System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30150, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30150 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30150 - **State**: PUBLISHED - **Published Date**: April 08, 2025 at 13:46 UTC - **Last Updated**: April 08, 2025 at 18:46 UTC - **Reserved Date**: March 17, 2025 at 12:41 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Shopware 6 is an open commerce platform based on Symfony Framework and Vue. Through the store-api it is possible as a attacker to check if a specific e-mail address has an account in the shop. Using the store-api endpoint /store-api/account/recovery-password you get the response, which indicates clearly that there is no account for this customer. In contrast you get a success response if the account was found. This vulnerability is fixed in Shopware 6.6.10.3 or 6.5.8.17. For older versions of 6.4, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. ### Weakness Classification (CWE) - CWE-204: Improper Input Validation ### Affected Products **shopware - shopware** Affected versions: - < 6.5.8.17 (Status: affected) - >= 6.6.0.0, < 6.6.10.3 (Status: affected) - >= 6.7.0.0-rc1, < 6.7.0.0-rc2 (Status: affected) ### References 1. [https://github.com/shopware/shopware/security/advisories/GHSA-hh7j-6x3q-f52h](https://github.com/shopware/shopware/security/advisories/GHSA-hh7j-6x3q-f52h)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9449 - **State**: PUBLISHED - **Published Date**: January 02, 2015 at 20:00 UTC - **Last Updated**: August 06, 2024 at 13:47 UTC - **Reserved Date**: January 02, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the RiffVideo::infoTagsHandler function in riffvideo.cpp in Exiv2 0.24 allows remote attackers to cause a denial of service (crash) via a long IKEY INFO tag value in an AVI file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-2454-1](http://www.ubuntu.com/usn/USN-2454-1) 2. [FEDORA-2015-0301](http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148382.html) 3. [](http://dev.exiv2.org/issues/960) 4. [61801](http://secunia.com/advisories/61801) 5. [GLSA-201507-03](https://security.gentoo.org/glsa/201507-03) 6. [71912](http://www.securityfocus.com/bid/71912) 7. [](http://dev.exiv2.org/projects/exiv2/repository/diff?rev=3264&rev_to=3263)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34672, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34672 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34672 - **State**: PUBLISHED - **Published Date**: June 23, 2023 at 00:00 UTC - **Last Updated**: December 05, 2024 at 15:07 UTC - **Reserved Date**: June 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Improper Access Control leads to adding a high-privilege user affecting Elenos ETG150 FM transmitter running on version 3.12 by exploiting user's role within the admin profile. An attack could occur over the public Internet in some cases. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://elenos.com) 2. [](https://strik3r.gitbook.io/strik3r-blog/security-research/cves-pocs/cve-2023-34672)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3689, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3689 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3689 - **State**: PUBLISHED - **Published Date**: May 02, 2016 at 10:00 UTC - **Last Updated**: August 06, 2024 at 00:03 UTC - **Reserved Date**: March 30, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-2971-2](http://www.ubuntu.com/usn/USN-2971-2) 2. [SUSE-SU-2016:1690](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html) 3. [](https://bugzilla.novell.com/show_bug.cgi?id=971628) 4. [SUSE-SU-2016:1696](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html) 5. [USN-2970-1](http://www.ubuntu.com/usn/USN-2970-1) 6. [1035441](http://www.securitytracker.com/id/1035441) 7. [](https://github.com/torvalds/linux/commit/a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff) 8. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff) 9. [USN-2968-1](http://www.ubuntu.com/usn/USN-2968-1) 10. [](https://bugzilla.redhat.com/show_bug.cgi?id=1320060) 11. [USN-2971-3](http://www.ubuntu.com/usn/USN-2971-3) 12. [SUSE-SU-2016:1764](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html) 13. [USN-3000-1](http://www.ubuntu.com/usn/USN-3000-1) 14. [USN-2971-1](http://www.ubuntu.com/usn/USN-2971-1) 15. [USN-2968-2](http://www.ubuntu.com/usn/USN-2968-2) 16. [openSUSE-SU-2016:1382](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html) 17. [](http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1) 18. [[oss-security] 20160330 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (ims-pcu driver)](http://www.openwall.com/lists/oss-security/2016/03/30/6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26115, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26115 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26115 - **State**: PUBLISHED - **Published Date**: September 25, 2020 at 05:40 UTC - **Last Updated**: August 04, 2024 at 15:49 UTC - **Reserved Date**: September 25, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description cPanel before 90.0.10 allows self XSS via the Cron Editor interface (SEC-574). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://docs.cpanel.net/changelogs/90-change-log/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28932, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28932 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28932 - **State**: PUBLISHED - **Published Date**: April 09, 2024 at 17:00 UTC - **Last Updated**: May 03, 2025 at 00:39 UTC - **Reserved Date**: March 13, 2024 at 01:26 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Microsoft - Microsoft SQL Server 2022 for (CU 12)** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft SQL Server 2019 (CU 25)** Affected versions: - 15.0.0 (Status: affected) **Microsoft - Microsoft SQL Server 2019 (GDR)** Affected versions: - 15.0.0 (Status: affected) **Microsoft - Microsoft SQL Server 2022 (GDR)** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft ODBC Driver 17 for SQL Server on Windows** Affected versions: - 17.0.0.0 (Status: affected) **Microsoft - Microsoft ODBC Driver 17 for SQL Server on Linux** Affected versions: - 17.0.0.0 (Status: affected) **Microsoft - Microsoft ODBC Driver 17 for SQL Server on MacOS** Affected versions: - 17.0.0.0 (Status: affected) **Microsoft - Microsoft ODBC Driver 18 for SQL Server on Windows** Affected versions: - 18.0.0.0 (Status: affected) **Microsoft - Microsoft ODBC Driver 18 for SQL Server on Linux** Affected versions: - 18.0.0.0 (Status: affected) **Microsoft - Microsoft ODBC Driver 18 for SQL Server on MacOS** Affected versions: - 18.0.0.0 (Status: affected) **Microsoft - Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)** Affected versions: - 16.11.0 (Status: affected) **Microsoft - Microsoft Visual Studio 2022 version 17.9** Affected versions: - 17.0 (Status: affected) **Microsoft - Microsoft Visual Studio 2022 version 17.4** Affected versions: - 17.4.0 (Status: affected) **Microsoft - Microsoft Visual Studio 2022 version 17.6** Affected versions: - 17.6.0 (Status: affected) **Microsoft - Microsoft Visual Studio 2022 version 17.8** Affected versions: - 17.8.0 (Status: affected) ### References 1. [Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28932)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-49342, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-49342 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-49342 - **State**: PUBLISHED - **Published Date**: December 14, 2023 at 21:29 UTC - **Last Updated**: August 02, 2024 at 21:53 UTC - **Reserved Date**: November 27, 2023 at 03:17 UTC - **Assigned By**: canonical ### Vulnerability Description Temporary data passed between application components by Budgie Extras Clockworks applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel. ### CVSS Metrics - **CVSS Base Score**: 6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-377: Security Weakness - CWE-668: Security Weakness ### Affected Products **Ubuntu Budgie - Budgie Extras** Affected versions: - v1.4.0 (Status: affected) ### References 1. [](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49342) 2. [](https://github.com/UbuntuBudgie/budgie-extras/security/advisories/GHSA-2vfg-p2h9-wg39) 3. [](https://ubuntu.com/security/notices/USN-6556-1) ### Credits - Sam Lane - David Mohammed
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3011, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3011 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3011 - **State**: PUBLISHED - **Published Date**: April 12, 2017 at 14:00 UTC - **Last Updated**: August 05, 2024 at 14:09 UTC - **Reserved Date**: December 02, 2016 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable integer overflow vulnerability in the CCITT fax PDF filter. Successful exploitation could lead to arbitrary code execution. ### Affected Products **n/a - Adobe Acrobat Reader 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier.** Affected versions: - Adobe Acrobat Reader 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier. (Status: affected) ### References 1. [97548](http://www.securityfocus.com/bid/97548) 2. [1038228](http://www.securitytracker.com/id/1038228) 3. [](https://helpx.adobe.com/security/products/acrobat/apsb17-11.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7133 - **State**: PUBLISHED - **Published Date**: April 24, 2020 at 18:36 UTC - **Last Updated**: August 04, 2024 at 09:18 UTC - **Reserved Date**: January 16, 2020 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A unauthorized remote access vulnerability was discovered in HPE IOT + GCP version(s): 1.4.0, 1.4.1, 1.4.2, 1.2.4.2. ### Affected Products **n/a - HPE IOT + GCP** Affected versions: - 1.4.0, 1.4.1, 1.4.2, 1.2.4.2 (Status: affected) ### References 1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03947en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6171, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6171 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6171 - **State**: PUBLISHED - **Published Date**: February 09, 2017 at 15:00 UTC - **Last Updated**: August 06, 2024 at 01:22 UTC - **Reserved Date**: July 06, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Knot DNS before 2.3.0 allows remote DNS servers to cause a denial of service (memory exhaustion and slave server crash) via a large zone transfer for (1) DDNS, (2) AXFR, or (3) IXFR. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20160706 Malicious primary DNS servers can crash secondaries](http://www.openwall.com/lists/oss-security/2016/07/06/3) 2. [91678](http://www.securityfocus.com/bid/91678) 3. [[dns-operations] 20160704 DNS activities in Japan](https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html) 4. [[oss-security] 20160706 Re: Malicious primary DNS servers can crash secondaries](http://www.openwall.com/lists/oss-security/2016/07/06/4) 5. [](https://gitlab.labs.nic.cz/labs/knot/blob/c546a70563ef4c7badb7cb5bdf6d1ba8e7adae82/NEWS) 6. [](https://gitlab.labs.nic.cz/labs/knot/issues/464) 7. [](https://github.com/sischkg/xfer-limit/blob/master/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2053, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2053 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2053 - **State**: PUBLISHED - **Published Date**: April 22, 2021 at 21:53 UTC - **Last Updated**: September 26, 2024 at 18:11 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: UI Framework). The supported version that is affected is 13.4.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Enterprise Manager Base Platform, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data as well as unauthorized read access to a subset of Enterprise Manager Base Platform accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **Oracle Corporation - Enterprise Manager Base Platform** Affected versions: - 13.4.0.0 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2021.html) 2. [](https://blog.stmcyber.com/vulns/cve-2021-2053/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4953, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4953 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4953 - **State**: PUBLISHED - **Published Date**: July 09, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 05:18 UTC - **Reserved Date**: January 03, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. ### Affected Products **n/a - Adobe Acrobat and Reader 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier versions** Affected versions: - Adobe Acrobat and Reader 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier versions (Status: affected) ### References 1. [104173](http://www.securityfocus.com/bid/104173) 2. [](https://helpx.adobe.com/security/products/acrobat/apsb18-09.html) 3. [1040920](http://www.securitytracker.com/id/1040920)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1833, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1833 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1833 - **State**: PUBLISHED - **Published Date**: May 16, 2019 at 01:20 UTC - **Last Updated**: November 19, 2024 at 19:06 UTC - **Reserved Date**: December 06, 2018 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol parser of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies. The vulnerability is due to improper parsing of specific attributes in a TLS packet header. An attacker could exploit this vulnerability by sending malicious TLS messages to the affected system. A successful exploit could allow the attacker to bypass the configured policies for the system, which could allow traffic to flow through without being inspected. ### Weakness Classification (CWE) - CWE-693: Security Weakness ### Affected Products **Cisco - Cisco Firepower Threat Defense Software** Affected versions: - unspecified (Status: affected) ### References 1. [20190515 Cisco Firepower Threat Defense Software SSL/TLS Policy Bypass Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ftd-ssltls-bypass) 2. [108338](http://www.securityfocus.com/bid/108338)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1421, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1421 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1421 - **State**: PUBLISHED - **Published Date**: March 18, 2003 at 05:00 UTC - **Last Updated**: August 08, 2024 at 03:26 UTC - **Reserved Date**: February 05, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerabilities in FUDforum before 2.2.0 allow remote attackers to perform unauthorized database operations via (1) report.php, (2) selmsg.php, and (3) showposts.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20020818 FUDforum file access and SQL Injection](http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0082.html) 2. [fudforum-sql-injection(9912)](http://www.iss.net/security_center/static/9912.php) 3. [20020818 FUDforum file access and SQL Injection](http://online.securityfocus.com/archive/1/288042) 4. [5500](http://www.securityfocus.com/bid/5500)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0112, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0112 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0112 - **State**: PUBLISHED - **Published Date**: March 11, 2008 at 23:00 UTC - **Last Updated**: August 07, 2024 at 07:32 UTC - **Reserved Date**: January 07, 2008 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Unspecified vulnerability in Microsoft Excel 2000 SP3, and Office for Mac 2004 and 2008 allows user-assisted remote attackers to execute arbitrary code via a crafted .SLK file that is not properly handled when importing the file, aka "Excel File Import Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1019583](http://www.securitytracker.com/id?1019583) 2. [TA08-071A](http://www.us-cert.gov/cas/techalerts/TA08-071A.html) 3. [oval:org.mitre.oval:def:5284](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5284) 4. [MS08-014](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014) 5. [SSRT080028](http://marc.info/?l=bugtraq&m=120585858807305&w=2) 6. [HPSBST02320](http://marc.info/?l=bugtraq&m=120585858807305&w=2) 7. [28095](http://www.securityfocus.com/bid/28095) 8. [ADV-2008-0846](http://www.vupen.com/english/advisories/2008/0846/references)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-5072, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-5072 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-5072 - **State**: PUBLISHED - **Published Date**: April 21, 2011 at 10:00 UTC - **Last Updated**: September 16, 2024 at 16:17 UTC - **Reserved Date**: April 20, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Memory leak in the ldap_explode_dn function in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.61 (aka 6.0.0.8-TIV-ITDS-IF0003) allows remote authenticated users to cause a denial of service (memory consumption) via an empty string argument. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [IO11407](http://www.ibm.com/support/docview.wss?uid=swg1IO11407) 2. [](http://www.ibm.com/support/docview.wss?uid=swg24029672)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40368, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40368 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40368 - **State**: PUBLISHED - **Published Date**: April 12, 2022 at 09:07 UTC - **Last Updated**: April 21, 2025 at 13:54 UTC - **Reserved Date**: September 01, 2021 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in SIMATIC S7-400 CPU 412-1 DP V7 (All versions), SIMATIC S7-400 CPU 412-2 DP V7 (All versions), SIMATIC S7-400 CPU 412-2 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 414-2 DP V7 (All versions), SIMATIC S7-400 CPU 414-3 DP V7 (All versions), SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416-2 DP V7 (All versions), SIMATIC S7-400 CPU 416-3 DP V7 (All versions), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416F-2 DP V7 (All versions), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 417-4 DP V7 (All versions), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.10), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants) (All versions < V10.1), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) (All versions < V8.2.3), SIPLUS S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIPLUS S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIPLUS S7-400 CPU 416-3 V7 (All versions), SIPLUS S7-400 CPU 417-4 V7 (All versions). Affected devices improperly handle specially crafted packets sent to port 102/tcp. This could allow an attacker to create a Denial-of-Service condition. A restart is needed to restore normal operations. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **Siemens - SIMATIC S7-400 CPU 412-1 DP V7** Affected versions: - All versions (Status: affected) **Siemens - SIMATIC S7-400 CPU 412-2 DP V7** Affected versions: - All versions (Status: affected) **Siemens - SIMATIC S7-400 CPU 412-2 PN/DP V7** Affected versions: - All versions < V7.0.3 (Status: affected) **Siemens - SIMATIC S7-400 CPU 414-2 DP V7** Affected versions: - All versions (Status: affected) **Siemens - SIMATIC S7-400 CPU 414-3 DP V7** Affected versions: - All versions (Status: affected) **Siemens - SIMATIC S7-400 CPU 414-3 PN/DP V7** Affected versions: - All versions < V7.0.3 (Status: affected) **Siemens - SIMATIC S7-400 CPU 414F-3 PN/DP V7** Affected versions: - All versions < V7.0.3 (Status: affected) **Siemens - SIMATIC S7-400 CPU 416-2 DP V7** Affected versions: - All versions (Status: affected) **Siemens - SIMATIC S7-400 CPU 416-3 DP V7** Affected versions: - All versions (Status: affected) **Siemens - SIMATIC S7-400 CPU 416-3 PN/DP V7** Affected versions: - All versions < V7.0.3 (Status: affected) **Siemens - SIMATIC S7-400 CPU 416F-2 DP V7** Affected versions: - All versions (Status: affected) **Siemens - SIMATIC S7-400 CPU 416F-3 PN/DP V7** Affected versions: - All versions < V7.0.3 (Status: affected) **Siemens - SIMATIC S7-400 CPU 417-4 DP V7** Affected versions: - All versions (Status: affected) **Siemens - SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)** Affected versions: - All versions < V6.0.10 (Status: affected) **Siemens - SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)** Affected versions: - All versions < V10.1 (Status: affected) **Siemens - SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)** Affected versions: - All versions < V8.2.3 (Status: affected) **Siemens - SIPLUS S7-400 CPU 414-3 PN/DP V7** Affected versions: - All versions < V7.0.3 (Status: affected) **Siemens - SIPLUS S7-400 CPU 416-3 PN/DP V7** Affected versions: - All versions < V7.0.3 (Status: affected) **Siemens - SIPLUS S7-400 CPU 416-3 V7** Affected versions: - All versions (Status: affected) **Siemens - SIPLUS S7-400 CPU 417-4 V7** Affected versions: - All versions (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-557541.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000541, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000541 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000541 - **State**: REJECTED - **Published Date**: June 25, 2018 at 13:00 UTC - **Last Updated**: June 25, 2018 at 12:57 UTC - **Reserved Date**: June 23, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2930, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2930 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2930 - **State**: PUBLISHED - **Published Date**: June 09, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 18:06 UTC - **Reserved Date**: June 09, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Sun Grid Engine 5.3 and Sun N1 Grid Engine 6.0, when configured in Certificate Security Protocol (CSP) Mode, allows local users to shut down the grid service or gain access, even if access is denied. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [sge-csp-authentication-bypass(26997)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26997) 2. [102321](http://sunsolve.sun.com/search/document.do?assetkey=1-26-102321-1) 3. [1016247](http://securitytracker.com/id?1016247) 4. [20518](http://secunia.com/advisories/20518) 5. [ADV-2006-2215](http://www.vupen.com/english/advisories/2006/2215)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22954, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22954 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22954 - **State**: PUBLISHED - **Published Date**: February 09, 2022 at 22:05 UTC - **Last Updated**: August 03, 2024 at 18:58 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description A cross-site request forgery vulnerability exists in Concrete CMS <v9 that could allow an attacker to make requests on behalf of other users. ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **n/a - https://github.com/concrete5/concrete5** Affected versions: - fixed in Concrete CMS v 9.0 (Status: affected) ### References 1. [](https://documentation.concretecms.org/developers/introduction/version-history/90-release-notes)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45490, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45490 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45490 - **State**: PUBLISHED - **Published Date**: March 28, 2022 at 01:10 UTC - **Last Updated**: August 04, 2024 at 04:39 UTC - **Reserved Date**: December 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The client applications in 3CX on Windows, the 3CX app for iOS, and the 3CX application for Android through 2022-03-17 lack SSL certificate validation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.3cx.com/community/forums/posts-articles-news/) 2. [](https://packetstormsecurity.com/files/166376/3CX-Client-Missing-TLS-Validation.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-35268, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-35268 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-35268 - **State**: PUBLISHED - **Published Date**: September 07, 2021 at 00:00 UTC - **Last Updated**: August 04, 2024 at 00:33 UTC - **Reserved Date**: June 23, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS inode is loaded in the function ntfs_inode_real_open, a heap buffer overflow can occur allowing for code execution and escalation of privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://ntfs-3g.com) 2. [[oss-security] 20210830 NTFS3G-SA-2021-0001: Multiple buffer overflows in all versions of NTFS-3G](http://www.openwall.com/lists/oss-security/2021/08/30/1) 3. [](https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp) 4. [DSA-4971](https://www.debian.org/security/2021/dsa-4971) 5. [FEDORA-2021-e7c8ba6301](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/766ISTT3KCARKFUIQT7N6WV6T63XOKG3/) 6. [FEDORA-2021-5b1dac797b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSEKTKHO5HFZHWZNJNBJZA56472KRUZI/) 7. [[debian-lts-announce] 20211116 [SECURITY] [DLA 2819-1] ntfs-3g security update](https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html) 8. [GLSA-202301-01](https://security.gentoo.org/glsa/202301-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-40703, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-40703 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-40703 - **State**: PUBLISHED - **Published Date**: September 22, 2024 at 12:20 UTC - **Last Updated**: September 22, 2024 at 15:27 UTC - **Reserved Date**: July 08, 2024 at 19:31 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and IBM Cognos Analytics Reports for iOS 11.0.0.7 could allow a local attacker to obtain sensitive information in the form of an API key. An attacker could use this information to launch further attacks against affected applications. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-522: Security Weakness ### Affected Products **IBM - Cognos Analytics** Affected versions: - 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3 (Status: affected) **IBM - Cognos Analytics Reports** Affected versions: - 11.0.0.7 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7160700) 2. [](https://www.ibm.com/support/pages/node/7168038)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6124, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6124 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6124 - **State**: PUBLISHED - **Published Date**: December 09, 2015 at 11:00 UTC - **Last Updated**: August 06, 2024 at 07:15 UTC - **Reserved Date**: August 14, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS15-131](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-131) 2. [1034324](http://www.securitytracker.com/id/1034324)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2006 - **State**: PUBLISHED - **Published Date**: August 31, 2022 at 15:33 UTC - **Last Updated**: April 16, 2025 at 17:49 UTC - **Reserved Date**: June 06, 2022 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description AutomationDirect DirectLOGIC has a DLL vulnerability in the install directory that may allow an attacker to execute code during the installation process. This issue affects: AutomationDirect C-more EA9 EA9-T6CL versions prior to 6.73; EA9-T6CL-R versions prior to 6.73; EA9-T7CL versions prior to 6.73; EA9-T7CL-R versions prior to 6.73; EA9-T8CL versions prior to 6.73; EA9-T10CL versions prior to 6.73; EA9-T10WCL versions prior to 6.73; EA9-T12CL versions prior to 6.73; EA9-T15CL versions prior to 6.73; EA9-RHMI versions prior to 6.73; EA9-PGMSW versions prior to 6.73; ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-427: Security Weakness ### Affected Products **AutomationDirect - C-more EA9** Affected versions: - EA9-T6CL (Status: affected) - EA9-T6CL-R (Status: affected) - EA9-T7CL (Status: affected) - EA9-T7CL-R (Status: affected) - EA9-T8CL (Status: affected) - EA9-T10CL (Status: affected) - EA9-T10WCL (Status: affected) - EA9-T12CL (Status: affected) - EA9-T15CL (Status: affected) - EA9-RHMI (Status: affected) - EA9-PGMSW (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-167-01) ### Credits - Sam Hanson of Dragos reported this vulnerability to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-7166, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-7166 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-7166 - **State**: PUBLISHED - **Published Date**: December 29, 2023 at 08:31 UTC - **Last Updated**: August 02, 2024 at 08:50 UTC - **Reserved Date**: December 28, 2023 at 20:28 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic has been found in Novel-Plus up to 4.2.0. This affects an unknown part of the file /user/updateUserInfo of the component HTTP POST Request Handler. The manipulation of the argument nickName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is c62da9bb3a9b3603014d0edb436146512631100d. It is recommended to apply a patch to fix this issue. The identifier VDB-249201 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **n/a - Novel-Plus** Affected versions: - 4.0 (Status: affected) - 4.1 (Status: affected) - 4.2 (Status: affected) ### References 1. [](https://vuldb.com/?id.249201) 2. [](https://vuldb.com/?ctiid.249201) 3. [](https://github.com/JTZ-a/SRC/blob/master/novel-plus/storedXSS/en-us.md) 4. [](https://github.com/201206030/novel-plus/commit/c62da9bb3a9b3603014d0edb436146512631100d) ### Credits - JTZ- (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24543, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24543 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24543 - **State**: PUBLISHED - **Published Date**: January 24, 2025 at 17:24 UTC - **Last Updated**: January 24, 2025 at 19:00 UTC - **Reserved Date**: January 23, 2025 at 14:50 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in RSTheme Ultimate Coming Soon & Maintenance allows Cross Site Request Forgery. This issue affects Ultimate Coming Soon & Maintenance: from n/a through 1.0.9. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **RSTheme - Ultimate Coming Soon & Maintenance** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/ultimate-coming-soon/vulnerability/wordpress-ultimate-coming-soon-maintenance-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Marek Mikita (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30590, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30590 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30590 - **State**: PUBLISHED - **Published Date**: August 26, 2021 at 17:05 UTC - **Last Updated**: August 03, 2024 at 22:40 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Heap buffer overflow in Bookmarks in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://crbug.com/1227777) 2. [](https://chromereleases.googleblog.com/2021/08/the-stable-channel-has-been-updated-to.html) 3. [FEDORA-2021-78b9d84299](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LVY4WIWTVVYKQMROJJS365TZBKEARCF/) 4. [FEDORA-2021-6225d60814](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QW4R2K5HVJ4R6XDZYOJCCFPIN2XHNS3L/) 5. [FEDORA-2021-02b301441f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPJPUSAWIJMQFBQQQYXAICLI4EKFQOH6/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0958, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0958 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0958 - **State**: PUBLISHED - **Published Date**: April 03, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:35 UTC - **Reserved Date**: April 03, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Format string vulnerability in the log_do function in log.c for YepYep mtftpd 0.0.3, when the statistics option is enabled, allows remote attackers to execute arbitrary code via the CWD command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [12947](http://www.securityfocus.com/bid/12947) 2. [](http://www.tripbit.org/advisories/TA-040305.txt) 3. [](http://unl0ck.org/files/papers/mtftpd.txt) 4. [](http://www.securiteam.com/exploits/5KP0W0AF5K.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9284, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9284 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9284 - **State**: PUBLISHED - **Published Date**: November 11, 2016 at 22:00 UTC - **Last Updated**: August 06, 2024 at 02:42 UTC - **Reserved Date**: November 11, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description getUsersByJSON in framework/modules/users/controllers/usersController.php in Exponent CMS v2.4.0 allows remote attackers to read user information via users/getUsersByJSON/sort/ and a trailing string. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/exponentcms/exponent-cms/commit/e7b6856ac384bf2b8ea7761a1e46d6e4186d36f4) 2. [94296](http://www.securityfocus.com/bid/94296) 3. [1037281](http://www.securitytracker.com/id/1037281)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4119, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4119 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4119 - **State**: PUBLISHED - **Published Date**: June 15, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 06:04 UTC - **Reserved Date**: May 28, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site request forgery (CSRF) vulnerabilities in ISPConfig before 3.0.5.4p7 allow remote attackers to hijack the authentication of (1) administrators for requests that create an administrator account via a request to admin/users_edit.php or (2) arbitrary users for requests that conduct SQL injection attacks via the server parameter to monitor/show_sys_state.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20150610 Multiple Vulnerabilities in ISPConfig](http://www.securityfocus.com/archive/1/535734/100/0/threaded) 2. [](http://bugtracker.ispconfig.org/index.php?do=details&task_id=3898) 3. [75126](http://www.securityfocus.com/bid/75126) 4. [](http://packetstormsecurity.com/files/132238/ISPConfig-3.0.5.4p6-SQL-Injection-Cross-Site-Request-Forgery.html) 5. [37259](https://www.exploit-db.com/exploits/37259/) 6. [](https://www.htbridge.com/advisory/HTB23260)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14571, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14571 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14571 - **State**: PUBLISHED - **Published Date**: September 18, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 19:34 UTC - **Reserved Date**: September 18, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .xps file, related to an "Illegal Instruction Violation starting at Unknown Symbol @ 0x00000000049c024c called from STDUXPSFile!DllUnregisterServer+0x0000000000025706." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-14571)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-1474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-1474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-1474 - **State**: PUBLISHED - **Published Date**: April 21, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:58 UTC - **Reserved Date**: April 21, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SSH before 2.0 disables host key checking when connecting to the localhost, which allows remote attackers to silently redirect connections to the localhost by poisoning the client's DNS cache. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ssh-dns-authentication-bypass(6604)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6604) 2. [VU#786900](http://www.kb.cert.org/vuls/id/786900)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41772, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41772 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41772 - **State**: PUBLISHED - **Published Date**: October 10, 2023 at 17:07 UTC - **Last Updated**: April 14, 2025 at 22:45 UTC - **Reserved Date**: August 31, 2023 at 23:37 UTC - **Assigned By**: microsoft ### Vulnerability Description Win32k Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) ### References 1. [Win32k Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41772)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2965, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2965 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2965 - **State**: REJECTED - **Published Date**: October 11, 2005 at 04:00 UTC - **Last Updated**: November 04, 2005 at 10:00 UTC - **Reserved Date**: September 19, 2005 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4781, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4781 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4781 - **State**: PUBLISHED - **Published Date**: February 13, 2015 at 02:00 UTC - **Last Updated**: August 06, 2024 at 11:27 UTC - **Reserved Date**: July 09, 2014 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description The alert module in IBM InfoSphere BigInsights 2.1.2 and 3.x before 3.0.0.2 allows remote attackers to obtain sensitive Alert management-services API information via a network-tracing attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21693053) 2. [ibm-biginsights-cve20144781-tracing(95028)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95028)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11289, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11289 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11289 - **State**: PUBLISHED - **Published Date**: December 09, 2017 at 06:00 UTC - **Last Updated**: August 05, 2024 at 18:05 UTC - **Reserved Date**: July 13, 2017 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description An issue was discovered in Adobe Connect 9.6.2 and earlier versions. A reflected cross-site scripting vulnerability exists that can result in information disclosure. ### Affected Products **n/a - Adobe Connect 9.6.2 and earlier versions** Affected versions: - Adobe Connect 9.6.2 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/connect/apsb17-35.html) 2. [1039799](http://www.securitytracker.com/id/1039799) 3. [101838](http://www.securityfocus.com/bid/101838)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21210, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21210 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21210 - **State**: PUBLISHED - **Published Date**: October 15, 2024 at 19:52 UTC - **Last Updated**: October 31, 2024 at 13:05 UTC - **Reserved Date**: December 07, 2023 at 22:28 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4 and 23. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). ### CVSS Metrics - **CVSS Base Score**: 3.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Affected Products **Oracle Corporation - Oracle Java SE** Affected versions: - Oracle Java SE:8u421 (Status: affected) - Oracle Java SE:8u421-perf (Status: affected) - Oracle Java SE:11.0.24 (Status: affected) - Oracle Java SE:17.0.12 (Status: affected) - Oracle Java SE:21.0.4 (Status: affected) - Oracle Java SE:23 (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2024.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3677, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3677 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3677 - **State**: PUBLISHED - **Published Date**: November 18, 2005 at 23:00 UTC - **Last Updated**: August 07, 2024 at 23:17 UTC - **Reserved Date**: November 18, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in RealNetworks RealPlayer 10 and 10.5 allows remote attackers to execute arbitrary code via a crafted image in a RealPlayer Skin (RJS) file. NOTE: due to the lack of details, it is unclear how this is different than CVE-2005-2629 and CVE-2005-2630, but the vendor advisory implies that it is different. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [15398](http://www.securityfocus.com/bid/15398/) 2. [17514](http://secunia.com/advisories/17514) 3. [](http://service.real.com/help/faq/security/051110_player/EN/) 4. [20051111 High Risk Flaw in RealPlayer](http://marc.info/?l=bugtraq&m=113181464921104&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8589, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8589 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8589 - **State**: PUBLISHED - **Published Date**: November 14, 2018 at 01:00 UTC - **Last Updated**: February 07, 2025 at 16:38 UTC - **Reserved Date**: March 14, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.sys, aka "Windows Win32k Elevation of Privilege Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2. ### Affected Products **Microsoft - Windows Server 2008** Affected versions: - 32-bit Systems Service Pack 2 (Status: affected) - 32-bit Systems Service Pack 2 (Server Core installation) (Status: affected) - Itanium-Based Systems Service Pack 2 (Status: affected) - x64-based Systems Service Pack 2 (Status: affected) - x64-based Systems Service Pack 2 (Server Core installation) (Status: affected) **Microsoft - Windows 7** Affected versions: - 32-bit Systems Service Pack 1 (Status: affected) - x64-based Systems Service Pack 1 (Status: affected) **Microsoft - Windows Server 2008 R2** Affected versions: - Itanium-Based Systems Service Pack 1 (Status: affected) - x64-based Systems Service Pack 1 (Status: affected) - x64-based Systems Service Pack 1 (Server Core installation) (Status: affected) ### References 1. [105796](http://www.securityfocus.com/bid/105796) 2. [1042140](http://www.securitytracker.com/id/1042140) 3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8589)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5893, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5893 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5893 - **State**: PUBLISHED - **Published Date**: September 15, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 11:55 UTC - **Reserved Date**: August 30, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The froyo (aka com.shinsegae.mobile.froyo) application 5.1.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 2. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) 3. [VU#301689](http://www.kb.cert.org/vuls/id/301689)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41811, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41811 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41811 - **State**: PUBLISHED - **Published Date**: August 05, 2024 at 20:17 UTC - **Last Updated**: August 06, 2024 at 13:53 UTC - **Reserved Date**: July 22, 2024 at 13:57 UTC - **Assigned By**: GitHub_M ### Vulnerability Description ipl/web is a set of common web components for php projects. Some of the recent development by Icinga is, under certain circumstances, susceptible to cross site request forgery. (CSRF). All affected products, in any version, will be unaffected by this once `icinga-php-library` is upgraded. Version 0.10.1 includes a fix for this. It will be published as part of the `icinga-php-library` v0.14.1 release. ### CVSS Metrics - **CVSS Base Score**: 3.9/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Icinga - ipl-web** Affected versions: - < 0.10.1 (Status: affected) ### References 1. [https://github.com/Icinga/ipl-web/security/advisories/GHSA-w9pg-7c3h-fc8j](https://github.com/Icinga/ipl-web/security/advisories/GHSA-w9pg-7c3h-fc8j) 2. [https://github.com/Icinga/ipl-web/commit/492336fdb57a5bb0881ed642ab36f5841337571e](https://github.com/Icinga/ipl-web/commit/492336fdb57a5bb0881ed642ab36f5841337571e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20261, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20261 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20261 - **State**: PUBLISHED - **Published Date**: October 18, 2023 at 16:27 UTC - **Last Updated**: August 02, 2024 at 09:05 UTC - **Reserved Date**: October 27, 2022 at 18:47 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to retrieve arbitrary files from an affected system. This vulnerability is due to improper validation of parameters that are sent to the web UI. An attacker could exploit this vulnerability by logging in to Cisco Catalyst SD-WAN Manager and issuing crafted requests using the web UI. A successful exploit could allow the attacker to obtain arbitrary files from the underlying Linux file system of an affected system. To exploit this vulnerability, the attacker must be an authenticated user. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Affected Products **Cisco - Cisco SD-WAN vManage** Affected versions: - 17.2.6 (Status: affected) - 17.2.7 (Status: affected) - 17.2.8 (Status: affected) - 17.2.9 (Status: affected) - 17.2.10 (Status: affected) - 17.2.4 (Status: affected) - 17.2.5 (Status: affected) - 18.3.1.1 (Status: affected) - 18.3.3.1 (Status: affected) - 18.3.3 (Status: affected) - 18.3.4 (Status: affected) - 18.3.5 (Status: affected) - 18.3.7 (Status: affected) - 18.3.8 (Status: affected) - 18.3.6.1 (Status: affected) - 18.3.1 (Status: affected) - 18.3.0 (Status: affected) - 18.4.0.1 (Status: affected) - 18.4.3 (Status: affected) - 18.4.302 (Status: affected) - 18.4.303 (Status: affected) - 18.4.4 (Status: affected) - 18.4.5 (Status: affected) - 18.4.0 (Status: affected) - 18.4.1 (Status: affected) - 18.4.6 (Status: affected) - 19.2.0 (Status: affected) - 19.2.097 (Status: affected) - 19.2.099 (Status: affected) - 19.2.1 (Status: affected) - 19.2.2 (Status: affected) - 19.2.3 (Status: affected) - 19.2.31 (Status: affected) - 19.2.929 (Status: affected) - 19.2.4 (Status: affected) - 20.1.1.1 (Status: affected) - 20.1.12 (Status: affected) - 20.1.1 (Status: affected) - 20.1.2 (Status: affected) - 20.1.3 (Status: affected) - 19.3.0 (Status: affected) - 19.1.0 (Status: affected) - 18.2.0 (Status: affected) - 20.3.1 (Status: affected) - 20.3.2 (Status: affected) - 20.3.2.1 (Status: affected) - 20.3.3 (Status: affected) - 20.3.3.1 (Status: affected) - 20.3.4 (Status: affected) - 20.3.4.1 (Status: affected) - 20.3.4.2 (Status: affected) - 20.3.5 (Status: affected) - 20.3.6 (Status: affected) - 20.3.7 (Status: affected) - 20.3.7.1 (Status: affected) - 20.3.4.3 (Status: affected) - 20.3.5.1 (Status: affected) - 20.3.7.2 (Status: affected) - 20.3.8 (Status: affected) - 20.4.1 (Status: affected) - 20.4.1.1 (Status: affected) - 20.4.1.2 (Status: affected) - 20.4.2 (Status: affected) - 20.4.2.2 (Status: affected) - 20.4.2.1 (Status: affected) - 20.4.2.3 (Status: affected) - 20.5.1 (Status: affected) - 20.5.1.2 (Status: affected) - 20.5.1.1 (Status: affected) - 20.6.1 (Status: affected) - 20.6.1.1 (Status: affected) - 20.6.2.1 (Status: affected) - 20.6.2.2 (Status: affected) - 20.6.2 (Status: affected) - 20.6.3 (Status: affected) - 20.6.3.1 (Status: affected) - 20.6.4 (Status: affected) - 20.6.5 (Status: affected) - 20.6.5.1 (Status: affected) - 20.6.1.2 (Status: affected) - 20.6.3.2 (Status: affected) - 20.6.4.1 (Status: affected) - 20.6.5.2 (Status: affected) - 20.6.5.4 (Status: affected) - 20.6.3.3 (Status: affected) - 20.6.4.2 (Status: affected) - 20.6.3.0.45 (Status: affected) - 20.6.3.0.46 (Status: affected) - 20.6.3.0.47 (Status: affected) - 20.6.3.4 (Status: affected) - 20.6.4.0.21 (Status: affected) - 20.6.5.1.10 (Status: affected) - 20.6.5.1.11 (Status: affected) - 20.6.5.1.7 (Status: affected) - 20.6.5.1.9 (Status: affected) - 20.6.5.2.4 (Status: affected) - 20.6.5.5 (Status: affected) - 20.6.5.2.8 (Status: affected) - 20.6.5.1.13 (Status: affected) ### References 1. [cisco-sa-sdwan-lfi-OWLbKUGe](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25599, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25599 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25599 - **State**: PUBLISHED - **Published Date**: May 24, 2023 at 00:00 UTC - **Last Updated**: January 16, 2025 at 20:15 UTC - **Reserved Date**: February 08, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A vulnerability in the conferencing component of Mitel MiVoice Connect through 19.3 SP2, 22.24.1500.0 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation for the test_presenter.php page. A successful exploit could allow an attacker to execute arbitrary scripts. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.mitel.com/support/security-advisories) 2. [](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0003)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4327, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4327 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4327 - **State**: PUBLISHED - **Published Date**: February 03, 2014 at 02:00 UTC - **Last Updated**: August 07, 2024 at 00:01 UTC - **Reserved Date**: November 04, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.openssh.com/txt/portable-keysign-rand-helper.adv) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=755640)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12989, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12989 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12989 - **State**: PUBLISHED - **Published Date**: December 27, 2024 at 17:31 UTC - **Last Updated**: December 27, 2024 at 18:20 UTC - **Reserved Date**: December 27, 2024 at 08:38 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in WISI Tangram GT31 up to 20241214 and classified as problematic. Affected by this issue is some unknown functionality of the component HTTP Request Handler. The manipulation leads to server-side request forgery. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **WISI - Tangram GT31** Affected versions: - 20241214 (Status: affected) ### References 1. [VDB-289382 | WISI Tangram GT31 HTTP Request server-side request forgery](https://vuldb.com/?id.289382) 2. [VDB-289382 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.289382) 3. [Submit #463798 | Tangram wisi Control GT31 Server-Side Request Forgery](https://vuldb.com/?submit.463798) ### Credits - Havook (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1247, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1247 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1247 - **State**: PUBLISHED - **Published Date**: June 08, 2010 at 20:00 UTC - **Last Updated**: August 07, 2024 at 01:14 UTC - **Reserved Date**: April 05, 2010 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Unspecified vulnerability in Microsoft Office Excel 2002 SP3 allows remote attackers to execute arbitrary code via an Excel file with a malformed RTD (0x813) record that triggers heap corruption, aka "Excel Memory Corruption Vulnerability," a different vulnerability than CVE-2010-0823 and CVE-2010-1249. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [65237](http://osvdb.org/65237) 2. [MS10-038](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-038) 3. [oval:org.mitre.oval:def:6630](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6630) 4. [TA10-159B](http://www.us-cert.gov/cas/techalerts/TA10-159B.html) 5. [20100608 VUPEN Security Research - Microsoft Office Excel RTD Heap Corruption Vulnerability (CVE-2010-1247)](http://www.securityfocus.com/archive/1/511754/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0804, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0804 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0804 - **State**: PUBLISHED - **Published Date**: January 22, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:28 UTC - **Reserved Date**: September 25, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to bypass the directionality check via fragmented TCP connection requests or reopening closed TCP connection requests, aka "One-way Connection Enforcement Bypass." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4419](http://www.osvdb.org/4419) 2. [](http://www.checkpoint.com/techsupport/alerts/list_vun.html#One-way_Connection) 3. [fw1-remote-bypass(5468)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5468)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10861, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10861 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10861 - **State**: PUBLISHED - **Published Date**: December 01, 2017 at 14:00 UTC - **Last Updated**: August 05, 2024 at 17:50 UTC - **Reserved Date**: July 04, 2017 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Directory traversal vulnerability in QND Advance/Standard allows an attacker to read arbitrary files via a specially crafted command. ### Affected Products **QualitySoft Corporation - QND Advance/Standard** Affected versions: - all versions (Status: affected) ### References 1. [](https://jvn.jp/en/vu/JVNVU94198685/index.html) 2. [](http://www.qualitysoft.com/qnd_vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3118, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3118 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3118 - **State**: REJECTED - **Published Date**: July 04, 2013 at 10:00 UTC - **Last Updated**: September 17, 2024 at 04:25 UTC - **Reserved Date**: August 09, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3780, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3780 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3780 - **State**: PUBLISHED - **Published Date**: October 06, 2010 at 20:00 UTC - **Last Updated**: August 07, 2024 at 03:18 UTC - **Reserved Date**: October 06, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-1059-1](http://www.ubuntu.com/usn/USN-1059-1) 2. [MDVSA-2010:217](http://www.mandriva.com/security/advisories?name=MDVSA-2010:217) 3. [43220](http://secunia.com/advisories/43220) 4. [ADV-2011-0301](http://www.vupen.com/english/advisories/2011/0301) 5. [[dovecot] 20101002 v1.2.15 released](http://www.dovecot.org/list/dovecot/2010-October/053450.html) 6. [RHSA-2011:0600](http://www.redhat.com/support/errata/RHSA-2011-0600.html) 7. [ADV-2010-2840](http://www.vupen.com/english/advisories/2010/2840)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21822, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21822 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21822 - **State**: PUBLISHED - **Published Date**: March 17, 2022 at 20:30 UTC - **Last Updated**: August 03, 2024 at 02:53 UTC - **Reserved Date**: December 10, 2021 at 00:00 UTC - **Assigned By**: nvidia ### Vulnerability Description NVIDIA FLARE contains a vulnerability in the admin interface, where an un-authorized attacker can cause Allocation of Resources Without Limits or Throttling, which may lead to cause system unavailable. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-770: Security Weakness ### Affected Products **NVIDIA - NVIDIA FLARE** Affected versions: - All versions prior to 2.0.16 (Status: affected) ### References 1. [](https://github.com/NVIDIA/NVFlare/security/advisories/GHSA-jx8f-cpx7-fv47)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8502, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8502 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8502 - **State**: PUBLISHED - **Published Date**: March 20, 2025 at 10:09 UTC - **Last Updated**: March 20, 2025 at 18:36 UTC - **Reserved Date**: September 05, 2024 at 20:37 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description A vulnerability in the RpcAgentServerLauncher class of modelscope/agentscope v0.0.6a3 allows for remote code execution (RCE) via deserialization of untrusted data using the dill library. The issue occurs in the AgentServerServicer.create_agent method, where serialized input is deserialized using dill.loads, enabling an attacker to execute arbitrary commands on the server. ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **modelscope - modelscope/agentscope** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/7a42da2a-2ae5-442d-aff9-c9a3b47870eb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8073, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8073 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8073 - **State**: PUBLISHED - **Published Date**: March 21, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 06:46 UTC - **Reserved Date**: March 12, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Yii 2.x before 2.0.15 allows remote attackers to execute arbitrary LUA code via a variant of the CVE-2018-7269 attack in conjunction with the Redis extension. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.yiiframework.com/news/168/releasing-yii-2-0-15-and-database-extensions-with-security-fixes/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25063, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25063 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25063 - **State**: PUBLISHED - **Published Date**: August 08, 2023 at 11:38 UTC - **Last Updated**: September 25, 2024 at 16:45 UTC - **Reserved Date**: February 02, 2023 at 09:58 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Anadnet Quick Page/Post Redirect Plugin plugin <= 5.2.3 versions. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Anadnet - Quick Page/Post Redirect Plugin** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/quick-pagepost-redirect-plugin/wordpress-quick-page-post-redirect-plugin-plugin-5-2-3-cross-site-scripting-xss?_s_id=cve) ### Credits - Justiice (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41223, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41223 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41223 - **State**: PUBLISHED - **Published Date**: November 22, 2022 at 00:00 UTC - **Last Updated**: January 28, 2025 at 21:38 UTC - **Reserved Date**: September 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Director database component of MiVoice Connect through 19.3 (22.22.6100.0) could allow an authenticated attacker to conduct a code-injection attack via crafted data due to insufficient restrictions on the database data type. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.mitel.com/support/security-advisories) 2. [](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0008)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-47597, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-47597 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-47597 - **State**: PUBLISHED - **Published Date**: May 07, 2025 at 14:20 UTC - **Last Updated**: May 07, 2025 at 18:13 UTC - **Reserved Date**: May 07, 2025 at 10:44 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Maulik Vora WP Podcasts Manager allows Cross Site Request Forgery. This issue affects WP Podcasts Manager: from n/a through 1.2. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Maulik Vora - WP Podcasts Manager** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wp-podcasts-manager/vulnerability/wordpress-wp-podcasts-manager-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - ch4r0n (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4045, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4045 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4045 - **State**: PUBLISHED - **Published Date**: October 21, 2010 at 18:12 UTC - **Last Updated**: August 07, 2024 at 03:34 UTC - **Reserved Date**: October 21, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Opera before 10.63 does not properly restrict web script in unspecified circumstances involving reloads and redirects, which allows remote attackers to spoof the Address Bar, conduct cross-site scripting (XSS) attacks, and possibly execute arbitrary code by leveraging the ability of a script to interact with a web page from (1) a different domain or (2) a different security context. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.opera.com/support/kb/view/973/) 2. [1024570](http://securitytracker.com/id?1024570) 3. [](http://www.opera.com/docs/changelogs/mac/1063/) 4. [41740](http://secunia.com/advisories/41740) 5. [oval:org.mitre.oval:def:12071](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12071) 6. [](http://www.opera.com/docs/changelogs/unix/1063/) 7. [](http://www.opera.com/docs/changelogs/windows/1063/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4448, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4448 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4448 - **State**: PUBLISHED - **Published Date**: December 21, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:46 UTC - **Reserved Date**: December 21, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FlatNuke 2.5.6 verifies authentication credentials based on an MD5 checksum of the admin name and the hashed password rather than the plaintext password, which allows attackers to gain privileges by obtaining the password hash (possibly via CVE-2005-2813), then calculating the credentials and including them in the secid cookie. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [flatnuke-multiple-obtain-information(22159)](https://exchange.xforce.ibmcloud.com/vulnerabilities/22159) 2. [](http://cvs.sourceforge.net/viewcvs.py/flatnuke/flatnuke/Changelog?rev=1.78&view=markup) 3. [15796](http://www.securityfocus.com/bid/15796) 4. [20051210 Flatnuke 2.5.6 privilege escalation / remote commands execution exploit](http://www.securityfocus.com/archive/1/419107) 5. [1015339](http://securitytracker.com/id?1015339)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34880, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34880 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34880 - **State**: PUBLISHED - **Published Date**: January 13, 2022 at 21:43 UTC - **Last Updated**: August 04, 2024 at 00:26 UTC - **Reserved Date**: June 17, 2021 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. Crafted data in a 3DS file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14833. ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Bentley - View** Affected versions: - 10.15.0.75 (Status: affected) ### References 1. [](https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0004) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1469/) ### Credits - Mat Powell of Trend Micro Zero Day Initiative
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1125, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1125 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1125 - **State**: PUBLISHED - **Published Date**: March 01, 2011 at 22:00 UTC - **Last Updated**: August 06, 2024 at 22:14 UTC - **Reserved Date**: March 01, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Google Chrome before 9.0.597.107 does not properly perform layout, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:14368](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14368) 2. [google-chrome-layouts-dos(65743)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65743) 3. [46614](http://www.securityfocus.com/bid/46614) 4. [](http://code.google.com/p/chromium/issues/detail?id=73235) 5. [](http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1528, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1528 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1528 - **State**: PUBLISHED - **Published Date**: February 19, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:53 UTC - **Reserved Date**: February 18, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Event Calendar module 2.13 for PHP-Nuke allows remote attackers to gain sensitive information via an HTTP request to (1) config.php, (2) index.php, or (3) submit.php, which reveal the full path in an error message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [11693](http://www.securityfocus.com/bid/11693) 2. [event-calendar-path-disclosure(18105)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18105) 3. [20041116 [waraxe-2004-SA#038 - Multiple vulnerabilities in Event Calendar module for PhpNuke]](http://marc.info/?l=bugtraq&m=110064626111756&w=2) 4. [](http://www.waraxe.us/index.php?modname=sa&id=38) 5. [13213](http://secunia.com/advisories/13213)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38031, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38031 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38031 - **State**: PUBLISHED - **Published Date**: July 09, 2024 at 17:03 UTC - **Last Updated**: May 05, 2025 at 17:01 UTC - **Reserved Date**: June 11, 2024 at 18:18 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38031)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13361, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13361 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13361 - **State**: PUBLISHED - **Published Date**: January 22, 2025 at 07:29 UTC - **Last Updated**: February 12, 2025 at 17:19 UTC - **Reserved Date**: January 13, 2025 at 16:48 UTC - **Assigned By**: Wordfence ### Vulnerability Description The AI Power: Complete AI Pack plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpaicg_save_image_media function in all versions up to, and including, 1.8.96. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload image files and embed shortcode attributes in the image_alt value that will execute when sending a POST request to the attachment page. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **senols - AI Power: Complete AI Pack** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/11d49c89-43be-4e12-86b5-aa7a72a89803?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3224162/gpt3-ai-content-generator/trunk/classes/wpaicg_image.php) ### Credits - Michael Mazzolini
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21889, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21889 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21889 - **State**: PUBLISHED - **Published Date**: January 17, 2023 at 23:35 UTC - **Last Updated**: February 13, 2025 at 16:40 UTC - **Reserved Date**: December 17, 2022 at 19:26 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.42 and prior to 7.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N). ### CVSS Metrics - **CVSS Base Score**: 3.8/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N` ### Affected Products **Oracle Corporation - VM VirtualBox** Affected versions: - * (Status: affected) - * (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2023.html) 2. [](https://security.gentoo.org/glsa/202310-07)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2364, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2364 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2364 - **State**: PUBLISHED - **Published Date**: April 28, 2023 at 11:00 UTC - **Last Updated**: August 02, 2024 at 06:19 UTC - **Reserved Date**: April 28, 2023 at 10:53 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as problematic, was found in SourceCodester Resort Reservation System 1.0. Affected is an unknown function of the file registration.php. The manipulation of the argument fullname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227640. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **SourceCodester - Resort Reservation System** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.227640) 2. [](https://vuldb.com/?ctiid.227640) 3. [](https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Resort_Reservation_System-Stored-Cross-Site-Scripting-1.md) ### Credits - navaidansari (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21741, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21741 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21741 - **State**: PUBLISHED - **Published Date**: February 27, 2025 at 02:12 UTC - **Last Updated**: May 04, 2025 at 07:20 UTC - **Reserved Date**: December 29, 2024 at 08:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: usbnet: ipheth: fix DPE OoB read Fix an out-of-bounds DPE read, limit the number of processed DPEs to the amount that fits into the fixed-size NDP16 header. ### Affected Products **Linux - Linux** Affected versions: - a2d274c62e44b1995c170595db3865c6fe701226 (Status: affected) - a2d274c62e44b1995c170595db3865c6fe701226 (Status: affected) - a2d274c62e44b1995c170595db3865c6fe701226 (Status: affected) - a2d274c62e44b1995c170595db3865c6fe701226 (Status: affected) **Linux - Linux** Affected versions: - 6.5 (Status: affected) - 0 (Status: unaffected) - 6.6.78 (Status: unaffected) - 6.12.14 (Status: unaffected) - 6.13.3 (Status: unaffected) - 6.14 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/22475242ddb70e35c9148234be9a3aa9fb8efff9) 2. [](https://git.kernel.org/stable/c/5835bf66c50ac2b85ed28b282c2456c3516ef0a6) 3. [](https://git.kernel.org/stable/c/971b8c572559e52d32a2b82f2d9e0685439a0117) 4. [](https://git.kernel.org/stable/c/ee591f2b281721171896117f9946fced31441418)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3326, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3326 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3326 - **State**: PUBLISHED - **Published Date**: May 14, 2015 at 00:00 UTC - **Last Updated**: August 06, 2024 at 05:47 UTC - **Reserved Date**: April 16, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Trend Micro ScanMail for Microsoft Exchange (SMEX) 10.2 before Hot Fix Build 3318 and 11.0 before Hot Fix Build 4180 creates session IDs for the web console using a random number generator with predictable values, which makes it easier for remote attackers to bypass authentication via a brute force attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://esupport.trendmicro.com/solution/en-US/1109669.aspx) 2. [](http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html) 3. [74661](http://www.securityfocus.com/bid/74661) 4. [1032323](http://www.securitytracker.com/id/1032323)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0359, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0359 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0359 - **State**: PUBLISHED - **Published Date**: July 10, 2023 at 04:21 UTC - **Last Updated**: November 12, 2024 at 14:21 UTC - **Reserved Date**: January 18, 2023 at 02:13 UTC - **Assigned By**: zephyr ### Vulnerability Description A missing nullptr-check in handle_ra_input can cause a nullptr-deref. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **zephyrproject-rtos - Zephyr** Affected versions: - * (Status: affected) - * (Status: affected) ### References 1. [](https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c7fq-vqm6-v5pf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39040, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39040 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39040 - **State**: PUBLISHED - **Published Date**: September 18, 2023 at 00:00 UTC - **Last Updated**: September 25, 2024 at 19:26 UTC - **Reserved Date**: July 25, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An information leak in Cheese Cafe Line v13.6.1 allows attackers to obtain the channel access token and send crafted messages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://cheese.com) 2. [](https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39040.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-1583, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-1583 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-1583 - **State**: PUBLISHED - **Published Date**: October 15, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 09:42 UTC - **Reserved Date**: January 16, 2014 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openSUSE-SU-2014:1344](http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html) 2. [FEDORA-2014-13042](http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html) 3. [1031028](http://www.securitytracker.com/id/1031028) 4. [openSUSE-SU-2014:1345](http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html) 5. [](http://www.mozilla.org/security/announce/2014/mfsa2014-82.html) 6. [70424](http://www.securityfocus.com/bid/70424) 7. [](https://advisories.mageia.org/MGASA-2014-0421.html) 8. [GLSA-201504-01](https://security.gentoo.org/glsa/201504-01) 9. [RHSA-2014:1635](http://rhn.redhat.com/errata/RHSA-2014-1635.html) 10. [FEDORA-2014-14084](http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html) 11. [USN-2372-1](http://www.ubuntu.com/usn/USN-2372-1) 12. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html) 13. [62022](http://secunia.com/advisories/62022) 14. [1031030](http://www.securitytracker.com/id/1031030) 15. [62023](http://secunia.com/advisories/62023) 16. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1015540) 17. [DSA-3050](http://www.debian.org/security/2014/dsa-3050) 18. [61854](http://secunia.com/advisories/61854)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20730, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20730 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20730 - **State**: PUBLISHED - **Published Date**: May 03, 2022 at 03:16 UTC - **Last Updated**: November 06, 2024 at 16:18 UTC - **Reserved Date**: November 02, 2021 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Security Intelligence feed feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the Security Intelligence DNS feed. This vulnerability is due to incorrect feed update processing. An attacker could exploit this vulnerability by sending traffic through an affected device that should be blocked by the affected device. A successful exploit could allow the attacker to bypass device controls and successfully send traffic to devices that are expected to be protected by the affected device. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-241: Security Weakness ### Affected Products **Cisco - Cisco Firepower Threat Defense Software** Affected versions: - n/a (Status: affected) ### References 1. [20220427 Cisco Firepower Threat Defense Software Security Intelligence DNS Feed Bypass Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-sidns-bypass-3PzA5pO)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41288, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41288 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41288 - **State**: PUBLISHED - **Published Date**: January 05, 2024 at 16:19 UTC - **Last Updated**: April 17, 2025 at 18:12 UTC - **Reserved Date**: August 28, 2023 at 09:45 UTC - **Assigned By**: qnap ### Vulnerability Description An OS command injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following version: Video Station 5.7.2 ( 2023/11/23 ) and later ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **QNAP Systems Inc. - Video Station** Affected versions: - 5.7.x (Status: affected) ### References 1. [](https://www.qnap.com/en/security-advisory/qsa-23-55) ### Credits - Vladimir Meier and Thomas Dewaele (Bugscale SA)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2892, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2892 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2892 - **State**: PUBLISHED - **Published Date**: November 15, 2010 at 20:00 UTC - **Last Updated**: August 07, 2024 at 02:46 UTC - **Reserved Date**: July 27, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description gsb/drivers.php in LANDesk Management Gateway 4.0 through 4.0-1.48 and 4.2 through 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request forgery (CSRF) attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20101110 CORE-2010-1018 - Landesk OS command injection](http://www.securityfocus.com/archive/1/514728/100/0/threaded) 2. [1024728](http://securitytracker.com/id?1024728) 3. [ADV-2010-2957](http://www.vupen.com/english/advisories/2010/2957) 4. [42188](http://secunia.com/advisories/42188) 5. [](http://community.landesk.com/support/docs/DOC-21767) 6. [](http://www.coresecurity.com/content/landesk-os-command-injection-vulnerability) 7. [44781](http://www.securityfocus.com/bid/44781) 8. [15488](http://www.exploit-db.com/exploits/15488)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-31470, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-31470 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-31470 - **State**: PUBLISHED - **Published Date**: April 28, 2023 at 00:00 UTC - **Last Updated**: January 31, 2025 at 15:58 UTC - **Reserved Date**: April 28, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SmartDNS through 41 before 56d0332 allows an out-of-bounds write because of a stack-based buffer overflow in the _dns_encode_domain function in the dns.c file, via a crafted DNS request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/pymumu/smartdns/issues/1378) 2. [](https://github.com/pymumu/smartdns/commit/56d0332bf91104cfc877635f6c82e9348587df04)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12920, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12920 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12920 - **State**: PUBLISHED - **Published Date**: June 20, 2019 at 18:57 UTC - **Last Updated**: August 04, 2024 at 23:32 UTC - **Reserved Date**: June 20, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description On Shenzhen Cylan Clever Dog Smart Camera DOG-2W and DOG-2W-V4 devices, an attacker on the network can login remotely to the camera and gain root access. The device ships with a hardcoded 12345678 password for the root account, accessible from a TELNET login prompt. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.exploit-db.com/exploits/46993)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28300, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28300 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28300 - **State**: PUBLISHED - **Published Date**: March 29, 2023 at 00:00 UTC - **Last Updated**: February 18, 2025 at 16:59 UTC - **Reserved Date**: March 31, 2022 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation 10.16.02.034 CONNECT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 images. Crafted data in a JP2 file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16202. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Bentley - MicroStation** Affected versions: - 10.16.02.034 (Status: affected) ### References 1. [](https://www.zerodayinitiative.com/advisories/ZDI-22-592/) 2. [](https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0007) ### Credits - Anonymous
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34388, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34388 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34388 - **State**: PUBLISHED - **Published Date**: November 30, 2023 at 16:54 UTC - **Last Updated**: June 03, 2025 at 13:46 UTC - **Reserved Date**: June 02, 2023 at 17:18 UTC - **Assigned By**: SEL ### Vulnerability Description An Improper Authentication vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote unauthenticated attacker to potentially perform session hijacking attack and bypass authentication. See product Instruction Manual Appendix A dated 20230830 for more details. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **Schweitzer Engineering Laboratories - SEL-451** Affected versions: - R315-V0 (Status: affected) - R316-V0 (Status: affected) - R317-V0 (Status: affected) - R318-V0 (Status: affected) - R320-V0 (Status: affected) - R321-V0 (Status: affected) - R322-V0 (Status: affected) - R323-V0 (Status: affected) - R324-V0 (Status: affected) - R325-V0 (Status: affected) - R326-V0 (Status: affected) - R327-V0 (Status: affected) ### References 1. [](https://selinc.com/support/security-notifications/external-reports/) 2. [](https://www.nozominetworks.com/blog/) ### Credits - Andrea Palanca and Gabriele Quagliarella of Nozomi Networks
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-47157, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-47157 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-47157 - **State**: PUBLISHED - **Published Date**: March 18, 2024 at 00:00 UTC - **Last Updated**: November 25, 2024 at 20:58 UTC - **Reserved Date**: March 18, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Kossy module before 0.60 for Perl allows JSON hijacking because of X-Requested-With mishandling. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/kazeburo/Kossy/pull/16) 2. [](https://metacpan.org/dist/Kossy/changes)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3373, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3373 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3373 - **State**: PUBLISHED - **Published Date**: September 14, 2016 at 10:00 UTC - **Last Updated**: August 05, 2024 at 23:56 UTC - **Reserved Date**: March 15, 2016 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 does not properly implement registry access control, which allows local users to obtain sensitive account information via a crafted application, aka "Windows Kernel Elevation of Privilege Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS16-111](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-111) 2. [1036802](http://www.securitytracker.com/id/1036802) 3. [92845](http://www.securityfocus.com/bid/92845) 4. [40430](https://www.exploit-db.com/exploits/40430/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6213, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6213 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6213 - **State**: PUBLISHED - **Published Date**: August 02, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 15:25 UTC - **Reserved Date**: February 23, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description paypal/invoice-sdk-php is vulnerable to reflected XSS in samples/permissions.php via the permToken parameter, resulting in code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/paypal/invoice-sdk-php/issues/13)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30401, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30401 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30401 - **State**: PUBLISHED - **Published Date**: April 12, 2024 at 15:26 UTC - **Last Updated**: August 02, 2024 at 01:32 UTC - **Reserved Date**: March 26, 2024 at 23:06 UTC - **Assigned By**: juniper ### Vulnerability Description An Out-of-bounds Read vulnerability in the advanced forwarding management process aftman of Juniper Networks Junos OS on MX Series with MPC10E, MPC11, MX10K-LC9600 line cards, MX304, and EX9200-15C, may allow an attacker to exploit a stack-based buffer overflow, leading to a reboot of the FPC. Through code review, it was determined that the interface definition code for aftman could read beyond a buffer boundary, leading to a stack-based buffer overflow. This issue affects Junos OS on MX Series and EX9200-15C: * from 21.2 before 21.2R3-S1, * from 21.4 before 21.4R3, * from 22.1 before 22.1R2, * from 22.2 before 22.2R2;  This issue does not affect: * versions of Junos OS prior to 20.3R1; * any version of Junos OS 20.4. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 21.2 (Status: affected) - 21.4 (Status: affected) - 22.1 (Status: affected) - 22.2 (Status: affected) - 0 (Status: unaffected) - 20.4 (Status: unaffected) ### References 1. [](https://supportportal.juniper.net/JSA79110) 2. [](https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0270, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0270 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0270 - **State**: PUBLISHED - **Published Date**: January 26, 2009 at 19:00 UTC - **Last Updated**: August 07, 2024 at 04:24 UTC - **Reserved Date**: January 26, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in PXEService.exe in Fujitsu SystemcastWizard Lite 2.0A, 2.0, 1.9, and earlier allows remote attackers to execute arbitrary code via a large PXE protocol request in a UDP packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [51486](http://osvdb.org/51486) 2. [20090119 [Wintercore Research ] Fujitsu SystemcastWizard Lite PXEService Remote Buffer Overflow.](http://www.securityfocus.com/archive/1/500172/100/0/threaded) 3. [ADV-2009-0176](http://www.vupen.com/english/advisories/2009/0176) 4. [](http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2008-2.html) 5. [](http://www.wintercore.com/advisories/advisory_W010109.html) 6. [33342](http://www.securityfocus.com/bid/33342) 7. [33594](http://secunia.com/advisories/33594)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13699, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13699 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13699 - **State**: PUBLISHED - **Published Date**: July 09, 2018 at 06:00 UTC - **Last Updated**: August 05, 2024 at 09:14 UTC - **Reserved Date**: July 08, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The mintToken function of a smart contract implementation for DestiNeed (DSN), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md) 2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/DestiNeedToken)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5310, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5310 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5310 - **State**: PUBLISHED - **Published Date**: December 02, 2008 at 11:00 UTC - **Last Updated**: August 07, 2024 at 10:49 UTC - **Reserved Date**: December 01, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in image.php in NetArt Media Car Portal 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [7198](https://www.exploit-db.com/exploits/7198) 2. [32426](http://www.securityfocus.com/bid/32426) 3. [ADV-2008-3241](http://www.vupen.com/english/advisories/2008/3241) 4. [32844](http://secunia.com/advisories/32844) 5. [carportal-image-sql-injection(46786)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46786) 6. [4677](http://securityreason.com/securityalert/4677)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16161, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16161 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16161 - **State**: PUBLISHED - **Published Date**: November 15, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 10:17 UTC - **Reserved Date**: August 30, 2018 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description OpenDolphin 2.7.0 and earlier allows authenticated users to gain administrative privileges and perform unintended operations. ### Affected Products **Life Sciences Computing Corporation - OpenDolphin** Affected versions: - 2.7.0 and earlier (Status: affected) ### References 1. [JVN#59394343](http://jvn.jp/en/jp/JVN59394343/index.html) 2. [](http://www.opendolphin.com/security20181023.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-0594, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-0594 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-0594 - **State**: PUBLISHED - **Published Date**: July 14, 2021 at 13:44 UTC - **Last Updated**: August 03, 2024 at 15:47 UTC - **Reserved Date**: November 06, 2020 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In onCreate of ConfirmConnectActivity, there is a possible remote bypass of user consent due to improper input validation. This could lead to remote (proximal, NFC) escalation of privilege allowing an attacker to deceive a user into allowing a Bluetooth connection with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-176445224 ### Affected Products **n/a - Android** Affected versions: - Android-11 Android-8.1 Android-9 Android-10 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2021-07-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40692, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40692 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40692 - **State**: PUBLISHED - **Published Date**: January 21, 2022 at 18:17 UTC - **Last Updated**: August 04, 2024 at 02:51 UTC - **Reserved Date**: September 08, 2021 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Insufficient capability checks made it possible for teachers to download users outside of their courses. ### Affected Products **n/a - moodle** Affected versions: - 3.11 to 3.11.2, 3.10 to 3.10.6, 3.9 to 3.9.9 and earlier unsupported versions (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2043414)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48901, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48901 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48901 - **State**: PUBLISHED - **Published Date**: August 22, 2024 at 01:30 UTC - **Last Updated**: May 04, 2025 at 08:25 UTC - **Reserved Date**: August 21, 2024 at 06:06 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: btrfs: do not start relocation until in progress drops are done We hit a bug with a recovering relocation on mount for one of our file systems in production. I reproduced this locally by injecting errors into snapshot delete with balance running at the same time. This presented as an error while looking up an extent item WARNING: CPU: 5 PID: 1501 at fs/btrfs/extent-tree.c:866 lookup_inline_extent_backref+0x647/0x680 CPU: 5 PID: 1501 Comm: btrfs-balance Not tainted 5.16.0-rc8+ #8 RIP: 0010:lookup_inline_extent_backref+0x647/0x680 RSP: 0018:ffffae0a023ab960 EFLAGS: 00010202 RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000000000 RBP: ffff943fd2a39b60 R08: 0000000000000000 R09: 0000000000000001 R10: 0001434088152de0 R11: 0000000000000000 R12: 0000000001d05000 R13: ffff943fd2a39b60 R14: ffff943fdb96f2a0 R15: ffff9442fc923000 FS: 0000000000000000(0000) GS:ffff944e9eb40000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f1157b1fca8 CR3: 000000010f092000 CR4: 0000000000350ee0 Call Trace: <TASK> insert_inline_extent_backref+0x46/0xd0 __btrfs_inc_extent_ref.isra.0+0x5f/0x200 ? btrfs_merge_delayed_refs+0x164/0x190 __btrfs_run_delayed_refs+0x561/0xfa0 ? btrfs_search_slot+0x7b4/0xb30 ? btrfs_update_root+0x1a9/0x2c0 btrfs_run_delayed_refs+0x73/0x1f0 ? btrfs_update_root+0x1a9/0x2c0 btrfs_commit_transaction+0x50/0xa50 ? btrfs_update_reloc_root+0x122/0x220 prepare_to_merge+0x29f/0x320 relocate_block_group+0x2b8/0x550 btrfs_relocate_block_group+0x1a6/0x350 btrfs_relocate_chunk+0x27/0xe0 btrfs_balance+0x777/0xe60 balance_kthread+0x35/0x50 ? btrfs_balance+0xe60/0xe60 kthread+0x16b/0x190 ? set_kthread_struct+0x40/0x40 ret_from_fork+0x22/0x30 </TASK> Normally snapshot deletion and relocation are excluded from running at the same time by the fs_info->cleaner_mutex. However if we had a pending balance waiting to get the ->cleaner_mutex, and a snapshot deletion was running, and then the box crashed, we would come up in a state where we have a half deleted snapshot. Again, in the normal case the snapshot deletion needs to complete before relocation can start, but in this case relocation could very well start before the snapshot deletion completes, as we simply add the root to the dead roots list and wait for the next time the cleaner runs to clean up the snapshot. Fix this by setting a bit on the fs_info if we have any DEAD_ROOT's that had a pending drop_progress key. If they do then we know we were in the middle of the drop operation and set a flag on the fs_info. Then balance can wait until this flag is cleared to start up again. If there are DEAD_ROOT's that don't have a drop_progress set then we're safe to start balance right away as we'll be properly protected by the cleaner_mutex. ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 5.15.27 (Status: unaffected) - 5.16.13 (Status: unaffected) - 5.17 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/6599d5e8bd758d897fd2ef4dc388ae50278b1f7e) 2. [](https://git.kernel.org/stable/c/5e70bc827b563caf22e1203428cc3719643de5aa) 3. [](https://git.kernel.org/stable/c/b4be6aefa73c9a6899ef3ba9c5faaa8a66e333ef)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3885, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3885 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3885 - **State**: PUBLISHED - **Published Date**: May 22, 2025 at 00:49 UTC - **Last Updated**: May 22, 2025 at 18:33 UTC - **Reserved Date**: April 22, 2025 at 21:43 UTC - **Assigned By**: zdi ### Vulnerability Description Harman Becker MGU21 Bluetooth Improper Input Validation Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Harman Becker MGU21 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Bluetooth stack of the BCM89359 chipset. The issue results from the lack of proper validation of Bluetooth frames. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-23942. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Harman Becker - MGU21** Affected versions: - MGU21_22-07 firmware with BCM89359 wireless chipset; LMP Version: 5.0 (0x9); LMP Subversion: 0x420d (Status: affected) ### References 1. [ZDI-25-251](https://www.zerodayinitiative.com/advisories/ZDI-25-251/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14064, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14064 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14064 - **State**: PUBLISHED - **Published Date**: July 15, 2020 at 19:11 UTC - **Last Updated**: August 04, 2024 at 12:32 UTC - **Reserved Date**: June 14, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IceWarp Email Server 12.3.0.1 has Incorrect Access Control for user accounts. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.icewarp.com/download-premise/server/) 2. [](https://github.com/networksecure/Icewarp_incorrect_access_control)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0851, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0851 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0851 - **State**: PUBLISHED - **Published Date**: November 06, 2003 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:05 UTC - **Reserved Date**: October 10, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recursion) via malformed ASN.1 sequences. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:5528](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5528) 2. [FEDORA-2005-1042](http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html) 3. [20040304-01-U](ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc) 4. [17381](http://secunia.com/advisories/17381) 5. [NetBSD-SA2004-003](ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-003.txt.asc) 6. [20030930 SSL Implementation Vulnerabilities](http://www.cisco.com/warp/public/707/cisco-sa-20030930-ssl.shtml) 7. [8970](http://www.securityfocus.com/bid/8970) 8. [20031104 [OpenSSL Advisory] Denial of Service in ASN.1 parsing](http://marc.info/?l=bugtraq&m=106796246511667&w=2) 9. [RHSA-2004:119](http://rhn.redhat.com/errata/RHSA-2004-119.html) 10. [](http://www.openssl.org/news/secadv_20031104.txt) 11. [VU#412478](http://www.kb.cert.org/vuls/id/412478) 12. [20040508 [FLSA-2004:1395] Updated OpenSSL resolves security vulnerability](http://marc.info/?l=bugtraq&m=108403850228012&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3540, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3540 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3540 - **State**: PUBLISHED - **Published Date**: July 03, 2007 at 20:00 UTC - **Last Updated**: August 07, 2024 at 14:21 UTC - **Reserved Date**: July 03, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in search.asp in rwAuction Pro 5.0 allow remote attackers to inject arbitrary web script or HTML via the (1) search, (2) show, (3) searchtype, (4) catid, and (5) searchtxt parameters, a different version and vectors than CVE-2005-4060. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [24668](http://www.securityfocus.com/bid/24668) 2. [25849](http://secunia.com/advisories/25849) 3. [](http://pridels-team.blogspot.com/2007/06/rwauction-pro-xss-vuln.html) 4. [36347](http://osvdb.org/36347) 5. [ADV-2007-2368](http://www.vupen.com/english/advisories/2007/2368)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6420 - **State**: PUBLISHED - **Published Date**: December 10, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 20:26 UTC - **Reserved Date**: December 09, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in jce.php in the JCE Admin Component in Ryan Demmer Joomla Content Editor (JCE) 1.1.0 beta 2 and earlier for Joomla! (com_jce) allow remote attackers to inject arbitrary web script or HTML via the (1) img, (2) title, (3) w, or (4) h parameter, different vectors than CVE-2006-6166. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [jceadmin-jce-xss(30799)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30799) 2. [ADV-2006-4903](http://www.vupen.com/english/advisories/2006/4903) 3. [23160](http://secunia.com/advisories/23160) 4. [21496](http://www.securityfocus.com/bid/21496)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-26444, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-26444 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-26444 - **State**: PUBLISHED - **Published Date**: November 10, 2021 at 00:46 UTC - **Last Updated**: August 03, 2024 at 20:26 UTC - **Reserved Date**: January 29, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Azure RTOS Information Disclosure Vulnerability ### CVSS Metrics - **CVSS Base Score**: 3.3/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Azure Real Time Operating System** Affected versions: - 6.0.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26444)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49613, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49613 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49613 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 02:23 UTC - **Last Updated**: May 04, 2025 at 08:41 UTC - **Reserved Date**: February 26, 2025 at 02:21 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: serial: 8250: Fix PM usage_count for console handover When console is enabled, univ8250_console_setup() calls serial8250_console_setup() before .dev is set to uart_port. Therefore, it will not call pm_runtime_get_sync(). Later, when the actual driver is going to take over univ8250_console_exit() is called. As .dev is already set, serial8250_console_exit() makes pm_runtime_put_sync() call with usage count being zero triggering PM usage count warning (extra debug for univ8250_console_setup(), univ8250_console_exit(), and serial8250_register_ports()): [ 0.068987] univ8250_console_setup ttyS0 nodev [ 0.499670] printk: console [ttyS0] enabled [ 0.717955] printk: console [ttyS0] printing thread started [ 1.960163] serial8250_register_ports assigned dev for ttyS0 [ 1.976830] printk: console [ttyS0] disabled [ 1.976888] printk: console [ttyS0] printing thread stopped [ 1.977073] univ8250_console_exit ttyS0 usage:0 [ 1.977075] serial8250 serial8250: Runtime PM usage count underflow! [ 1.977429] dw-apb-uart.6: ttyS0 at MMIO 0x4010006000 (irq = 33, base_baud = 115200) is a 16550A [ 1.977812] univ8250_console_setup ttyS0 usage:2 [ 1.978167] printk: console [ttyS0] printing thread started [ 1.978203] printk: console [ttyS0] enabled To fix the issue, call pm_runtime_get_sync() in serial8250_register_ports() as soon as .dev is set for an uart_port if it has console enabled. This problem became apparent only recently because 82586a721595 ("PM: runtime: Avoid device usage count underflows") added the warning printout. I confirmed this problem also occurs with v5.18 (w/o the warning printout, obviously). ### Affected Products **Linux - Linux** Affected versions: - bedb404e91bb2908d9921fc736a518a9d89525fc (Status: affected) - bedb404e91bb2908d9921fc736a518a9d89525fc (Status: affected) - bedb404e91bb2908d9921fc736a518a9d89525fc (Status: affected) - bedb404e91bb2908d9921fc736a518a9d89525fc (Status: affected) **Linux - Linux** Affected versions: - 5.7 (Status: affected) - 0 (Status: unaffected) - 5.10.132 (Status: unaffected) - 5.15.56 (Status: unaffected) - 5.18.13 (Status: unaffected) - 5.19 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/d9cb6fabc90102f9e61fe35bd0160db88f4f53b4) 2. [](https://git.kernel.org/stable/c/190ce5cdc55d1b66ea582ac2be6fd5a72e3cc486) 3. [](https://git.kernel.org/stable/c/5df66302f03f87ae8953785a882d78e911f00c55) 4. [](https://git.kernel.org/stable/c/f9b11229b79c0fb2100b5bb4628a101b1d37fbf6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2797 - **State**: PUBLISHED - **Published Date**: April 04, 2025 at 07:00 UTC - **Last Updated**: June 09, 2025 at 19:27 UTC - **Reserved Date**: March 25, 2025 at 17:47 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Woffice Core plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.4.21. This is due to missing or incorrect nonce validation on the 'woffice_handle_user_approval_actions' function. This makes it possible for unauthenticated attackers to approve registration for any user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **WofficeIO - Woffice Core** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1665f2d0-899b-4f9b-91b1-e5799c3b4d3d?source=cve) 2. [](https://hub.woffice.io/woffice/changelog#april-1st-2025-version-5422) ### Credits - Friderika Baranyai
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41980, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41980 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41980 - **State**: REJECTED - **Last Updated**: January 04, 2023 at 00:00 UTC - **Reserved Date**: October 04, 2021 at 00:00 UTC - **Assigned By**: NCSC.ch ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32497, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32497 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32497 - **State**: PUBLISHED - **Published Date**: April 09, 2025 at 16:09 UTC - **Last Updated**: April 09, 2025 at 17:59 UTC - **Reserved Date**: April 09, 2025 at 11:19 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in squiter Spoiler Block allows Stored XSS. This issue affects Spoiler Block: from n/a through 1.7. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **squiter - Spoiler Block** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/spoiler-block/vulnerability/wordpress-spoiler-block-plugin-1-7-csrf-to-stored-xss-vulnerability?_s_id=cve) ### Credits - johska (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34323, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34323 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34323 - **State**: PUBLISHED - **Published Date**: January 01, 2023 at 00:00 UTC - **Last Updated**: April 11, 2025 at 14:07 UTC - **Reserved Date**: June 22, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple XSS issues were discovered in Sage XRT Business Exchange 12.4.302 that allow an attacker to execute JavaScript code in the context of other users' browsers. The attacker needs to be authenticated to reach the vulnerable features. An issue is present in the Filters and Display model features (OnlineBanking > Web Monitoring > Settings > Filters / Display models). The name of a filter or a display model is interpreted as HTML and can thus embed JavaScript code, which is executed when displayed. This is a stored XSS. Another issue is present in the Notification feature (OnlineBanking > Configuration > Notifications and alerts > Alerts *). The name of an alert is interpreted as HTML, and can thus embed JavaScript code, which is executed when displayed. This is a stored XSS. (Also, an issue is present in the File download feature, accessible via /OnlineBanking/cgi/isapi.dll/DOWNLOADFRS. When requesting to show the list of downloadable files, the contents of three form fields are embedded in the JavaScript code without prior sanitization. This is essentially a self-XSS.) ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.synacktiv.com/sites/default/files/2022-12/sage_xrt_multiple_xss.pdf)