System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22876, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22876 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22876 - **State**: PUBLISHED - **Published Date**: March 15, 2023 at 18:39 UTC - **Last Updated**: February 26, 2025 at 20:17 UTC - **Reserved Date**: January 09, 2023 at 15:16 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.7 and 6.1.0.0 through 6.1.2.1 could allow a privileged user to obtain sensitive information that could aid in further attacks against the system. IBM X-Force ID: 244364. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **IBM - Sterling B2B Integrator** Affected versions: - 6.0.0.0 (Status: affected) - 6.1.0.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6963093) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/244364)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7284, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7284 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7284 - **State**: PUBLISHED - **Published Date**: October 13, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:47 UTC - **Reserved Date**: October 01, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The net_get_random_once implementation in net/core/utils.c in the Linux kernel 3.13.x and 3.14.x before 3.14.5 on certain Intel processors does not perform the intended slow-path operation to initialize random seeds, which makes it easier for remote attackers to spoof or disrupt IP communication by leveraging the predictability of TCP sequence numbers, TCP and UDP port numbers, and IP ID values. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1148788) 2. [](http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5) 3. [[oss-security] 20141001 CVE Request: linux kernel net_get_random_once bug](http://www.openwall.com/lists/oss-security/2014/10/01/19) 4. [](https://web.archive.org/web/20141002163852/http://secondlookforensics.com/ngro-linux-kernel-bug/) 5. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3d4405226d27b3a215e4d03cfa51f536244e5de7) 6. [](https://github.com/torvalds/linux/commit/3d4405226d27b3a215e4d03cfa51f536244e5de7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26037, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26037 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26037 - **State**: REJECTED - **Last Updated**: May 28, 2025 at 16:41 UTC - **Reserved Date**: March 02, 2022 at 00:32 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8124, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8124 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8124 - **State**: PUBLISHED - **Published Date**: November 22, 2017 at 19:00 UTC - **Last Updated**: September 16, 2024 at 19:05 UTC - **Reserved Date**: April 25, 2017 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description The UMA product with software V200R001 has a privilege elevation vulnerability due to insufficient validation or improper processing of parameters. An attacker could craft specific packets to exploit these vulnerabilities to gain elevated privileges. ### Affected Products **Huawei Technologies Co., Ltd. - UMA** Affected versions: - V200R001 (Status: affected) ### References 1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170612-01-uma-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34750, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34750 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34750 - **State**: PUBLISHED - **Published Date**: November 15, 2024 at 16:14 UTC - **Last Updated**: November 15, 2024 at 18:11 UTC - **Reserved Date**: June 15, 2021 at 13:43 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the administrative web-based GUI configuration manager of Cisco Firepower Management Center Software could allow an authenticated, remote attacker to access sensitive configuration information. The attacker would require low privilege credentials on an affected device. This vulnerability is due to lack of proper encryption of sensitive information stored within the GUI configuration manager. An attacker could exploit this vulnerability by logging into the FMC GUI and navigating to certain sensitive configurations. A successful exploit could allow the attacker to view sensitive configuration parameters in clear text.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.[[Publication_URL{Layout()}]]This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see . ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Affected Products **Cisco - Cisco Firepower Management Center** Affected versions: - N/A (Status: affected) ### References 1. [cisco-sa-fmc-infodisc-Ft2WVmNU](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-Ft2WVmNU)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23807, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23807 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23807 - **State**: PUBLISHED - **Published Date**: February 28, 2024 at 13:50 UTC - **Last Updated**: August 01, 2024 at 23:13 UTC - **Reserved Date**: January 22, 2024 at 16:40 UTC - **Assigned By**: apache ### Vulnerability Description The Apache Xerces C++ XML parser on versions 3.0.0 before 3.2.5 contains a use-after-free error triggered during the scanning of external DTDs. Users are recommended to upgrade to version 3.2.5 which fixes the issue, or mitigate the issue by disabling DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable. This issue has been disclosed before as CVE-2018-1311, but unfortunately that advisory incorrectly stated the issue would be fixed in version 3.2.3 or 3.2.4. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Apache Software Foundation - Apache Xerces C++** Affected versions: - 3.0.0 (Status: affected) ### References 1. [](https://github.com/apache/xerces-c/pull/54) 2. [](https://lists.apache.org/thread/c497tgn864tsbm8w0bo3f0d81s07zk9r)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-42277, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-42277 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-42277 - **State**: PUBLISHED - **Published Date**: September 08, 2023 at 00:00 UTC - **Last Updated**: September 26, 2024 at 17:43 UTC - **Reserved Date**: September 08, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description hutool v5.8.21 was discovered to contain a buffer overflow via the component jsonObject.putByPath. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/dromara/hutool/issues/3285)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17074, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17074 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17074 - **State**: REJECTED - **Published Date**: January 29, 2018 at 19:00 UTC - **Last Updated**: January 29, 2018 at 18:57 UTC - **Reserved Date**: November 30, 2017 at 00:00 UTC - **Assigned By**: openssl ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21759, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21759 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21759 - **State**: PUBLISHED - **Published Date**: January 10, 2023 at 00:00 UTC - **Last Updated**: January 01, 2025 at 00:36 UTC - **Reserved Date**: December 13, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability ### CVSS Metrics - **CVSS Base Score**: 3.3/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) ### References 1. [Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21759)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-5087, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-5087 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-5087 - **State**: PUBLISHED - **Published Date**: August 26, 2012 at 18:00 UTC - **Last Updated**: September 16, 2024 at 19:35 UTC - **Reserved Date**: April 30, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description SilverStripe 2.3.x before 2.3.10 and 2.4.x before 2.4.4 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism and hijack the authentication of administrators via vectors related to "form action requests" using a controller. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://doc.silverstripe.org/sapphire/en/trunk/changelogs//2.3.10) 2. [](http://open.silverstripe.org/changeset/115182) 3. [[oss-security] 20120501 Re: CVE-request: SilverStripe before 2.4.4](http://www.openwall.com/lists/oss-security/2012/05/01/3) 4. [](http://doc.silverstripe.org/sapphire/en/trunk/changelogs//2.4.4) 5. [42346](http://secunia.com/advisories/42346) 6. [[oss-security] 20120430 CVE-request: SilverStripe before 2.4.4](http://www.openwall.com/lists/oss-security/2012/04/30/1) 7. [[oss-security] 20120430 Re: CVE-request: SilverStripe before 2.4.4](http://www.openwall.com/lists/oss-security/2012/04/30/3) 8. [[oss-security] 20110104 CVE request: silverstripe before 2.4.4](http://www.openwall.com/lists/oss-security/2011/01/03/12) 9. [](http://open.silverstripe.org/changeset/115185)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21891, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21891 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21891 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 14:57 UTC - **Last Updated**: May 04, 2025 at 07:23 UTC - **Reserved Date**: December 29, 2024 at 08:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: ipvlan: ensure network headers are in skb linear part syzbot found that ipvlan_process_v6_outbound() was assuming the IPv6 network header isis present in skb->head [1] Add the needed pskb_network_may_pull() calls for both IPv4 and IPv6 handlers. [1] BUG: KMSAN: uninit-value in __ipv6_addr_type+0xa2/0x490 net/ipv6/addrconf_core.c:47 __ipv6_addr_type+0xa2/0x490 net/ipv6/addrconf_core.c:47 ipv6_addr_type include/net/ipv6.h:555 [inline] ip6_route_output_flags_noref net/ipv6/route.c:2616 [inline] ip6_route_output_flags+0x51/0x720 net/ipv6/route.c:2651 ip6_route_output include/net/ip6_route.h:93 [inline] ipvlan_route_v6_outbound+0x24e/0x520 drivers/net/ipvlan/ipvlan_core.c:476 ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:491 [inline] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:541 [inline] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:605 [inline] ipvlan_queue_xmit+0xd72/0x1780 drivers/net/ipvlan/ipvlan_core.c:671 ipvlan_start_xmit+0x5b/0x210 drivers/net/ipvlan/ipvlan_main.c:223 __netdev_start_xmit include/linux/netdevice.h:5150 [inline] netdev_start_xmit include/linux/netdevice.h:5159 [inline] xmit_one net/core/dev.c:3735 [inline] dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3751 sch_direct_xmit+0x399/0xd40 net/sched/sch_generic.c:343 qdisc_restart net/sched/sch_generic.c:408 [inline] __qdisc_run+0x14da/0x35d0 net/sched/sch_generic.c:416 qdisc_run+0x141/0x4d0 include/net/pkt_sched.h:127 net_tx_action+0x78b/0x940 net/core/dev.c:5484 handle_softirqs+0x1a0/0x7c0 kernel/softirq.c:561 __do_softirq+0x14/0x1a kernel/softirq.c:595 do_softirq+0x9a/0x100 kernel/softirq.c:462 __local_bh_enable_ip+0x9f/0xb0 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline] __dev_queue_xmit+0x2758/0x57d0 net/core/dev.c:4611 dev_queue_xmit include/linux/netdevice.h:3311 [inline] packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276 packet_snd net/packet/af_packet.c:3132 [inline] packet_sendmsg+0x93e0/0xa7e0 net/packet/af_packet.c:3164 sock_sendmsg_nosec net/socket.c:718 [inline] ### Affected Products **Linux - Linux** Affected versions: - 2ad7bf3638411cb547f2823df08166c13ab04269 (Status: affected) - 2ad7bf3638411cb547f2823df08166c13ab04269 (Status: affected) - 2ad7bf3638411cb547f2823df08166c13ab04269 (Status: affected) - 2ad7bf3638411cb547f2823df08166c13ab04269 (Status: affected) - 2ad7bf3638411cb547f2823df08166c13ab04269 (Status: affected) **Linux - Linux** Affected versions: - 3.19 (Status: affected) - 0 (Status: unaffected) - 6.1.130 (Status: unaffected) - 6.6.81 (Status: unaffected) - 6.12.18 (Status: unaffected) - 6.13.6 (Status: unaffected) - 6.14 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/5b8dea8d1612dc7151d2457d7d2e6a69820309bf) 2. [](https://git.kernel.org/stable/c/4ec48f812804f370f622e0874e6dd8fcc58241cd) 3. [](https://git.kernel.org/stable/c/5353fd89663c48f56bdff975c562cfe78b1a2e4c) 4. [](https://git.kernel.org/stable/c/e2a4f76a2d8a44816ecd25bcbdb47b786d621974) 5. [](https://git.kernel.org/stable/c/27843ce6ba3d3122b65066550fe33fb8839f8aef)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45519, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45519 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45519 - **State**: PUBLISHED - **Published Date**: December 08, 2022 at 00:00 UTC - **Last Updated**: April 23, 2025 at 14:35 UTC - **Reserved Date**: November 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the Go parameter at /goform/SafeMacFilter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeMacFilter/readme.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-38029, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-38029 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-38029 - **State**: PUBLISHED - **Published Date**: October 11, 2022 at 00:00 UTC - **Last Updated**: January 02, 2025 at 21:27 UTC - **Reserved Date**: August 08, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows ALPC Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 21H1** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows ALPC Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38029)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0372, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0372 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0372 - **State**: PUBLISHED - **Published Date**: February 17, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:13 UTC - **Reserved Date**: February 13, 2005 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description Directory traversal vulnerability in gftp before 2.0.18 for GTK+ allows remote malicious FTP servers to read arbitrary files via .. (dot dot) sequences in filenames returned from a LIST command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MDKSA-2005:050](http://www.mandriva.com/security/advisories?name=MDKSA-2005:050) 2. [oval:org.mitre.oval:def:9923](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9923) 3. [CLSA-2005:957](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000957) 4. [GLSA-200502-27](http://www.gentoo.org/security/en/glsa/glsa-200502-27.xml) 5. [12539](http://www.securityfocus.com/bid/12539) 6. [FEDORA-2005-309](http://www.securityfocus.com/advisories/8379) 7. [oval:org.mitre.oval:def:717](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A717) 8. [RHSA-2005:410](http://www.redhat.com/support/errata/RHSA-2005-410.html) 9. [DSA-686](http://www.debian.org/security/2005/dsa-686) 10. [FEDORA-2005-310](http://www.securityfocus.com/advisories/8380)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-22715, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-22715 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-22715 - **State**: PUBLISHED - **Published Date**: January 17, 2024 at 00:00 UTC - **Last Updated**: August 01, 2024 at 22:51 UTC - **Reserved Date**: January 11, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stupid Simple CMS <=1.2.4 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin-edit.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/RumblingIsOccupied/cms/blob/main/1.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47524, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47524 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47524 - **State**: PUBLISHED - **Published Date**: December 23, 2022 at 00:00 UTC - **Last Updated**: April 15, 2025 at 03:26 UTC - **Reserved Date**: December 19, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description F-Secure SAFE Browser 19.1 before 19.2 for Android allows an IDN homograph attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.f-secure.com/en/home/support/security-advisories/cve-2022-47524)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0974, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0974 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0974 - **State**: PUBLISHED - **Published Date**: January 04, 2000 at 05:00 UTC - **Last Updated**: August 01, 2024 at 16:55 UTC - **Reserved Date**: December 14, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in Solaris snoop allows remote attackers to gain root privileges via GETQUOTA requests to the rpc.rquotad service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [864](http://www.securityfocus.com/bid/864) 2. [00190](http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/190)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2742, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2742 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2742 - **State**: PUBLISHED - **Published Date**: December 16, 2010 at 19:00 UTC - **Last Updated**: August 07, 2024 at 02:46 UTC - **Reserved Date**: July 14, 2010 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The Netlogon RPC Service in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, and R2, when the domain controller role is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a crafted RPC packet, aka "Netlogon RPC Null dereference DOS Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [TA10-348A](http://www.us-cert.gov/cas/techalerts/TA10-348A.html) 2. [MS10-101](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-101) 3. [oval:org.mitre.oval:def:11963](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11963) 4. [1024883](http://www.securitytracker.com/id?1024883)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-20728, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-20728 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-20728 - **State**: PUBLISHED - **Published Date**: February 15, 2024 at 12:18 UTC - **Last Updated**: August 01, 2024 at 21:59 UTC - **Reserved Date**: December 04, 2023 at 16:52 UTC - **Assigned By**: adobe ### Vulnerability Description Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Adobe - Acrobat Reader** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb24-07.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-23764, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-23764 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-23764 - **State**: PUBLISHED - **Published Date**: July 27, 2023 at 20:45 UTC - **Last Updated**: October 16, 2024 at 20:11 UTC - **Reserved Date**: January 17, 2023 at 20:40 UTC - **Assigned By**: GitHub_P ### Vulnerability Description An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff within the GitHub pull request UI. To do so, an attacker would need write access to the repository. This vulnerability affected GitHub Enterprise Server versions 3.7.0 and above and was fixed in versions 3.7.9, 3.8.2, and 3.9.1. This vulnerability was reported via the GitHub Bug Bounty program. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:N` ### Weakness Classification (CWE) - CWE-697: Security Weakness ### Affected Products **GitHub - Enterprise Server** Affected versions: - 3.7.0 (Status: affected) - 3.8.0 (Status: affected) - 3.9.0 (Status: affected) ### References 1. [](https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.1) 2. [](https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.2) 3. [](https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.9) ### Credits - inspector-ambitious
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-9629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-9629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-9629 - **State**: PUBLISHED - **Published Date**: July 08, 2019 at 18:12 UTC - **Last Updated**: August 04, 2024 at 21:54 UTC - **Reserved Date**: March 07, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Sonatype Nexus Repository Manager before 3.17.0 establishes a default administrator user with weak defaults (fixed credentials). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.twistlock.com/labs-blog/vulnerabilities-nexus-repository-left-thousands-artifacts-exposed/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-55628, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-55628 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-55628 - **State**: PUBLISHED - **Published Date**: January 06, 2025 at 18:02 UTC - **Last Updated**: January 06, 2025 at 19:14 UTC - **Reserved Date**: December 09, 2024 at 17:48 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.8, DNS resource name compression can lead to small DNS messages containing very large hostnames which can be costly to decode, and lead to very large DNS log records. While there are limits in place, they were too generous. The issue has been addressed in Suricata 7.0.8. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-405: Security Weakness - CWE-779: Security Weakness ### Affected Products **OISF - suricata** Affected versions: - < 7.0.8 (Status: affected) ### References 1. [https://github.com/OISF/suricata/security/advisories/GHSA-96w4-jqwf-qx2j](https://github.com/OISF/suricata/security/advisories/GHSA-96w4-jqwf-qx2j) 2. [https://github.com/OISF/suricata/commit/19cf0f81335d9f787d587450f7105ad95a648951](https://github.com/OISF/suricata/commit/19cf0f81335d9f787d587450f7105ad95a648951) 3. [https://github.com/OISF/suricata/commit/37f4c52b22fcdde4adf9b479cb5700f89d00768d](https://github.com/OISF/suricata/commit/37f4c52b22fcdde4adf9b479cb5700f89d00768d) 4. [https://github.com/OISF/suricata/commit/3a5671739f5b25e5dd973a74ca5fd8ea40e1ae2d](https://github.com/OISF/suricata/commit/3a5671739f5b25e5dd973a74ca5fd8ea40e1ae2d) 5. [https://redmine.openinfosecfoundation.org/issues/7280](https://redmine.openinfosecfoundation.org/issues/7280)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20343, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20343 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20343 - **State**: PUBLISHED - **Published Date**: June 02, 2021 at 20:40 UTC - **Last Updated**: September 16, 2024 at 20:03 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Jazz Foundation and IBM Engineering products are vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 194593. ### Affected Products **IBM - Engineering Test Management** Affected versions: - 7.0.0 (Status: affected) - 7.0.1 (Status: affected) **IBM - Rational Quality Manager** Affected versions: - 6.0.6 (Status: affected) - 6.0.6.1 (Status: affected) **IBM - Rational Rhapsody Model Manager** Affected versions: - 6.0.6 (Status: affected) - 6.0.6.1 (Status: affected) - 7.0 (Status: affected) **IBM - Rational DOORS Next Generation** Affected versions: - 6.0.6 (Status: affected) - 6.0.6.1 (Status: affected) - 7.0 (Status: affected) - 7.0.1 (Status: affected) - 7.0.2 (Status: affected) **IBM - Engineering Lifecycle Optimization** Affected versions: - 7.0 (Status: affected) - 7.0.1 (Status: affected) - 7.0.2 (Status: affected) **IBM - Rational Collaborative Lifecycle Management** Affected versions: - 6.0.6 (Status: affected) - 6.0.6.1 (Status: affected) **IBM - Rational Engineering Lifecycle Manager** Affected versions: - 6.0.6 (Status: affected) - 6.0.6.1 (Status: affected) - 7.0 (Status: affected) - 7.0.1 (Status: affected) - 7.0.2 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6457739) 2. [ibm-jazz-cve202120343-ssrf (194593)](https://exchange.xforce.ibmcloud.com/vulnerabilities/194593)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17108, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17108 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17108 - **State**: PUBLISHED - **Published Date**: October 08, 2019 at 12:25 UTC - **Last Updated**: August 05, 2024 at 01:33 UTC - **Reserved Date**: October 03, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Local file inclusion in brokerPerformance.php in Centreon Web before 2.8.28 allows attackers to disclose information or perform a stored XSS attack on a user. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/centreon/centreon/pull/7101) 2. [](https://www.openwall.com/lists/oss-security/2019/10/08/1) 3. [[oss-security] 20191009 Re: Multiple vulnerabilities in Centreon-Web and Centreon-VM](http://www.openwall.com/lists/oss-security/2019/10/09/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1481 - **State**: PUBLISHED - **Published Date**: December 12, 2018 at 16:00 UTC - **Last Updated**: September 16, 2024 at 20:13 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM BigFix Platform 9.2.0 through 9.2.14 and 9.5 through 9.5.9 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 140763. ### Affected Products **IBM - BigFix Platform** Affected versions: - 9.5.9 (Status: affected) - 9.2.0 (Status: affected) - 9.2.14 (Status: affected) - 9.5.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/docview.wss?uid=ibm10733605) 2. [ibm-bigfix-cve20181481-info-disc(140763)](https://exchange.xforce.ibmcloud.com/vulnerabilities/140763)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4090, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4090 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4090 - **State**: PUBLISHED - **Published Date**: April 29, 2025 at 13:13 UTC - **Last Updated**: May 01, 2025 at 14:22 UTC - **Reserved Date**: April 29, 2025 at 13:13 UTC - **Assigned By**: mozilla ### Vulnerability Description A vulnerability existed in Thunderbird for Android where potentially sensitive library locations were logged via Logcat. This vulnerability affects Firefox < 138 and Thunderbird < 138. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) **Mozilla - Thunderbird** Affected versions: - unspecified (Status: affected) ### References 1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1929478) 2. [](https://www.mozilla.org/security/advisories/mfsa2025-28/) 3. [](https://www.mozilla.org/security/advisories/mfsa2025-31/) ### Credits - Seongyun Jeong
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28318, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28318 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28318 - **State**: PUBLISHED - **Published Date**: March 15, 2024 at 00:00 UTC - **Last Updated**: August 29, 2024 at 16:52 UTC - **Reserved Date**: March 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description gpac 2.3-DEV-rev921-g422b78ecf-master was discovered to contain a out of boundary write vulnerability via swf_get_string at scene_manager/swf_parse.c:325 ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gpac/gpac/issues/2764)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11974, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11974 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11974 - **State**: REJECTED - **Published Date**: August 30, 2019 at 15:47 UTC - **Last Updated**: August 30, 2019 at 15:47 UTC - **Reserved Date**: June 07, 2018 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-49968, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-49968 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-49968 - **State**: PUBLISHED - **Published Date**: March 04, 2024 at 00:00 UTC - **Last Updated**: August 29, 2024 at 14:05 UTC - **Reserved Date**: December 04, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Customer Support System v1 was discovered to contain a SQL injection vulnerability via the id parameter at /customer_support/manage_department.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html) 2. [](https://github.com/geraldoalcantara/CVE-2023-49968)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12763, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12763 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12763 - **State**: PUBLISHED - **Published Date**: May 13, 2020 at 14:01 UTC - **Last Updated**: August 04, 2024 at 12:04 UTC - **Reserved Date**: May 09, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TRENDnet ProView Wireless camera TV-IP512WN 1.0R 1.0.4 is vulnerable to an unauthenticated stack-based buffer overflow in handling RTSP packets. This may result in remote code execution or denial of service. The issue is in the binary rtspd (in /sbin) when parsing a long "Authorization: Basic" RTSP header. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://payatu.com/blog/munawwar/trendNet-wireless-camera-buffer-overflow-vulnerability)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31468, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31468 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31468 - **State**: PUBLISHED - **Published Date**: April 03, 2025 at 13:27 UTC - **Last Updated**: April 03, 2025 at 15:08 UTC - **Reserved Date**: March 28, 2025 at 11:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP_Identicon allows Reflected XSS. This issue affects WP_Identicon: from n/a through 2.0. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **NotFound - WP_Identicon** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wp-identicon/vulnerability/wordpress-wp-identicon-plugin-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - johska (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4379, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4379 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4379 - **State**: PUBLISHED - **Published Date**: April 03, 2019 at 17:43 UTC - **Last Updated**: August 05, 2024 at 05:11 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A lock screen issue allowed access to the share function on a locked device. This issue was addressed by restricting options offered on a locked device. This issue affected versions prior to iOS 12.0.1. ### Affected Products **n/a - iOS** Affected versions: - Versions prior to: iOS 12.0.1 (Status: affected) ### References 1. [](https://support.apple.com/kb/HT209162)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1768 - **State**: PUBLISHED - **Published Date**: March 07, 2025 at 11:12 UTC - **Last Updated**: March 07, 2025 at 13:28 UTC - **Reserved Date**: February 27, 2025 at 21:23 UTC - **Assigned By**: Wordfence ### Vulnerability Description The SEO Plugin by Squirrly SEO plugin for WordPress is vulnerable to blind SQL Injection via the 'search' parameter in all versions up to, and including, 12.4.05 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **cifi - SEO Plugin by Squirrly SEO** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1a23ee5c-275f-4d51-8199-1cc2b0086f73?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/models/Snippet.php?rev=3207037#L96) 3. [](https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/models/Snippet.php?rev=3207037#L118) 4. [](https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Onboarding.php?rev=3207037#L62) 5. [](https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Assistant.php?rev=3207037#L55) 6. [](https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Audits.php?rev=3207037#L86) 7. [](https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/BulkSeo.php?rev=3207037#L148) 8. [](https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/FocusPages.php?rev=3207037#L107) 9. [](https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Post.php?rev=3207037#L480) 10. [](https://wordpress.org/plugins/squirrly-seo/#developers) 11. [](https://plugins.trac.wordpress.org/changeset/3248412/) 12. [](https://plugins.trac.wordpress.org/changeset/3250395/) ### Credits - Muhamad Visat Sutarno
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5247, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5247 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5247 - **State**: PUBLISHED - **Published Date**: October 06, 2007 at 17:00 UTC - **Last Updated**: August 07, 2024 at 15:24 UTC - **Reserved Date**: October 06, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple format string vulnerabilities in the Monolith Lithtech engine, as used by First Encounter Assault Recon (F.E.A.R.) 1.08 and earlier, when Punkbuster (PB) is enabled, allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in (1) a PB_Y packet to the YPG server on UDP port 27888 or (2) a PB_U packet to UCON on UDP port 27888, different vectors than CVE-2004-1500. NOTE: this issue might be in Punkbuster itself, but there are insufficient details to be certain. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [45530](http://osvdb.org/45530) 2. [](http://aluigi.altervista.org/adv/fearfspb-adv.txt) 3. [](http://aluigi.org/poc/fearfspb.zip) 4. [20071001 Format string in F.E.A.R. 1.08 through PB](http://www.securityfocus.com/archive/1/481231/100/0/threaded) 5. [3197](http://securityreason.com/securityalert/3197) 6. [45531](http://osvdb.org/45531) 7. [fear-punkbuster-format-string(36900)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36900)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1219, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1219 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1219 - **State**: PUBLISHED - **Published Date**: September 11, 2019 at 21:24 UTC - **Last Updated**: August 04, 2024 at 18:13 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An information disclosure vulnerability exists when the Windows Transaction Manager improperly handles objects in memory, aka 'Windows Transaction Manager Information Disclosure Vulnerability'. ### Affected Products **Microsoft - Windows** Affected versions: - 7 for 32-bit Systems Service Pack 1 (Status: affected) - 7 for x64-based Systems Service Pack 1 (Status: affected) - 8.1 for 32-bit systems (Status: affected) - 8.1 for x64-based systems (Status: affected) - RT 8.1 (Status: affected) - 10 for 32-bit Systems (Status: affected) - 10 for x64-based Systems (Status: affected) - 10 Version 1607 for 32-bit Systems (Status: affected) - 10 Version 1607 for x64-based Systems (Status: affected) - 10 Version 1703 for 32-bit Systems (Status: affected) - 10 Version 1703 for x64-based Systems (Status: affected) - 10 Version 1709 for 32-bit Systems (Status: affected) - 10 Version 1709 for x64-based Systems (Status: affected) - 10 Version 1803 for 32-bit Systems (Status: affected) - 10 Version 1803 for x64-based Systems (Status: affected) - 10 Version 1803 for ARM64-based Systems (Status: affected) - 10 Version 1809 for 32-bit Systems (Status: affected) - 10 Version 1809 for x64-based Systems (Status: affected) - 10 Version 1809 for ARM64-based Systems (Status: affected) - 10 Version 1709 for ARM64-based Systems (Status: affected) **Microsoft - Windows Server** Affected versions: - 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected) - 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected) - 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) - 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected) - 2012 (Status: affected) - 2012 (Core installation) (Status: affected) - 2012 R2 (Status: affected) - 2012 R2 (Core installation) (Status: affected) - 2016 (Status: affected) - 2016 (Core installation) (Status: affected) - version 1803 (Core Installation) (Status: affected) - 2019 (Status: affected) - 2019 (Core installation) (Status: affected) - 2008 for Itanium-Based Systems Service Pack 2 (Status: affected) - 2008 for 32-bit Systems Service Pack 2 (Status: affected) - 2008 for x64-based Systems Service Pack 2 (Status: affected) - 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1219)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4608, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4608 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4608 - **State**: PUBLISHED - **Published Date**: June 06, 2024 at 03:32 UTC - **Last Updated**: August 01, 2024 at 20:47 UTC - **Reserved Date**: May 07, 2024 at 14:48 UTC - **Assigned By**: Wordfence ### Vulnerability Description The SellKit – Funnel builder and checkout optimizer for WooCommerce to sell more, faster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' parameter in all versions up to, and including, 1.9.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **artbees - SellKit – Funnel builder and checkout optimizer for WooCommerce to sell more, faster** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/9fbb31a5-9ed2-445a-b309-a9835128eb44?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/sellkit/trunk/includes/elementor/modules/optin/fields/acceptance.php#L31) 3. [](https://plugins.trac.wordpress.org/browser/sellkit/trunk/includes/elementor/modules/optin/fields/field-base.php#L304) 4. [](https://plugins.trac.wordpress.org/browser/sellkit/trunk/includes/elementor/modules/optin/widgets/optin.php#L48) ### Credits - Matthew Rollings
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0327, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0327 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0327 - **State**: PUBLISHED - **Published Date**: January 21, 2006 at 00:00 UTC - **Last Updated**: August 07, 2024 at 16:34 UTC - **Reserved Date**: January 20, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TYPO3 3.7.1 allows remote attackers to obtain sensitive information via a direct request to (1) thumbs.php, (2) showpic.php, or (3) tables.php, which causes them to incorrectly define a variable and reveal the path in an error message when a require function call fails. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060119 Re: IRM 015: File system path disclosure on TYPO3 Web Content Manager](http://www.securityfocus.com/archive/1/422390/100/0/threaded) 2. [361](http://securityreason.com/securityalert/361) 3. [22666](http://www.osvdb.org/22666) 4. [](http://bugs.typo3.org/view.php?id=2248) 5. [](http://www.irmplc.com/advisory015.htm) 6. [typo3-multiple-path-disclosure(24244)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24244) 7. [22665](http://www.osvdb.org/22665) 8. [18546](http://secunia.com/advisories/18546) 9. [ADV-2006-0269](http://www.vupen.com/english/advisories/2006/0269) 10. [20060119 IRM 015: File system path disclosure on TYPO3 Web Content Manager](http://www.securityfocus.com/archive/1/422360/100/0/threaded) 11. [22667](http://www.osvdb.org/22667)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48919, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48919 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48919 - **State**: PUBLISHED - **Published Date**: October 22, 2024 at 20:58 UTC - **Last Updated**: October 23, 2024 at 14:49 UTC - **Reserved Date**: October 09, 2024 at 22:06 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Cursor is a code editor built for programming with AI. Prior to Sep 27, 2024, if a user generated a terminal command via Cursor's Terminal Cmd-K/Ctrl-K feature and if the user explicitly imported a malicious web page into the Terminal Cmd-K prompt, an attacker with control over the referenced web page could have a significant chance of influencing a language model to output arbitrary commands for execution in the user's terminal. This scenario would require the user explicitly opt-in to including the contents of a compromised webpage, and it would require that the attacker display prompt injection text in the the contents of the compromised webpage. A server-side patch to not stream back newlines or control characters was released on September 27, 2024, within two hours of the issue being reported. Additionally, Cursor 0.42 includes client-side mitigations to prevent any newline or control character from being streamed into the terminal directly. It also contains a new setting, `"cursor.terminal.usePreviewBox"`, which, if set to true, streams the response into a preview box whose contents then have to be manually accepted before being inserted into the terminal. This setting is useful if you're working in a shell environment where commands can be executed without pressing enter or any control character. The patch has been applied server-side, so no additional action is needed, even on older versions of Cursor. Separately, Cursor's maintainers also recommend, as best practice, to only include trusted pieces of context in prompts. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **getcursor - cursor** Affected versions: - < 0.42 (Status: affected) ### References 1. [https://github.com/getcursor/cursor/security/advisories/GHSA-rmj9-23rg-gr67](https://github.com/getcursor/cursor/security/advisories/GHSA-rmj9-23rg-gr67)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-29369, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-29369 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-29369 - **State**: PUBLISHED - **Published Date**: June 13, 2023 at 23:26 UTC - **Last Updated**: January 01, 2025 at 01:43 UTC - **Reserved Date**: April 04, 2023 at 22:34 UTC - **Assigned By**: microsoft ### Vulnerability Description Remote Procedure Call Runtime Denial of Service Vulnerability ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-190: Security Weakness ### Affected Products **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Remote Procedure Call Runtime Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29369)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6344, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6344 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6344 - **State**: PUBLISHED - **Published Date**: December 31, 2018 at 22:00 UTC - **Last Updated**: May 06, 2025 at 16:02 UTC - **Reserved Date**: January 26, 2018 at 00:00 UTC - **Assigned By**: facebook ### Vulnerability Description A heap corruption in WhatsApp can be caused by a malformed RTP packet being sent after a call is established. The vulnerability can be used to cause denial of service. It affects WhatsApp for Android prior to v2.18.293, WhatsApp for iOS prior to v2.18.93, and WhatsApp for Windows Phone prior to v2.18.172. ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Facebook - WhatsApp for Android** Affected versions: - 2.18.293 (Status: affected) - unspecified (Status: affected) **Facebook - WhatsApp for iOS** Affected versions: - 2.18.93 (Status: affected) - unspecified (Status: affected) **Facebook - WhatsApp for Windows Phone** Affected versions: - 2.18.172 (Status: affected) - unspecified (Status: affected) ### References 1. [](https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-3.html) 2. [106365](http://www.securityfocus.com/bid/106365)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40942, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40942 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40942 - **State**: PUBLISHED - **Published Date**: June 27, 2022 at 20:21 UTC - **Last Updated**: August 04, 2024 at 02:59 UTC - **Reserved Date**: September 13, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In GPAC MP4Box v1.1.0, there is a heap-buffer-overflow in the function filter_parse_dyn_args function in filter_core/filter.c:1454, as demonstrated by GPAC. This can cause a denial of service (DOS). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gpac/gpac/issues/1908)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3755, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3755 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3755 - **State**: PUBLISHED - **Published Date**: May 29, 2025 at 04:47 UTC - **Last Updated**: May 29, 2025 at 13:17 UTC - **Reserved Date**: April 17, 2025 at 07:04 UTC - **Assigned By**: Mitsubishi ### Vulnerability Description Improper Validation of Specified Index, Position, or Offset in Input vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to read information in the product, to cause a Denial-of-Service (DoS) condition in MELSOFT connection, or to stop the operation of the CPU module (causing a DoS condtion on the CPU module), by sending specially crafted packets. The product is needed to reset for recovery. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H` ### Weakness Classification (CWE) - CWE-1285: Security Weakness ### Affected Products **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-32MT/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-32MT/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-32MT/ESS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-32MT/DSS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-32MR/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-32MR/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-64MT/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-64MT/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-64MT/ESS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-64MT/DSS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-64MR/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-64MR/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-80MT/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-80MT/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-80MT/ESS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-80MT/DSS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-80MR/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5U-80MR/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-32MT/D** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-32MT/DSS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-64MT/D** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-64MT/DSS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-96MT/D** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-96MT/DSS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-32MT/DS-TS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-32MT/DSS-TS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UC-32MR/DS-TS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-24MT/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-24MT/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-24MT/ESS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-24MT/DSS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-24MR/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-24MR/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-40MT/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-40MT/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-40MT/ESS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-40MT/DSS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-40MR/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-40MR/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-60MT/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-60MT/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-60MT/ESS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-60MT/DSS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-60MR/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-60MR/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-24MT/ES-A** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-24MR/ES-A** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-40MT/ES-A** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-40MR/ES-A** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-60MT/ES-A** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5UJ-60MR/ES-A** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-30MT/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-30MT/ESS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-30MR/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-40MT/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-40MT/ESS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-40MR/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-60MT/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-60MT/ESS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-60MR/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-80MT/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-80MT/ESS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-80MR/ES** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-30MT/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-30MT/DSS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-30MR/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-40MT/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-40MT/DSS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-40MR/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-60MT/DS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-60MT/DSS** Affected versions: - All versions (Status: affected) **Mitsubishi Electric Corporation - MELSEC iQ-F Series FX5S-60MR/DS** Affected versions: - All versions (Status: affected) ### References 1. [](https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-003_en.pdf) 2. [](https://jvn.jp/vu/JVNVU94070048/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2717, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2717 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2717 - **State**: PUBLISHED - **Published Date**: March 28, 2013 at 15:00 UTC - **Last Updated**: September 17, 2024 at 01:51 UTC - **Reserved Date**: March 28, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple unspecified vulnerabilities in the System Management (aka SysAdmin) Console in EMC Smarts Network Configuration Manager (NCM) through 9.2 have unknown impact and attack vectors, a different issue than CVE-2013-0935. NOTE: this might overlap CVEs for open-source server components or other third-party components. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20130326 ESA-2013-016: EMC Smarts Network Configuration Manager](http://archives.neohapsis.com/archives/bugtraq/2013-03/0135.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27486, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27486 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27486 - **State**: PUBLISHED - **Published Date**: April 12, 2021 at 14:36 UTC - **Last Updated**: August 03, 2024 at 21:26 UTC - **Reserved Date**: February 19, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description FATEK Automation WinProladder Versions 3.30 and prior is vulnerable to an integer underflow, which may cause an out-of-bounds write and allow an attacker to execute arbitrary code. ### Weakness Classification (CWE) - CWE-191: Security Weakness ### Affected Products **n/a - FATEK Automation WinProladder** Affected versions: - WinProladder Versions 3.30 and prior (Status: affected) ### References 1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-098-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6635, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6635 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6635 - **State**: PUBLISHED - **Published Date**: July 20, 2024 at 07:38 UTC - **Last Updated**: August 01, 2024 at 21:41 UTC - **Reserved Date**: July 09, 2024 at 21:27 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WooCommerce - Social Login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.3. This is due to insufficient controls in the 'woo_slg_login_email' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, excluding an administrator, if they know the email of user. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-288: Security Weakness ### Affected Products **WPWeb - WooCommerce - Social Login** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/37836722-eb25-4393-8cdf-91057642ba3f?source=cve) 2. [](https://codecanyon.net/item/social-login-wordpress-woocommerce-plugin/8495883) ### Credits - Vu Nguyen
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-57615, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-57615 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-57615 - **State**: PUBLISHED - **Published Date**: January 14, 2025 at 00:00 UTC - **Last Updated**: January 17, 2025 at 17:48 UTC - **Reserved Date**: January 09, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in the BATcalcbetween_intern component of MonetDB Server v11.47.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/MonetDB/MonetDB/issues/7413)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15135, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15135 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15135 - **State**: PUBLISHED - **Published Date**: August 18, 2019 at 15:43 UTC - **Last Updated**: August 05, 2024 at 00:34 UTC - **Reserved Date**: August 18, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The handshake protocol in Object Management Group (OMG) DDS Security 1.1 sends cleartext information about all of the capabilities of a participant (including capabilities inapplicable to the current session), which makes it easier for attackers to discover potentially sensitive reachability information on a Data Distribution Service (DDS) network. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://arxiv.org/abs/1908.05310) 2. [](https://www.omg.org/spec/DDS-SECURITY/1.1/PDF)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2582, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2582 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2582 - **State**: PUBLISHED - **Published Date**: May 09, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 13:42 UTC - **Reserved Date**: May 09, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple buffer overflows in the DB2 JDBC Applet Server (DB2JDS) service in IBM DB2 9.x and earlier allow remote attackers to (1) execute arbitrary code via a crafted packet to the DB2JDS service on tcp/6789; and cause a denial of service via (2) an invalid LANG parameter or (2) a long packet that generates a "MemTree overflow." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [26010](http://www.securityfocus.com/bid/26010) 2. [1018029](http://www.securitytracker.com/id?1018029) 3. [1018801](http://www.securitytracker.com/id?1018801) 4. [](http://www.zerodayinitiative.com/advisories/ZDI-07-056.html) 5. [IY97750](http://www-1.ibm.com/support/search.wss?rs=0&q=IY97750&apar=only) 6. [db2-db2jdbc-bo(34184)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34184) 7. [40973](http://osvdb.org/40973) 8. [40975](http://osvdb.org/40975) 9. [ADV-2007-1707](http://www.vupen.com/english/advisories/2007/1707) 10. [23890](http://www.securityfocus.com/bid/23890) 11. [25148](http://secunia.com/advisories/25148) 12. [20071010 ZDI-07-056: IBM DB2 DB2JDS Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/482024/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13949, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13949 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13949 - **State**: REJECTED - **Published Date**: November 23, 2021 at 19:59 UTC - **Last Updated**: November 23, 2021 at 19:59 UTC - **Reserved Date**: July 11, 2018 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7927, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7927 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7927 - **State**: PUBLISHED - **Published Date**: August 19, 2024 at 20:00 UTC - **Last Updated**: August 20, 2024 at 14:00 UTC - **Reserved Date**: August 19, 2024 at 13:44 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical was found in ZZCMS 2023. Affected by this vulnerability is an unknown functionality of the file /admin/class.php?dowhat=modifyclass. The manipulation of the argument skin[] leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **n/a - ZZCMS** Affected versions: - 2023 (Status: affected) ### References 1. [VDB-275113 | ZZCMS class.php path traversal](https://vuldb.com/?id.275113) 2. [VDB-275113 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275113) 3. [Submit #392186 | ZZCMS China Merchants Network Content Management System zzcms 2023 Unauthenticated Arbitrary File Read](https://vuldb.com/?submit.392186) 4. [](https://gitee.com/A0kooo/cve_article/blob/master/zzcms/Directory_traversal3/zzcms%20class.php%20Directory%20traversal.md) ### Credits - 0kooo (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3805, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3805 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3805 - **State**: PUBLISHED - **Published Date**: July 17, 2013 at 10:00 UTC - **Last Updated**: August 06, 2024 at 16:22 UTC - **Reserved Date**: June 03, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Prepared Statements. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html) 2. [openSUSE-SU-2013:1335](http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html) 3. [SUSE-SU-2013:1390](http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html) 4. [95327](http://osvdb.org/95327) 5. [openSUSE-SU-2013:1410](http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html) 6. [SUSE-SU-2013:1529](http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html) 7. [](http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2847, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2847 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2847 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 13:00 UTC - **Last Updated**: March 27, 2025 at 13:20 UTC - **Reserved Date**: March 27, 2025 at 06:11 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in Codezips Gym Management System 1.0. This issue affects some unknown processing of the file /dashboard/admin/over_month.php. The manipulation of the argument mm leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **Codezips - Gym Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-301493 | Codezips Gym Management System over_month.php sql injection](https://vuldb.com/?id.301493) 2. [VDB-301493 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.301493) 3. [Submit #522330 | Codezips Gym Management System 1.0 SQL Injection](https://vuldb.com/?submit.522330) 4. [](https://www.yuque.com/baimatangseng-iyusa/qwwm81/zbefafzyl0of6g56?singleDoc) ### Credits - sjdalu (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5474 - **State**: PUBLISHED - **Published Date**: July 21, 2016 at 10:00 UTC - **Last Updated**: October 11, 2024 at 20:34 UTC - **Reserved Date**: June 16, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Retail Service Backbone component in Oracle Retail Applications 14.0, 14.1, and 15.0 allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to RSB Kernel. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html) 2. [1036397](http://www.securitytracker.com/id/1036397) 3. [91787](http://www.securityfocus.com/bid/91787) 4. [91891](http://www.securityfocus.com/bid/91891)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0119, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0119 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0119 - **State**: PUBLISHED - **Published Date**: March 15, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:35 UTC - **Reserved Date**: March 15, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Alcatel Speed Touch Home ADSL Modem allows remote attackers to cause a denial of service (reboot) via a network scan with unusual packets, such as nmap with OS detection. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [alcatel-speedtouch-nmap-dos(7893)](http://www.iss.net/security_center/static/7893.php) 2. [20020111 Bug in alcatel speed touch home adsl modem](http://online.securityfocus.com/archive/1/249746) 3. [3851](http://www.securityfocus.com/bid/3851)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4436, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4436 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4436 - **State**: PUBLISHED - **Published Date**: June 10, 2020 at 12:57 UTC - **Last Updated**: September 16, 2024 at 22:56 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Certain IBM Aspera applications are vulnerable to buffer overflow after valid authentication, which could allow an attacker with intimate knowledge of the system to execute arbitrary code through a service. IBM X-Force ID: 180902. ### Affected Products **IBM - Aspera Faspex On Demand** Affected versions: - 3.7.4 (Status: affected) **IBM - Aspera High-Speed Transfer Server for Cloud Pak for Integration (CP4I)** Affected versions: - 3.9.10 (Status: affected) **IBM - Aspera High-Speed Transfer Endpoint** Affected versions: - 3.9.3 (Status: affected) **IBM - Aspera Streaming** Affected versions: - 3.9.3 (Status: affected) **IBM - Aspera Server On Demand** Affected versions: - 3.7.4 (Status: affected) **IBM - Aspera Shares On Demand** Affected versions: - 3.7.4 (Status: affected) **IBM - Aspera Application Platform On Demand** Affected versions: - 3.7.4 (Status: affected) **IBM - Aspera Transfer Cluster Manager** Affected versions: - 1.3.1 (Status: affected) **IBM - Aspera High-Speed Transfer Server** Affected versions: - 3.9.3 (Status: affected) **IBM - Aspera Proxy Server** Affected versions: - 1.4.3 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6221324) 2. [ibm-aspera-cve20204436-bo (180902)](https://exchange.xforce.ibmcloud.com/vulnerabilities/180902)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0781, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0781 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0781 - **State**: PUBLISHED - **Published Date**: March 25, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:05 UTC - **Reserved Date**: September 11, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unknown vulnerability in ecartis before 1.0.0 does not properly validate user input, which allows attackers to obtain mailing list passwords. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-467](http://www.debian.org/security/2004/dsa-467) 2. [ecartis-subscribe-password-disclosure(12929)](https://exchange.xforce.ibmcloud.com/vulnerabilities/12929)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37377, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37377 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37377 - **State**: PUBLISHED - **Published Date**: September 08, 2023 at 00:00 UTC - **Last Updated**: September 26, 2024 at 18:12 UTC - **Reserved Date**: July 03, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Samsung Exynos Mobile Processor and Wearable Processor (Exynos 980, Exynos 850, Exynos 2100, and Exynos W920). Improper handling of length parameter inconsistency can cause incorrect packet filtering. ### CVSS Metrics - **CVSS Base Score**: 2/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AC:L/AV:L/A:L/C:N/I:N/PR:H/S:U/UI:R` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://semiconductor.samsung.com/support/quality-support/product-security-updates/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10666, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10666 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10666 - **State**: PUBLISHED - **Published Date**: May 03, 2018 at 04:00 UTC - **Last Updated**: August 05, 2024 at 07:46 UTC - **Reserved Date**: May 02, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Owned smart contract implementation for Aurora IDEX Membership (IDXM), an Ethereum ERC20 token, allows attackers to acquire contract ownership because the setOwner function is declared as public. A new owner can subsequently modify variables. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://medium.com/%40jonghyk.song/aurora-idex-membership-idxm-erc20-token-allows-attackers-to-acquire-contract-ownership-1ff426cee7c6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46195, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46195 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46195 - **State**: PUBLISHED - **Published Date**: January 14, 2022 at 19:16 UTC - **Last Updated**: August 04, 2024 at 05:02 UTC - **Reserved Date**: January 10, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8171, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8171 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8171 - **State**: PUBLISHED - **Published Date**: February 09, 2018 at 22:00 UTC - **Last Updated**: August 06, 2024 at 13:10 UTC - **Reserved Date**: October 10, 2014 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The memory resource controller (aka memcg) in the Linux kernel allows local users to cause a denial of service (deadlock) by spawning new processes within a memory-constrained cgroup. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2016:0068](http://rhn.redhat.com/errata/RHSA-2016-0068.html) 2. [RHSA-2015:0864](http://rhn.redhat.com/errata/RHSA-2015-0864.html) 3. [RHSA-2015:2152](http://rhn.redhat.com/errata/RHSA-2015-2152.html) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=1198109) 5. [74293](http://www.securityfocus.com/bid/74293) 6. [RHSA-2015:2411](http://rhn.redhat.com/errata/RHSA-2015-2411.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18381, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18381 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18381 - **State**: PUBLISHED - **Published Date**: July 30, 2019 at 18:38 UTC - **Last Updated**: August 05, 2024 at 21:20 UTC - **Reserved Date**: July 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The installation process in Open edX before 2017-01-10 exposes a MongoDB instance to external connections with default credentials. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://groups.google.com/forum/#%21topic/openedx-announce/mpyyx34LWSY) 2. [](https://groups.google.com/forum/#%21topic/openedx-announce/jRXyo1HJzNk)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1838, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1838 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1838 - **State**: PUBLISHED - **Published Date**: March 22, 2013 at 21:00 UTC - **Last Updated**: August 06, 2024 at 15:13 UTC - **Reserved Date**: February 19, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) does not properly implement a quota for fixed IPs, which allows remote authenticated users to cause a denial of service (resource exhaustion and failure to spawn new instances) via a large number of calls to the addFixedIp function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[openstack] 20130314 [OSSA 2013-008] Nova DoS by allocating all Fixed IPs (CVE-2013-1838)](https://lists.launchpad.net/openstack/msg21892.html) 2. [58492](http://www.securityfocus.com/bid/58492) 3. [](https://bugs.launchpad.net/nova/+bug/1125468) 4. [USN-1771-1](http://ubuntu.com/usn/usn-1771-1) 5. [](https://review.openstack.org/#/c/24453/) 6. [52728](http://secunia.com/advisories/52728) 7. [](https://bugzilla.redhat.com/show_bug.cgi?id=919648) 8. [52580](http://secunia.com/advisories/52580) 9. [91303](http://osvdb.org/91303) 10. [](https://review.openstack.org/#/c/24452/) 11. [nova-fixedips-dos(82877)](https://exchange.xforce.ibmcloud.com/vulnerabilities/82877) 12. [RHSA-2013:0709](http://rhn.redhat.com/errata/RHSA-2013-0709.html) 13. [](https://review.openstack.org/#/c/24451/) 14. [[oss-security] 20130314 [OSSA 2013-008] Nova DoS by allocating all Fixed IPs (CVE-2013-1838)](http://www.openwall.com/lists/oss-security/2013/03/14/18)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-36306, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-36306 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-36306 - **State**: PUBLISHED - **Published Date**: June 10, 2024 at 21:21 UTC - **Last Updated**: March 27, 2025 at 20:40 UTC - **Reserved Date**: May 23, 2024 at 19:30 UTC - **Assigned By**: trendmicro ### Vulnerability Description A link following vulnerability in the Trend Micro Apex One and Apex One as a Service Damage Cleanup Engine could allow a local attacker to create a denial-of-service condition on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H` ### Affected Products **Trend Micro, Inc. - Trend Micro Apex One** Affected versions: - 2019 (14.0) (Status: affected) **Trend Micro, Inc. - Trend Micro Apex One as a Service** Affected versions: - SaaS (Status: affected) ### References 1. [](https://success.trendmicro.com/dcx/s/solution/000298063) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-24-568/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4958, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4958 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4958 - **State**: PUBLISHED - **Published Date**: November 18, 2012 at 19:00 UTC - **Last Updated**: September 17, 2024 at 03:54 UTC - **Reserved Date**: September 17, 2012 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Directory traversal vulnerability in NFRAgent.exe in Novell File Reporter 1.0.2 allows remote attackers to read arbitrary files via a 126 /FSF/CMD request with a .. (dot dot) in a FILE element of an FSFUI record. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#273371](http://www.kb.cert.org/vuls/id/273371) 2. [](https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7449 - **State**: PUBLISHED - **Published Date**: February 06, 2017 at 17:00 UTC - **Last Updated**: August 06, 2024 at 01:57 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The TIFFGetField function in coders/tiff.c in GraphicsMagick 1.3.24 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a file containing an "unterminated" string. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1374233) 2. [openSUSE-SU-2016:2641](http://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html) 3. [93074](http://www.securityfocus.com/bid/93074) 4. [[debian-lts-announce] 20180627 [SECURITY] [DLA 1401-1] graphicsmagick security update](https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html) 5. [openSUSE-SU-2016:2644](http://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html) 6. [[oss-security] 20160918 Re: GraphicsMagick 1.3.25 fixes some security issues](http://www.openwall.com/lists/oss-security/2016/09/18/8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13871, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13871 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13871 - **State**: PUBLISHED - **Published Date**: June 06, 2020 at 15:37 UTC - **Last Updated**: August 04, 2024 at 12:32 UTC - **Reserved Date**: June 06, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-202007-26](https://security.gentoo.org/glsa/202007-26) 2. [FEDORA-2020-d0f892b069](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BN32AGQPMHZRNM6P6L5GZPETOWTGXOKP/) 3. [[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update](https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html) 4. [](https://www.oracle.com/security-alerts/cpujan2021.html) 5. [](https://www.sqlite.org/src/info/cd708fa84d2aaaea) 6. [](https://www.sqlite.org/src/info/c8d3b9f0a750a529) 7. [](https://www.sqlite.org/src/info/79eff1d0383179c4) 8. [](https://security.netapp.com/advisory/ntap-20200619-0002/) 9. [](https://www.oracle.com/security-alerts/cpuApr2021.html) 10. [](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-2124, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-2124 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-2124 - **State**: PUBLISHED - **Published Date**: October 27, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:51 UTC - **Reserved Date**: October 28, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The recvn and sendn functions in nylon 0.2 do not check when the recv function call returns 0, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) by closing the connection while recv is executing. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [5938](http://www.securityfocus.com/bid/5938) 2. [nylon-recv-endless-dos(10334)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10334) 3. [20021010 nylon 0.2 (0.3?) DoS](http://www.security-express.com/archives/bugtraq/2002-10/0146.html) 4. [7281](http://secunia.com/advisories/7281)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3417, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3417 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3417 - **State**: PUBLISHED - **Published Date**: July 31, 2008 at 17:00 UTC - **Last Updated**: August 07, 2024 at 09:37 UTC - **Reserved Date**: July 31, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in home/index.asp in fipsCMS light 2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the r parameter, a different vector than CVE-2006-6115 and CVE-2007-2561. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [6135](https://www.exploit-db.com/exploits/6135) 2. [31250](http://secunia.com/advisories/31250) 3. [30380](http://www.securityfocus.com/bid/30380) 4. [4095](http://securityreason.com/securityalert/4095) 5. [fipscmslight-index-sql-injection(44022)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44022)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39162, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39162 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39162 - **State**: PUBLISHED - **Published Date**: September 09, 2021 at 22:05 UTC - **Last Updated**: August 04, 2024 at 01:58 UTC - **Reserved Date**: August 16, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event. This can lead to a DoS in the presence of untrusted *upstream* servers. 0.15.1 contains an upgraded envoy binary with this vulnerability patched. If only trusted upstreams are configured, there is not substantial risk of this condition being triggered. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-754: Security Weakness ### Affected Products **pomerium - pomerium** Affected versions: - >= 0.15.0, < 0.15.1 (Status: affected) ### References 1. [](https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ) 2. [](https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv) 3. [](https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-37945, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-37945 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-37945 - **State**: PUBLISHED - **Published Date**: May 20, 2025 at 15:58 UTC - **Last Updated**: May 26, 2025 at 05:24 UTC - **Reserved Date**: April 16, 2025 at 04:51 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: net: phy: allow MDIO bus PM ops to start/stop state machine for phylink-controlled PHY DSA has 2 kinds of drivers: 1. Those who call dsa_switch_suspend() and dsa_switch_resume() from their device PM ops: qca8k-8xxx, bcm_sf2, microchip ksz 2. Those who don't: all others. The above methods should be optional. For type 1, dsa_switch_suspend() calls dsa_user_suspend() -> phylink_stop(), and dsa_switch_resume() calls dsa_user_resume() -> phylink_start(). These seem good candidates for setting mac_managed_pm = true because that is essentially its definition [1], but that does not seem to be the biggest problem for now, and is not what this change focuses on. Talking strictly about the 2nd category of DSA drivers here (which do not have MAC managed PM, meaning that for their attached PHYs, mdio_bus_phy_suspend() and mdio_bus_phy_resume() should run in full), I have noticed that the following warning from mdio_bus_phy_resume() is triggered: WARN_ON(phydev->state != PHY_HALTED && phydev->state != PHY_READY && phydev->state != PHY_UP); because the PHY state machine is running. It's running as a result of a previous dsa_user_open() -> ... -> phylink_start() -> phy_start() having been initiated by the user. The previous mdio_bus_phy_suspend() was supposed to have called phy_stop_machine(), but it didn't. So this is why the PHY is in state PHY_NOLINK by the time mdio_bus_phy_resume() runs. mdio_bus_phy_suspend() did not call phy_stop_machine() because for phylink, the phydev->adjust_link function pointer is NULL. This seems a technicality introduced by commit fddd91016d16 ("phylib: fix PAL state machine restart on resume"). That commit was written before phylink existed, and was intended to avoid crashing with consumer drivers which don't use the PHY state machine - phylink always does, when using a PHY. But phylink itself has historically not been developed with suspend/resume in mind, and apparently not tested too much in that scenario, allowing this bug to exist unnoticed for so long. Plus, prior to the WARN_ON(), it would have likely been invisible. This issue is not in fact restricted to type 2 DSA drivers (according to the above ad-hoc classification), but can be extrapolated to any MAC driver with phylink and MDIO-bus-managed PHY PM ops. DSA is just where the issue was reported. Assuming mac_managed_pm is set correctly, a quick search indicates the following other drivers might be affected: $ grep -Zlr PHYLINK_NETDEV drivers/ | xargs -0 grep -L mac_managed_pm drivers/net/ethernet/atheros/ag71xx.c drivers/net/ethernet/microchip/sparx5/sparx5_main.c drivers/net/ethernet/microchip/lan966x/lan966x_main.c drivers/net/ethernet/freescale/dpaa2/dpaa2-mac.c drivers/net/ethernet/freescale/fs_enet/fs_enet-main.c drivers/net/ethernet/freescale/dpaa/dpaa_eth.c drivers/net/ethernet/freescale/ucc_geth.c drivers/net/ethernet/freescale/enetc/enetc_pf_common.c drivers/net/ethernet/marvell/mvpp2/mvpp2_main.c drivers/net/ethernet/marvell/mvneta.c drivers/net/ethernet/marvell/prestera/prestera_main.c drivers/net/ethernet/mediatek/mtk_eth_soc.c drivers/net/ethernet/altera/altera_tse_main.c drivers/net/ethernet/wangxun/txgbe/txgbe_phy.c drivers/net/ethernet/meta/fbnic/fbnic_phylink.c drivers/net/ethernet/tehuti/tn40_phy.c drivers/net/ethernet/mscc/ocelot_net.c Make the existing conditions dependent on the PHY device having a phydev->phy_link_change() implementation equal to the default phy_link_change() provided by phylib. Otherwise, we implicitly know that the phydev has the phylink-provided phylink_phy_change() callback, and when phylink is used, the PHY state machine always needs to be stopped/ started on the suspend/resume path. The code is structured as such that if phydev->phy_link_change() is absent, it is a matter of time until the kernel will crash - no need to further complicate the test. Thus, for the situation where the PM is not managed b ---truncated--- ### Affected Products **Linux - Linux** Affected versions: - 744d23c71af39c7dc77ac7c3cac87ae86a181a85 (Status: affected) - 744d23c71af39c7dc77ac7c3cac87ae86a181a85 (Status: affected) - 744d23c71af39c7dc77ac7c3cac87ae86a181a85 (Status: affected) - 744d23c71af39c7dc77ac7c3cac87ae86a181a85 (Status: affected) - 47ac7b2f6a1ffef76e55a9ec146881a36673284b (Status: affected) - 7dc0ed411de3450e75b2a9600b5742cbf0908167 (Status: affected) **Linux - Linux** Affected versions: - 6.0 (Status: affected) - 0 (Status: unaffected) - 6.12.24 (Status: unaffected) - 6.13.12 (Status: unaffected) - 6.14.3 (Status: unaffected) - 6.15 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/a6ed6f8ec81b8ca7100dcd9e62bdbc0dff1b2259) 2. [](https://git.kernel.org/stable/c/54e5d00a8de6c13f6c01a94ed48025e882cd15f7) 3. [](https://git.kernel.org/stable/c/bd4037d51d3f6667636a1383e78e48a5b7b60755) 4. [](https://git.kernel.org/stable/c/fc75ea20ffb452652f0d4033f38fe88d7cfdae35)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5716, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5716 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5716 - **State**: REJECTED - **Published Date**: September 05, 2017 at 19:00 UTC - **Last Updated**: September 06, 2017 at 12:57 UTC - **Reserved Date**: February 01, 2017 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1634, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1634 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1634 - **State**: PUBLISHED - **Published Date**: April 08, 2020 at 19:26 UTC - **Last Updated**: September 16, 2024 at 22:02 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description On High-End SRX Series devices, in specific configurations and when specific networking events or operator actions occur, an SPC receiving genuine multicast traffic may core. Subsequently, all FPCs in a chassis may reset causing a Denial of Service. This issue affects both IPv4 and IPv6. This issue affects: Juniper Networks Junos OS 12.3X48 version 12.3X48-D80 and later versions prior to 12.3X48-D95 on High-End SRX Series. This issue does not affect Branch SRX Series devices. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-190: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 12.3X48-D80 (Status: affected) ### References 1. [](https://kb.juniper.net/JSA11014)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4628, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4628 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4628 - **State**: PUBLISHED - **Published Date**: October 21, 2008 at 00:00 UTC - **Last Updated**: August 07, 2024 at 10:24 UTC - **Reserved Date**: October 20, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in del.php in myWebland miniBloggie 1.0 allows remote attackers to execute arbitrary SQL commands via the post_id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-2864](http://www.vupen.com/english/advisories/2008/2864) 2. [6782](https://www.exploit-db.com/exploits/6782) 3. [minibloggie-del-sql-injection(45980)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45980) 4. [4442](http://securityreason.com/securityalert/4442) 5. [31810](http://www.securityfocus.com/bid/31810)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0676, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0676 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0676 - **State**: PUBLISHED - **Published Date**: April 21, 2016 at 10:00 UTC - **Last Updated**: October 15, 2024 at 19:11 UTC - **Reserved Date**: December 09, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect availability via vectors related to the kernel. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1035629](http://www.securitytracker.com/id/1035629) 2. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1748, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1748 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1748 - **State**: PUBLISHED - **Published Date**: May 21, 2009 at 18:00 UTC - **Last Updated**: August 07, 2024 at 05:27 UTC - **Reserved Date**: May 21, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple directory traversal vulnerabilities in index.php in Catviz 0.4.0 Beta 1 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) webpages_form or (2) userman_form parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [35042](http://www.securityfocus.com/bid/35042) 2. [54657](http://osvdb.org/54657) 3. [8745](https://www.exploit-db.com/exploits/8745)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31139, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31139 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31139 - **State**: PUBLISHED - **Published Date**: March 28, 2024 at 15:07 UTC - **Last Updated**: August 02, 2024 at 01:46 UTC - **Reserved Date**: March 28, 2024 at 14:39 UTC - **Assigned By**: JetBrains ### Vulnerability Description In JetBrains TeamCity before 2024.03 xXE was possible in the Maven build steps detector ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H` ### Affected Products **JetBrains - TeamCity** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.jetbrains.com/privacy-security/issues-fixed/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-25079, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-25079 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-25079 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:43 UTC - **Reserved Date**: December 16, 2022 at 21:17 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23996, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23996 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23996 - **State**: PUBLISHED - **Published Date**: June 24, 2021 at 13:25 UTC - **Last Updated**: August 03, 2024 at 19:14 UTC - **Reserved Date**: January 13, 2021 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description By utilizing 3D CSS in conjunction with Javascript, content could have been rendered outside the webpage's viewport, resulting in a spoofing attack that could have been used for phishing or other attacks on a user. This vulnerability affects Firefox < 88. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.mozilla.org/security/advisories/mfsa2021-16/) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1701834)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20781, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20781 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20781 - **State**: PUBLISHED - **Published Date**: April 29, 2020 at 13:08 UTC - **Last Updated**: August 05, 2024 at 02:53 UTC - **Reserved Date**: April 17, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in LG Bridge before April 2019 on Windows. DLL Hijacking can occur. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://lgsecurity.lge.com/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32175, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32175 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32175 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 01:56 UTC - **Last Updated**: August 02, 2024 at 15:10 UTC - **Reserved Date**: May 03, 2023 at 20:10 UTC - **Assigned By**: zdi ### Vulnerability Description VIPRE Antivirus Plus Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Antivirus Plus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Anti Malware Service. By creating a symbolic link, an attacker can abuse the service to create arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18899. ### Weakness Classification (CWE) - CWE-59: Security Weakness ### Affected Products **VIPRE - Antivirus Plus** Affected versions: - 11.0.6.22 (Status: affected) ### References 1. [ZDI-23-755](https://www.zerodayinitiative.com/advisories/ZDI-23-755/) 2. [vendor-provided URL](https://success.vipre.com/en_US/antivirus-plus-release-notes/home-plus-release-notes-20230530)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28981, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28981 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28981 - **State**: PUBLISHED - **Published Date**: April 17, 2023 at 00:00 UTC - **Last Updated**: February 05, 2025 at 21:40 UTC - **Reserved Date**: March 29, 2023 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). If the receipt of router advertisements is enabled on an interface and a specifically malformed RA packet is received, memory corruption will happen which leads to an rpd crash. This issue affects: Juniper Networks Junos OS 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2; 22.1 versions prior to 22.1R2. Juniper Networks Junos OS Evolved 20.3-EVO version 20.3R1-EVO and later versions; 20.4-EVO versions prior to 20.4R3-S6-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R2-EVO; 22.1-EVO versions prior to 22.1R2-EVO. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 20.3 (Status: affected) - 20.4 (Status: affected) - 21.1 (Status: affected) - 21.2 (Status: affected) - 21.3 (Status: affected) - 21.4 (Status: affected) - 22.1 (Status: affected) **Juniper Networks - Junos OS Evolved** Affected versions: - 20.3R1-EVO (Status: affected) - 20.4-EVO (Status: affected) - 21.3-EVO (Status: affected) - 21.4-EVO (Status: affected) - 22.1-EVO (Status: affected) ### References 1. [](https://supportportal.juniper.net/JSA70607)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34909, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34909 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34909 - **State**: PUBLISHED - **Published Date**: February 27, 2023 at 00:00 UTC - **Last Updated**: May 30, 2025 at 16:02 UTC - **Reserved Date**: July 01, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the A4N (Aremis 4 Nomad) application 1.5.0 for Android. It allows SQL Injection, by which an attacker can bypass authentication and retrieve data that is stored in the database. ### CVSS Metrics - **CVSS Base Score**: 7.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AC:L/AV:L/A:N/C:H/I:H/PR:N/S:U/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.aremis.com/en_GB/welcome) 2. [](https://excellium-services.com/cert-xlm-advisory/CVE-2022-34909) 3. [](https://cds.thalesgroup.com/en/tcs-cert/CVE-2022-34909)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17459, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17459 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17459 - **State**: PUBLISHED - **Published Date**: January 09, 2019 at 19:00 UTC - **Last Updated**: August 05, 2024 at 10:47 UTC - **Reserved Date**: September 25, 2018 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Incorrect handling of clicks in the omnibox in Navigation in Google Chrome prior to 69.0.3497.92 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://crbug.com/880759) 2. [](https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop_11.html) 3. [RHSA-2018:2818](https://access.redhat.com/errata/RHSA-2018:2818)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30148, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30148 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30148 - **State**: PUBLISHED - **Published Date**: October 14, 2023 at 00:00 UTC - **Last Updated**: September 17, 2024 at 19:55 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple Stored Cross Site Scripting (XSS) vulnerabilities in Opart opartmultihtmlblock before version 2.0.12 and Opart multihtmlblock* version 1.0.0, allows remote authenticated users to inject arbitrary web script or HTML via the body_text or body_text_rude field in /sourcefiles/BlockhtmlClass.php and /sourcefiles/blockhtml.php. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:N/C:H/I:H/PR:H/S:U/UI:R` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://security.friendsofpresta.org/modules/2023/10/10/opartmultihtmlblock.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43397, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43397 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43397 - **State**: PUBLISHED - **Published Date**: November 11, 2021 at 04:39 UTC - **Last Updated**: August 04, 2024 at 03:55 UTC - **Reserved Date**: November 04, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description LiquidFiles before 3.6.3 allows remote attackers to elevate their privileges from Admin (or User Admin) to Sysadmin. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://forum.liquidfiles.com/forums/news.6/) 2. [](https://man.liquidfiles.com/release_notes/version_3-6-x.html) 3. [](http://packetstormsecurity.com/files/164997/LiquidFiles-3.5.13-Privilege-Escalation.html) 4. [20211118 Responsible Full disclosure for LiquidFiles 3.5.13](http://seclists.org/fulldisclosure/2021/Nov/40) 5. [20211123 Re: Responsible Full disclosure for LiquidFiles 3.5.13](http://seclists.org/fulldisclosure/2021/Nov/52)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8213, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8213 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8213 - **State**: PUBLISHED - **Published Date**: December 07, 2015 at 20:00 UTC - **Last Updated**: August 06, 2024 at 08:13 UTC - **Reserved Date**: November 14, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/django/django/commit/316bc3fc9437c5960c24baceb93c73f1939711e4) 2. [openSUSE-SU-2015:2199](http://lists.opensuse.org/opensuse-updates/2015-12/msg00014.html) 3. [USN-2816-1](http://www.ubuntu.com/usn/USN-2816-1) 4. [RHSA-2016:0129](http://rhn.redhat.com/errata/RHSA-2016-0129.html) 5. [](https://www.djangoproject.com/weblog/2015/nov/24/security-releases-issued/) 6. [FEDORA-2015-323274d412](http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174770.html) 7. [1034237](http://www.securitytracker.com/id/1034237) 8. [RHSA-2016:0158](http://rhn.redhat.com/errata/RHSA-2016-0158.html) 9. [RHSA-2016:0157](http://rhn.redhat.com/errata/RHSA-2016-0157.html) 10. [DSA-3404](http://www.debian.org/security/2015/dsa-3404) 11. [RHSA-2016:0156](http://rhn.redhat.com/errata/RHSA-2016-0156.html) 12. [77750](http://www.securityfocus.com/bid/77750) 13. [FEDORA-2015-a8c8f60fbd](http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173375.html) 14. [openSUSE-SU-2015:2202](http://lists.opensuse.org/opensuse-updates/2015-12/msg00017.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5991, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5991 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5991 - **State**: PUBLISHED - **Published Date**: February 17, 2018 at 07:00 UTC - **Last Updated**: August 05, 2024 at 05:47 UTC - **Reserved Date**: January 22, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL Injection exists in the Form Maker 3.6.12 component for Joomla! via the id, from, or to parameter in a view=stats request, a different vulnerability than CVE-2015-2798. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [44111](https://exploit-db.com/exploits/44111)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3091 - **State**: REJECTED - **Last Updated**: March 22, 2023 at 00:00 UTC - **Reserved Date**: January 07, 2021 at 00:00 UTC - **Assigned By**: palo_alto ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36934, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36934 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36934 - **State**: PUBLISHED - **Published Date**: September 22, 2022 at 21:30 UTC - **Last Updated**: May 27, 2025 at 16:05 UTC - **Reserved Date**: July 27, 2022 at 00:00 UTC - **Assigned By**: facebook ### Vulnerability Description An integer overflow in WhatsApp could result in remote code execution in an established video call. ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Meta - WhatsApp for iOS** Affected versions: - unspecified (Status: affected) **Meta - WhatsApp Business for iOS** Affected versions: - unspecified (Status: affected) **Meta - WhatsApp for Android** Affected versions: - unspecified (Status: affected) **Meta - WhatsApp Business for Android** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.whatsapp.com/security/advisories/2022/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15464, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15464 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15464 - **State**: PUBLISHED - **Published Date**: January 11, 2019 at 15:00 UTC - **Last Updated**: November 19, 2024 at 19:18 UTC - **Reserved Date**: August 17, 2018 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in Cisco 900 Series Aggregation Services Router (ASR) software could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of certain broadcast packets ingress to the device. An attacker could exploit this vulnerability by sending large streams of broadcast packets to an affected device. If successful, an exploit could allow an attacker to impact services running on the device, resulting in a partial DoS condition. ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **Cisco - Cisco ASR 900 Series Aggregation Services Routers** Affected versions: - n/a (Status: affected) ### References 1. [106550](http://www.securityfocus.com/bid/106550) 2. [20190109 Cisco ASR 900 Series Aggregation Services Router Software Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-asr900-dos)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48380, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48380 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48380 - **State**: PUBLISHED - **Published Date**: December 15, 2023 at 08:12 UTC - **Last Updated**: May 21, 2025 at 14:26 UTC - **Reserved Date**: November 16, 2023 at 03:49 UTC - **Assigned By**: twcert ### Vulnerability Description Softnext Mail SQR Expert is an email management platform, it has insufficient filtering for a special character within a spcific function. A remote attacker authenticated as a localhost can exploit this vulnerability to perform command injection attacks, to execute arbitrary system command, manipulate system or disrupt service. ### CVSS Metrics - **CVSS Base Score**: 7.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Softnext - Mail SQR Expert ** Affected versions: - (Status: affected) ### References 1. [](https://www.twcert.org.tw/tw/cp-132-7598-37b03-1.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6615, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6615 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6615 - **State**: PUBLISHED - **Published Date**: April 06, 2009 at 18:00 UTC - **Last Updated**: August 07, 2024 at 11:34 UTC - **Reserved Date**: April 06, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in Zen Software Zen Cart 2008 allows remote attackers to execute arbitrary SQL commands via the keyword parameter in the advanced_search_result page. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [29020](http://www.securityfocus.com/bid/29020) 2. [zencart-index-sql-injection(42161)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42161) 3. [](http://downloads.securityfocus.com/vulnerabilities/exploits/29020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3775, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3775 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3775 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:39 UTC - **Reserved Date**: October 23, 2009 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29638, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29638 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29638 - **State**: PUBLISHED - **Published Date**: May 18, 2022 at 11:50 UTC - **Last Updated**: August 03, 2024 at 06:26 UTC - **Reserved Date**: April 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the comment parameter in the function setIpQosRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/2.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12299, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12299 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12299 - **State**: PUBLISHED - **Published Date**: August 13, 2020 at 03:26 UTC - **Last Updated**: August 04, 2024 at 11:56 UTC - **Reserved Date**: April 28, 2020 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper input validation in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access. ### Affected Products **n/a - Intel(R) Server Board Families Advisory** Affected versions: - See provided reference (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00367.html) 2. [](https://security.netapp.com/advisory/ntap-20200814-0001/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31192, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31192 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31192 - **State**: PUBLISHED - **Published Date**: March 31, 2025 at 22:22 UTC - **Last Updated**: April 03, 2025 at 20:13 UTC - **Reserved Date**: March 27, 2025 at 16:13 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with improved checks. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. A website may be able to access sensor information without user consent. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - Safari** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/122371) 2. [](https://support.apple.com/en-us/122373) 3. [](https://support.apple.com/en-us/122379)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4683, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4683 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4683 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:42 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1292, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1292 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1292 - **State**: PUBLISHED - **Published Date**: April 15, 2025 at 19:46 UTC - **Last Updated**: April 17, 2025 at 19:41 UTC - **Reserved Date**: February 13, 2025 at 23:38 UTC - **Assigned By**: ChromeOS ### Vulnerability Description Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 122.0.6261.132 stable on Cr50 Boards allows an attacker with root access to gain persistence and bypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process. ### Affected Products **Google - ChromeOS** Affected versions: - 122.0.6261.132 (Status: affected) ### References 1. [](https://issuetracker.google.com/issues/324336238) 2. [](https://issues.chromium.org/issues/b/324336238)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25141, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25141 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25141 - **State**: PUBLISHED - **Published Date**: February 09, 2021 at 16:11 UTC - **Last Updated**: August 03, 2024 at 19:56 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A security vulnerability has been identified in in certain HPE and Aruba L2/L3 switch firmware. A data processing error due to improper handling of an unexpected data type in user supplied information to the switch's management interface has been identified. The data processing error could be exploited to cause a crash or reboot in the switch management interface and/or possibly the switch itself leading to local denial of service (DoS). The user must have administrator privileges to exploit this vulnerability. ### Affected Products **n/a - Aruba 5400R zl2 Switch Series; Aruba 2930F Switch Series; Aruba 2920 Switch Series; Aruba 2930M Switch Series; Aruba 2530 Switch Series; Aruba 2540 Switch Series; Aruba 3800 Switch Series; HPE 3500 and 3500 yl Switch Series; Aruba 3810M Switch Series; HPE 8200 zl Switch Series; Aruba 2620 Switch Series; Aruba 5400 zl Switch Series; HPE 6200 yl Switch Series** Affected versions: - Prior to KB.16.10.0012 (Status: affected) - - Prior to WC.16.10.0012 (Status: affected) - - Prior to WB.16.10.0011 (Status: affected) - - Aruba 2530YA prior to YA.16.10.0012 / Aruba 2530YB prior YB.16.10.0012 (Status: affected) - - Prior to YC.16.10.0012 (Status: affected) - - Prior to KA.16.04.0022 (Status: affected) - - Prior to K.16.02.0032 (Status: affected) - - Prior to KB.16.10.0012 (Status: affected) - - Prior to K.15.18.0024 (Status: affected) - - Prior to RA.16.04.0022 (Status: affected) ### References 1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04082en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5528, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5528 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5528 - **State**: PUBLISHED - **Published Date**: October 11, 2013 at 01:00 UTC - **Last Updated**: August 06, 2024 at 17:15 UTC - **Reserved Date**: August 22, 2013 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [40887](https://www.exploit-db.com/exploits/40887/) 2. [](http://packetstormsecurity.com/files/140071/Cisco-Unified-Communications-Manager-7-8-9-Directory-Traversal.html) 3. [98336](http://osvdb.org/98336) 4. [62960](http://www.securityfocus.com/bid/62960) 5. [20131010 Cisco Unified Communications Manager Administrative Web Interface Directory Traversal Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5528)