System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19060, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19060
- **State**: PUBLISHED
- **Published Date**: November 07, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 11:30 UTC
- **Reserved Date**: November 07, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Poppler 0.71.0. There is a NULL pointer dereference in goo/GooString.h, will lead to denial of service, as demonstrated by utils/pdfdetach.cc not validating a filename of an embedded file before constructing a save path.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3837-1](https://usn.ubuntu.com/3837-1/)
2. [](https://gitlab.freedesktop.org/poppler/poppler/issues/660)
3. [RHSA-2019:2022](https://access.redhat.com/errata/RHSA-2019:2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42030, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42030 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42030
- **State**: PUBLISHED
- **Published Date**: August 08, 2024 at 08:13 UTC
- **Last Updated**: August 09, 2024 at 17:50 UTC
- **Reserved Date**: July 27, 2024 at 06:52 UTC
- **Assigned By**: huawei
### Vulnerability Description
Access permission verification vulnerability in the content sharing pop-up module
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-701: Security Weakness
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 4.2.0 (Status: affected)
- 4.0.0 (Status: affected)
- 3.1.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 14.0.0 (Status: affected)
- 13.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/8/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11587, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11587
- **State**: PUBLISHED
- **Published Date**: July 24, 2017 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 18:12 UTC
- **Reserved Date**: July 23, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
On Cisco DDR2200 ADSL2+ Residential Gateway DDR2200B-NA-AnnexA-FCC-V00.00.03.45.4E and DDR2201v1 ADSL2+ Residential Gateway DDR2201v1-NA-AnnexA-FCC-V00.00.03.28.3 devices, there is directory traversal in the filename parameter to the /download.conf URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [100484](http://www.securityfocus.com/bid/100484)
2. [](http://seclists.org/fulldisclosure/2017/Jul/26) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23588, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23588
- **State**: PUBLISHED
- **Published Date**: February 03, 2025 at 14:22 UTC
- **Last Updated**: February 03, 2025 at 16:34 UTC
- **Reserved Date**: January 16, 2025 at 11:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WOW WordPress WOW Best CSS Compiler allows Reflected XSS. This issue affects WOW Best CSS Compiler: from n/a through 2.0.2.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WOW WordPress - WOW Best CSS Compiler**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/best-css-compiler/vulnerability/wordpress-wow-best-css-compiler-plugin-2-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9347, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9347 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9347
- **State**: PUBLISHED
- **Published Date**: December 08, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 13:40 UTC
- **Reserved Date**: December 08, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in dosearch.php in phpMyRecipes 1.2.2 allows remote attackers to execute arbitrary SQL commands via the words_exact parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35365](http://www.exploit-db.com/exploits/35365)
2. [115038](http://osvdb.org/show/osvdb/115038)
3. [phpmyrecipes-dosearch-sql-injection(99005)](https://exchange.xforce.ibmcloud.com/vulnerabilities/99005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3187, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3187
- **State**: PUBLISHED
- **Published Date**: April 08, 2016 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Prepopulate module 7.x-2.x before 7.x-2.1 for Drupal allows remote attackers to modify the REQUEST superglobal array, and consequently have unspecified impact, via a base64-encoded pp parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/node/2679215)
2. [](https://www.drupal.org/node/2679503)
3. [](http://cgit.drupalcode.org/prepopulate/commit/prepopulate.module?id=16cdb63cc3b256dd785e029ec17f92ddf80cc443) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32900, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32900
- **State**: PUBLISHED
- **Published Date**: February 27, 2023 at 00:00 UTC
- **Last Updated**: March 11, 2025 at 18:10 UTC
- **Reserved Date**: June 09, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.6, macOS Big Sur 11.7. An app may be able to gain elevated privileges.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213443)
2. [](https://support.apple.com/en-us/HT213444) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11450, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11450
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 21:04 UTC
- **Reserved Date**: May 25, 2018 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A reflected Cross-Site-Scripting (XSS) vulnerability has been identified in Siemens PLM Software TEAMCENTER (V9.1.2.5). If a user visits the login portal through the URL crafted by the attacker, the attacker can insert html/javascript and thus alter/rewrite the login portal page. Siemens PLM Software TEAMCENTER V9.1.3 and newer are not affected.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Siemens AG - Siemens PLM Software TEAMCENTER**
Affected versions:
- Siemens PLM Software TEAMCENTER : Version 9.1.2.5 (Status: affected)
### References
1. [](https://github.com/LucvanDonk/Siemens-Siemens-PLM-Software-TEAMCENTER-Reflected-Cross-Site-Scripting-XSS-vulnerability/wiki) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2621, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2621 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2621
- **State**: PUBLISHED
- **Published Date**: July 15, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: June 09, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the PeopleSoft PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.48.17 and 8.49.11 has unknown impact and remote authenticated attack vectors, a different vulnerability than CVE-2008-2615, CVE-2008-2616, CVE-2008-2617, CVE-2008-2618, CVE-2008-2620, and CVE-2008-2622.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html)
2. [ADV-2008-2115](http://www.vupen.com/english/advisories/2008/2115)
3. [SSRT061201](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143)
4. [1020497](http://www.securitytracker.com/id?1020497)
5. [HPSBMA02133](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143)
6. [ADV-2008-2109](http://www.vupen.com/english/advisories/2008/2109/references)
7. [31087](http://secunia.com/advisories/31087)
8. [oracle-peopsoft-peoptools-unspecified(43822)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43822)
9. [31113](http://secunia.com/advisories/31113) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37130, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37130
- **State**: PUBLISHED
- **Published Date**: June 11, 2024 at 01:34 UTC
- **Last Updated**: August 02, 2024 at 03:50 UTC
- **Reserved Date**: June 03, 2024 at 12:08 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell OpenManage Server Administrator, versions 11.0.1.0 and prior, contains a Local Privilege Escalation vulnerability via XSL Hijacking. A local low-privileged malicious user could potentially exploit this vulnerability and escalate their privilege to the admin user and gain full control of the machine. Exploitation may lead to a complete system compromise.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**Dell - Dell OpenManage Server Administrator**
Affected versions:
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000225914/dsa-2024-264-dell-openmanage-server-administrator-omsa-security-update-for-local-privilege-escalation-via-xsl-hijacking-vulnerability) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1722, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1722 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1722
- **State**: PUBLISHED
- **Published Date**: April 26, 2018 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 03:38 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security QRadar SIEM 7.2 and 7.3 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 134811.
### Affected Products
**IBM - Security QRadar SIEM**
Affected versions:
- 7.2 (Status: affected)
- 7.3 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg22015802)
2. [ibm-qradar-cve20171722-SqlInjection(134811)](https://exchange.xforce.ibmcloud.com/vulnerabilities/134811) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16395, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16395 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16395
- **State**: PUBLISHED
- **Published Date**: November 16, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 10:24 UTC
- **Reserved Date**: September 03, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ruby-lang.org/en/news/2018/10/17/openssl-x509-name-equality-check-does-not-work-correctly-cve-2018-16395/)
2. [RHSA-2018:3738](https://access.redhat.com/errata/RHSA-2018:3738)
3. [](https://www.ruby-lang.org/en/news/2018/11/06/ruby-2-6-0-preview3-released/)
4. [RHSA-2018:3729](https://access.redhat.com/errata/RHSA-2018:3729)
5. [](https://hackerone.com/reports/387250)
6. [RHSA-2018:3730](https://access.redhat.com/errata/RHSA-2018:3730)
7. [RHSA-2018:3731](https://access.redhat.com/errata/RHSA-2018:3731)
8. [](https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-3-8-released/)
9. [DSA-4332](https://www.debian.org/security/2018/dsa-4332)
10. [USN-3808-1](https://usn.ubuntu.com/3808-1/)
11. [](https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-4-5-released/)
12. [](https://security.netapp.com/advisory/ntap-20190221-0002/)
13. [](https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-5-2-released/)
14. [[debian-lts-announce] 20181028 [SECURITY] [DLA 1558-1] ruby2.1 security update](https://lists.debian.org/debian-lts-announce/2018/10/msg00020.html)
15. [1042105](http://www.securitytracker.com/id/1042105)
16. [openSUSE-SU-2019:1771](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html)
17. [RHSA-2019:1948](https://access.redhat.com/errata/RHSA-2019:1948)
18. [RHSA-2019:2565](https://access.redhat.com/errata/RHSA-2019:2565)
19. [](https://www.oracle.com/security-alerts/cpujan2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5600, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5600
- **State**: PUBLISHED
- **Published Date**: July 07, 2020 at 08:05 UTC
- **Last Updated**: August 04, 2024 at 08:30 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains a resource management error vulnerability, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.
### Affected Products
**Mitsubishi Electric Corporation - GOT2000 series GT27, GT25, and GT23**
Affected versions:
- CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model (Status: affected)
### References
1. [](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-005_en.pdf)
2. [](https://jvn.jp/en/vu/JVNVU95413676/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4642, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4642
- **State**: PUBLISHED
- **Published Date**: January 11, 2019 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 00:39 UTC
- **Reserved Date**: May 11, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
In iOS before 9.3.3, tvOS before 9.2.2, and OS X El Capitan before v10.11.6 and Security Update 2016-004, proxy authentication incorrectly reported HTTP proxies received credentials securely. This issue was addressed through improved warnings.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT206902)
2. [](https://support.apple.com/HT206903)
3. [](https://support.apple.com/HT206905) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40466, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40466 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40466
- **State**: PUBLISHED
- **Published Date**: October 13, 2021 at 00:27 UTC
- **Last Updated**: August 04, 2024 at 02:44 UTC
- **Reserved Date**: September 02, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Common Log File System Driver Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40466) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36141, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36141 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36141
- **State**: PUBLISHED
- **Published Date**: August 03, 2023 at 00:00 UTC
- **Last Updated**: October 17, 2024 at 16:24 UTC
- **Reserved Date**: June 21, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
User enumeration is found in in PHPJabbers Cleaning Business Software 1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.phpjabbers.com/cleaning-business-software/)
2. [](https://medium.com/%40bcksec/multiple-vulnerabilities-in-php-jabbers-scripts-25af4afcadd4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3998, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3998 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3998
- **State**: PUBLISHED
- **Published Date**: October 01, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 23:56 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable heap-based buffer overflow vulnerability exists in the Windows enhanced metafile parser of Atlantis Word Processor, version 3.2.5.0. A specially crafted image embedded within a document can cause an undersized allocation, resulting in an overflow when the application tries to copy data into it. An attacker must convince a victim to open a document in order to trigger this vulnerability.
### Affected Products
**The Atlantis Word Processor Team - Atlantis Word Processor**
Affected versions:
- 3.2.5.0 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0666) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0084, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0084 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0084
- **State**: PUBLISHED
- **Published Date**: April 15, 2009 at 03:49 UTC
- **Last Updated**: August 07, 2024 at 04:24 UTC
- **Reserved Date**: January 08, 2009 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Use-after-free vulnerability in DirectShow in Microsoft DirectX 8.1 and 9.0 allows remote attackers to execute arbitrary code via an MJPEG file or video stream with a malformed Huffman table, which triggers an exception that frees heap memory that is later accessed, aka "MJPEG Decompression Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA09-104A](http://www.us-cert.gov/cas/techalerts/TA09-104A.html)
2. [53632](http://osvdb.org/53632)
3. [34665](http://secunia.com/advisories/34665)
4. [1022040](http://www.securitytracker.com/id?1022040)
5. [ADV-2009-1025](http://www.vupen.com/english/advisories/2009/1025)
6. [oval:org.mitre.oval:def:5618](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5618)
7. [](http://support.avaya.com/elmodocs2/security/ASA-2009-132.htm)
8. [34460](http://www.securityfocus.com/bid/34460)
9. [MS09-011](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-011)
10. [](http://www.piotrbania.com/all/adv/ms-directx-mjpeg-adv.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24626, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24626 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24626
- **State**: PUBLISHED
- **Published Date**: September 23, 2020 at 12:41 UTC
- **Last Updated**: August 04, 2024 at 15:19 UTC
- **Reserved Date**: August 25, 2020 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
Unathenticated directory traversal in the ReceiverServlet class doPost() method can lead to arbitrary remote code execution in HPE Pay Per Use (PPU) Utility Computing Service (UCS) Meter version 1.9.
### Affected Products
**n/a - HPE Pay Per Use (PPU) Utility Computing Service (UCS) Meter**
Affected versions:
- 1.9 (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04037en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3521, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3521 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3521
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: May 08, 2013 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2012, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2012
- **State**: PUBLISHED
- **Published Date**: June 19, 2019 at 19:58 UTC
- **Last Updated**: August 04, 2024 at 18:35 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In rw_t3t_act_handle_fmt_rsp of rw_t3t.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-120497437
### Affected Products
**n/a - Android**
Affected versions:
- Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2019-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6441, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6441 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6441
- **State**: PUBLISHED
- **Published Date**: January 24, 2013 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 00:20 UTC
- **Reserved Date**: December 26, 2012 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to obtain sensitive information via a crafted CIP packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7172, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7172 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7172
- **State**: PUBLISHED
- **Published Date**: February 27, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 06:24 UTC
- **Reserved Date**: February 15, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In index.php in WonderCMS before 2.4.1, remote attackers can delete arbitrary files via directory traversal.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://foreversong.cn/archives/1070)
2. [](https://github.com/robiso/wondercms/commit/64efdc4fd974c83cedd221b46e7c3854a81650ec)
3. [](https://www.wondercms.com/whatsnew) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2563, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2563
- **State**: PUBLISHED
- **Published Date**: April 14, 2025 at 06:00 UTC
- **Last Updated**: April 14, 2025 at 14:20 UTC
- **Reserved Date**: March 20, 2025 at 14:53 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The User Registration & Membership WordPress plugin before 4.1.2 does not prevent users to set their account role when the Membership Addon is enabled, leading to a privilege escalation issue and allowing unauthenticated users to gain admin privileges
### Weakness Classification (CWE)
- CWE-269 Improper Privilege Management: Security Weakness
### Affected Products
**Unknown - User Registration & Membership**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/2c0f62a1-9510-4f90-a297-17634e6c8b75/)
### Credits
- wesley (wcraft)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1872, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1872 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1872
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 14:47 UTC
- **Last Updated**: August 03, 2024 at 16:25 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved state management. This issue is fixed in iOS 14.5 and iPadOS 14.5, watchOS 7.4, macOS Big Sur 11.3. Muting a CallKit call while ringing may not result in mute being enabled.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212317)
2. [](https://support.apple.com/en-us/HT212324)
3. [](https://support.apple.com/en-us/HT212325) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5950, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5950 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5950
- **State**: PUBLISHED
- **Published Date**: February 01, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 01:15 UTC
- **Reserved Date**: June 29, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Kenexa LCMS Premier on Cloud stores user credentials in plain in clear text which can be read by an authenticated user.
### Affected Products
**IBM Corporation - Kenexa LCMS Premier on Cloud**
Affected versions:
- 9.0 (Status: affected)
- 9.1 (Status: affected)
- 9.2 (Status: affected)
- 9.2.1 (Status: affected)
- 9.3.0 (Status: affected)
- 9.4.0 (Status: affected)
- 9.5.0 (Status: affected)
- 10.0.0 (Status: affected)
- 10.1.0 (Status: affected)
- 10.2.0 (Status: affected)
### References
1. [94387](http://www.securityfocus.com/bid/94387)
2. [](http://www.ibm.com/support/docview.wss?uid=swg21992067) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4912, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4912 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4912
- **State**: PUBLISHED
- **Published Date**: January 04, 2021 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 17:19 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cloud Pak System 2.3 Self Service Console could allow a privilege escalation by capturing the user request URL when logged in as a privileged user. IBM X-Force ID: 191287.
### Affected Products
**IBM - Cloud Pak System**
Affected versions:
- 2.3 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6393554)
2. [ibm-cps-cve20204912-priv-escalation (191287)](https://exchange.xforce.ibmcloud.com/vulnerabilities/191287) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32663, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32663 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32663
- **State**: PUBLISHED
- **Published Date**: April 11, 2025 at 08:43 UTC
- **Last Updated**: April 11, 2025 at 13:30 UTC
- **Reserved Date**: April 09, 2025 at 11:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in roninwp FAT Cooming Soon allows PHP Local File Inclusion. This issue affects FAT Cooming Soon: from n/a through 1.1.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-98: Security Weakness
### Affected Products
**roninwp - FAT Cooming Soon**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/fat-coming-soon/vulnerability/wordpress-fat-cooming-soon-plugin-1-1-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0830
- **State**: PUBLISHED
- **Published Date**: November 16, 2017 at 23:00 UTC
- **Last Updated**: September 17, 2024 at 00:11 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in the Android framework (device policy client). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62623498.
### Affected Products
**Google Inc. - Android**
Affected versions:
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 7.0 (Status: affected)
- 7.1.1 (Status: affected)
- 7.1.2 (Status: affected)
- 8.0 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-11-01)
2. [101775](http://www.securityfocus.com/bid/101775) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14303, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14303
- **State**: PUBLISHED
- **Published Date**: March 13, 2020 at 18:49 UTC
- **Last Updated**: August 05, 2024 at 00:12 UTC
- **Reserved Date**: July 27, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ricoh-usa.com/en/support-and-download)
2. [](https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27909, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27909
- **State**: PUBLISHED
- **Published Date**: December 08, 2020 at 20:09 UTC
- **Last Updated**: August 04, 2024 at 16:25 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. Processing a maliciously crafted audio file may lead to arbitrary code execution.
### Affected Products
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/kb/HT211931)
2. [](https://support.apple.com/en-us/HT211928)
3. [](https://support.apple.com/en-us/HT211929)
4. [](https://support.apple.com/en-us/HT211930)
5. [20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1](http://seclists.org/fulldisclosure/2020/Dec/32)
6. [](https://www.zerodayinitiative.com/advisories/ZDI-21-374/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1384, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1384 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1384
- **State**: PUBLISHED
- **Published Date**: March 07, 2012 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 21:57 UTC
- **Reserved Date**: February 28, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the NetEase Pmail (com.netease.rpmms) application 0.5.0 and 0.5.2 for Android has unknown impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1384-vulnerability-in-NetEasePmail.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1789
- **State**: PUBLISHED
- **Published Date**: March 31, 2007 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 13:06 UTC
- **Reserved Date**: March 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Flyspray 0.9.9 allows remote attackers to obtain sensitive information (private project summaries) via direct requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23214](http://www.securityfocus.com/bid/23214)
2. [34591](http://osvdb.org/34591)
3. [24702](http://secunia.com/advisories/24702)
4. [](http://www.flyspray.org/changelog)
5. [ADV-2007-1181](http://www.vupen.com/english/advisories/2007/1181) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21175
- **State**: PUBLISHED
- **Published Date**: March 09, 2021 at 17:46 UTC
- **Last Updated**: August 03, 2024 at 18:01 UTC
- **Reserved Date**: December 21, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Site isolation in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1146651)
3. [FEDORA-2021-c88a96bd4b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/)
4. [FEDORA-2021-4740239e28](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/)
5. [FEDORA-2021-78547312f2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCIDZ77XUDMB2EBPPWCQXPEIJERDNSNT/)
6. [DSA-4886](https://www.debian.org/security/2021/dsa-4886)
7. [GLSA-202104-08](https://security.gentoo.org/glsa/202104-08) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1111, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1111 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1111
- **State**: PUBLISHED
- **Published Date**: March 09, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:56 UTC
- **Reserved Date**: March 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Aztek Forum 4.0 allows remote attackers to obtain sensitive information via a "*/*" in the msg parameter to index.php, which reveals usernames and passwords in a MySQL error message, possibly due to a forced SQL error or SQL injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1547](https://www.exploit-db.com/exploits/1547)
2. [23611](http://www.osvdb.org/23611)
3. [16938](http://www.securityfocus.com/bid/16938)
4. [aztekforum-info-disclosure(25036)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25036)
5. [20060302 AZTEK forums 4.0 multiple vulnerabilities (PoC)](http://www.securityfocus.com/archive/1/426650/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30996, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30996 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30996
- **State**: PUBLISHED
- **Published Date**: February 24, 2024 at 15:35 UTC
- **Last Updated**: February 13, 2025 at 16:49 UTC
- **Reserved Date**: April 21, 2023 at 17:49 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cognos Analytics 11.1.7, 11.2.4, and 12.0.0 could be vulnerable to information leakage due to unverified sources in messages sent between Windows objects of different origins. IBM X-Force ID: 254290.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-346: Security Weakness
### Affected Products
**IBM - Cognos Analytics**
Affected versions:
- 11.1.7, 11.2.4, 12.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7123154)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/254290)
3. [](https://security.netapp.com/advisory/ntap-20240405-0004/)
4. [](https://security.netapp.com/advisory/ntap-20240621-0006/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4071, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4071 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4071
- **State**: PUBLISHED
- **Published Date**: July 30, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 14:37 UTC
- **Reserved Date**: July 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in uploader/index.php in Webbler CMS before 3.1.6 allow remote attackers to inject arbitrary web script or HTML via the (1) page or (2) login parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [37133](http://osvdb.org/37133)
2. [2946](http://securityreason.com/securityalert/2946)
3. [20070724 PR07-18: Cross-site Scripting (XSS) / HTML injection on Webbler CMS admin login page (1)](http://www.securityfocus.com/archive/1/474529/100/0/threaded)
4. [](http://www.procheckup.com/Vulner_2007.php)
5. [](http://tincan.co.uk/?lid=1975)
6. [20070724 PR07-19: Cross-site Scripting (XSS) / HTML injection on Webbler CMS admin login page (2)](http://www.securityfocus.com/archive/1/474518/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3933, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3933
- **State**: PUBLISHED
- **Published Date**: September 04, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 10:00 UTC
- **Reserved Date**: September 04, 2008 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Wireshark (formerly Ethereal) 0.10.14 through 1.0.2 allows attackers to cause a denial of service (crash) via a packet with crafted zlib-compressed data that triggers an invalid read in the tvb_uncompress function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2008-7936](https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00713.html)
2. [RHSA-2008:0890](http://www.redhat.com/support/errata/RHSA-2008-0890.html)
3. [31864](http://secunia.com/advisories/31864)
4. [](http://www.wireshark.org/security/wnpa-sec-2008-05.html)
5. [](http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0278)
6. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2649)
7. [oval:org.mitre.oval:def:9620](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9620)
8. [20080917 rPSA-2008-0278-1 tshark wireshark](http://www.securityfocus.com/archive/1/496487/100/0/threaded)
9. [](http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm)
10. [32091](http://secunia.com/advisories/32091)
11. [ADV-2008-2773](http://www.vupen.com/english/advisories/2008/2773)
12. [32944](http://secunia.com/advisories/32944)
13. [1020819](http://www.securitytracker.com/id?1020819)
14. [FEDORA-2008-7894](https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00715.html)
15. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2682)
16. [ADV-2008-2493](http://www.vupen.com/english/advisories/2008/2493)
17. [MDVSA-2008:199](http://www.mandriva.com/security/advisories?name=MDVSA-2008:199)
18. [GLSA-200809-17](http://security.gentoo.org/glsa/glsa-200809-17.xml)
19. [31886](http://secunia.com/advisories/31886)
20. [32028](http://secunia.com/advisories/32028)
21. [DSA-1673](http://www.debian.org/security/2008/dsa-1673) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13555
- **State**: PUBLISHED
- **Published Date**: February 17, 2021 at 18:23 UTC
- **Last Updated**: August 04, 2024 at 12:25 UTC
- **Reserved Date**: May 26, 2020 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In COM Server Application Privilege Escalation, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege.
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**n/a - Advantech**
Affected versions:
- Advantech WebAccess/SCADA 9.0.1 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29532, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29532 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29532
- **State**: PUBLISHED
- **Published Date**: May 14, 2021 at 19:12 UTC
- **Last Updated**: August 03, 2024 at 22:11 UTC
- **Reserved Date**: March 30, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an end-to-end open source platform for machine learning. An attacker can force accesses outside the bounds of heap allocated arrays by passing in invalid tensor values to `tf.raw_ops.RaggedCross`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/efea03b38fb8d3b81762237dc85e579cc5fc6e87/tensorflow/core/kernels/ragged_cross_op.cc#L456-L487) lacks validation for the user supplied arguments. Each of the above branches call a helper function after accessing array elements via a `*_list[next_*]` pattern, followed by incrementing the `next_*` index. However, as there is no validation that the `next_*` values are in the valid range for the corresponding `*_list` arrays, this results in heap OOB reads. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 2.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- < 2.1.4 (Status: affected)
- >= 2.2.0, < 2.2.3 (Status: affected)
- >= 2.3.0, < 2.3.3 (Status: affected)
- >= 2.4.0, < 2.4.2 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j47f-4232-hvv8)
2. [](https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4930, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4930 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4930
- **State**: PUBLISHED
- **Published Date**: November 06, 2023 at 20:41 UTC
- **Last Updated**: February 26, 2025 at 21:21 UTC
- **Reserved Date**: September 13, 2023 at 10:38 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Front End PM WordPress plugin before 11.4.3 does not block listing the contents of the directories where it stores attachments to private messages, allowing unauthenticated visitors to list and download private attachments if the autoindex feature of the web server is enabled.
### Weakness Classification (CWE)
- CWE-200 Information Exposure: Improper Input Validation
### Affected Products
**Unknown - Front End PM**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/c73b3276-e6f1-4f22-a888-025e5d0504f2)
### Credits
- Dmitrii Ignatyev
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0812, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0812 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0812
- **State**: PUBLISHED
- **Published Date**: February 01, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 09:27 UTC
- **Reserved Date**: January 06, 2014 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in KENT-WEB Joyful Note 2.8 and earlier, when Internet Explorer 7 or earlier is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.kent-web.com/bbs/joyful.html)
2. [102740](http://osvdb.org/102740)
3. [65301](http://www.securityfocus.com/bid/65301)
4. [JVN#30718178](http://jvn.jp/en/jp/JVN30718178/index.html)
5. [JVNDB-2014-000013](http://jvndb.jvn.jp/jvndb/JVNDB-2014-000013) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8781, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8781 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8781
- **State**: PUBLISHED
- **Published Date**: November 18, 2024 at 14:00 UTC
- **Last Updated**: November 18, 2024 at 20:18 UTC
- **Reserved Date**: September 13, 2024 at 10:53 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Execution with Unnecessary Privileges, : Improper Protection of Alternate Path vulnerability in TR7 Application Security Platform (ASP) allows Privilege Escalation, -Privilege Abuse.This issue affects Application Security Platform (ASP): v1.4.25.188.
### Weakness Classification (CWE)
- CWE-250: Security Weakness
- CWE-424: Security Weakness
### Affected Products
**TR7 - Application Security Platform (ASP)**
Affected versions:
- v1.4.25.188 (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-24-1861)
### Credits
- Anil CELIK
- Emre ODAMAN
- Havelsan Inc. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1850, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1850 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1850
- **State**: PUBLISHED
- **Published Date**: May 24, 2022 at 12:10 UTC
- **Last Updated**: August 03, 2024 at 00:17 UTC
- **Reserved Date**: May 24, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Path Traversal in GitHub repository filegator/filegator prior to 7.8.0.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**filegator - filegator/filegator**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/07755f07-a412-4911-84a4-2f8c03c8f7ce)
2. [](https://github.com/filegator/filegator/commit/6e2b68f17f48cdc1d6a4a93a2369d2069fe64989) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5972, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5972 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5972
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: January 06, 2021 at 16:16 UTC
- **Reserved Date**: August 12, 2015 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3503, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3503 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3503
- **State**: PUBLISHED
- **Published Date**: October 13, 2010 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 03:11 UTC
- **Reserved Date**: September 20, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Solaris 10 and OpenSolaris allows local users to affect confidentiality and integrity via unknown vectors related to su.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html)
2. [TA10-287A](http://www.us-cert.gov/cas/techalerts/TA10-287A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24291, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24291
- **State**: PUBLISHED
- **Published Date**: February 06, 2024 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 15:51 UTC
- **Reserved Date**: January 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the component /member/index/login of yzmcms v7.0 allows attackers to direct users to malicious sites via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitee.com/wgd0ay/wgd0ay/issues/I8WSD1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22525
- **State**: REJECTED
- **Last Updated**: January 16, 2024 at 17:32 UTC
- **Reserved Date**: January 01, 2023 at 00:01 UTC
- **Assigned By**: atlassian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20518, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20518 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20518
- **State**: PUBLISHED
- **Published Date**: August 13, 2024 at 16:52 UTC
- **Last Updated**: November 05, 2024 at 17:10 UTC
- **Reserved Date**: October 27, 2022 at 18:53 UTC
- **Assigned By**: AMD
### Vulnerability Description
Incomplete cleanup in the ASP may expose the Master Encryption Key (MEK) to a privileged attacker with access to the BIOS menu or UEFI shell and a memory exfiltration vulnerability, potentially resulting in loss of confidentiality.
### CVSS Metrics
- **CVSS Base Score**: 1.9/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**AMD - AMD EPYC™ 9004 Series Processors**
Affected versions:
- GenoaPI 1.0.0.4 (Status: unaffected)
**AMD - AMD Ryzen™ 3000 Series Desktop Processors**
Affected versions:
- ComboAM4V1 1.0.0.A (Status: unaffected)
- ComboAM4V2 1.2.0.A (Status: unaffected)
**AMD - AMD Ryzen™ 5000 Series Desktop Processors**
Affected versions:
- ComboAM4V2 1.2.0.A (Status: unaffected)
**AMD - AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics**
Affected versions:
- ComboAM4V2 1.2.0.A (Status: unaffected)
**AMD - AMD Ryzen™ 7000 Series Desktop Processors**
Affected versions:
- ComboAM5 1.0.0.6 (Status: unaffected)
**AMD - AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics**
Affected versions:
- ComboAM4V2 1.2.0.A (Status: unaffected)
- ComboAM4V1 1.0.0.A (Status: unaffected)
**AMD - AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics**
Affected versions:
- ComboAM4V2 1.2.0.A (Status: unaffected)
**AMD - AMD Ryzen™ Threadripper™ 3000 Series Processors**
Affected versions:
- CastlePeakPI-SP3r3 1.0.0.9 (Status: unaffected)
**AMD - AMD Ryzen™ Threadripper™ PRO 3000WX Series Processors**
Affected versions:
- ChagallWSPI-sWRX8 1.0.0.6 (Status: unaffected)
- CastlePeakWSPI-sWRX8 1.0.0.B (Status: unaffected)
**AMD - AMD Ryzen™ Threadripper™ PRO 5000WX Processors**
Affected versions:
- ChagallWSPI-sWRX8 1.0.0.6 (Status: unaffected)
**AMD - AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics**
Affected versions:
- PicassoPI-FP5 1.0.0.F (Status: unaffected)
**AMD - AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics**
Affected versions:
- PollockPI-FT5 1.0.0.5 (Status: unaffected)
**AMD - AMD Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics**
Affected versions:
- PicassoPI-FP5 1.0.0.F (Status: unaffected)
**AMD - AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics**
Affected versions:
- RenoirPI-FP6 1.0.0.C (Status: unaffected)
**AMD - AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics**
Affected versions:
- CezannePI-FP6 1.0.0.E (Status: unaffected)
**AMD - AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics**
Affected versions:
- CezannePI-FP6 1.0.0.E (Status: unaffected)
**AMD - AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics**
Affected versions:
- MendocinoPI-FT6 1.0.0.4 (Status: unaffected)
**AMD - AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics**
Affected versions:
- RembrandtPI-FP7 1.0.0.8 (Status: unaffected)
**AMD - AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics**
Affected versions:
- RembrandtPI-FP7 1.0.0.8 (Status: unaffected)
**AMD - AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics**
Affected versions:
- CezannePI-FP6 1.0.0.E (Status: unaffected)
**AMD - AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics**
Affected versions:
- CezannePI-FP6 1.0.0.E (Status: unaffected)
**AMD - AMD Ryzen™ Embedded R1000 Series Processors**
Affected versions:
- EmbeddedPI-FP5 1.2.0.A (Status: unaffected)
**AMD - AMD Ryzen™ Embedded R2000 Series Processors**
Affected versions:
- EmbeddedR2KPI-FP5 1.0.0.2 (Status: unaffected)
**AMD - AMD Ryzen™ Embedded 5000 Series Processors**
Affected versions:
- EmbAM4PI 1.0.0.3 (Status: unaffected)
**AMD - AMD Ryzen™ Embedded 7000 Series Processors**
Affected versions:
- EmbeddedAM5PI 1.0.0.0 (Status: unaffected)
**AMD - AMD Ryzen™ Embedded V1000 Series Processors**
Affected versions:
- various (Status: affected)
**AMD - AMD Ryzen™ Embedded V2000 Series Processors**
Affected versions:
- EmbeddedPI-FP6 1.0.0.8 (Status: unaffected)
**AMD - AMD Ryzen™ Embedded V3000 Series Processors**
Affected versions:
- EmbeddedPI-FP7r2 1.0.0.5 (Status: unaffected)
### References
1. [](https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html)
2. [](https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44758, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44758 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44758
- **State**: PUBLISHED
- **Published Date**: October 11, 2023 at 06:00 UTC
- **Last Updated**: September 18, 2024 at 20:51 UTC
- **Reserved Date**: November 04, 2022 at 21:08 UTC
- **Assigned By**: HCL
### Vulnerability Description
BigFix Insights/IVR fixlet uses improper credential handling within certain fixlet content. An attacker can gain access to information that is not explicitly authorized.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Affected Products
**HCL Software - BigFix Insights for Vulnerability Remediation**
Affected versions:
- <=2.0.2 (Status: affected)
### References
1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23554
- **State**: PUBLISHED
- **Published Date**: May 17, 2024 at 23:31 UTC
- **Last Updated**: August 01, 2024 at 23:06 UTC
- **Reserved Date**: January 18, 2024 at 07:29 UTC
- **Assigned By**: HCL
### Vulnerability Description
Cross-Site Request Forgery (CSRF) on Session Token vulnerability that could potentially lead to Remote Code Execution (RCE).
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**HCL Software - BigFix Platform**
Affected versions:
- 9.5 - 9.5.24, 10 - 10.0.11, 11.0.1 (Status: affected)
### References
1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113140) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1133, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1133 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1133
- **State**: PUBLISHED
- **Published Date**: April 16, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:36 UTC
- **Reserved Date**: April 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The POP3 server in IBM iSeries AS/400 returns different error messages when the user exists or not, which allows remote attackers to determine valid user IDs on the server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050414 Enumeration of AS/400 users and their status via POP3](http://marc.info/?l=bugtraq&m=111358863001693&w=2)
2. [13156](http://www.securityfocus.com/bid/13156) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39268, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39268 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39268
- **State**: PUBLISHED
- **Published Date**: September 30, 2022 at 20:25 UTC
- **Last Updated**: April 23, 2025 at 16:53 UTC
- **Reserved Date**: September 02, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
### Impact In a CSRF attack, an innocent end user is tricked by an attacker into submitting a web request that they did not intend. This may cause actions to be performed on the website that can include inadvertent client or server data leakage, change of session state, or manipulation of an end user's account. ### Patch Upgrade to v2022.09.10 to patch this vulnerability. ### Workarounds Rebuild and redeploy the Orchest `auth-server` with this commit: https://github.com/orchest/orchest/commit/c2587a963cca742c4a2503bce4cfb4161bf64c2d ### References https://en.wikipedia.org/wiki/Cross-site_request_forgery https://cwe.mitre.org/data/definitions/352.html ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/orchest/orchest * Email us at rick@orchest.io
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**orchest - orchest**
Affected versions:
- >=v2022.03.7 (Status: affected)
- <=v2022.09.9 (Status: affected)
### References
1. [](https://github.com/orchest/orchest/security/advisories/GHSA-q44f-8jpw-qv4j)
2. [](https://github.com/orchest/orchest/pull/1324)
3. [](https://github.com/orchest/orchest/commit/c2587a963cca742c4a2503bce4cfb4161bf64c2d)
4. [](https://github.com/orchest/orchest/releases/tag/v2022.09.10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27276, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27276 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27276
- **State**: PUBLISHED
- **Published Date**: April 10, 2022 at 20:23 UTC
- **Last Updated**: August 03, 2024 at 05:25 UTC
- **Reserved Date**: March 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_10F2C. This vulnerability is triggered via a crafted packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wu610777031/IoT_Hunter/blob/main/Inhand%20InRouter%20900%20Industrial%204G%20Router%20%20Vulnerabilities%28RCE%29.pdf)
2. [](https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46806, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46806
- **State**: PUBLISHED
- **Published Date**: June 02, 2025 at 12:11 UTC
- **Last Updated**: June 02, 2025 at 16:27 UTC
- **Reserved Date**: April 30, 2025 at 11:28 UTC
- **Assigned By**: suse
### Vulnerability Description
A Use of Out-of-range Pointer Offset vulnerability in sslh leads to denial of service on some architectures.This issue affects sslh before 2.2.4.
### Weakness Classification (CWE)
- CWE-823: Security Weakness
### Affected Products
**https://github.com/yrutschle/sslh/releases/tag/v2.2.4 - sslh**
Affected versions:
- ? (Status: affected)
### References
1. [](https://github.com/yrutschle/sslh/releases/tag/v2.2.4)
2. [](https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46806)
### Credits
- Matthias Gerstner, SUSE |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-29599, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-29599 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-29599
- **State**: PUBLISHED
- **Published Date**: December 07, 2020 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 16:55 UTC
- **Reserved Date**: December 07, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible to inject additional shell commands via coders/pdf.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html)
2. [](https://github.com/ImageMagick/ImageMagick/discussions/2851)
3. [[debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html)
4. [GLSA-202101-36](https://security.gentoo.org/glsa/202101-36)
5. [[debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9365, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9365
- **State**: PUBLISHED
- **Published Date**: June 02, 2017 at 05:04 UTC
- **Last Updated**: August 05, 2024 at 17:02 UTC
- **Reserved Date**: June 02, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CSRF exists in BigTree CMS through 4.2.18 with the force parameter to /admin/pages/revisions.php - for example: /admin/pages/revisions/1/?force=false. A page with id=1 can be unlocked.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/bigtreecms/BigTree-CMS/issues/281)
2. [](https://github.com/bigtreecms/BigTree-CMS/commit/c17d09b05d9c20c214ee2f4fbb52f7307a7b4b6f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45782, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45782 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45782
- **State**: PUBLISHED
- **Published Date**: March 03, 2025 at 17:05 UTC
- **Last Updated**: March 25, 2025 at 04:58 UTC
- **Reserved Date**: September 08, 2024 at 01:57 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in the HFS filesystem. When reading an HFS volume's name at grub_fs_mount(), the HFS filesystem driver performs a strcpy() using the user-provided volume name as input without properly validating the volume name's length. This issue may read to a heap-based out-of-bounds writer, impacting grub's sensitive data integrity and eventually leading to a secure boot protection bypass.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Unknown - Unknown**
Affected versions:
- 0 (Status: affected)
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 9**
**Red Hat - Red Hat OpenShift Container Platform 4**
### References
1. [](https://access.redhat.com/security/cve/CVE-2024-45782)
2. [RHBZ#2345858](https://bugzilla.redhat.com/show_bug.cgi?id=2345858) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19017, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19017
- **State**: PUBLISHED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 01:00 UTC
- **Reserved Date**: November 06, 2018 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Several use after free vulnerabilities have been identified in CX-Supervisor (Versions 3.42 and prior). When processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**ICS-CERT - CX-Supervisor**
Affected versions:
- Versions 3.42 and prior (Status: affected)
### References
1. [106654](http://www.securityfocus.com/bid/106654)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47877, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47877 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47877
- **State**: PUBLISHED
- **Published Date**: May 02, 2023 at 00:00 UTC
- **Last Updated**: January 30, 2025 at 15:45 UTC
- **Reserved Date**: December 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Stored cross-site scripting vulnerability in Jedox 2020.2.5 allows remote, authenticated users to inject arbitrary web script or HTML in the Logs page via the log module 'log'.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.syslifters.com/assets/vulnerability-disclosure/Vulnerability-Disclosure-Jedox-Jedox-04-2023.pdf)
2. [](http://packetstormsecurity.com/files/172153/Jedox-2020.2.5-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4660
- **State**: PUBLISHED
- **Published Date**: June 18, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 18, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Enhanced SQL Portal 5.0.7961 allows remote attackers to inject arbitrary web script or HTML via the id parameter to iframe.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://hyp3rlinx.altervista.org/advisories/AS-ENHSQLPORTAL0602.txt)
2. [74946](http://www.securityfocus.com/bid/74946)
3. [20150602 Enhanced SQL Portal 5.0.7961 XSS Vulnerability](http://www.securityfocus.com/archive/1/535661/100/0/threaded)
4. [](http://packetstormsecurity.com/files/132122/Enhanced-SQL-Portal-5.0.7961-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0742
- **State**: PUBLISHED
- **Published Date**: March 18, 2022 at 11:20 UTC
- **Last Updated**: April 21, 2025 at 13:55 UTC
- **Reserved Date**: February 23, 2022 at 00:00 UTC
- **Assigned By**: Google
### Vulnerability Description
Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H`
### Weakness Classification (CWE)
- CWE-275: Security Weakness
### Affected Products
**Linux - Kernel**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.openwall.com/lists/oss-security/2022/03/15/3)
2. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2d3916f3189172d5c69d33065c3c21119fe539fc)
3. [](https://security.netapp.com/advisory/ntap-20220425-0001/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9893, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9893
- **State**: PUBLISHED
- **Published Date**: October 16, 2024 at 13:56 UTC
- **Last Updated**: February 19, 2025 at 17:27 UTC
- **Reserved Date**: October 11, 2024 at 20:06 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Nextend Social Login Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.1.14. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-288: Security Weakness
### Affected Products
**nextendweb - Nextend Social Login Pro**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/0e4588d1-f21e-48ba-a8cb-d18c421f000a?source=cve)
2. [](https://nextendweb.com/social-login/)
3. [](https://wordpress.org/plugins/nextend-facebook-connect/#developers)
### Credits
- wesley |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1700, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1700
- **State**: PUBLISHED
- **Published Date**: March 16, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 09:50 UTC
- **Reserved Date**: January 29, 2014 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use-after-free vulnerability in modules/speech/SpeechSynthesis.cpp in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of a certain utterance data structure.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-2883](http://www.debian.org/security/2014/dsa-2883)
2. [](https://code.google.com/p/chromium/issues/detail?id=344881)
3. [](http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html)
4. [GLSA-201408-16](http://security.gentoo.org/glsa/glsa-201408-16.xml)
5. [1029914](http://www.securitytracker.com/id/1029914)
6. [openSUSE-SU-2014:0501](http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00008.html)
7. [](https://src.chromium.org/viewvc/blink?revision=168171&view=revision) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14208, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14208 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14208
- **State**: REJECTED
- **Published Date**: March 06, 2020 at 23:50 UTC
- **Last Updated**: March 06, 2020 at 23:50 UTC
- **Reserved Date**: September 07, 2017 at 00:00 UTC
- **Assigned By**: zephyr
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5622, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5622
- **State**: PUBLISHED
- **Published Date**: October 26, 2023 at 16:18 UTC
- **Last Updated**: August 02, 2024 at 08:07 UTC
- **Reserved Date**: October 17, 2023 at 19:03 UTC
- **Assigned By**: tenable
### Vulnerability Description
Under certain conditions, Nessus Network Monitor could allow a low privileged user to escalate privileges to NT AUTHORITY\SYSTEM on Windows hosts by replacing a specially crafted file.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Tenable - Nessus Network Monitor**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.tenable.com/security/tns-2023-34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0427, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0427
- **State**: PUBLISHED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:41 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1198
- **State**: PUBLISHED
- **Published Date**: August 28, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 04:33 UTC
- **Reserved Date**: January 18, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in ha 0.999p+dfsg-5.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20150118 Re: CVE Request: ha -- directory traversals](http://www.openwall.com/lists/oss-security/2015/01/18/8)
2. [72103](http://www.securityfocus.com/bid/72103) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6090, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6090
- **State**: PUBLISHED
- **Published Date**: October 02, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 15:18 UTC
- **Reserved Date**: February 18, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unrestricted file upload vulnerability in clients/editclient.php in PhpCollab 2.5.1 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in logos_clients/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sysdream.com/news/lab/2017-09-29-cve-2017-6090-phpcollab-2-5-1-arbitrary-file-upload-unauthenticated/)
2. [42934](https://www.exploit-db.com/exploits/42934/)
3. [43519](https://www.exploit-db.com/exploits/43519/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11427, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11427
- **State**: PUBLISHED
- **Published Date**: July 03, 2019 at 14:46 UTC
- **Last Updated**: August 05, 2024 at 08:10 UTC
- **Reserved Date**: May 24, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CSRF tokens are not used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior, which makes it possible to perform CSRF attacks on the device administrator.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/klsecservices/Advisories/blob/master/KL-MOXA-2018-106.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9330, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9330 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9330
- **State**: PUBLISHED
- **Published Date**: January 20, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 13:40 UTC
- **Reserved Date**: December 07, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in tif_packbits.c in bmp2tif in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) via crafted BMP image, related to dimensions, which triggers an out-of-bounds read.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html)
2. [71789](http://www.securityfocus.com/bid/71789)
3. [RHSA-2016:1547](http://rhn.redhat.com/errata/RHSA-2016-1547.html)
4. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html)
5. [GLSA-201701-16](https://security.gentoo.org/glsa/201701-16)
6. [1031442](http://www.securitytracker.com/id/1031442)
7. [DSA-3273](http://www.debian.org/security/2015/dsa-3273)
8. [20141222 CVE-2014-9330: Libtiff integer overflow in bmp2tiff](http://seclists.org/fulldisclosure/2014/Dec/97)
9. [RHSA-2016:1546](http://rhn.redhat.com/errata/RHSA-2016-1546.html)
10. [](http://bugzilla.maptools.org/show_bug.cgi?id=2494) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28183, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28183
- **State**: PUBLISHED
- **Published Date**: May 17, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 05:48 UTC
- **Reserved Date**: March 30, 2022 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause an out-of-bounds read, which may lead to denial of service and information disclosure.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**NVIDIA - NVIDIA GPU Display Driver**
Affected versions:
- All GPU Driver versions for Windows and Linux (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5353)
2. [GLSA-202310-02](https://security.gentoo.org/glsa/202310-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1002205, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1002205 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1002205
- **State**: PUBLISHED
- **Published Date**: July 25, 2018 at 17:00 UTC
- **Last Updated**: May 06, 2025 at 14:48 UTC
- **Reserved Date**: July 25, 2018 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**DotNetZip - DotNetZip.Semvered**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://snyk.io/research/zip-slip-vulnerability)
2. [](https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366)
3. [](https://github.com/snyk/zip-slip-vulnerability)
4. [](https://snyk.io/vuln/SNYK-DOTNET-DOTNETZIP-60245)
5. [](https://github.com/haf/DotNetZip.Semverd/pull/121) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37147, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37147
- **State**: PUBLISHED
- **Published Date**: July 10, 2024 at 18:38 UTC
- **Last Updated**: August 02, 2024 at 03:50 UTC
- **Reserved Date**: June 03, 2024 at 17:29 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can attach a document to any item, even if the user has no write access on it. Upgrade to 10.0.16.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**glpi-project - glpi**
Affected versions:
- >= 0.85, < 10.0.16 (Status: affected)
### References
1. [https://github.com/glpi-project/glpi/security/advisories/GHSA-f2cg-fc85-ffmh](https://github.com/glpi-project/glpi/security/advisories/GHSA-f2cg-fc85-ffmh) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3768, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3768
- **State**: PUBLISHED
- **Published Date**: January 26, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 22:02 UTC
- **Reserved Date**: December 16, 2016 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
An unprivileged attacker with connectivity to the IMM2 could cause a denial of service attack on the IMM2 (Versions earlier than 4.4 for Lenovo System x and earlier than 6.4 for IBM System x). Flooding the IMM2 with a high volume of authentication failures via the Common Information Model (CIM) used by LXCA and OneCLI and other tools can exhaust available system memory which can cause the IMM2 to reboot itself until the requests cease.
### Affected Products
**Lenovo Group Ltd. - Integrated Management Module 2 (IMM2)**
Affected versions:
- Earlier than 4.4 for Lenovo System x (Status: affected)
- Earlier than 6.4 for IBM System x (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/product_security/LEN-14450) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6608
- **State**: PUBLISHED
- **Published Date**: December 11, 2016 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 01:36 UTC
- **Reserved Date**: August 06, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
XSS issues were discovered in phpMyAdmin. This affects the database privilege check and the "Remove partitioning" functionality. Specially crafted database names can trigger the XSS attack. All 4.6.x versions (prior to 4.6.4) are affected.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.phpmyadmin.net/security/PMASA-2016-31)
2. [93258](http://www.securityfocus.com/bid/93258)
3. [GLSA-201701-32](https://security.gentoo.org/glsa/201701-32) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-23194, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-23194 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23194
- **State**: PUBLISHED
- **Published Date**: July 02, 2021 at 17:51 UTC
- **Last Updated**: August 04, 2024 at 14:58 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross site scripting (XSS) vulnerability in the "Import Subscribers" feature in phplist 3.5.4 and below allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/phpList/phplist3/issues/678) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40411, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40411 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40411
- **State**: PUBLISHED
- **Published Date**: January 28, 2022 at 19:10 UTC
- **Last Updated**: April 15, 2025 at 19:20 UTC
- **Reserved Date**: September 01, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [6] the dns_data->dns2 variable, that has the value of the dns2 parameter provided through the SetLocalLink API, is not validated properly. This would lead to an OS command injection.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1755, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1755 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1755
- **State**: PUBLISHED
- **Published Date**: August 06, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 20:27 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 could allow a local attacker to inject commands into malicious files that could be executed by the administrator. IBM X-Force ID: 135855.
### Affected Products
**IBM - Security Identity Governance and Intelligence**
Affected versions:
- 5.2 (Status: affected)
- 5.2.1 (Status: affected)
- 5.2.2 (Status: affected)
- 5.2.2.1 (Status: affected)
- 5.2.3 (Status: affected)
- 5.2.3.1 (Status: affected)
- 5.2.3.2 (Status: affected)
### References
1. [ibm-sig-cve20171755-command-injection(135855)](https://exchange.xforce.ibmcloud.com/vulnerabilities/135855)
2. [](http://www.ibm.com/support/docview.wss?uid=swg22016869) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5677
- **State**: PUBLISHED
- **Published Date**: December 03, 2020 at 11:15 UTC
- **Last Updated**: August 04, 2024 at 08:39 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Reflected cross-site scripting vulnerability in GROWI v4.0.0 and earlier allows remote attackers to inject arbitrary script via unspecified vectors.
### Affected Products
**WESEEK, Inc. - GROWI**
Affected versions:
- v4.0.0 and earlier (Status: affected)
### References
1. [](https://github.com/weseek/growi)
2. [](https://hub.docker.com/r/weseek/growi/)
3. [](https://jvn.jp/en/jp/JVN56450373/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1358
- **State**: PUBLISHED
- **Published Date**: December 17, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:19 UTC
- **Reserved Date**: December 14, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SSH2 servers and clients do not properly handle lists with empty elements or strings, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1005812](http://securitytracker.com/id?1005812)
2. [CA-2002-36](http://www.cert.org/advisories/CA-2002-36.html)
3. [oval:org.mitre.oval:def:5721](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5721)
4. [20021216 R7-0009: Vulnerabilities in SSH2 Implementations from Multiple Vendors](http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html)
5. [1005813](http://securitytracker.com/id?1005813) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4635, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4635 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4635
- **State**: PUBLISHED
- **Published Date**: July 22, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:39 UTC
- **Reserved Date**: May 11, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
FaceTime in Apple iOS before 9.3.3 and OS X before 10.11.6 allows man-in-the-middle attackers to spoof relayed-call termination, and obtain sensitive audio information in opportunistic circumstances, via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036344](http://www.securitytracker.com/id/1036344)
2. [91829](http://www.securityfocus.com/bid/91829)
3. [1037086](http://www.securitytracker.com/id/1037086)
4. [APPLE-SA-2016-07-18-2](http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html)
5. [APPLE-SA-2016-07-18-1](http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html)
6. [](https://support.apple.com/HT206903)
7. [](https://support.apple.com/HT206902) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24651, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24651 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24651
- **State**: PUBLISHED
- **Published Date**: October 19, 2020 at 17:36 UTC
- **Last Updated**: August 04, 2024 at 15:19 UTC
- **Reserved Date**: August 25, 2020 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A syslogtempletselectwin expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
### Affected Products
**n/a - HPE Intelligent Management Center (iMC)**
Affected versions:
- Prior to iMC PLAT 7.3 (E0705P07) (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04036en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5193, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5193 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5193
- **State**: PUBLISHED
- **Published Date**: November 21, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 10:40 UTC
- **Reserved Date**: November 21, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in search.asp in W1L3D4 Philboard 1.14 and 1.2 allows remote attackers to inject arbitrary web script or HTML via the searchterms parameter. NOTE: this might overlap CVE-2007-4024.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4621](http://securityreason.com/securityalert/4621)
2. [30874](http://secunia.com/advisories/30874)
3. [5958](https://www.exploit-db.com/exploits/5958)
4. [philboard-search-xss(43451)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43451)
5. [29998](http://www.securityfocus.com/bid/29998) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36136, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36136 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36136
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 00:00 UTC
- **Last Updated**: October 10, 2024 at 19:05 UTC
- **Reserved Date**: June 21, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHPJabbers Class Scheduling System 1.0 lacks encryption on the password when editing a user account (update user page) allowing an attacker to capture all user names and passwords in clear text.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.phpjabbers.com/class-scheduling-system)
2. [](https://medium.com/%40blakehodder/additional-vulnerabilities-in-php-jabbers-scripts-c6bbd89b24bb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4819, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4819
- **State**: PUBLISHED
- **Published Date**: April 27, 2010 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 07:17 UTC
- **Reserved Date**: April 27, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unrestricted file upload vulnerabilities in upload.php in PHPhotoalbum allow remote attackers to execute arbitrary code by uploading a file with a (1) .php.pgif or (2) .php.pjpeg double extension, then accessing it via a direct request to the file in albums/userpics/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [10584](http://www.exploit-db.com/exploits/10584)
2. [phphotoalbum-upload-file-upload(54958)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54958)
3. [37436](http://www.securityfocus.com/bid/37436) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28128, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28128
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 00:00 UTC
- **Last Updated**: January 28, 2025 at 20:46 UTC
- **Reserved Date**: March 10, 2023 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.3.x and below that could allow an attacker to achieve a remove code execution.
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**n/a - Avalanche**
Affected versions:
- Avalanche version 6.3.x and below (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/ZDI-CAN-17812-Ivanti-Avalanche-FileStoreConfig-Arbitrary-File-Upload-Remote-Code-Execution-Vulnerability?language=en_US)
2. [](http://packetstormsecurity.com/files/172398/Ivanti-Avalanche-FileStoreConfig-Shell-Upload.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1805, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1805
- **State**: PUBLISHED
- **Published Date**: April 02, 2021 at 18:06 UTC
- **Last Updated**: August 03, 2024 at 16:25 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2.1, macOS Catalina 10.15.7 Supplemental Update, macOS Mojave 10.14.6 Security Update 2021-002. An application may be able to execute arbitrary code with kernel privileges.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212177)
2. [](https://support.apple.com/kb/HT212327)
3. [20210427 APPLE-SA-2021-04-26-4 Security Update 2021-003 Mojave](http://seclists.org/fulldisclosure/2021/Apr/54) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5927, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5927 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5927
- **State**: PUBLISHED
- **Published Date**: September 12, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 01:15 UTC
- **Reserved Date**: June 29, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Tivoli Storage Manager for Space Management (aka Spectrum Protect for Space Management) 6.3.x before 6.3.2.6, 6.4.x before 6.4.3.3, and 7.1.x before 7.1.6, when certain dsmsetpw tracing is configured, allows local users to discover an encrypted password by reading application-trace output.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92723](http://www.securityfocus.com/bid/92723)
2. [IT15203](http://www-01.ibm.com/support/docview.wss?uid=swg1IT15203)
3. [](http://www-01.ibm.com/support/docview.wss?uid=swg21989006) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1979, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1979 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1979
- **State**: PUBLISHED
- **Published Date**: April 27, 2008 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 08:41 UTC
- **Reserved Date**: April 27, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Discovery Service (casdscvc) in CA ARCserve Backup 12.0.5454.0 and earlier allows remote attackers to cause a denial of service (crash) via a packet with a large integer value used in an increment to TCP port 41523, which triggers a buffer over-read.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://aluigi.altervista.org/adv/carcbackazz-adv.txt)
2. [20080618 CA ARCserve Backup Discovery Service Denial of Service Vulnerability](http://www.securityfocus.com/archive/1/493430/100/0/threaded)
3. [29855](http://secunia.com/advisories/29855)
4. [28927](http://www.securityfocus.com/bid/28927)
5. [1020324](http://www.securitytracker.com/id?1020324)
6. [ADV-2008-1354](http://www.vupen.com/english/advisories/2008/1354)
7. [ca-arcservebackup-casdscvc-dos(41869)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41869) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4965, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4965
- **State**: PUBLISHED
- **Published Date**: April 12, 2021 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 21:07 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Jazz Team Server products use weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 192422.
### Affected Products
**IBM - Rational DOORS Next Generation**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
- 7.0 (Status: affected)
- 7.0.1 (Status: affected)
- 7.0.2 (Status: affected)
**IBM - Engineering Test Management**
Affected versions:
- 7.0.0 (Status: affected)
- 7.0.1 (Status: affected)
- 7.0.2 (Status: affected)
**IBM - Rational Collaborative Lifecycle Management**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
**IBM - Rational Engineering Lifecycle Manager**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
- 7.0 (Status: affected)
- 7.0.1 (Status: affected)
**IBM - Rational Quality Manager**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
**IBM - Rational Team Concert**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
**IBM - Rational Rhapsody Model Manager**
Affected versions:
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
- 7.0 (Status: affected)
- 7.0.1 (Status: affected)
- 6.0.2 (Status: affected)
**IBM - Engineering Workflow Management**
Affected versions:
- 7.0 (Status: affected)
- 7.0.1 (Status: affected)
- 7.0.2 (Status: affected)
**IBM - Engineering Lifecycle Optimization**
Affected versions:
- 7.0 (Status: affected)
- 7.0.1 (Status: affected)
- 7.0.2 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6441803)
2. [ibm-jazz-cve20204965-info-disc (192422)](https://exchange.xforce.ibmcloud.com/vulnerabilities/192422) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32614, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32614 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32614
- **State**: PUBLISHED
- **Published Date**: April 11, 2025 at 08:42 UTC
- **Last Updated**: April 11, 2025 at 14:56 UTC
- **Reserved Date**: April 09, 2025 at 11:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Ashan Perera EventON allows PHP Local File Inclusion. This issue affects EventON: from n/a through 2.3.2.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-98: Security Weakness
### Affected Products
**Ashan Perera - EventON**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/eventon-lite/vulnerability/wordpress-eventon-plugin-2-3-2-local-file-inclusion-vulnerability-2?_s_id=cve)
### Credits
- Dimas Maulana (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0847
- **State**: PUBLISHED
- **Published Date**: November 16, 2017 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 23:20 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in the Android media framework (mediaanalytics). Product: Android. Versions: 8.0. Android ID: A-65540999.
### Affected Products
**Google Inc. - Android**
Affected versions:
- 8.0 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2017-11-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3556, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3556
- **State**: PUBLISHED
- **Published Date**: May 25, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 16:14 UTC
- **Reserved Date**: May 20, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [53425](http://secunia.com/advisories/53425)
2. [openSUSE-SU-2013:0911](http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html)
3. [54425](http://secunia.com/advisories/54425)
4. [](http://www.wireshark.org/security/wnpa-sec-2013-25.html)
5. [GLSA-201308-05](http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml)
6. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8599)
7. [openSUSE-SU-2013:1086](http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html)
8. [](https://www.wireshark.org/docs/relnotes/wireshark-1.6.15.html)
9. [](http://anonsvn.wireshark.org/viewvc/trunk/epan/reassemble.c?r1=48943&r2=48942&pathrev=48943)
10. [openSUSE-SU-2013:0947](http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html)
11. [](http://anonsvn.wireshark.org/viewvc?view=revision&revision=48943)
12. [openSUSE-SU-2013:1084](http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2065, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2065
- **State**: PUBLISHED
- **Published Date**: September 27, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 18:35 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118143575
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7474
- **State**: PUBLISHED
- **Published Date**: October 29, 2024 at 12:46 UTC
- **Last Updated**: January 09, 2025 at 17:14 UTC
- **Reserved Date**: August 04, 2024 at 13:53 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
In version 1.3.2 of lunary-ai/lunary, an Insecure Direct Object Reference (IDOR) vulnerability exists. A user can view or delete external users by manipulating the 'id' parameter in the request URL. The application does not perform adequate checks on the 'id' parameter, allowing unauthorized access to external user data.
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**lunary-ai - lunary-ai/lunary**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/95d8b993-3347-4ef5-a2b3-1f57219b7871)
2. [](https://github.com/lunary-ai/lunary/commit/8f563c77d8614a72980113f530c7a9ec15a5f8d5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6436
- **State**: PUBLISHED
- **Published Date**: January 24, 2013 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 22:14 UTC
- **Reserved Date**: December 26, 2012 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Buffer overflow in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows remote attackers to cause a denial of service (CPU crash and communication outage) via a malformed CIP packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7105, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7105 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7105
- **State**: PUBLISHED
- **Published Date**: September 27, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 06:17 UTC
- **Reserved Date**: February 15, 2018 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A security vulnerability in HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers prior to v1.35, HPE Integrated Lights-Out 4 (iLO 4) prior to v2.61, HPE Integrated Lights-Out 3 (iLO 3) prior to v1.90 could be remotely exploited to execute arbitrary code leading to disclosure of information.
### Affected Products
**Hewlett Packard Enterprise - HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers, HPE Integrated Lights-Out 4 (iLO 4), HPE Integrated Lights-Out 3 (iLO 3)**
Affected versions:
- HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers prior to v1.35, HPE Integrated Lights-Out 4 (iLO 4) prior to v2.61, HPE Integrated Lights-Out 3 (iLO 3) prior to v1.90 (Status: affected)
### References
1. [105425](http://www.securityfocus.com/bid/105425)
2. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03866en_us)
3. [1041649](http://www.securitytracker.com/id/1041649) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49490, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49490
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:13 UTC
- **Last Updated**: May 04, 2025 at 08:39 UTC
- **Reserved Date**: February 26, 2025 at 02:08 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected
mdp5_get_global_state runs the risk of hitting a -EDEADLK when acquiring
the modeset lock, but currently mdp5_pipe_release doesn't check for if
an error is returned. Because of this, there is a possibility of
mdp5_pipe_release hitting a NULL dereference error.
To avoid this, let's have mdp5_pipe_release check if
mdp5_get_global_state returns an error and propogate that error.
Changes since v1:
- Separated declaration and initialization of *new_state to avoid
compiler warning
- Fixed some spelling mistakes in commit message
Changes since v2:
- Return 0 in case where hwpipe is NULL as this is considered normal
behavior
- Added 2nd patch in series to fix a similar NULL dereference issue in
mdp5_mixer_release
Patchwork: https://patchwork.freedesktop.org/patch/485179/
### Affected Products
**Linux - Linux**
Affected versions:
- 7907a0d77cb461f58045763c205a5830be72e97c (Status: affected)
- 7907a0d77cb461f58045763c205a5830be72e97c (Status: affected)
- 7907a0d77cb461f58045763c205a5830be72e97c (Status: affected)
- 7907a0d77cb461f58045763c205a5830be72e97c (Status: affected)
- 7907a0d77cb461f58045763c205a5830be72e97c (Status: affected)
- 7907a0d77cb461f58045763c205a5830be72e97c (Status: affected)
- 7907a0d77cb461f58045763c205a5830be72e97c (Status: affected)
**Linux - Linux**
Affected versions:
- 4.18 (Status: affected)
- 0 (Status: unaffected)
- 4.19.247 (Status: unaffected)
- 5.4.198 (Status: unaffected)
- 5.10.121 (Status: unaffected)
- 5.15.46 (Status: unaffected)
- 5.17.14 (Status: unaffected)
- 5.18.3 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/776f5c58bfe16cf322d71eeed3c5dda1eeac7e6b)
2. [](https://git.kernel.org/stable/c/b2aa2c4efe93e2580d6a8774b04fe2b99756a322)
3. [](https://git.kernel.org/stable/c/49dc28b4b2e28ef7564e355c91487996c1cbebd7)
4. [](https://git.kernel.org/stable/c/04bef5f1ba8ea6d7c1c8f5f65e0395c62db59cb8)
5. [](https://git.kernel.org/stable/c/19964dfb39bda4d7716a71009488f0668ecbcf52)
6. [](https://git.kernel.org/stable/c/33dc5aac46e0fad8f5eb193e5906ed0eb6b66ceb)
7. [](https://git.kernel.org/stable/c/d59be579fa932c46b908f37509f319cbd4ca9a68) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31990, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31990 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31990
- **State**: PUBLISHED
- **Published Date**: April 15, 2024 at 19:52 UTC
- **Last Updated**: August 02, 2024 at 01:59 UTC
- **Reserved Date**: April 08, 2024 at 13:48 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. The API server does not enforce project sourceNamespaces which allows attackers to use the UI to edit resources which should only be mutable via gitops. This vulenrability is fixed in 2.10.7, 2.9.12, and 2.8.16.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**argoproj - argo-cd**
Affected versions:
- >= 2.10.0, < 2.10.7 (Status: affected)
- >= 2.9.0, < 2.9.12 (Status: affected)
- >= 2.4.0, < 2.8.16 (Status: affected)
### References
1. [https://github.com/argoproj/argo-cd/security/advisories/GHSA-2gvw-w6fj-7m3c](https://github.com/argoproj/argo-cd/security/advisories/GHSA-2gvw-w6fj-7m3c)
2. [https://github.com/argoproj/argo-cd/commit/c514105af739eebedb9dbe89d8a6dd8dfc30bb2c](https://github.com/argoproj/argo-cd/commit/c514105af739eebedb9dbe89d8a6dd8dfc30bb2c)
3. [https://github.com/argoproj/argo-cd/commit/c5a252c4cc260e240e2074794aedb861d07e9ca5](https://github.com/argoproj/argo-cd/commit/c5a252c4cc260e240e2074794aedb861d07e9ca5)
4. [https://github.com/argoproj/argo-cd/commit/e0ff56d89fbd7d066e9c862b30337f6520f13f17](https://github.com/argoproj/argo-cd/commit/e0ff56d89fbd7d066e9c862b30337f6520f13f17) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.