System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52899, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52899 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52899 - **State**: PUBLISHED - **Published Date**: November 26, 2024 at 00:34 UTC - **Last Updated**: November 26, 2024 at 15:29 UTC - **Reserved Date**: November 17, 2024 at 14:25 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Data Virtualization Manager for z/OS 1.1 and 1.2 could allow an authenticated user to inject malicious JDBC URL parameters and execute code on the server. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **IBM - Data Virtualization Manager for z/OS** Affected versions: - 1.1, 1.2 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7177091)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5250, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5250 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5250 - **State**: PUBLISHED - **Published Date**: March 05, 2020 at 17:00 UTC - **Last Updated**: August 04, 2024 at 08:22 UTC - **Reserved Date**: January 02, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In PrestaShop before version 1.7.6.4, when a customer edits their address, they can freely change the id_address in the form, and thus steal someone else's address. It is the same with CustomerForm, you are able to change the id_customer and change all information of all accounts. The problem is patched in version 1.7.6.4. ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-285: Security Weakness ### Affected Products **PrestaShop - PrestaShop** Affected versions: - < 1.7.6.4 (Status: affected) ### References 1. [](https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-mhfc-6rhg-fxp3) 2. [](https://github.com/PrestaShop/PrestaShop/commit/a4a609b5064661f0b47ab5bc538e1a9cd3dd1069)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1372, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1372 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1372 - **State**: PUBLISHED - **Published Date**: July 21, 2017 at 20:00 UTC - **Last Updated**: September 16, 2024 at 19:10 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM TRIRIGA Application Platform 3.3, 3.4, and 3.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 126865. ### Affected Products **IBM - TRIRIGA Application Platform** Affected versions: - 3.3 (Status: affected) - 3.3.1 (Status: affected) - 3.3.2 (Status: affected) - 3.4 (Status: affected) - 3.4.1 (Status: affected) - 3.4.2 (Status: affected) - 3.5 (Status: affected) - 3.5.1 (Status: affected) - 3.5.2 (Status: affected) ### References 1. [](http://www.ibm.com/support/docview.wss?uid=swg22004675) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/126865)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-0330, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-0330 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-0330 - **State**: PUBLISHED - **Published Date**: February 10, 2021 at 16:49 UTC - **Last Updated**: August 03, 2024 at 15:39 UTC - **Reserved Date**: November 06, 2020 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-170732441 ### Affected Products **n/a - Android** Affected versions: - Android-9 Android-10 Android-11 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2021-02-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4212, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4212 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4212 - **State**: PUBLISHED - **Published Date**: July 13, 2016 at 01:00 UTC - **Last Updated**: August 06, 2024 at 00:25 UTC - **Reserved Date**: April 27, 2016 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [91716](http://www.securityfocus.com/bid/91716) 2. [1036281](http://www.securitytracker.com/id/1036281) 3. [](https://helpx.adobe.com/security/products/acrobat/apsb16-26.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15841, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15841 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15841 - **State**: PUBLISHED - **Published Date**: August 30, 2019 at 16:16 UTC - **Last Updated**: August 05, 2024 at 00:56 UTC - **Reserved Date**: August 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The facebook-for-woocommerce plugin before 1.9.15 for WordPress has CSRF via ajax_woo_infobanner_post_click, ajax_woo_infobanner_post_xout, or ajax_fb_toggle_visibility. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/facebook-for-woocommerce/#developers)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36511, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36511 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36511 - **State**: PUBLISHED - **Published Date**: July 17, 2023 at 14:19 UTC - **Last Updated**: September 30, 2024 at 14:39 UTC - **Reserved Date**: June 22, 2023 at 12:18 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce WooCommerce Order Barcodes plugin <= 1.6.4 versions. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **WooCommerce - WooCommerce Order Barcodes** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/woocommerce-order-barcodes/wordpress-woocommerce-order-barcodes-plugin-1-6-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3643, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3643 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3643 - **State**: PUBLISHED - **Published Date**: September 13, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 20:13 UTC - **Reserved Date**: June 19, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2012-09-19-3](http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html) 2. [85400](http://osvdb.org/85400) 3. [](http://support.apple.com/kb/HT5485) 4. [apple-itunes-webkit-cve20123643(78546)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78546) 5. [](http://support.apple.com/kb/HT5502) 6. [55534](http://www.securityfocus.com/bid/55534) 7. [APPLE-SA-2012-09-12-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html) 8. [oval:org.mitre.oval:def:17530](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17530)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2370, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2370 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2370 - **State**: PUBLISHED - **Published Date**: February 14, 2018 at 12:00 UTC - **Last Updated**: August 05, 2024 at 04:14 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description Server Side Request Forgery (SSRF) vulnerability in SAP Central Management Console, BI Launchpad and Fiori BI Launchpad, 4.10, from 4.20, from 4.30, could allow a malicious user to use common techniques to determine which ports are in use on the backend server. ### Affected Products **SAP SE - SAP BI Launchpad** Affected versions: - 4.00 (Status: affected) - from 4.20 (Status: affected) - from 4.30 (Status: affected) ### References 1. [](https://launchpad.support.sap.com/#/notes/2493727) 2. [102998](http://www.securityfocus.com/bid/102998) 3. [](https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6723, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6723 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6723 - **State**: PUBLISHED - **Published Date**: December 22, 2013 at 15:00 UTC - **Last Updated**: August 06, 2024 at 17:46 UTC - **Reserved Date**: November 08, 2013 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM WebSphere Portal 8.0.0.1 before CF09 does not properly handle references in compute="always" Web Content Manager (WCM) navigator components, which allows remote attackers to obtain sensitive component information via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [101271](http://osvdb.org/101271) 2. [64488](http://www.securityfocus.com/bid/64488) 3. [](http://www-01.ibm.com/support/docview.wss?uid=swg21660011) 4. [ibm-wsportal-cve20136723-reference(89278)](https://exchange.xforce.ibmcloud.com/vulnerabilities/89278) 5. [PI05684](http://www-01.ibm.com/support/docview.wss?uid=swg1PI05684)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11101, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11101 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11101 - **State**: PUBLISHED - **Published Date**: December 18, 2019 at 21:09 UTC - **Last Updated**: August 04, 2024 at 22:40 UTC - **Reserved Date**: April 11, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Insufficient input validation in the subsystem for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow a privileged user to potentially enable information disclosure via local access. ### Affected Products **n/a - Intel(R) CSME, Intel(R) TXE** Affected versions: - See provided reference (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2099, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2099 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2099 - **State**: PUBLISHED - **Published Date**: May 19, 2025 at 11:22 UTC - **Last Updated**: May 19, 2025 at 13:45 UTC - **Reserved Date**: March 07, 2025 at 17:39 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description A vulnerability in the `preprocess_string()` function of the `transformers.testing_utils` module in huggingface/transformers version v4.48.3 allows for a Regular Expression Denial of Service (ReDoS) attack. The regular expression used to process code blocks in docstrings contains nested quantifiers, leading to exponential backtracking when processing input with a large number of newline characters. An attacker can exploit this by providing a specially crafted payload, causing high CPU usage and potential application downtime, effectively resulting in a Denial of Service (DoS) scenario. ### Weakness Classification (CWE) - CWE-1333: Security Weakness ### Affected Products **huggingface - huggingface/transformers** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/97b780f3-ffca-424f-ad5d-0e1c57a5bde4) 2. [](https://github.com/huggingface/transformers/commit/8cb522b4190bd556ce51be04942720650b1a3e57)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32399, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32399 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32399 - **State**: PUBLISHED - **Published Date**: May 07, 2025 at 07:05 UTC - **Last Updated**: May 07, 2025 at 14:02 UTC - **Reserved Date**: April 07, 2025 at 09:23 UTC - **Assigned By**: Nozomi ### Vulnerability Description An Unchecked Input for Loop Condition in RT-Labs P-Net version 1.0.1 or earlier allows an attacker to cause IO devices that use the library to enter an infinite loop by sending a malicious RPC packet. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-606: Security Weakness ### Affected Products **RT-Labs - P-Net** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-32399) ### Credits - Luca Borzacchiello of Nozomi Networks.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24377, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24377 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24377 - **State**: PUBLISHED - **Published Date**: June 21, 2021 at 19:18 UTC - **Last Updated**: August 03, 2024 at 19:28 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Autoptimize WordPress plugin before 2.7.8 attempts to remove potential malicious files from the extracted archive uploaded via the 'Import Settings' feature, however this is not sufficient to protect against RCE as a race condition can be achieved in between the moment the file is extracted on the disk but not yet removed. It is a bypass of CVE-2020-24948. ### Weakness Classification (CWE) - CWE-362: Security Weakness ### Affected Products **Unknown - Autoptimize** Affected versions: - 2.7.8 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/85c0a564-2e56-413d-bc3a-1039343207e4) ### Credits - Marcin Węgłowski
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4186, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4186 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4186 - **State**: PUBLISHED - **Published Date**: October 10, 2012 at 17:00 UTC - **Last Updated**: August 06, 2024 at 20:28 UTC - **Reserved Date**: August 08, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Heap-based buffer overflow in the nsWaveReader::DecodeAudioData function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [50904](http://secunia.com/advisories/50904) 2. [50984](http://secunia.com/advisories/50984) 3. [50935](http://secunia.com/advisories/50935) 4. [oval:org.mitre.oval:def:16193](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16193) 5. [50856](http://secunia.com/advisories/50856) 6. [DSA-2565](http://www.debian.org/security/2012/dsa-2565) 7. [50892](http://secunia.com/advisories/50892) 8. [86117](http://osvdb.org/86117) 9. [DSA-2572](http://www.debian.org/security/2012/dsa-2572) 10. [RHSA-2012:1351](http://rhn.redhat.com/errata/RHSA-2012-1351.html) 11. [50936](http://secunia.com/advisories/50936) 12. [](http://www.mozilla.org/security/announce/2012/mfsa2012-86.html) 13. [51181](http://secunia.com/advisories/51181) 14. [55318](http://secunia.com/advisories/55318) 15. [SUSE-SU-2012:1351](http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html) 16. [MDVSA-2012:163](http://www.mandriva.com/security/advisories?name=MDVSA-2012:163) 17. [](https://bugzilla.mozilla.org/show_bug.cgi?id=785967) 18. [firefox-nswavereader-bo(79163)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79163) 19. [USN-1611-1](http://www.ubuntu.com/usn/USN-1611-1) 20. [DSA-2569](http://www.debian.org/security/2012/dsa-2569)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15940, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15940 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15940 - **State**: PUBLISHED - **Published Date**: October 12, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 10:10 UTC - **Reserved Date**: August 28, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. ### Affected Products **Adobe - Adobe Acrobat and Reader** Affected versions: - 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier versions (Status: affected) ### References 1. [1041809](http://www.securitytracker.com/id/1041809) 2. [](https://helpx.adobe.com/security/products/acrobat/apsb18-30.html) 3. [105432](http://www.securityfocus.com/bid/105432)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16757, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16757 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16757 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:51 UTC - **Last Updated**: December 20, 2021 at 22:51 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1273 - **State**: PUBLISHED - **Published Date**: March 10, 2007 at 20:00 UTC - **Last Updated**: August 07, 2024 at 12:50 UTC - **Reserved Date**: March 04, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer overflow in the ktruser function in NetBSD-current before 20061022, NetBSD 3 and 3-0 before 20061024, and NetBSD 2 before 20070209, when the kernel is built with the COMPAT_FREEBSD or COMPAT_DARWIN option, allows local users to cause a denial of service and possibly gain privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [22878](http://www.securityfocus.com/bid/22878) 2. [35453](http://osvdb.org/35453) 3. [NetBSD-SA2007-001](ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-001.txt.asc)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52650, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52650 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52650 - **State**: PUBLISHED - **Published Date**: May 01, 2024 at 12:53 UTC - **Last Updated**: May 04, 2025 at 07:40 UTC - **Reserved Date**: March 06, 2024 at 09:52 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: drm/tegra: dsi: Add missing check for of_find_device_by_node Add check for the return value of of_find_device_by_node() and return the error if it fails in order to avoid NULL pointer dereference. ### Affected Products **Linux - Linux** Affected versions: - e94236cde4d519cdecd45e2435defba33abdc99f (Status: affected) - e94236cde4d519cdecd45e2435defba33abdc99f (Status: affected) - e94236cde4d519cdecd45e2435defba33abdc99f (Status: affected) - e94236cde4d519cdecd45e2435defba33abdc99f (Status: affected) - e94236cde4d519cdecd45e2435defba33abdc99f (Status: affected) - e94236cde4d519cdecd45e2435defba33abdc99f (Status: affected) - e94236cde4d519cdecd45e2435defba33abdc99f (Status: affected) - e94236cde4d519cdecd45e2435defba33abdc99f (Status: affected) - e94236cde4d519cdecd45e2435defba33abdc99f (Status: affected) **Linux - Linux** Affected versions: - 3.19 (Status: affected) - 0 (Status: unaffected) - 4.19.311 (Status: unaffected) - 5.4.273 (Status: unaffected) - 5.10.214 (Status: unaffected) - 5.15.153 (Status: unaffected) - 6.1.83 (Status: unaffected) - 6.6.23 (Status: unaffected) - 6.7.11 (Status: unaffected) - 6.8.2 (Status: unaffected) - 6.9 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/47a13d0b9d8527518639ab5c39667f69d6203e80) 2. [](https://git.kernel.org/stable/c/f05631a8525c3b5e5994ecb1304d2d878956c0f5) 3. [](https://git.kernel.org/stable/c/92003981a6df5dc84af8a5904f8ee112fa324129) 4. [](https://git.kernel.org/stable/c/93128052bf832359531c3c0a9e3567b2b8682a2d) 5. [](https://git.kernel.org/stable/c/50c0ad785a780c72a2fdaba10b38c645ffb4eae6) 6. [](https://git.kernel.org/stable/c/52aa507148c4aad41436e2005d742ffcafad9976) 7. [](https://git.kernel.org/stable/c/c5d2342d24ef6e08fc90a529fe3dc59de421a2b9) 8. [](https://git.kernel.org/stable/c/3169eaf1365541fd8e521091010c44fbe14691fc) 9. [](https://git.kernel.org/stable/c/afe6fcb9775882230cd29b529203eabd5d2a638d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4313, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4313 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4313 - **State**: PUBLISHED - **Published Date**: August 23, 2006 at 22:00 UTC - **Last Updated**: August 07, 2024 at 19:06 UTC - **Reserved Date**: August 23, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple unspecified vulnerabilities in Cisco VPN 3000 series concentrators before 4.1, 4.1.x up to 4.1(7)L, and 4.7.x up to 4.7(2)F allow attackers to execute the (1) CWD, (2) MKD, (3) CDUP, (4) RNFR, (5) SIZE, and (6) RMD FTP commands to modify files or create and delete directories via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-3368](http://www.vupen.com/english/advisories/2006/3368) 2. [28138](http://www.osvdb.org/28138) 3. [1016737](http://securitytracker.com/id?1016737) 4. [19680](http://www.securityfocus.com/bid/19680) 5. [28139](http://www.osvdb.org/28139) 6. [cisco-vpn-ftp-command-execute(28539)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28539) 7. [20060823 Cisco VPN 3000 Concentrator FTP Management Vulnerabilities](http://www.cisco.com/warp/public/707/cisco-sa-20060823-vpn3k.shtml) 8. [21617](http://secunia.com/advisories/21617)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14652, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14652 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14652 - **State**: PUBLISHED - **Published Date**: October 31, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 09:38 UTC - **Reserved Date**: July 27, 2018 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The Gluster file system through versions 3.12 and 4.1.4 is vulnerable to a buffer overflow in the 'features/index' translator via the code handling the 'GF_XATTR_CLRLK_CMD' xattr in the 'pl_getxattr' function. A remote authenticated attacker could exploit this on a mounted volume to cause a denial of service. ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **The Gluster Project - glusterfs** Affected versions: - through 3.12 and 4.1.4 (Status: affected) ### References 1. [RHSA-2018:3431](https://access.redhat.com/errata/RHSA-2018:3431) 2. [[debian-lts-announce] 20181105 [SECURITY] [DLA 1565-1] glusterfs security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14652) 4. [RHSA-2018:3432](https://access.redhat.com/errata/RHSA-2018:3432) 5. [RHSA-2018:3470](https://access.redhat.com/errata/RHSA-2018:3470) 6. [GLSA-201904-06](https://security.gentoo.org/glsa/201904-06) 7. [[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update](https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6385, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6385 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6385 - **State**: PUBLISHED - **Published Date**: October 05, 2016 at 20:00 UTC - **Last Updated**: August 06, 2024 at 01:29 UTC - **Reserved Date**: July 26, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Memory leak in the Smart Install client implementation in Cisco IOS 12.2 and 15.0 through 15.2 and IOS XE 3.2 through 3.8 allows remote attackers to cause a denial of service (memory consumption) via crafted image-list parameters, aka Bug ID CSCuy82367. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [93203](http://www.securityfocus.com/bid/93203) 2. [1036914](http://www.securitytracker.com/id/1036914) 3. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-287-04) 4. [20160928 Cisco IOS and IOS XE Software Smart Install Memory Leak Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-smi)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000027, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000027 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000027 - **State**: PUBLISHED - **Published Date**: July 13, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 21:53 UTC - **Reserved Date**: July 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Koozali Foundation SME Server versions 8.x, 9.x, 10.x are vulnerable to an open URL redirect vulnerability in the user web login function resulting in unauthorized account access. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://forums.contribs.org/index.php/topic%2C52838.0.html) 2. [](https://cp270.wordpress.com/2017/02/02/security-advisory-open-url-redirect-in-sme-server/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9025, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9025 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9025 - **State**: PUBLISHED - **Published Date**: June 13, 2017 at 20:00 UTC - **Last Updated**: August 06, 2024 at 08:36 UTC - **Reserved Date**: April 18, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in a QTEE application. ### Affected Products **Qualcomm, Inc. - All Qualcomm products** Affected versions: - All Android releases from CAF using the Linux kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-06-01) 2. [98874](http://www.securityfocus.com/bid/98874) 3. [1038623](http://www.securitytracker.com/id/1038623)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34486, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34486 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34486 - **State**: PUBLISHED - **Published Date**: June 29, 2023 at 00:00 UTC - **Last Updated**: November 26, 2024 at 18:22 UTC - **Reserved Date**: June 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description itsourcecode Online Hotel Management System Project In PHP v1.0.0 is vulnerable to Cross Site Scripting (XSS). Remote code execution can be achieved by entering malicious code in the date selection box. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/JunyanYip/itsourcecode_justines_xss_vul)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-47659, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-47659 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-47659 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 02:05 UTC - **Last Updated**: May 16, 2025 at 07:23 UTC - **Reserved Date**: February 26, 2025 at 02:04 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: drm/plane: Move range check for format_count earlier While the check for format_count > 64 in __drm_universal_plane_init() shouldn't be hit (it's a WARN_ON), in its current position it will then leak the plane->format_types array and fail to call drm_mode_object_unregister() leaking the modeset identifier. Move it to the start of the function to avoid allocating those resources in the first place. ### Affected Products **Linux - Linux** Affected versions: - e6fc3b68558e4c6d8d160b5daf2511b99afa8814 (Status: affected) - e6fc3b68558e4c6d8d160b5daf2511b99afa8814 (Status: affected) - e6fc3b68558e4c6d8d160b5daf2511b99afa8814 (Status: affected) - e6fc3b68558e4c6d8d160b5daf2511b99afa8814 (Status: affected) - e6fc3b68558e4c6d8d160b5daf2511b99afa8814 (Status: affected) - e6fc3b68558e4c6d8d160b5daf2511b99afa8814 (Status: affected) - e6fc3b68558e4c6d8d160b5daf2511b99afa8814 (Status: affected) **Linux - Linux** Affected versions: - 4.14 (Status: affected) - 0 (Status: unaffected) - 4.19.247 (Status: unaffected) - 5.4.198 (Status: unaffected) - 5.10.121 (Status: unaffected) - 5.15.46 (Status: unaffected) - 5.17.14 (Status: unaffected) - 5.18.3 (Status: unaffected) - 5.19 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/4ab7e453a3ee88c274cf97bee9487ab92a66d313) 2. [](https://git.kernel.org/stable/c/1e29d829ad51d1472dd035487953a6724b56fc33) 3. [](https://git.kernel.org/stable/c/b5cd108143513e4498027b96ec4710702d186f11) 4. [](https://git.kernel.org/stable/c/978e3d023256bfaf34a0033d40c94e8a8e70cf3c) 5. [](https://git.kernel.org/stable/c/787163d19bc3cdc6ca4b96223f62208534d1cf6b) 6. [](https://git.kernel.org/stable/c/ad6dd7a2bac86118985c7b3426e175b9d3c1ec4f) 7. [](https://git.kernel.org/stable/c/4b674dd69701c2e22e8e7770c1706a69f3b17269)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-32332, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-32332 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-32332 - **State**: PUBLISHED - **Published Date**: April 18, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 02:06 UTC - **Reserved Date**: April 12, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in WDS Settings under the Wireless Page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.totolink.net/home/menu/newstpl/menu_newstpl/products/id/154.html) 2. [](https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/N300RT/XSS_1_WDS_Settings/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2543, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2543 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2543 - **State**: PUBLISHED - **Published Date**: July 20, 2009 at 18:00 UTC - **Last Updated**: August 07, 2024 at 05:52 UTC - **Reserved Date**: July 20, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple unspecified vulnerabilities in the IBM Proventia engine 4.9.0.0.44 20081231, as used in IBM Proventia Network Mail Security System, Network Mail Security System Virtual Appliance, Desktop Endpoint Security, Network Multi-Function Security (MFS), and possibly other products, allow remote attackers to bypass detection of malware via a modified (1) ZIP or (2) CAB archive, a related issue to CVE-2009-1240. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20090716 Re: Update: [TZO-06-2009] IBM Proventia - Generic bypass (Limited disclosure - see details)](http://www.securityfocus.com/archive/1/504995/100/0/threaded) 2. [](http://iss.custhelp.com/cgi-bin/iss.cfg/php/enduser/std_adp.php?p_faqid=5417) 3. [20090715 Update: [TZO-06-2009] IBM Proventia - Generic bypass (Limited disclosure - see details)](http://www.securityfocus.com/archive/1/504987/100/0/threaded) 4. [20090716 Re[2]: Update: [TZO-06-2009] IBM Proventia - Generic bypass (Limited disclosure - see details)](http://www.securityfocus.com/archive/1/504992/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3913, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3913 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3913 - **State**: PUBLISHED - **Published Date**: August 13, 2024 at 12:30 UTC - **Last Updated**: January 29, 2025 at 06:04 UTC - **Reserved Date**: April 17, 2024 at 07:09 UTC - **Assigned By**: CERTVDE ### Vulnerability Description An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-552: Security Weakness ### Affected Products **Phoenix Contact - CHARX SEC-3000 (1139022)** Affected versions: - 0.0.0 (Status: affected) **Phoenix Contact - CHARX SEC-3050 (1139018)** Affected versions: - 0.0.0 (Status: affected) **Phoenix Contact - CHARX SEC-3100 (1139012)** Affected versions: - 0.0.0 (Status: affected) **Phoenix Contact - CHARX SEC-3150 (1139012)** Affected versions: - 0.0.0 (Status: affected) ### References 1. [](https://cert.vde.com/en/advisories/VDE-2024-022) ### Credits - Alex Olson, "gadha" - Trend Micro's Zero Day Initiative
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45664, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45664 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45664 - **State**: PUBLISHED - **Published Date**: December 26, 2021 at 00:26 UTC - **Last Updated**: August 04, 2024 at 04:47 UTC - **Reserved Date**: December 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description NETGEAR R7000 devices before 1.0.11.126 are affected by stored XSS. ### CVSS Metrics - **CVSS Base Score**: 5.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AC:L/AV:P/A:N/C:H/I:L/PR:H/S:C/UI:R` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000064076/Security-Advisory-for-Stored-Cross-Site-Scripting-on-R7000-PSV-2020-0011)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2951, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2951 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2951 - **State**: REJECTED - **Published Date**: May 29, 2012 at 20:00 UTC - **Last Updated**: April 26, 2014 at 23:57 UTC - **Reserved Date**: May 29, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1440, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1440 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1440 - **State**: PUBLISHED - **Published Date**: July 02, 2016 at 14:00 UTC - **Last Updated**: August 05, 2024 at 22:55 UTC - **Reserved Date**: January 04, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The proxy process on Cisco Web Security Appliance (WSA) devices through 9.1.0-070 allows remote attackers to cause a denial of service (CPU consumption) by establishing an FTP session and then improperly terminating the control connection after a file transfer, aka Bug ID CSCuy43468. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1036188](http://www.securitytracker.com/id/1036188) 2. [20160627 Cisco Web Security Appliance Native FTP Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160627-wsa)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38354, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38354 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38354 - **State**: PUBLISHED - **Published Date**: September 10, 2021 at 13:34 UTC - **Last Updated**: May 02, 2025 at 19:43 UTC - **Reserved Date**: August 09, 2021 at 00:00 UTC - **Assigned By**: Wordfence ### Vulnerability Description The GNU-Mailman Integration WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the gm_error parameter found in the ~/includes/admin/mailing-lists-page.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.6. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **GNU-Mailman Integration - GNU-Mailman Integration** Affected versions: - 1.0.6 (Status: affected) ### References 1. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38354) 2. [](https://plugins.trac.wordpress.org/browser/gnu-mailman-integration/trunk/includes/admin/mailing-lists-page.php?rev=859898#L34) ### Credits - p7e4
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4520, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4520 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4520 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0402, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0402 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0402 - **State**: REJECTED - **Last Updated**: January 17, 2025 at 22:56 UTC - **Reserved Date**: October 17, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13197, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13197 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13197 - **State**: PUBLISHED - **Published Date**: July 05, 2018 at 02:00 UTC - **Last Updated**: August 05, 2024 at 08:52 UTC - **Reserved Date**: July 04, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The sell function of a smart contract implementation for Welfare Token Fund (WTF), an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/ETHEREUMBLACK/sell%20integer%20overflow.md) 2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/WelfareTokenFund)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22003, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22003 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22003 - **State**: PUBLISHED - **Published Date**: February 09, 2022 at 16:36 UTC - **Last Updated**: January 02, 2025 at 18:28 UTC - **Reserved Date**: December 16, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Office Graphics Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Microsoft Office 2019** Affected versions: - 19.0.0 (Status: affected) **Microsoft - Microsoft Office 2019 for Mac** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft 365 Apps for Enterprise** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Office LTSC for Mac 2021** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Office LTSC 2021** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Office 2016** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft Office 2013 Service Pack 1** Affected versions: - 15.0.0 (Status: affected) ### References 1. [Microsoft Office Graphics Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22003)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30764, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30764 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30764 - **State**: PUBLISHED - **Published Date**: September 08, 2021 at 13:46 UTC - **Last Updated**: August 03, 2024 at 22:40 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Processing a maliciously crafted file may lead to arbitrary code execution. This issue is fixed in iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. This issue was addressed with improved checks. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT212317) 2. [](https://support.apple.com/en-us/HT212323) 3. [](https://support.apple.com/en-us/HT212324)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8032, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8032 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8032 - **State**: PUBLISHED - **Published Date**: February 25, 2021 at 09:15 UTC - **Last Updated**: September 16, 2024 at 20:03 UTC - **Reserved Date**: January 27, 2020 at 00:00 UTC - **Assigned By**: suse ### Vulnerability Description A Insecure Temporary File vulnerability in the packaging of cyrus-sasl of openSUSE Factory allows local attackers to escalate to root. This issue affects: openSUSE Factory cyrus-sasl version 2.1.27-4.2 and prior versions. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-377: Security Weakness ### Affected Products **openSUSE - Factory** Affected versions: - cyrus-sasl (Status: affected) ### References 1. [](https://bugzilla.suse.com/show_bug.cgi?id=1180669) ### Credits - Johannes Segitz of SUSE
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9070, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9070 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9070 - **State**: PUBLISHED - **Published Date**: June 11, 2018 at 21:00 UTC - **Last Updated**: August 06, 2024 at 02:42 UTC - **Reserved Date**: October 27, 2016 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description A maliciously crafted page loaded to the sidebar through a bookmark can reference a privileged chrome window and engage in limited JavaScript operations violating cross-origin protections. This vulnerability affects Firefox < 50. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [94337](http://www.securityfocus.com/bid/94337) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1281071) 3. [1037298](http://www.securitytracker.com/id/1037298) 4. [](https://www.mozilla.org/security/advisories/mfsa2016-89/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-29014, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-29014 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-29014 - **State**: PUBLISHED - **Published Date**: July 09, 2021 at 18:26 UTC - **Last Updated**: October 25, 2024 at 13:57 UTC - **Reserved Date**: November 24, 2020 at 00:00 UTC - **Assigned By**: fortinet ### Vulnerability Description A concurrent execution using shared resource with improper synchronization ('race condition') in the command shell of FortiSandbox before 3.2.2 may allow an authenticated attacker to bring the system into an unresponsive state via specifically orchestrated sequences of commands. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X` ### Affected Products **Fortinet - Fortinet FortiSandbox** Affected versions: - FortiSandbox before 3.2.2 (Status: affected) ### References 1. [](https://fortiguard.com/advisory/FG-IR-20-185)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27833, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27833 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27833 - **State**: PUBLISHED - **Published Date**: June 10, 2024 at 20:56 UTC - **Last Updated**: February 13, 2025 at 17:46 UTC - **Reserved Date**: February 26, 2024 at 15:32 UTC - **Assigned By**: apple ### Vulnerability Description An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5. Processing maliciously crafted web content may lead to arbitrary code execution. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - visionOS** Affected versions: - unspecified (Status: affected) **Apple - Safari** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT214101) 2. [](https://support.apple.com/en-us/HT214100) 3. [](https://support.apple.com/en-us/HT214108) 4. [](https://support.apple.com/en-us/HT214103) 5. [](https://support.apple.com/en-us/HT214102) 6. [](http://seclists.org/fulldisclosure/2024/Jun/5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0939, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0939 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0939 - **State**: PUBLISHED - **Published Date**: October 03, 2011 at 23:00 UTC - **Last Updated**: September 16, 2024 at 22:31 UTC - **Reserved Date**: February 10, 2011 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Unspecified vulnerability in Cisco IOS 12.4, 15.0, and 15.1, and IOS XE 2.5.x through 3.2.x, allows remote attackers to cause a denial of service (device reload) via a crafted SIP message, aka Bug ID CSCth03022. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20110928 Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerabilities](http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d5a.shtml) 2. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=24127)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46243, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46243 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46243 - **State**: PUBLISHED - **Published Date**: November 07, 2023 at 19:10 UTC - **Last Updated**: September 12, 2024 at 19:12 UTC - **Reserved Date**: October 19, 2023 at 20:34 UTC - **Assigned By**: GitHub_M ### Vulnerability Description XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible for a user to execute any content with the right of an existing document's content author, provided the user have edit right on it. A crafted URL of the form ` /xwiki/bin/edit//?content=%7B%7Bgroovy%7D%7Dprintln%28%22Hello+from+Groovy%21%22%29%7B%7B%2Fgroovy%7D%7D&xpage=view` can be used to execute arbitrary groovy code on the server. This vulnerability has been patched in XWiki versions 14.10.6 and 15.2RC1. Users are advised to update. There are no known workarounds for this issue. ### CVSS Metrics - **CVSS Base Score**: 10/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **xwiki - xwiki-platform** Affected versions: - >= 1.0, < 14.10.6 (Status: affected) ### References 1. [https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g2qq-c5j9-5w5w](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g2qq-c5j9-5w5w) 2. [https://github.com/xwiki/xwiki-platform/commit/a0e6ca083b36be6f183b9af33ae735c1e02010f4](https://github.com/xwiki/xwiki-platform/commit/a0e6ca083b36be6f183b9af33ae735c1e02010f4) 3. [https://jira.xwiki.org/browse/XWIKI-20385](https://jira.xwiki.org/browse/XWIKI-20385)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6548, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6548 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6548 - **State**: PUBLISHED - **Published Date**: January 21, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 12:17 UTC - **Reserved Date**: September 17, 2014 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle SOA Suite component in Oracle Fusion Middleware 11.1.1.7 allows local users to affect confidentiality, integrity, and availability via vectors related to B2B Engine. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13040, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13040 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13040 - **State**: PUBLISHED - **Published Date**: September 14, 2017 at 06:00 UTC - **Last Updated**: August 05, 2024 at 18:58 UTC - **Reserved Date**: August 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The MPTCP parser in tcpdump before 4.9.2 has a buffer over-read in print-mptcp.c, several functions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201709-23](https://security.gentoo.org/glsa/201709-23) 2. [](https://support.apple.com/HT208221) 3. [DSA-3971](http://www.debian.org/security/2017/dsa-3971) 4. [](https://github.com/the-tcpdump-group/tcpdump/commit/4c3aee4bb0294c232d56b6d34e9eeb74f630fe8c) 5. [1039307](http://www.securitytracker.com/id/1039307) 6. [](http://www.tcpdump.org/tcpdump-changes.txt) 7. [RHEA-2018:0705](https://access.redhat.com/errata/RHEA-2018:0705)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2904, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2904 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2904 - **State**: PUBLISHED - **Published Date**: August 19, 2011 at 21:00 UTC - **Last Updated**: August 06, 2024 at 23:15 UTC - **Reserved Date**: July 27, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in acknow.php in Zabbix before 1.8.6 allows remote attackers to inject arbitrary web script or HTML via the backurl parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [45502](http://secunia.com/advisories/45502) 2. [49016](http://www.securityfocus.com/bid/49016) 3. [[oss-security] 20110809 Re: CVE request: zabbix XSS flaw](http://www.openwall.com/lists/oss-security/2011/08/09/5) 4. [](http://www.zabbix.com/rn1.8.6.php) 5. [[oss-security] 20110808 CVE request: zabbix XSS flaw](http://www.openwall.com/lists/oss-security/2011/08/08/2) 6. [FEDORA-2011-10601](http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063904.html) 7. [](https://support.zabbix.com/browse/ZBX-3835) 8. [FEDORA-2011-10618](http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063884.html) 9. [](https://bugzilla.redhat.com/show_bug.cgi?id=729162) 10. [45677](http://secunia.com/advisories/45677) 11. [zabbix-acknow-xss(69025)](https://exchange.xforce.ibmcloud.com/vulnerabilities/69025)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4575, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4575 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4575 - **State**: PUBLISHED - **Published Date**: July 01, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 11:20 UTC - **Reserved Date**: June 23, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in js/window.php in the Wikipop plugin 2.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://codevigilant.com/disclosure/wp-plugin-wikipop-a3-cross-site-scripting-xss)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0457, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0457 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0457 - **State**: PUBLISHED - **Published Date**: March 03, 2023 at 04:18 UTC - **Last Updated**: March 05, 2025 at 20:02 UTC - **Reserved Date**: January 24, 2023 at 08:55 UTC - **Assigned By**: Mitsubishi ### Vulnerability Description Plaintext Storage of a Password vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series, MELSEC iQ-R Series, MELSEC-Q Series and MELSEC-L Series allows a remote unauthenticated attacker to disclose plaintext credentials stored in project files and login into FTP server or Web server. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-256: Security Weakness ### Affected Products **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-32MT/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-64MT/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-80MT/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-32MR/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-64MR/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-80MR/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-32MT/DS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-64MT/DS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-80MT/DS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-32MR/DS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-64MR/DS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-80MR/DS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-32MT/ESS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-64MT/ESS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-80MT/ESS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-32MT/DSS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-64MT/DSS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-80MT/DSS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-32MT/D** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-64MT/D** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-96MT/D** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-32MT/DSS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-64MT/DSS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-96MT/DSS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-32MT/DS-TS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-32MT/DSS-TS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-32MR/DS-TS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-24MT/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-40MT/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-60MT/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-24MR/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-40MR/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-60MR/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-24MT/ESS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-40MT/ESS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-60MT/ESS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-24MT/ES-A** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-40MT/ES-A** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-60MT/ES-A** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-24MR/ES-A** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-40MR/ES-A** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-60MR/ES-A** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-30MT/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-40MT/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-60MT/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-80MT/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-30MR/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-40MR/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-60MR/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-80MR/ES** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-30MT/ESS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-40MT/ESS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-60MT/ESS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-80MT/ESS** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5-ENET** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5-ENET/IP** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R00CPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R01CPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R02CPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R04CPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R08CPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R16CPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R32CPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R120CPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R04ENCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R08ENCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R16ENCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R32ENCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R120ENCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R08SFCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R16SFCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R32SFCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R120SFCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R08PCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R16PCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R32PCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R120PCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R08PSFCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R16PSFCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R32PSFCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R120PSFCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series RJ71EN71** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-R Series R12CCPU-V** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q03UDECPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q04UDEHCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q06UDEHCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q10UDEHCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q13UDEHCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q20UDEHCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q26UDEHCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q50UDEHCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q100UDEHCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q03UDVCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q04UDVCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q06UDVCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q13UDVCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q26UDVCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q04UDPVCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q06UDPVCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q13UDPVCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series Q26UDPVCPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-Q Series QJ71E71-100** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-L Series L02CPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-L Series L06CPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-L Series L26CPU** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-L Series L02CPU-P** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-L Series L06CPU-P** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-L Series L26CPU-P** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-L Series L26CPU-BT** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-L Series L26CPU-PBT** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC-L Series LJ71E71-100** Affected versions: - all versions (Status: affected) ### References 1. [](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-023_en.pdf) 2. [](https://jvn.jp/vu/JVNVU93891523/index.html) 3. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-061-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23072, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23072 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23072 - **State**: PUBLISHED - **Published Date**: January 14, 2025 at 18:29 UTC - **Last Updated**: March 13, 2025 at 18:20 UTC - **Reserved Date**: January 10, 2025 at 17:00 UTC - **Assigned By**: wikimedia-foundation ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - RefreshSpecial Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - RefreshSpecial Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Wikimedia Foundation - Mediawiki - RefreshSpecial Extension** Affected versions: - 1.39.x (Status: affected) - 1.41.x (Status: affected) - 1.42.x (Status: affected) ### References 1. [](https://phabricator.wikimedia.org/T378885) 2. [](https://gerrit.wikimedia.org/r/q/Ic9547e80a8296d707ad8a157eb8ba7aa26fb08dc) ### Credits - BlankEclair (Claire)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1415, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1415 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1415 - **State**: PUBLISHED - **Published Date**: April 10, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 04:40 UTC - **Reserved Date**: January 27, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The bsdinstall installer in FreeBSD 10.x before 10.1 p9, when configuring full disk encrypted ZFS, uses world-readable permissions for the GELI keyfile (/boot/encryption.key), which allows local users to obtain sensitive key information by reading the file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1032042](http://www.securitytracker.com/id/1032042) 2. [FreeBSD-SA-15:08](https://www.freebsd.org/security/advisories/FreeBSD-SA-15:08.bsdinstall.asc) 3. [20150407 FreeBSD 10.x ZFS encryption.key disclosure (CVE-2015-1415)](http://www.securityfocus.com/archive/1/535209/100/0/threaded) 4. [](http://packetstormsecurity.com/files/131338/FreeBSD-10.x-ZFS-encryption.key-Disclosure.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-1018, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-1018 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-1018 - **State**: PUBLISHED - **Published Date**: January 22, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:37 UTC - **Reserved Date**: November 24, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description shred 1.0 file wiping utility does not properly open a file for overwriting or flush its buffers, which prevents shred from properly replacing the file's data and allows local users to recover the file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [shred-recover-files(5722)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5722) 2. [20001011 Shred v1.0 Fix](http://marc.info/?l=bugtraq&m=97131166004145&w=2) 3. [20001010 Shred 1.0 Bug Report](http://marc.info/?l=bugtraq&m=97119799515246&w=2) 4. [1788](http://www.securityfocus.com/bid/1788)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14785, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14785 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14785 - **State**: REJECTED - **Published Date**: May 22, 2018 at 20:00 UTC - **Last Updated**: May 22, 2018 at 19:57 UTC - **Reserved Date**: September 27, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32759, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32759 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32759 - **State**: PUBLISHED - **Published Date**: August 27, 2021 at 22:00 UTC - **Last Updated**: August 03, 2024 at 23:33 UTC - **Reserved Date**: May 12, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description OpenMage magento-lts is an alternative to the Magento CE official releases. Due to missing sanitation in data flow in versions prior to 19.4.15 and 20.0.13, it was possible for admin users to upload arbitrary executable files to the server. OpenMage versions 19.4.15 and 20.0.13 have a patch for this Issue. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **OpenMage - magento-lts** Affected versions: - < 19.4.15 (Status: affected) - >= 20, < 20.0.13 (Status: affected) ### References 1. [](https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15) 2. [](https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58) 3. [](https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11452, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11452 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11452 - **State**: PUBLISHED - **Published Date**: January 16, 2025 at 03:27 UTC - **Last Updated**: January 16, 2025 at 15:15 UTC - **Reserved Date**: November 19, 2024 at 20:11 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Chamber Dashboard Business Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'business_categories' shortcode in all versions up to, and including, 3.3.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **gwendydd - Chamber Dashboard Business Directory** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/54e5989f-3d2c-4ed3-b4c4-f2589b885637?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/chamber-dashboard-business-directory/trunk/shortcodes/bus_cat_shortcode.php#L52) 3. [](https://plugins.trac.wordpress.org/changeset/3222548/) ### Credits - Peter Thaleikis
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26842, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26842 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26842 - **State**: PUBLISHED - **Published Date**: May 31, 2023 at 00:00 UTC - **Last Updated**: January 09, 2025 at 19:14 UTC - **Reserved Date**: February 27, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the OptionManager.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26842)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43510, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43510 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43510 - **State**: REJECTED - **Last Updated**: May 28, 2025 at 18:21 UTC - **Reserved Date**: November 02, 2022 at 03:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3616, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3616 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3616 - **State**: PUBLISHED - **Published Date**: November 04, 2011 at 21:00 UTC - **Last Updated**: August 06, 2024 at 23:37 UTC - **Reserved Date**: September 21, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The getSkillname function in the eve module in Conky 1.8.1 and earlier allows local users to overwrite arbitrary files via a symlink attack on /tmp/.cesf. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [43225](http://secunia.com/advisories/43225) 2. [](https://bugs.launchpad.net/ubuntu/+source/conky/+bug/607309) 3. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612033) 4. [[oss-security] 20111009 CVE Request -- Conky 1.8.1 "/tmp/.cesf" Insecure Temporary File Security Issue](http://www.openwall.com/lists/oss-security/2011/10/09/4) 5. [[oss-security] 20111010 Re: CVE Request -- Conky 1.8.1 "/tmp/.cesf" Insecure Temporary File Security Issue](http://www.openwall.com/lists/oss-security/2011/10/10/8) 6. [46353](http://secunia.com/advisories/46353) 7. [GLSA-201110-09](http://www.gentoo.org/security/en/glsa/glsa-201110-09.xml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3483, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3483 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3483 - **State**: PUBLISHED - **Published Date**: November 03, 2005 at 22:00 UTC - **Last Updated**: August 07, 2024 at 23:17 UTC - **Reserved Date**: November 03, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in GO-Global for Windows 3.1.0.3270 and earlier allows remote attackers to execute arbitrary code via a data block that is longer than the specified data block size. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20051102 Buffer-overflow in GO-Global for Windows](http://marc.info/?l=full-disclosure&m=113095918810489&w=2) 2. [](http://aluigi.altervista.org/adv/ggwbof-adv.txt) 3. [17424](http://secunia.com/advisories/17424) 4. [ADV-2005-2290](http://www.vupen.com/english/advisories/2005/2290) 5. [15285](http://www.securityfocus.com/bid/15285) 6. [20464](http://www.osvdb.org/20464)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0992, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0992 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0992 - **State**: PUBLISHED - **Published Date**: February 02, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:37 UTC - **Reserved Date**: January 31, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description shopplus.cgi in ShopPlus shopping cart allows remote attackers to execute arbitrary commands via shell metacharacters in the "file" parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20010905 ShopPlus Cart](http://archives.neohapsis.com/archives/bugtraq/2001-09/0012.html) 2. [shopplus-command-execution(7077)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7077)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15897, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15897 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15897 - **State**: PUBLISHED - **Published Date**: December 11, 2017 at 21:00 UTC - **Last Updated**: September 17, 2024 at 03:42 UTC - **Reserved Date**: October 25, 2017 at 00:00 UTC - **Assigned By**: nodejs ### Vulnerability Description Node.js had a bug in versions 8.X and 9.X which caused buffers to not be initialized when the encoding for the fill value did not match the encoding specified. For example, 'Buffer.alloc(0x100, "This is not correctly encoded", "hex");' The buffer implementation was updated such that the buffer will be initialized to all zeros in these cases. ### Affected Products **The Node.js Project - Node.js** Affected versions: - 8.0 and higher (Status: affected) - 9.0 and higher (Status: affected) ### References 1. [](https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-35037, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-35037 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-35037 - **State**: PUBLISHED - **Published Date**: December 01, 2021 at 22:50 UTC - **Last Updated**: August 04, 2024 at 16:55 UTC - **Reserved Date**: November 29, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Events Manager WordPress plugin before 5.9.8 does not sanitise and escape some search parameter before outputing them in pages, which could lead to Cross-Site Scripting issues ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - Events Manager** Affected versions: - 5.9.8 (Status: affected) ### References 1. [](https://plugins.trac.wordpress.org/changeset/2336019/events-manager) 2. [](https://wpscan.com/vulnerability/937b9bdb-7e8e-4ea8-82ec-aa5f6bd70619) ### Credits - Jakob Wierzba
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31876, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31876 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31876 - **State**: PUBLISHED - **Published Date**: May 13, 2021 at 21:03 UTC - **Last Updated**: August 03, 2024 at 23:10 UTC - **Reserved Date**: April 29, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Bitcoin Core 0.12.0 through 0.21.1 does not properly implement the replacement policy specified in BIP125, which makes it easier for attackers to trigger a loss of funds, or a denial of service attack against downstream projects such as Lightning network nodes. An unconfirmed child transaction with nSequence = 0xff_ff_ff_ff, spending an unconfirmed parent with nSequence <= 0xff_ff_ff_fd, should be replaceable because there is inherited signaling by the child transaction. However, the actual PreChecks implementation does not enforce this. Instead, mempool rejects the replacement attempt of the unconfirmed child transaction. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2021-31876) 2. [](https://bitcoinops.org/en/topics/replace-by-fee/) 3. [](https://github.com/bitcoin/bitcoin) 4. [](https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html) 5. [](https://bitcoinops.org/en/newsletters/2021/05/12/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19531, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19531 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19531 - **State**: PUBLISHED - **Published Date**: December 03, 2019 at 15:39 UTC - **Last Updated**: August 05, 2024 at 02:16 UTC - **Reserved Date**: December 03, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9) 2. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc05481b2fcabaaeccf63e32ac1baab54e5b6963) 3. [[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3](http://www.openwall.com/lists/oss-security/2019/12/03/4) 4. [openSUSE-SU-2019:2675](http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html) 5. [[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update](https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html) 6. [[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-47299, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-47299 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-47299 - **State**: REJECTED - **Last Updated**: May 06, 2025 at 02:55 UTC - **Reserved Date**: May 05, 2025 at 20:10 UTC - **Assigned By**: fortinet ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4346, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4346 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4346 - **State**: PUBLISHED - **Published Date**: December 18, 2005 at 22:00 UTC - **Last Updated**: August 07, 2024 at 23:38 UTC - **Reserved Date**: December 18, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Invalid SQL syntax error in blog.php in phpBB Blog 2.2.2 and earlier allows remote attackers to obtain the full path of the application via an invalid permalink parameter to index.php, which produces an invalid SQL query that leaks the full pathname in a SQL syntax error message. NOTE: this was originally claimed to be SQL injection, but a cleansing step strips all non-digit characters and leaves an empty permalink argument, which leads to the syntax error. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://pridels0.blogspot.com/2005/12/phpbb-blog-222-sql-inj-vuln.html) 2. [](http://www.outshine.com/forums/viewtopic.php?t=308) 3. [21565](http://www.osvdb.org/21565) 4. [phpbbblog-permalink-sql-injection(23495)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23495)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20095, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20095 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20095 - **State**: PUBLISHED - **Published Date**: November 01, 2023 at 17:14 UTC - **Last Updated**: August 02, 2024 at 08:57 UTC - **Reserved Date**: October 27, 2022 at 18:47 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of HTTPS requests. An attacker could exploit this vulnerability by sending crafted HTTPS requests to an affected system. A successful exploit could allow the attacker to cause resource exhaustion, resulting in a DoS condition. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H` ### Affected Products **Cisco - Cisco Adaptive Security Appliance (ASA) Software** Affected versions: - 9.8.1 (Status: affected) - 9.8.1.5 (Status: affected) - 9.8.1.7 (Status: affected) - 9.8.2 (Status: affected) - 9.8.2.8 (Status: affected) - 9.8.2.14 (Status: affected) - 9.8.2.15 (Status: affected) - 9.8.2.17 (Status: affected) - 9.8.2.20 (Status: affected) - 9.8.2.24 (Status: affected) - 9.8.2.26 (Status: affected) - 9.8.2.28 (Status: affected) - 9.8.2.33 (Status: affected) - 9.8.2.35 (Status: affected) - 9.8.2.38 (Status: affected) - 9.8.3.8 (Status: affected) - 9.8.3.11 (Status: affected) - 9.8.3.14 (Status: affected) - 9.8.3.16 (Status: affected) - 9.8.3.18 (Status: affected) - 9.8.3.21 (Status: affected) - 9.8.3 (Status: affected) - 9.8.3.26 (Status: affected) - 9.8.3.29 (Status: affected) - 9.8.4 (Status: affected) - 9.8.4.3 (Status: affected) - 9.8.4.7 (Status: affected) - 9.8.4.8 (Status: affected) - 9.8.4.10 (Status: affected) - 9.8.4.12 (Status: affected) - 9.8.4.15 (Status: affected) - 9.8.4.17 (Status: affected) - 9.8.4.25 (Status: affected) - 9.8.4.20 (Status: affected) - 9.8.4.22 (Status: affected) - 9.8.4.26 (Status: affected) - 9.8.4.29 (Status: affected) - 9.8.4.32 (Status: affected) - 9.8.4.33 (Status: affected) - 9.8.4.34 (Status: affected) - 9.8.4.35 (Status: affected) - 9.8.4.39 (Status: affected) - 9.8.4.40 (Status: affected) - 9.8.4.41 (Status: affected) - 9.8.4.43 (Status: affected) - 9.8.4.44 (Status: affected) - 9.8.4.45 (Status: affected) - 9.12.1 (Status: affected) - 9.12.1.2 (Status: affected) - 9.12.1.3 (Status: affected) - 9.12.2 (Status: affected) - 9.12.2.4 (Status: affected) - 9.12.2.5 (Status: affected) - 9.12.2.9 (Status: affected) - 9.12.3 (Status: affected) - 9.12.3.2 (Status: affected) - 9.12.3.7 (Status: affected) - 9.12.4 (Status: affected) - 9.12.3.12 (Status: affected) - 9.12.3.9 (Status: affected) - 9.12.2.1 (Status: affected) - 9.12.4.2 (Status: affected) - 9.12.4.4 (Status: affected) - 9.12.4.7 (Status: affected) - 9.12.4.10 (Status: affected) - 9.12.4.13 (Status: affected) - 9.12.4.8 (Status: affected) - 9.12.4.18 (Status: affected) - 9.12.4.24 (Status: affected) - 9.12.4.26 (Status: affected) - 9.12.4.29 (Status: affected) - 9.12.4.30 (Status: affected) - 9.12.4.35 (Status: affected) - 9.12.4.37 (Status: affected) - 9.12.4.38 (Status: affected) - 9.12.4.39 (Status: affected) - 9.12.4.40 (Status: affected) - 9.12.4.41 (Status: affected) - 9.14.1 (Status: affected) - 9.14.1.10 (Status: affected) - 9.14.1.6 (Status: affected) - 9.14.1.15 (Status: affected) - 9.14.1.19 (Status: affected) - 9.14.1.30 (Status: affected) - 9.14.2 (Status: affected) - 9.14.2.4 (Status: affected) - 9.14.2.8 (Status: affected) - 9.14.2.13 (Status: affected) - 9.14.2.15 (Status: affected) - 9.14.3 (Status: affected) - 9.14.3.1 (Status: affected) - 9.14.3.9 (Status: affected) - 9.14.3.11 (Status: affected) - 9.14.3.13 (Status: affected) - 9.14.3.18 (Status: affected) - 9.14.3.15 (Status: affected) - 9.14.4 (Status: affected) - 9.14.4.6 (Status: affected) - 9.14.4.7 (Status: affected) - 9.15.1 (Status: affected) - 9.15.1.7 (Status: affected) - 9.15.1.10 (Status: affected) - 9.15.1.15 (Status: affected) - 9.15.1.16 (Status: affected) - 9.15.1.17 (Status: affected) - 9.15.1.1 (Status: affected) - 9.15.1.21 (Status: affected) - 9.16.1 (Status: affected) - 9.16.1.28 (Status: affected) - 9.16.2 (Status: affected) - 9.16.2.3 (Status: affected) - 9.16.2.7 (Status: affected) - 9.16.2.11 (Status: affected) - 9.16.2.13 (Status: affected) - 9.16.2.14 (Status: affected) - 9.16.3 (Status: affected) - 9.16.3.3 (Status: affected) - 9.16.3.14 (Status: affected) - 9.17.1 (Status: affected) - 9.17.1.7 (Status: affected) - 9.17.1.9 (Status: affected) - 9.18.1 (Status: affected) **Cisco - Cisco Firepower Threat Defense Software** Affected versions: - 6.2.3 (Status: affected) - 6.2.3.1 (Status: affected) - 6.2.3.2 (Status: affected) - 6.2.3.3 (Status: affected) - 6.2.3.4 (Status: affected) - 6.2.3.5 (Status: affected) - 6.2.3.6 (Status: affected) - 6.2.3.7 (Status: affected) - 6.2.3.8 (Status: affected) - 6.2.3.10 (Status: affected) - 6.2.3.11 (Status: affected) - 6.2.3.9 (Status: affected) - 6.2.3.12 (Status: affected) - 6.2.3.13 (Status: affected) - 6.2.3.14 (Status: affected) - 6.2.3.15 (Status: affected) - 6.2.3.16 (Status: affected) - 6.2.3.17 (Status: affected) - 6.2.3.18 (Status: affected) - 6.6.0 (Status: affected) - 6.6.0.1 (Status: affected) - 6.6.1 (Status: affected) - 6.6.3 (Status: affected) - 6.6.4 (Status: affected) - 6.6.5 (Status: affected) - 6.6.5.1 (Status: affected) - 6.6.5.2 (Status: affected) - 6.4.0 (Status: affected) - 6.4.0.1 (Status: affected) - 6.4.0.3 (Status: affected) - 6.4.0.2 (Status: affected) - 6.4.0.4 (Status: affected) - 6.4.0.5 (Status: affected) - 6.4.0.6 (Status: affected) - 6.4.0.7 (Status: affected) - 6.4.0.8 (Status: affected) - 6.4.0.9 (Status: affected) - 6.4.0.10 (Status: affected) - 6.4.0.11 (Status: affected) - 6.4.0.12 (Status: affected) - 6.4.0.13 (Status: affected) - 6.4.0.14 (Status: affected) - 6.4.0.15 (Status: affected) - 6.7.0 (Status: affected) - 6.7.0.1 (Status: affected) - 6.7.0.2 (Status: affected) - 6.7.0.3 (Status: affected) - 7.0.0 (Status: affected) - 7.0.0.1 (Status: affected) - 7.0.1 (Status: affected) - 7.0.1.1 (Status: affected) - 7.0.2 (Status: affected) - 7.0.2.1 (Status: affected) - 7.0.3 (Status: affected) - 7.1.0 (Status: affected) - 7.1.0.1 (Status: affected) - 7.1.0.2 (Status: affected) - 7.2.0 (Status: affected) - 7.2.0.1 (Status: affected) ### References 1. [cisco-sa-asa-webvpn-dos-3GhZQBAS](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-dos-3GhZQBAS)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26721, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26721 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26721 - **State**: PUBLISHED - **Published Date**: April 03, 2024 at 14:55 UTC - **Last Updated**: May 04, 2025 at 08:54 UTC - **Reserved Date**: February 19, 2024 at 14:20 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: drm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address Commit bd077259d0a9 ("drm/i915/vdsc: Add function to read any PPS register") defines a new macro to calculate the DSC PPS register addresses with PPS number as an input. This macro correctly calculates the addresses till PPS 11 since the addresses increment by 4. So in that case the following macro works correctly to give correct register address: _MMIO(_DSCA_PPS_0 + (pps) * 4) However after PPS 11, the register address for PPS 12 increments by 12 because of RC Buffer memory allocation in between. Because of this discontinuity in the address space, the macro calculates wrong addresses for PPS 12 - 16 resulting into incorrect DSC PPS parameter value read/writes causing DSC corruption. This fixes it by correcting this macro to add the offset of 12 for PPS >=12. v3: Add correct paranthesis for pps argument (Jani Nikula) (cherry picked from commit 6074be620c31dc2ae11af96a1a5ea95580976fb5) ### Affected Products **Linux - Linux** Affected versions: - bd077259d0a9c9bf453e7e9751bf41f1996e6585 (Status: affected) - bd077259d0a9c9bf453e7e9751bf41f1996e6585 (Status: affected) **Linux - Linux** Affected versions: - 6.7 (Status: affected) - 0 (Status: unaffected) - 6.7.6 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/ff5999fb03f467e1e7159f0ddb199c787f7512b9) 2. [](https://git.kernel.org/stable/c/962ac2dce56bb3aad1f82a4bbe3ada57a020287c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1226, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1226 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1226 - **State**: PUBLISHED - **Published Date**: December 15, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:46 UTC - **Reserved Date**: December 14, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SugarCRM Sugar Sales 2.0.1c and earlier allows remote attackers to gain sensitive information via certain requests to scripts that contain invalid input, which reveals the path in an error message, as demonstrated using phprint.php with an empty module parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20041213 SugarSales Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=110295433323795&w=2) 2. [sugar-sales-path-disclosure(18447)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18447)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3574, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3574 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3574 - **State**: PUBLISHED - **Published Date**: October 19, 2010 at 21:00 UTC - **Last Updated**: August 07, 2024 at 03:11 UTC - **Reserved Date**: September 20, 2010 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:12462](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12462) 2. [](http://support.avaya.com/css/P8/documents/100114327) 3. [RHSA-2010:0865](http://www.redhat.com/support/errata/RHSA-2010-0865.html) 4. [ADV-2011-0134](http://www.vupen.com/english/advisories/2011/0134) 5. [](http://support.avaya.com/css/P8/documents/100114315) 6. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml) 7. [HPSBMU02799](http://marc.info/?l=bugtraq&m=134254866602253&w=2) 8. [ADV-2011-0143](http://www.vupen.com/english/advisories/2011/0143) 9. [oval:org.mitre.oval:def:12367](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12367) 10. [RHSA-2010:0770](http://www.redhat.com/support/errata/RHSA-2010-0770.html) 11. [SSRT100333](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748) 12. [RHSA-2010:0768](http://www.redhat.com/support/errata/RHSA-2010-0768.html) 13. [FEDORA-2010-16240](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html) 14. [44011](http://www.securityfocus.com/bid/44011) 15. [USN-1010-1](http://www.ubuntu.com/usn/USN-1010-1) 16. [](https://bugzilla.redhat.com/show_bug.cgi?id=642215) 17. [RHSA-2010:0987](http://www.redhat.com/support/errata/RHSA-2010-0987.html) 18. [44954](http://secunia.com/advisories/44954) 19. [42432](http://secunia.com/advisories/42432) 20. [RHSA-2011:0880](http://www.redhat.com/support/errata/RHSA-2011-0880.html) 21. [](http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html) 22. [RHSA-2010:0873](http://www.redhat.com/support/errata/RHSA-2010-0873.html) 23. [](http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html) 24. [](http://www.vmware.com/security/advisories/VMSA-2011-0003.html) 25. [42974](http://secunia.com/advisories/42974) 26. [41972](http://secunia.com/advisories/41972) 27. [ADV-2010-3086](http://www.vupen.com/english/advisories/2010/3086) 28. [HPSBUX02608](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748) 29. [ADV-2010-3112](http://www.vupen.com/english/advisories/2010/3112) 30. [](http://support.avaya.com/css/P8/documents/100123193) 31. [42377](http://secunia.com/advisories/42377) 32. [SUSE-SR:2010:019](http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html) 33. [RHSA-2011:0152](http://www.redhat.com/support/errata/RHSA-2011-0152.html) 34. [](http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html) 35. [20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX](http://www.securityfocus.com/archive/1/516397/100/0/threaded) 36. [41967](http://secunia.com/advisories/41967) 37. [RHSA-2010:0807](http://www.redhat.com/support/errata/RHSA-2010-0807.html) 38. [RHSA-2010:0935](http://www.redhat.com/support/errata/RHSA-2010-0935.html) 39. [FEDORA-2010-16312](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html) 40. [FEDORA-2010-16294](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3179, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3179 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3179 - **State**: PUBLISHED - **Published Date**: October 11, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 23:01 UTC - **Reserved Date**: October 11, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description drm.c in Linux kernel 2.6.10 to 2.6.13 creates a debug file in sysfs with world-readable and world-writable permissions, which allows local users to enable DRM debugging and obtain sensitive information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MDKSA-2005:235](http://www.mandriva.com/security/advisories?name=MDKSA-2005:235) 2. [MDKSA-2005:220](http://www.mandriva.com/security/advisories?name=MDKSA-2005:220) 3. [](http://www.kernel.org/hg/linux-2.6/?cmd=changeset%3Bnode=d7067d7d1f92cba14963a430cfbd53098cbbc8fd) 4. [17280](http://secunia.com/advisories/17280) 5. [15154](http://www.securityfocus.com/bid/15154) 6. [FEDORA-2005-1007](http://www.securityfocus.com/advisories/9549) 7. [17114](http://secunia.com/advisories/17114) 8. [](http://bugs.gentoo.org/show_bug.cgi?id=107893)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29545, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29545 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29545 - **State**: PUBLISHED - **Published Date**: May 14, 2021 at 19:11 UTC - **Last Updated**: August 03, 2024 at 22:11 UTC - **Reserved Date**: March 30, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in converting sparse tensors to CSR Sparse matrices. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/800346f2c03a27e182dd4fba48295f65e7790739/tensorflow/core/kernels/sparse/kernels.cc#L66) does a double redirection to access an element of an array allocated on the heap. If the value at `indices(i, 0)` is such that `indices(i, 0) + 1` is outside the bounds of `csr_row_ptr`, this results in writing outside of bounds of heap allocated data. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### CVSS Metrics - **CVSS Base Score**: 2.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-131: Security Weakness ### Affected Products **tensorflow - tensorflow** Affected versions: - < 2.1.4 (Status: affected) - >= 2.2.0, < 2.2.3 (Status: affected) - >= 2.3.0, < 2.3.3 (Status: affected) - >= 2.4.0, < 2.4.2 (Status: affected) ### References 1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hmg3-c7xj-6qwm) 2. [](https://github.com/tensorflow/tensorflow/commit/1e922ccdf6bf46a3a52641f99fd47d54c1decd13)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4947, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4947 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4947 - **State**: PUBLISHED - **Published Date**: October 20, 2023 at 06:35 UTC - **Last Updated**: February 05, 2025 at 19:10 UTC - **Reserved Date**: September 13, 2023 at 15:03 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WooCommerce EAN Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the refresh_order_ean_data AJAX action in versions up to 6.1.0. This makes it possible for authenticated attackers with contributor-level access and above, to update EAN numbers for orders. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Affected Products **Yan&Co - WooCommerce EAN Payment Gateway** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2760b183-3c15-4f0e-b72f-7c0333f9d4b6?source=cve) 2. [](https://plugins.yanco.dk/product/woocommerce-ean-payment-gateway/) ### Credits - Lana Codes - Yan&Co ApS
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0865, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0865 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0865 - **State**: PUBLISHED - **Published Date**: July 07, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 09:27 UTC - **Reserved Date**: January 06, 2014 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 through 4.7.0 before 4.7.0.03 FP5 in IBM Algorithmics relies on client-side input validation, which allows remote authenticated users to bypass intended dual-control restrictions and modify data via crafted serialized objects, as demonstrated by limit manipulations. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ibm-aclm-cve20140865-sec-bypass(90939)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90939) 2. [](http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html) 3. [20140630 SEC Consult SA-20140630-0 :: Multiple vulnerabilities in IBM Algorithmics RICOS](http://www.securityfocus.com/archive/1/532598/100/0/threaded) 4. [59296](http://secunia.com/advisories/59296) 5. [](http://www-01.ibm.com/support/docview.wss?uid=swg21675881) 6. [](https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140630-0_IBM_Algorithmics_RICOS_multiple_vulnerabilities_v10.txt) 7. [20140630 SEC Consult SA-20140630-0 :: Multiple vulnerabilities in IBM Algorithmics RICOS](http://seclists.org/fulldisclosure/2014/Jun/173)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1827, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1827 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1827 - **State**: PUBLISHED - **Published Date**: June 20, 2022 at 10:26 UTC - **Last Updated**: August 03, 2024 at 00:17 UTC - **Reserved Date**: May 23, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The PDF24 Article To PDF WordPress plugin through 4.2.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Unknown - PDF24 Article To PDF** Affected versions: - 4.2.2 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/0bd25283-e079-4010-b139-cce9afb1d54d) ### Credits - Daniel Ruf
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8287, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8287 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8287 - **State**: PUBLISHED - **Published Date**: July 11, 2018 at 00:00 UTC - **Last Updated**: August 05, 2024 at 06:54 UTC - **Reserved Date**: March 14, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8288, CVE-2018-8291, CVE-2018-8296, CVE-2018-8298. ### Affected Products **Microsoft - ChakraCore** Affected versions: - ChakraCore (Status: affected) **Microsoft - Internet Explorer 11** Affected versions: - Windows 10 for 32-bit Systems (Status: affected) - Windows 10 for x64-based Systems (Status: affected) - Windows 10 Version 1607 for 32-bit Systems (Status: affected) - Windows 10 Version 1607 for x64-based Systems (Status: affected) - Windows 10 Version 1703 for 32-bit Systems (Status: affected) - Windows 10 Version 1703 for x64-based Systems (Status: affected) - Windows 10 Version 1709 for 32-bit Systems (Status: affected) - Windows 10 Version 1709 for x64-based Systems (Status: affected) - Windows 10 Version 1803 for 32-bit Systems (Status: affected) - Windows 10 Version 1803 for x64-based Systems (Status: affected) - Windows 7 for 32-bit Systems Service Pack 1 (Status: affected) - Windows 7 for x64-based Systems Service Pack 1 (Status: affected) - Windows 8.1 for 32-bit systems (Status: affected) - Windows 8.1 for x64-based systems (Status: affected) - Windows RT 8.1 (Status: affected) - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) - Windows Server 2012 R2 (Status: affected) - Windows Server 2016 (Status: affected) **Microsoft - Microsoft Edge** Affected versions: - Windows 10 for 32-bit Systems (Status: affected) - Windows 10 for x64-based Systems (Status: affected) - Windows 10 Version 1607 for 32-bit Systems (Status: affected) - Windows 10 Version 1607 for x64-based Systems (Status: affected) - Windows 10 Version 1703 for 32-bit Systems (Status: affected) - Windows 10 Version 1703 for x64-based Systems (Status: affected) - Windows 10 Version 1709 for 32-bit Systems (Status: affected) - Windows 10 Version 1709 for x64-based Systems (Status: affected) - Windows 10 Version 1803 for 32-bit Systems (Status: affected) - Windows 10 Version 1803 for x64-based Systems (Status: affected) - Windows Server 2016 (Status: affected) **Microsoft - Internet Explorer 10** Affected versions: - Windows Server 2012 (Status: affected) ### References 1. [1041256](http://www.securitytracker.com/id/1041256) 2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8287) 3. [104634](http://www.securityfocus.com/bid/104634) 4. [1041258](http://www.securitytracker.com/id/1041258)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-46712, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-46712 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-46712 - **State**: PUBLISHED - **Published Date**: February 27, 2023 at 00:00 UTC - **Last Updated**: March 11, 2025 at 14:26 UTC - **Reserved Date**: December 07, 2022 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13. An app may be able to cause unexpected system termination or potentially execute code with kernel privileges. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213488)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5905, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5905 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5905 - **State**: PUBLISHED - **Published Date**: September 18, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 07:06 UTC - **Reserved Date**: August 06, 2015 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Safari in Apple iOS before 9 allows remote attackers to spoof the relationship between URLs and web content via a crafted window opener on a web site. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033609](http://www.securitytracker.com/id/1033609) 2. [](https://support.apple.com/HT205212) 3. [76764](http://www.securityfocus.com/bid/76764) 4. [APPLE-SA-2015-09-16-1](http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45896, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45896 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45896 - **State**: PUBLISHED - **Published Date**: August 28, 2024 at 00:00 UTC - **Last Updated**: October 31, 2024 at 17:02 UTC - **Reserved Date**: October 16, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ntfs3 in the Linux kernel through 6.8.0 allows a physically proximate attacker to read kernel memory by mounting a filesystem (e.g., if a Linux distribution is configured to allow unprivileged mounts of removable media) and then leveraging local access to trigger an out-of-bounds read. A length value can be larger than the amount of memory allocated. NOTE: the supplier's perspective is that there is no vulnerability when an attack requires an attacker-modified filesystem image. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://dfir.ru/2024/06/19/vulnerabilities-in-7-zip-and-ntfs3/) 2. [](https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.11) 3. [](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=013ff63b649475f0ee134e2c8d0c8e65284ede50) 4. [](https://github.com/torvalds/linux/commit/013ff63b649475f0ee134e2c8d0c8e65284ede50)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-47763, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-47763 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-47763 - **State**: REJECTED - **Last Updated**: May 10, 2025 at 02:55 UTC - **Reserved Date**: May 09, 2025 at 14:40 UTC - **Assigned By**: fortinet ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-19158, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-19158 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-19158 - **State**: PUBLISHED - **Published Date**: September 15, 2021 at 13:52 UTC - **Last Updated**: August 04, 2024 at 14:08 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross Site Scripting (XSS) in S-CMS build 20191014 and earlier allows remote attackers to execute arbitrary code via the 'Site Title' parameter of the component '/data/admin/#/app/config/'. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/TL-swallow/swallow/blob/master/S-CMS%20XSS1.docx)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23523, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23523 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23523 - **State**: PUBLISHED - **Published Date**: March 16, 2024 at 04:26 UTC - **Last Updated**: August 01, 2024 at 23:06 UTC - **Reserved Date**: January 17, 2024 at 18:19 UTC - **Assigned By**: Patchstack ### Vulnerability Description Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Elementor Pro.This issue affects Elementor Pro: from n/a through 3.19.2. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **Elementor - Elementor Pro** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/elementor-pro/wordpress-elementor-pro-plugin-3-19-2-contributor-arbitrary-user-meta-data-retrieval-vulnerability?_s_id=cve) ### Credits - Dynamic.ooo Team
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4429, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4429 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4429 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 09, 2011 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1549, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1549 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1549 - **State**: PUBLISHED - **Published Date**: May 07, 2010 at 17:43 UTC - **Last Updated**: August 07, 2024 at 01:28 UTC - **Reserved Date**: April 26, 2010 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Unspecified vulnerability in the Agent in HP LoadRunner before 9.50 and HP Performance Center before 9.50 allows remote attackers to execute arbitrary code via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SSRT071328](http://www.securityfocus.com/archive/1/511146/100/0/threaded) 2. [HPSBMA02201](http://www.securityfocus.com/archive/1/511146/100/0/threaded) 3. [HPSBMA02528](http://seclists.org/bugtraq/2010/May/69) 4. [SSRT100106](http://seclists.org/bugtraq/2010/May/69) 5. [43411](https://www.exploit-db.com/exploits/43411/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1144, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1144 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1144 - **State**: PUBLISHED - **Published Date**: April 16, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:35 UTC - **Reserved Date**: April 16, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description popup.php in EasyPHPCalendar before 6.2.8 allows remote attackers to obtain sensitive information via an invalid ev parameter, which reveals the full pathname of the web server in a PHP error message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [15545](http://www.osvdb.org/15545) 2. [](http://www.snkenjoi.com/secadv/secadv4.txt) 3. [](http://docs.easyphpcalendar.com/Change%20Log/changeLog.htm) 4. [1013704](http://securitytracker.com/id?1013704)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2858, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2858 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2858 - **State**: PUBLISHED - **Published Date**: April 15, 2014 at 18:00 UTC - **Last Updated**: August 06, 2024 at 10:28 UTC - **Reserved Date**: April 15, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 through 2.3.6 allows remote attackers to obtain sensitive information via unspecified vectors related to a "configured block." NOTE: this issue was SPLIT from CVE-2014-0053 per ADT2 due to different vulnerability types. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20140227 Update: CVE-2014-0053 Information Disclosure when using Grails](http://www.securityfocus.com/archive/1/531281/100/0/threaded) 2. [](http://www.gopivotal.com/security/cve-2014-0053) 3. [20140227 Update: CVE-2014-0053 Information Disclosure when using Grails](http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0267.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7938, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7938 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7938 - **State**: PUBLISHED - **Published Date**: January 09, 2016 at 02:00 UTC - **Last Updated**: August 06, 2024 at 08:06 UTC - **Reserved Date**: October 22, 2015 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Advantech EKI-132x devices with firmware before 2015-12-31 allow remote attackers to bypass authentication via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-15-344-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9312, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9312 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9312 - **State**: PUBLISHED - **Published Date**: June 25, 2018 at 15:00 UTC - **Last Updated**: September 16, 2024 at 23:06 UTC - **Reserved Date**: May 30, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Improperly implemented option-field processing in the TCP/IP stack on Allen-Bradley L30ERMS safety devices v30 and earlier causes a denial of service. When a crafted TCP packet is received, the device reboots immediately. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-172-02) 2. [104528](http://www.securityfocus.com/bid/104528)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-35566, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-35566 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-35566 - **State**: PUBLISHED - **Published Date**: October 20, 2021 at 10:50 UTC - **Last Updated**: September 25, 2024 at 19:35 UTC - **Reserved Date**: June 28, 2021 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: Diagnostics). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Applications Manager accessible data as well as unauthorized access to critical data or complete access to all Oracle Applications Manager accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N` ### Affected Products **Oracle Corporation - Applications Manager** Affected versions: - 12.1.3 (Status: affected) - 12.2.3-12.2.10 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2190, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2190 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2190 - **State**: PUBLISHED - **Published Date**: July 13, 2023 at 02:00 UTC - **Last Updated**: October 30, 2024 at 19:53 UTC - **Reserved Date**: April 19, 2023 at 22:23 UTC - **Assigned By**: GitLab ### Vulnerability Description An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.10 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1. It may be possible for users to view new commits to private projects in a fork created while the project was public. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **GitLab - GitLab** Affected versions: - 13.10 (Status: affected) - 16.0 (Status: affected) - 16.1 (Status: affected) ### References 1. [GitLab Issue #408137](https://gitlab.com/gitlab-org/gitlab/-/issues/408137) 2. [HackerOne Bug Bounty Report #1944500](https://hackerone.com/reports/1944500) ### Credits - Thanks [pwnie](https://hackerone.com/pwnie) for reporting this vulnerability through our HackerOne bug bounty program
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27201, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27201 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27201 - **State**: PUBLISHED - **Published Date**: March 15, 2022 at 16:45 UTC - **Last Updated**: August 03, 2024 at 05:25 UTC - **Reserved Date**: March 15, 2022 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. ### Affected Products **Jenkins project - Jenkins Semantic Versioning Plugin** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2124) 2. [[oss-security] 20220315 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/03/15/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2708, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2708 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2708 - **State**: PUBLISHED - **Published Date**: August 08, 2022 at 12:50 UTC - **Last Updated**: April 15, 2025 at 13:55 UTC - **Reserved Date**: August 08, 2022 at 00:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in SourceCodester Gym Management System. This affects an unknown part of the file login.php. The manipulation of the argument user_login with the input 123@xx.com' OR (SELECT 9084 FROM(SELECT COUNT(*),CONCAT(0x7178767871,(SELECT (ELT(9084=9084,1))),0x71767a6271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- dPvW leads to sql injection. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-205833 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Gym Management System** Affected versions: - n/a (Status: affected) ### References 1. [](https://vuldb.com/?id.205833)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16242, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16242 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16242 - **State**: PUBLISHED - **Published Date**: March 22, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 20:20 UTC - **Reserved Date**: October 31, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on MECO USB Memory Stick with Fingerprint MECOZiolsamDE601 devices. The fingerprint authentication requirement for data access can be bypassed. An attacker with physical access can send a static packet to a serial port exposed on the PCB to unlock the key and get access to the data without possessing the required fingerprint. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.blackhat.com/us-17/briefings/schedule/index.html#attacking-encrypted-usb-keys-the-hardware-way-7443) 2. [](https://www.blackhat.com/docs/us-17/thursday/us-17-Picod-Attacking-Encrypted-USB-Keys-The-Hard%28ware%29-Way.pdf) 3. [](https://gist.github.com/audebert/ef6e206a27ededd1386cff48604e9335) 4. [](https://www.elie.net/talk/attacking-encrypted-usb-keys-the-hardware-way)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43041, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43041 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43041 - **State**: PUBLISHED - **Published Date**: October 29, 2023 at 00:49 UTC - **Last Updated**: September 06, 2024 at 19:34 UTC - **Reserved Date**: September 15, 2023 at 01:12 UTC - **Assigned By**: ibm ### Vulnerability Description IBM QRadar SIEM 7.5 is vulnerable to information exposure allowing a delegated Admin tenant user with a specific domain security profile assigned to see data from other domains. This vulnerability is due to an incomplete fix for CVE-2022-34352. IBM X-Force ID: 266808. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **IBM - QRadar SIEM** Affected versions: - 7.5 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7060803) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/266808)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13195, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13195 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13195 - **State**: PUBLISHED - **Published Date**: January 08, 2025 at 23:31 UTC - **Last Updated**: January 09, 2025 at 16:19 UTC - **Reserved Date**: January 08, 2025 at 14:30 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in donglight bookstore电商书城系统说明 1.0.0. It has been classified as critical. This affects the function getHtml of the file src/main/java/org/zdd/bookstore/rawl/HttpUtil.java. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **donglight - bookstore电商书城系统说明** Affected versions: - 1.0.0 (Status: affected) ### References 1. [VDB-290787 | donglight bookstore电商书城系统说明 HttpUtil.java getHtml server-side request forgery](https://vuldb.com/?id.290787) 2. [VDB-290787 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.290787) 3. [Submit #469689 | donglight bookstore 1.0 SSRF](https://vuldb.com/?submit.469689) 4. [](https://github.com/donglight/bookstore/issues/11) 5. [](https://github.com/donglight/bookstore/issues/11#issue-2760929273) ### Credits - LVZC1 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4617, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4617 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4617 - **State**: PUBLISHED - **Published Date**: February 15, 2019 at 21:00 UTC - **Last Updated**: August 06, 2024 at 06:18 UTC - **Reserved Date**: June 16, 2015 at 00:00 UTC - **Assigned By**: larry_cashdollar ### Vulnerability Description Vulnerability in Easy2map-photos WordPress Plugin v1.09 MapPinImageUpload.php and MapPinIconSave.php allows path traversal when specifying file names creating files outside of the upload directory. ### Affected Products **Steven Ellis - Easy2map-photos WordPress Plugin** Affected versions: - 1.09 (Status: affected) ### References 1. [](https://wordpress.org/plugins/easy2map-photos) 2. [](http://www.vapidlabs.com/advisory.php?v=130)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0735, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0735 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0735 - **State**: PUBLISHED - **Published Date**: March 28, 2022 at 18:52 UTC - **Last Updated**: August 02, 2024 at 23:40 UTC - **Reserved Date**: February 23, 2022 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.10 before 14.6.5, all versions starting from 14.7 before 14.7.4, all versions starting from 14.8 before 14.8.2. An unauthorised user was able to steal runner registration tokens through an information disclosure vulnerability using quick actions commands. ### CVSS Metrics - **CVSS Base Score**: 10/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Affected Products **GitLab - GitLab** Affected versions: - >=14.8, <14.8.2 (Status: affected) - >=14.7, <14.7.4 (Status: affected) - >=12.10, <14.6.5 (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/353529) 2. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0735.json) ### Credits - This vulnerability was found internally by a member of the GitLab team.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-1777, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-1777 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-1777 - **State**: PUBLISHED - **Published Date**: June 11, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 09:50 UTC - **Reserved Date**: January 29, 2014 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 10 and 11 allows remote attackers to read local files on the client via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1030370](http://www.securitytracker.com/id/1030370) 2. [67869](http://www.securityfocus.com/bid/67869) 3. [MS14-035](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5655, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5655 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5655 - **State**: REJECTED - **Published Date**: October 20, 2023 at 01:51 UTC - **Last Updated**: January 23, 2024 at 22:31 UTC - **Reserved Date**: October 19, 2023 at 13:34 UTC - **Assigned By**: Wordfence ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0450, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0450 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0450 - **State**: PUBLISHED - **Published Date**: February 04, 2000 at 05:00 UTC - **Last Updated**: August 01, 2024 at 16:41 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [194](http://www.securityfocus.com/bid/194)