [VU#455516](http://www.kb.cert.org/vuls/id/455516) 6. [TA06-255A](http://www.us-cert.gov/cas/techalerts/TA06-255A.html) 7. [win-pgm-bo(28643)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28643) 8. [21851](http://secunia.com/advisories/21851) 9. [SSRT061187](http://www.securityfocus.com/archive/1/446630/100/100/threaded) 10. [HPSBST02134](http://www.securityfocus.com/archive/1/446630/100/100/threaded) 11. [1016827](http://securitytracker.com/id?1016827)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2695, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2695 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2695 - **State**: PUBLISHED - **Published Date**: June 15, 2024 at 08:42 UTC - **Last Updated**: August 01, 2024 at 19:18 UTC - **Reserved Date**: March 19, 2024 at 20:54 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Shariff Wrapper plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'shariff' shortcode in all versions up to, and including, 4.6.13 due to insufficient input sanitization and output escaping on user supplied attributes such as 'borderradius' and 'timestamp'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **3uu - Shariff Wrapper** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/9baa8bbf-a318-4bc5-8bfd-2bd64536965e?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3069111%40shariff%2Ftrunk&old=3061040%40shariff%2Ftrunk&sfp_email=&sfph_mail=#file1) ### Credits - Ngô Thiên An
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23426, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23426 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23426 - **State**: PUBLISHED - **Published Date**: September 01, 2021 at 14:25 UTC - **Last Updated**: September 16, 2024 at 23:16 UTC - **Reserved Date**: January 08, 2021 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description This affects all versions of package Proto. It is possible to inject pollute the object property of an application using Proto by leveraging the merge function. ### CVSS Metrics - **CVSS Base Score**: 5.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:U/RC:C` ### Affected Products **n/a - Proto** Affected versions: - 0 (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-JS-PROTO-1316301) 2. [](https://www.npmjs.com/package/Proto) ### Credits - Vanshal Gaur
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7284, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7284 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7284 - **State**: PUBLISHED - **Published Date**: December 18, 2019 at 17:33 UTC - **Last Updated**: August 04, 2024 at 20:46 UTC - **Reserved Date**: January 31, 2019 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description This issue was addressed with improved checks. This issue is fixed in iOS 12.2. Processing a maliciously crafted mail message may lead to S/MIME signature spoofing. ### Affected Products **Apple - iOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/HT209599)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4387, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4387 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4387 - **State**: PUBLISHED - **Published Date**: October 02, 2006 at 21:00 UTC - **Last Updated**: August 07, 2024 at 19:06 UTC - **Reserved Date**: August 28, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Apple Mac OS X 10.4 through 10.4.7, when the administrator clears the "Allow user to administer this computer" checkbox in System Preferences for a user, does not remove the user's account from the appserveradm or appserverusr groups, which still allows the user to manage WebObjects applications. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1016955](http://securitytracker.com/id?1016955) 2. [20271](http://www.securityfocus.com/bid/20271) 3. [22187](http://secunia.com/advisories/22187) 4. [ADV-2006-3852](http://www.vupen.com/english/advisories/2006/3852) 5. [APPLE-SA-2006-09-29](http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html) 6. [macos-webobjects-incorrect-privileges(29296)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29296) 7. [29273](http://www.osvdb.org/29273)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54170, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54170 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54170 - **State**: PUBLISHED - **Published Date**: February 27, 2025 at 14:55 UTC - **Last Updated**: February 27, 2025 at 15:12 UTC - **Reserved Date**: November 30, 2024 at 14:47 UTC - **Assigned By**: ibm ### Vulnerability Description IBM EntireX 11.1 could allow a local user to cause a denial of service due to use of a regular expression with an inefficient complexity that consumes excessive CPU cycles. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-1333: Security Weakness ### Affected Products **IBM - EntireX** Affected versions: - 11.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7184194)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16650, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16650 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16650 - **State**: PUBLISHED - **Published Date**: September 21, 2019 at 01:54 UTC - **Last Updated**: August 05, 2024 at 01:17 UTC - **Reserved Date**: September 20, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description On Supermicro X10 and X11 products, a client's access privileges may be transferred to a different client that later has the same socket file descriptor number. In opportunistic circumstances, an attacker can simply connect to the virtual media service, and then connect virtual USB devices to the server managed by the BMC. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://eclypsium.com/2019/09/03/usbanywhere-bmc-vulnerability-opens-servers-to-remote-attack/) 2. [](https://github.com/eclypsium/USBAnywhere) 3. [](https://www.supermicro.com/support/security_BMC_virtual_media.cfm)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29440, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29440 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29440 - **State**: REJECTED - **Published Date**: March 25, 2024 at 00:00 UTC - **Last Updated**: May 27, 2024 at 00:14 UTC - **Reserved Date**: March 19, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36484, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36484 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36484 - **State**: PUBLISHED - **Published Date**: August 25, 2022 at 13:55 UTC - **Last Updated**: August 03, 2024 at 10:07 UTC - **Reserved Date**: July 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a stack overflow via the function setDiagnosisCfg. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30330, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30330 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30330 - **State**: PUBLISHED - **Published Date**: May 13, 2025 at 17:48 UTC - **Last Updated**: May 13, 2025 at 18:41 UTC - **Reserved Date**: March 20, 2025 at 17:36 UTC - **Assigned By**: adobe ### Vulnerability Description Illustrator versions 29.3, 28.7.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Adobe - Illustrator** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/illustrator/apsb25-43.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4112, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4112 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4112 - **State**: PUBLISHED - **Published Date**: October 19, 2013 at 10:00 UTC - **Last Updated**: September 17, 2024 at 02:05 UTC - **Reserved Date**: July 31, 2012 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The Baseboard Management Controller (BMC) in Cisco Unified Computing System (UCS) allows local users to gain privileges and execute arbitrary commands via crafted command parameters within the command-line interface, aka Bug ID CSCtr43330. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20131016 Cisco Unified Computing System Baseboard Management Controller Command Injection Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4112)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5421, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5421 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5421 - **State**: REJECTED - **Published Date**: March 05, 2019 at 20:00 UTC - **Last Updated**: March 05, 2019 at 19:57 UTC - **Reserved Date**: January 12, 2018 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5150, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5150 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5150 - **State**: PUBLISHED - **Published Date**: May 29, 2024 at 02:00 UTC - **Last Updated**: August 01, 2024 at 21:03 UTC - **Reserved Date**: May 20, 2024 at 18:19 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Login with phone number plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.7.26. This is due to the 'activation_code' default value is empty, and the not empty check is missing in the 'lwp_ajax_register' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user email. The vulnerability is patched in version 1.7.26, but there is an issue in the patch that causes the entire function to not work, and this issue is fixed in version 1.7.27. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **glboy - Login with phone number** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/cf34eb9f-f6e9-4a7a-8459-c86f9fa3dad8?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/login-with-phone-number/tags/1.7.25/login-with-phonenumber.php#L4183) 3. [](https://plugins.trac.wordpress.org/browser/login-with-phone-number/tags/1.7.25/login-with-phonenumber.php#L4220) 4. [](https://plugins.trac.wordpress.org/browser/login-with-phone-number/tags/1.7.25/login-with-phonenumber.php#L4241) 5. [](https://plugins.trac.wordpress.org/changeset/3090625/login-with-phone-number) 6. [](https://plugins.trac.wordpress.org/changeset/3090754/login-with-phone-number#file5) ### Credits - István Márton
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1072, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1072 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1072 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: January 11, 2013 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0541, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0541 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0541 - **State**: PUBLISHED - **Published Date**: January 08, 2019 at 21:00 UTC - **Last Updated**: February 07, 2025 at 16:28 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in the way that the MSHTML engine inproperly validates input, aka "MSHTML Engine Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Office Word Viewer, Internet Explorer 9, Internet Explorer 11, Microsoft Excel Viewer, Internet Explorer 10, Office 365 ProPlus. ### Affected Products **Microsoft - Microsoft Office** Affected versions: - 2010 Service Pack 2 (32-bit editions) (Status: affected) - 2010 Service Pack 2 (64-bit editions) (Status: affected) - 2013 RT Service Pack 1 (Status: affected) - 2013 Service Pack 1 (32-bit editions) (Status: affected) - 2013 Service Pack 1 (64-bit editions) (Status: affected) - 2016 (32-bit edition) (Status: affected) - 2016 (64-bit edition) (Status: affected) - 2019 for 32-bit editions (Status: affected) - 2019 for 64-bit editions (Status: affected) **Microsoft - Microsoft Office Word Viewer** Affected versions: - Microsoft Office Word Viewer (Status: affected) **Microsoft - Internet Explorer 9** Affected versions: - Windows Server 2008 for 32-bit Systems Service Pack 2 (Status: affected) - Windows Server 2008 for x64-based Systems Service Pack 2 (Status: affected) **Microsoft - Internet Explorer 11** Affected versions: - Windows 10 for 32-bit Systems (Status: affected) - Windows 10 for x64-based Systems (Status: affected) - Windows 10 Version 1607 for 32-bit Systems (Status: affected) - Windows 10 Version 1607 for x64-based Systems (Status: affected) - Windows 10 Version 1703 for 32-bit Systems (Status: affected) - Windows 10 Version 1703 for x64-based Systems (Status: affected) - Windows 10 Version 1709 for 32-bit Systems (Status: affected) - Windows 10 Version 1709 for ARM64-based Systems (Status: affected) - Windows 10 Version 1709 for x64-based Systems (Status: affected) - Windows 10 Version 1803 for 32-bit Systems (Status: affected) - Windows 10 Version 1803 for ARM64-based Systems (Status: affected) - Windows 10 Version 1803 for x64-based Systems (Status: affected) - Windows 10 Version 1809 for 32-bit Systems (Status: affected) - Windows 10 Version 1809 for ARM64-based Systems (Status: affected) - Windows 10 Version 1809 for x64-based Systems (Status: affected) - Windows 7 for 32-bit Systems Service Pack 1 (Status: affected) - Windows 7 for x64-based Systems Service Pack 1 (Status: affected) - Windows 8.1 for 32-bit systems (Status: affected) - Windows 8.1 for x64-based systems (Status: affected) - Windows RT 8.1 (Status: affected) - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) - Windows Server 2012 R2 (Status: affected) - Windows Server 2016 (Status: affected) - Windows Server 2019 (Status: affected) **Microsoft - Microsoft Excel Viewer** Affected versions: - 2007 Service Pack 3 (Status: affected) **Microsoft - Internet Explorer 10** Affected versions: - Windows Server 2012 (Status: affected) **Microsoft - Office** Affected versions: - 365 ProPlus for 32-bit Systems (Status: affected) - 365 ProPlus for 64-bit Systems (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0541) 2. [46536](https://www.exploit-db.com/exploits/46536/) 3. [106402](http://www.securityfocus.com/bid/106402)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51688, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51688 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51688 - **State**: PUBLISHED - **Published Date**: November 14, 2024 at 20:04 UTC - **Last Updated**: November 14, 2024 at 21:19 UTC - **Reserved Date**: October 30, 2024 at 15:05 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in FraudLabs Pro FraudLabs Pro SMS Verification allows Stored XSS.This issue affects FraudLabs Pro SMS Verification: from n/a through 1.10.1. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **FraudLabs Pro - FraudLabs Pro SMS Verification** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/fraudlabs-pro-sms-verification/wordpress-fraudlabs-pro-sms-verification-plugin-1-10-1-csrf-to-stored-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6589, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6589 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6589 - **State**: PUBLISHED - **Published Date**: March 09, 2017 at 19:00 UTC - **Last Updated**: August 05, 2024 at 15:33 UTC - **Reserved Date**: March 09, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description EpicEditor through 0.2.3 has Cross-Site Scripting because of an insecure default marked.js configuration. An example attack vector is a crafted IMG element in an HTML document. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bad.code.blog/2017/03/09/epiceditor-cross-site-scripting/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-49122, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-49122 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-49122 - **State**: PUBLISHED - **Published Date**: January 09, 2024 at 09:59 UTC - **Last Updated**: May 01, 2025 at 03:55 UTC - **Reserved Date**: November 22, 2023 at 14:43 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Siemens - Solid Edge SE2023** Affected versions: - All versions < V223.0 Update 10 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26375, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26375 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26375 - **State**: REJECTED - **Last Updated**: December 02, 2022 at 00:00 UTC - **Reserved Date**: October 01, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34412, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34412 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34412 - **State**: PUBLISHED - **Published Date**: August 17, 2023 at 13:07 UTC - **Last Updated**: August 02, 2024 at 16:10 UTC - **Reserved Date**: June 05, 2023 at 12:05 UTC - **Assigned By**: CERTVDE ### Vulnerability Description A vulnerability in Red Lion Europe mbNET/mbNET.rokey and Helmholz REX 200 and REX 250 devices with firmware lower 7.3.2 allows an authenticated remote attacker with high privileges to inject malicious HTML or JavaScript code (XSS). ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Red Lion Europe - mbNET** Affected versions: - 0 (Status: affected) **Red Lion Europe - mbNET.rokey** Affected versions: - 0 (Status: affected) **Helmholz - REX 200** Affected versions: - 0 (Status: affected) **Helmholz - REX 250** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert.vde.com/en/advisories/VDE-2023-012/) 2. [](https://cert.vde.com/en/advisories/VDE-2023-029/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5898, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5898 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5898 - **State**: PUBLISHED - **Published Date**: January 15, 2014 at 01:33 UTC - **Last Updated**: August 06, 2024 at 17:22 UTC - **Reserved Date**: September 18, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-0375 and CVE-2014-0403. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2014:0414](https://access.redhat.com/errata/RHSA-2014:0414) 2. [SSRT101455](http://marc.info/?l=bugtraq&m=139402749111889&w=2) 3. [RHSA-2014:0135](http://rhn.redhat.com/errata/RHSA-2014-0135.html) 4. [56535](http://secunia.com/advisories/56535) 5. [102027](http://osvdb.org/102027) 6. [RHSA-2014:0030](http://rhn.redhat.com/errata/RHSA-2014-0030.html) 7. [56485](http://secunia.com/advisories/56485) 8. [SSRT101454](http://marc.info/?l=bugtraq&m=139402697611681&w=2) 9. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777) 10. [HPSBUX02972](http://marc.info/?l=bugtraq&m=139402697611681&w=2) 11. [SUSE-SU-2014:0451](http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html) 12. [HPSBUX02973](http://marc.info/?l=bugtraq&m=139402749111889&w=2) 13. [1029608](http://www.securitytracker.com/id/1029608) 14. [64912](http://www.securityfocus.com/bid/64912) 15. [oracle-cpujan2014-cve20135898(90356)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90356) 16. [SUSE-SU-2014:0266](http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html) 17. [64758](http://www.securityfocus.com/bid/64758) 18. [SUSE-SU-2014:0246](http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html) 19. [](http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html) 20. [RHSA-2014:0134](http://rhn.redhat.com/errata/RHSA-2014-0134.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9629 - **State**: PUBLISHED - **Published Date**: January 24, 2020 at 21:57 UTC - **Last Updated**: August 06, 2024 at 13:47 UTC - **Reserved Date**: January 20, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer overflow in the Encode function in modules/codec/schroedinger.c in VideoLAN VLC media player before 2.1.6 and 2.2.x before 2.2.1 allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted length value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://openwall.com/lists/oss-security/2015/01/20/5) 2. [](https://github.com/videolan/vlc/commit/9bb0353a5c63a7f8c6fc853faa3df4b4df1f5eb5) 3. [](https://www.videolan.org/security/sa1501.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-42135, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-42135 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-42135 - **State**: PUBLISHED - **Published Date**: October 11, 2021 at 02:52 UTC - **Last Updated**: August 04, 2024 at 03:30 UTC - **Reserved Date**: October 11, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HashiCorp Vault and Vault Enterprise 1.8.x through 1.8.4 may have an unexpected interaction between glob-related policies and the Google Cloud secrets engine. Users may, in some situations, have more privileges than intended, e.g., a user with read permission for the /gcp/roleset/* path may be able to issue Google Cloud service account credentials. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://discuss.hashicorp.com/t/hcsec-2021-28-vaults-google-cloud-secrets-engine-policies-with-globs-may-provide-additional-privileges-in-vault-1-8-0-onwards/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2233, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2233 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2233 - **State**: PUBLISHED - **Published Date**: April 22, 2021 at 21:53 UTC - **Last Updated**: September 26, 2024 at 15:05 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Enterprise Asset Management product of Oracle E-Business Suite (component: Setup). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Asset Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Enterprise Asset Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Enterprise Asset Management accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N` ### Affected Products **Oracle Corporation - Enterprise Asset Management** Affected versions: - 12.1.1-12.1.3 (Status: affected) - 12.2.3-12.2.10 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6311, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6311 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6311 - **State**: PUBLISHED - **Published Date**: August 22, 2017 at 18:00 UTC - **Last Updated**: August 06, 2024 at 01:29 UTC - **Reserved Date**: July 26, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Get requests in JBoss Enterprise Application Platform (EAP) 7 disclose internal IP addresses to remote attackers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2017:3458](https://access.redhat.com/errata/RHSA-2017:3458) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1362735) 3. [RHSA-2017:3455](https://access.redhat.com/errata/RHSA-2017:3455) 4. [RHSA-2017:3456](https://access.redhat.com/errata/RHSA-2017:3456) 5. [RHSA-2017:3454](https://access.redhat.com/errata/RHSA-2017:3454)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1010151, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1010151 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1010151 - **State**: PUBLISHED - **Published Date**: July 19, 2019 at 13:56 UTC - **Last Updated**: August 05, 2024 at 03:07 UTC - **Reserved Date**: March 20, 2019 at 00:00 UTC - **Assigned By**: dwf ### Vulnerability Description zzcms zzmcms 8.3 and earlier is affected by: File Delete to getshell. The impact is: getshell. The component is: /user/ppsave.php. ### Affected Products **zzcms - zzmcms** Affected versions: - ≤ 8.3 (Status: affected) ### References 1. [](https://gist.github.com/Lz1y/24a6368c7ffdc1af7292035dd16a97f5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3271, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3271 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3271 - **State**: PUBLISHED - **Published Date**: January 27, 2017 at 22:01 UTC - **Last Updated**: October 09, 2024 at 19:37 UTC - **Reserved Date**: December 06, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters ). Supported versions that are affected are 8.5.2 and 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data as well as unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS v3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). ### Affected Products **Oracle - Outside In Technology** Affected versions: - 8.5.2 (Status: affected) - 8.5.3 (Status: affected) ### References 1. [95532](http://www.securityfocus.com/bid/95532) 2. [1037631](http://www.securitytracker.com/id/1037631) 3. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40108, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40108 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40108 - **State**: PUBLISHED - **Published Date**: September 27, 2021 at 12:01 UTC - **Last Updated**: August 04, 2024 at 02:27 UTC - **Reserved Date**: August 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Concrete CMS through 8.5.5. The Calendar is vulnerable to CSRF. ccm_token is not verified on the ccm/calendar/dialogs/event/add/save endpoint. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://hackerone.com/reports/1102018) 2. [](https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1641, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1641 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1641 - **State**: PUBLISHED - **Published Date**: March 28, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 03:34 UTC - **Reserved Date**: March 28, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple buffer overflows in Oracle Web Cache for Oracle 9i Application Server (9iAS) allow remote attackers to execute arbitrary code via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#291555](http://www.kb.cert.org/vuls/id/291555) 2. [4856](http://www.securityfocus.com/bid/4856) 3. [](http://www.nextgenss.com/vna/ora-webcache.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0372, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0372 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0372 - **State**: PUBLISHED - **Published Date**: January 22, 2008 at 19:00 UTC - **Last Updated**: August 07, 2024 at 07:39 UTC - **Reserved Date**: January 22, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description 8e6 R3000 Internet Filter 2.0.05.33, and other versions before 2.0.11, allows remote attackers to bypass intended restrictions via a fragmented HTTP request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20080121 Re: 8e6 Technologies R3000 Internet Filter Bypass by Request Split](http://www.securityfocus.com/archive/1/486770/100/0/threaded) 2. [3557](http://securityreason.com/securityalert/3557) 3. [27309](http://www.securityfocus.com/bid/27309) 4. [28524](http://secunia.com/advisories/28524) 5. [r3000-urlfilter-security-bypass(39723)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39723) 6. [20080116 8e6 Technologies R3000 Internet Filter Bypass by Request Split](http://www.securityfocus.com/archive/1/486398/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48153, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48153 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48153 - **State**: PUBLISHED - **Published Date**: October 14, 2024 at 00:00 UTC - **Last Updated**: October 17, 2024 at 17:26 UTC - **Reserved Date**: October 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the get_subconfig function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/tw11ty/CVE/blob/main/DrayTek/Vigor3900/Vigor3900%20command%20execution%20vulnerability.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0496, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0496 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0496 - **State**: PUBLISHED - **Published Date**: December 15, 2020 at 15:57 UTC - **Last Updated**: August 04, 2024 at 06:02 UTC - **Reserved Date**: October 17, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In CPDF_RenderStatus::LoadSMask of cpdf_renderstatus.cpp, there is a possible memory corruption due to a use-after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-149481220 ### Affected Products **n/a - Android** Affected versions: - Android-11 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2020-12-01)