System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10225, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10225 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10225 - **State**: PUBLISHED - **Published Date**: March 19, 2021 at 20:01 UTC - **Last Updated**: August 04, 2024 at 22:17 UTC - **Reserved Date**: March 27, 2019 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in atomic-openshift of openshift-4.2 where the basic-user RABC role in OpenShift Container Platform doesn't sufficiently protect the GlusterFS StorageClass against leaking of the restuserkey. An attacker with basic-user permissions is able to obtain the value of restuserkey, and use it to authenticate to the GlusterFS REST service, gaining access to read, and modify files. ### Weakness Classification (CWE) - CWE-522: Security Weakness ### Affected Products **n/a - atomic-openshift** Affected versions: - atomic-openshift of openshift-4.2 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1743073)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48239, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48239 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48239 - **State**: PUBLISHED - **Published Date**: May 09, 2023 at 01:20 UTC - **Last Updated**: January 29, 2025 at 16:56 UTC - **Reserved Date**: January 09, 2023 at 11:51 UTC - **Assigned By**: Unisoc ### Vulnerability Description In camera driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000** Affected versions: - Android10/Android11/Android12/Android13 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24449 - **State**: PUBLISHED - **Published Date**: January 24, 2023 at 00:00 UTC - **Last Updated**: April 02, 2025 at 13:48 UTC - **Reserved Date**: January 23, 2023 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins PWauth Security Realm Plugin 0.4 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. ### Affected Products **Jenkins Project - Jenkins PWauth Security Realm Plugin** Affected versions: - unspecified (Status: affected) - next of 0.4 (Status: unknown) ### References 1. [](https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2985)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0397, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0397 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0397 - **State**: PUBLISHED - **Published Date**: March 16, 2010 at 19:00 UTC - **Last Updated**: August 07, 2024 at 00:45 UTC - **Reserved Date**: January 27, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The xmlrpc extension in PHP 5.3.1 does not properly handle a missing methodName element in the first argument to the xmlrpc_decode_request function, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly have unspecified other impact via a crafted argument. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=573573) 2. [](http://support.apple.com/kb/HT4435) 3. [[oss-security] 20100312 CVE-2010-0397: NULL pointer dereference in PHP's xmlrpc extension](http://www.openwall.com/lists/oss-security/2010/03/12/5) 4. [APPLE-SA-2010-11-10-1](http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html) 5. [SUSE-SR:2010:013](http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html) 6. [38708](http://www.securityfocus.com/bid/38708) 7. [RHSA-2010:0919](http://www.redhat.com/support/errata/RHSA-2010-0919.html) 8. [APPLE-SA-2010-08-24-1](http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html) 9. [](http://support.apple.com/kb/HT4312) 10. [SUSE-SR:2010:012](http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html) 11. [42410](http://secunia.com/advisories/42410) 12. [SUSE-SR:2010:017](http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html) 13. [ADV-2010-0724](http://www.vupen.com/english/advisories/2010/0724) 14. [MDVSA-2010:068](http://www.mandriva.com/security/advisories?name=MDVSA-2010:068) 15. [ADV-2010-3081](http://www.vupen.com/english/advisories/2010/3081)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13859, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13859 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13859 - **State**: PUBLISHED - **Published Date**: May 02, 2025 at 06:41 UTC - **Last Updated**: May 09, 2025 at 17:54 UTC - **Reserved Date**: February 10, 2025 at 23:51 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Buddyboss Platform plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘bp_nouveau_ajax_media_save’ function in all versions up to, and including, 2.8.50 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 2.8.41. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Boss Media - Buddyboss Platform** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/d77c8096-40b1-4ac7-881f-6aed98da6752?source=cve) 2. [](https://www.buddyboss.com/platform/) 3. [](https://www.buddyboss.com/resources/buddyboss-platform-releases/2-8-51/) ### Credits - Kaique Peres
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27405, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27405 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27405 - **State**: PUBLISHED - **Published Date**: May 17, 2024 at 11:40 UTC - **Last Updated**: May 04, 2025 at 09:04 UTC - **Reserved Date**: February 25, 2024 at 13:47 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: usb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs It is observed sometimes when tethering is used over NCM with Windows 11 as host, at some instances, the gadget_giveback has one byte appended at the end of a proper NTB. When the NTB is parsed, unwrap call looks for any leftover bytes in SKB provided by u_ether and if there are any pending bytes, it treats them as a separate NTB and parses it. But in case the second NTB (as per unwrap call) is faulty/corrupt, all the datagrams that were parsed properly in the first NTB and saved in rx_list are dropped. Adding a few custom traces showed the following: [002] d..1 7828.532866: dwc3_gadget_giveback: ep1out: req 000000003868811a length 1025/16384 zsI ==> 0 [002] d..1 7828.532867: ncm_unwrap_ntb: K: ncm_unwrap_ntb toprocess: 1025 [002] d..1 7828.532867: ncm_unwrap_ntb: K: ncm_unwrap_ntb nth: 1751999342 [002] d..1 7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb seq: 0xce67 [002] d..1 7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb blk_len: 0x400 [002] d..1 7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb ndp_len: 0x10 [002] d..1 7828.532869: ncm_unwrap_ntb: K: Parsed NTB with 1 frames In this case, the giveback is of 1025 bytes and block length is 1024. The rest 1 byte (which is 0x00) won't be parsed resulting in drop of all datagrams in rx_list. Same is case with packets of size 2048: [002] d..1 7828.557948: dwc3_gadget_giveback: ep1out: req 0000000011dfd96e length 2049/16384 zsI ==> 0 [002] d..1 7828.557949: ncm_unwrap_ntb: K: ncm_unwrap_ntb nth: 1751999342 [002] d..1 7828.557950: ncm_unwrap_ntb: K: ncm_unwrap_ntb blk_len: 0x800 Lecroy shows one byte coming in extra confirming that the byte is coming in from PC: Transfer 2959 - Bytes Transferred(1025) Timestamp((18.524 843 590) - Transaction 8391 - Data(1025 bytes) Timestamp(18.524 843 590) --- Packet 4063861 Data(1024 bytes) Duration(2.117us) Idle(14.700ns) Timestamp(18.524 843 590) --- Packet 4063863 Data(1 byte) Duration(66.160ns) Time(282.000ns) Timestamp(18.524 845 722) According to Windows driver, no ZLP is needed if wBlockLength is non-zero, because the non-zero wBlockLength has already told the function side the size of transfer to be expected. However, there are in-market NCM devices that rely on ZLP as long as the wBlockLength is multiple of wMaxPacketSize. To deal with such devices, it pads an extra 0 at end so the transfer is no longer multiple of wMaxPacketSize. ### Affected Products **Linux - Linux** Affected versions: - 9f6ce4240a2bf456402c15c06768059e5973f28c (Status: affected) - 9f6ce4240a2bf456402c15c06768059e5973f28c (Status: affected) - 9f6ce4240a2bf456402c15c06768059e5973f28c (Status: affected) - 9f6ce4240a2bf456402c15c06768059e5973f28c (Status: affected) - 9f6ce4240a2bf456402c15c06768059e5973f28c (Status: affected) - 9f6ce4240a2bf456402c15c06768059e5973f28c (Status: affected) - 9f6ce4240a2bf456402c15c06768059e5973f28c (Status: affected) - 9f6ce4240a2bf456402c15c06768059e5973f28c (Status: affected) **Linux - Linux** Affected versions: - 2.6.38 (Status: affected) - 0 (Status: unaffected) - 4.19.308 (Status: unaffected) - 5.4.270 (Status: unaffected) - 5.10.211 (Status: unaffected) - 5.15.150 (Status: unaffected) - 6.1.80 (Status: unaffected) - 6.6.19 (Status: unaffected) - 6.7.7 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/059285e04ebb273d32323fbad5431c5b94f77e48) 2. [](https://git.kernel.org/stable/c/a31cf46d108dabce3df80b3e5c07661e24912151) 3. [](https://git.kernel.org/stable/c/57ca0e16f393bb21d69734e536e383a3a4c665fd) 4. [](https://git.kernel.org/stable/c/2cb66b62a5d64ccf09b0591ab86fb085fa491fc5) 5. [](https://git.kernel.org/stable/c/35b604a37ec70d68b19dafd10bbacf1db505c9ca) 6. [](https://git.kernel.org/stable/c/2b7ec68869d50ea998908af43b643bca7e54577e) 7. [](https://git.kernel.org/stable/c/c7f43900bc723203d7554d299a2ce844054fab8e) 8. [](https://git.kernel.org/stable/c/76c51146820c5dac629f21deafab0a7039bc3ccd)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18615, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18615 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18615 - **State**: PUBLISHED - **Published Date**: December 19, 2019 at 16:39 UTC - **Last Updated**: August 05, 2024 at 01:54 UTC - **Reserved Date**: October 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In CloudVision Portal (CVP) for all releases in the 2018.2 Train, under certain conditions, the application logs user passwords in plain text for certain API calls, potentially leading to user password exposure. This only affects CVP environments where: 1. Devices have enable mode passwords which are different from the user's login password, OR 2. There are configlet builders that use the Device class and specify username and password explicitly Application logs are not accessible or visible from the CVP GUI. Application logs can only be read by authorized users with privileged access to the VM hosting the CVP application. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.arista.com/en/support/advisories-notices/security-advisories/9002-security-advisory-45)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40609, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40609 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40609 - **State**: PUBLISHED - **Published Date**: August 02, 2023 at 14:21 UTC - **Last Updated**: October 17, 2024 at 18:51 UTC - **Reserved Date**: September 12, 2022 at 19:35 UTC - **Assigned By**: ibm ### Vulnerability Description IBM SDK, Java Technology Edition 7.1.5.18 and 8.0.8.0 could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization flaw. By sending specially-crafted data, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 236069. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **IBM - SDK, Java Technology Edition** Affected versions: - 7.1.5.18, 8.0.8.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7017032) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/236069)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25438, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25438 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25438 - **State**: PUBLISHED - **Published Date**: March 01, 2024 at 00:00 UTC - **Last Updated**: August 15, 2024 at 20:45 UTC - **Reserved Date**: February 07, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site scripting (XSS) vulnerability in the Submission module of Pkp Ojs v3.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Input subject field under the Add Discussion function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://drive.google.com/file/d/1-9yUkbsQ-blYpTsdZoXfu3ALBA5wQCbG/view?usp=sharing) 2. [](https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25438%20-%3E%20Stored%20XSS%20in%20input%20Subject%20of%20the%20Add%20Discussion%20Component%20under%20Submissions)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2532, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2532 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2532 - **State**: PUBLISHED - **Published Date**: June 22, 2011 at 21:00 UTC - **Last Updated**: September 16, 2024 at 22:50 UTC - **Reserved Date**: June 22, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The json.decode function in util/json.lua in Prosody 0.8.x before 0.8.1 might allow remote attackers to cause a denial of service (infinite loop) via invalid JSON data, as demonstrated by truncated data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://blog.prosody.im/prosody-0-8-1-released/) 2. [](http://hg.prosody.im/0.8/rev/20979f124ad9) 3. [](http://prosody.im/doc/release/0.8.1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1823, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1823 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1823 - **State**: REJECTED - **Published Date**: November 05, 2020 at 22:17 UTC - **Last Updated**: November 05, 2020 at 22:17 UTC - **Reserved Date**: February 17, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-44180, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-44180 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-44180 - **State**: PUBLISHED - **Published Date**: May 15, 2025 at 00:00 UTC - **Last Updated**: May 15, 2025 at 16:12 UTC - **Reserved Date**: April 22, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Phpgurukul Vehicle Record Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in /edit-brand.php?bid={brandId}. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://phpgurukul.com/vehicle-record-system-using-php-and-mysql/) 2. [](https://github.com/nscerol/Vehicle-Record-Management-System/blob/main/CVE-2025-44180-Vehicle-Record-Management-System-1.0-Stored-Cross-Site-Scripting-Vulnerability.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0861, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0861 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0861 - **State**: PUBLISHED - **Published Date**: February 16, 2023 at 08:58 UTC - **Last Updated**: March 18, 2025 at 14:54 UTC - **Reserved Date**: February 16, 2023 at 08:48 UTC - **Assigned By**: ONEKEY ### Vulnerability Description NetModule NSRW web administration interface executes an OS command constructed with unsanitized user input. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. This issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-77: Security Weakness ### Affected Products **NetModule - NSRW** Affected versions: - 4.3.0.0 (Status: affected) - 4.4.0.0 (Status: affected) - 4.6.0.0 (Status: affected) - 4.7.0.0 (Status: affected) ### References 1. [](https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf) 2. [](https://onekey.com/blog/security-advisory-netmodule-multiple-vulnerabilities) ### Credits - Quentin Kaiser from ONEKEY Research Labs
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-58108, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-58108 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-58108 - **State**: PUBLISHED - **Published Date**: April 07, 2025 at 03:34 UTC - **Last Updated**: April 07, 2025 at 14:02 UTC - **Reserved Date**: March 27, 2025 at 07:13 UTC - **Assigned By**: huawei ### Vulnerability Description Buffer overflow vulnerability in the codec module Impact: Successful exploitation of this vulnerability may affect availability. ### CVSS Metrics - **CVSS Base Score**: 4.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **Huawei - HarmonyOS** Affected versions: - 5.0.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2025/4/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4943, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4943 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4943 - **State**: PUBLISHED - **Published Date**: July 19, 2014 at 19:00 UTC - **Last Updated**: August 06, 2024 at 11:34 UTC - **Reserved Date**: July 11, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [36267](http://www.exploit-db.com/exploits/36267) 2. [](http://linux.oracle.com/errata/ELSA-2014-3047.html) 3. [SUSE-SU-2014:1316](http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html) 4. [1030610](http://www.securitytracker.com/id/1030610) 5. [60220](http://secunia.com/advisories/60220) 6. [59790](http://secunia.com/advisories/59790) 7. [RHSA-2014:1025](http://rhn.redhat.com/errata/RHSA-2014-1025.html) 8. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf) 9. [SUSE-SU-2014:1319](http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html) 10. [SUSE-SU-2015:0481](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html) 11. [openSUSE-SU-2015:0566](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html) 12. [](https://bugzilla.redhat.com/show_bug.cgi?id=1119458) 13. [](http://linux.oracle.com/errata/ELSA-2014-0924.html) 14. [60393](http://secunia.com/advisories/60393) 15. [60380](http://secunia.com/advisories/60380) 16. [](http://linux.oracle.com/errata/ELSA-2014-3048.html) 17. [linux-kernel-cve20144943-priv-esc(94665)](https://exchange.xforce.ibmcloud.com/vulnerabilities/94665) 18. [[oss-security] 20140716 CVE-2014-4943: Linux privilege escalation in ppp over l2tp sockets](http://openwall.com/lists/oss-security/2014/07/17/1) 19. [60011](http://secunia.com/advisories/60011) 20. [](https://github.com/torvalds/linux/commit/3cf521f7dc87c031617fd47e4b7aa2593c2f3daf) 21. [DSA-2992](http://www.debian.org/security/2014/dsa-2992) 22. [109277](http://osvdb.org/show/osvdb/109277) 23. [60071](http://secunia.com/advisories/60071)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9459, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9459 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9459 - **State**: PUBLISHED - **Published Date**: November 06, 2018 at 17:00 UTC - **Last Updated**: September 16, 2024 at 20:06 UTC - **Reserved Date**: April 05, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In Attachment of Attachment.java and getFilePath of EmlAttachmentProvider.java, there is a possible Elevation of Privilege due to a path traversal error. This could lead to a remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android ID: A-66230183. ### Affected Products **Google Inc. - Android** Affected versions: - Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-08-01) 2. [1041432](http://www.securitytracker.com/id/1041432)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26474 - **State**: PUBLISHED - **Published Date**: March 02, 2023 at 18:12 UTC - **Last Updated**: March 05, 2025 at 21:21 UTC - **Reserved Date**: February 23, 2023 at 23:22 UTC - **Assigned By**: GitHub_M ### Vulnerability Description XWiki Platform is a generic wiki platform. Starting in version 13.10, it's possible to use the right of an existing document content author to execute a text area property. This has been patched in XWiki 14.10, 14.4.7, and 13.10.11. There are no known workarounds. ### CVSS Metrics - **CVSS Base Score**: 10/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **xwiki - xwiki-platform** Affected versions: - >= 13.10, < 13.10.11 (Status: affected) - >= 14.0, < 14.4.7 (Status: affected) - >= 14.5, < 14.10 (Status: affected) ### References 1. [https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r) 2. [https://jira.xwiki.org/browse/XWIKI-20373](https://jira.xwiki.org/browse/XWIKI-20373)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11864, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11864 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11864 - **State**: PUBLISHED - **Published Date**: January 14, 2025 at 13:46 UTC - **Last Updated**: January 14, 2025 at 15:50 UTC - **Reserved Date**: November 27, 2024 at 14:52 UTC - **Assigned By**: Arm ### Vulnerability Description Specifically crafted SCMI messages sent to an SCP running SCP-Firmware release versions up to and including 2.15.0 may lead to a Usage Fault and crash the SCP ### Weakness Classification (CWE) - CWE-755: Security Weakness ### Affected Products **Arm - SCP-Firmware** Affected versions: - * (Status: affected) ### References 1. [](https://developer.arm.com/Arm%20Security%20Center/SCP-Firmware%20Vulnerability%20CVE-2024-11863-11864)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5651, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5651 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5651 - **State**: PUBLISHED - **Published Date**: September 09, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 11:48 UTC - **Reserved Date**: August 30, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Kicksend: Share & Print Photos (aka com.kicksend.android) application 3.3.2.18 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#414153](http://www.kb.cert.org/vuls/id/414153) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10359, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10359 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10359 - **State**: PUBLISHED - **Published Date**: October 19, 2017 at 17:00 UTC - **Last Updated**: October 04, 2024 at 16:48 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Hyperion BI+ component of Oracle Hyperion (subcomponent: UI and Visualization). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hyperion BI+ accessible data as well as unauthorized read access to a subset of Oracle Hyperion BI+ accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N). ### Affected Products **Oracle Corporation - Hyperion BI+** Affected versions: - 11.1.2.4 (Status: affected) ### References 1. [1039595](http://www.securitytracker.com/id/1039595) 2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) 3. [101317](http://www.securityfocus.com/bid/101317)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1773, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1773 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1773 - **State**: PUBLISHED - **Published Date**: March 31, 2023 at 12:00 UTC - **Last Updated**: February 11, 2025 at 18:41 UTC - **Reserved Date**: March 31, 2023 at 10:51 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Rockoa 2.3.2. It has been declared as critical. This vulnerability affects unknown code of the file webmainConfig.php of the component Configuration File Handler. The manipulation leads to code injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224674 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **n/a - Rockoa** Affected versions: - 2.3.2 (Status: affected) ### References 1. [](https://vuldb.com/?id.224674) 2. [](https://vuldb.com/?ctiid.224674) 3. [](https://gitee.com/galaxies2580/cve/blob/master/xinhuv2.3.2.md) ### Credits - galaxies2580 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22356, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22356 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22356 - **State**: PUBLISHED - **Published Date**: March 28, 2025 at 15:12 UTC - **Last Updated**: March 28, 2025 at 15:58 UTC - **Reserved Date**: January 03, 2025 at 13:16 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stencies Stencies allows Reflected XSS. This issue affects Stencies: from n/a through 0.58. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Stencies - Stencies** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/stencies/vulnerability/wordpress-stencies-plugin-0-58-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - João Pedro S Alcântara (Kinorth) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0731, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0731 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0731 - **State**: PUBLISHED - **Published Date**: May 16, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 04:17 UTC - **Reserved Date**: January 07, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The ISDN implementation in Cisco IOS 15.3S allows remote attackers to cause a denial of service (device reload) via malformed Q931 SETUP messages, aka Bug ID CSCut37890. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20150514 Cisco IOS Voice Gateway Malformed ISDN Q931 Message Denial of Service Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=38833) 2. [1032337](http://www.securitytracker.com/id/1032337)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4613, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4613 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4613 - **State**: PUBLISHED - **Published Date**: December 19, 2022 at 00:00 UTC - **Last Updated**: April 15, 2025 at 12:56 UTC - **Reserved Date**: December 19, 2022 at 00:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome and classified as critical. This issue affects some unknown processing of the component Browser Extension Provisioning. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216275. ### CVSS Metrics - **CVSS Base Score**: 5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-266: Security Weakness ### Affected Products **Click Studios - Passwordstate** Affected versions: - n/a (Status: affected) **Click Studios - Passwordstate Browser Extension Chrome** Affected versions: - n/a (Status: affected) ### References 1. [](https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html) 2. [](https://www.modzero.com/static/MZ-22-03_Passwordstate_Security_Disclosure_Report-v1.0.pdf) 3. [](https://vuldb.com/?id.216275) ### Credits - Constantin Müller/Jan Benninger/Pascal Zenker
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36385, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36385 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36385 - **State**: PUBLISHED - **Published Date**: August 24, 2021 at 11:26 UTC - **Last Updated**: August 04, 2024 at 00:54 UTC - **Reserved Date**: July 12, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A SQL Injection vulnerability in Cerner Mobile Care 5.0.0 allows remote unauthenticated attackers to execute arbitrary SQL commands via a Fullwidth Apostrophe (aka U+FF07) in the default.aspx User ID field. Arbitrary system commands can be executed through the use of xp_cmdshell. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.blacklanternsecurity.com/blog/) 2. [](https://www.cerner.com/solutions/mobility) 3. [](https://www.blacklanternsecurity.com/2021-08-13-Cerner-MobileCare-CVE/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10776, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10776 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10776 - **State**: PUBLISHED - **Published Date**: December 06, 2024 at 12:38 UTC - **Last Updated**: December 09, 2024 at 14:06 UTC - **Reserved Date**: November 04, 2024 at 13:08 UTC - **Assigned By**: SICK AG ### Vulnerability Description Lua apps can be deployed, removed, started, reloaded or stopped without authorization via AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write files or load apps that use all features of the product available to a customer. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H` ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **SICK AG - SICK InspectorP61x** Affected versions: - 0 (Status: affected) **SICK AG - SICK InspectorP62x** Affected versions: - 0 (Status: affected) ### References 1. [](https://sick.com/psirt) 2. [](https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF) 3. [](https://www.cisa.gov/resources-tools/resources/ics-recommended-practices) 4. [](https://www.first.org/cvss/calculator/3.1) 5. [](https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0006.pdf) 6. [](https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0006.json) ### Credits - Manuel Stotz - Tobias Jaeger
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31440, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31440 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31440 - **State**: PUBLISHED - **Published Date**: May 21, 2021 at 14:30 UTC - **Last Updated**: August 03, 2024 at 22:55 UTC - **Reserved Date**: April 16, 2021 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.11.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-13661. ### Weakness Classification (CWE) - CWE-682: Security Weakness ### Affected Products **Linux - Kernel** Affected versions: - 5.11.15 (Status: affected) ### References 1. [](https://www.zerodayinitiative.com/advisories/ZDI-21-503/) 2. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36) 3. [](https://security.netapp.com/advisory/ntap-20210706-0003/) ### Credits - Manfred Paul
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1888, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1888 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1888 - **State**: PUBLISHED - **Published Date**: June 08, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:06 UTC - **Reserved Date**: June 08, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in MediaWiki before 1.4.5 allows remote attackers to inject arbitrary web script via HTML attributes in page templates. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SR:2005:019](http://www.novell.com/linux/security/advisories/2005_19_sr.html) 2. [](http://sourceforge.net/project/shownotes.php?release_id=332231) 3. [13861](http://www.securityfocus.com/bid/13861)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8354, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8354 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8354 - **State**: PUBLISHED - **Published Date**: February 13, 2017 at 21:00 UTC - **Last Updated**: August 06, 2024 at 02:20 UTC - **Reserved Date**: September 28, 2016 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description An issue was discovered in Schneider Electric Unity PRO prior to V11.1. Unity projects can be compiled as x86 instructions and loaded onto the PLC Simulator delivered with Unity PRO. These x86 instructions are subsequently executed directly by the simulator. A specially crafted patched Unity project file can make the simulator execute malicious code by redirecting the control flow of these instructions. ### Affected Products **n/a - Schneider Electric Unity PRO Control prior to V11.1** Affected versions: - Schneider Electric Unity PRO Control prior to V11.1 (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-306-03) 2. [93830](http://www.securityfocus.com/bid/93830)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2194, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2194 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2194 - **State**: PUBLISHED - **Published Date**: May 20, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 10:05 UTC - **Reserved Date**: February 25, 2014 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description system/egain/chat/entrypoint in Cisco Unified Web and E-mail Interaction Manager 9.0(2) allows remote attackers to have an unspecified impact by injecting a spoofed XML external entity. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20140516 Cisco Unified Web and E-mail Interaction Manager XML External Entities Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2194) 2. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=34270)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23327, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23327 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23327 - **State**: PUBLISHED - **Published Date**: March 04, 2022 at 11:24 UTC - **Last Updated**: August 03, 2024 at 03:36 UTC - **Reserved Date**: January 18, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A design flaw in Go-Ethereum 1.10.12 and older versions allows an attacker node to send 5120 future transactions with a high gas price in one message, which can purge all of pending transactions in a victim node's memory pool, causing a denial of service (DoS). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://ethereum.com) 2. [](http://go-ethereum.com) 3. [](https://tristartom.github.io/docs/ccs21.pdf) 4. [](https://dl.acm.org/doi/pdf/10.1145/3460120.3485369)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12364, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12364 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12364 - **State**: PUBLISHED - **Published Date**: November 30, 2017 at 09:00 UTC - **Last Updated**: August 05, 2024 at 18:36 UTC - **Reserved Date**: August 03, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A SQL Injection vulnerability in the web framework of Cisco Prime Service Catalog could allow an unauthenticated, remote attacker to execute unauthorized Structured Query Language (SQL) queries. The vulnerability is due to a failure to validate user-supplied input that is used in SQL queries. An attacker could exploit this vulnerability by sending a crafted SQL statement to an affected system. Successful exploitation could allow the attacker to read entries in some database tables. Cisco Bug IDs: CSCvg30333. ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **n/a - Cisco Prime Service Catalog** Affected versions: - Cisco Prime Service Catalog (Status: affected) ### References 1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-prime) 2. [102004](http://www.securityfocus.com/bid/102004) 3. [1039926](http://www.securitytracker.com/id/1039926)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19907, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19907 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19907 - **State**: PUBLISHED - **Published Date**: December 19, 2019 at 00:00 UTC - **Last Updated**: August 05, 2024 at 02:32 UTC - **Reserved Date**: December 19, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HrAddFBBlock in libfreebusy/freebusyutil.cpp in Kopano Groupware Core before 8.7.7 allows out-of-bounds access, as demonstrated by mishandling of an array copy during parsing of ICal data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://stash.kopano.io/projects/KC/repos/kopanocore/commits/4e02b420fff) 2. [](https://stash.kopano.io/projects/KC/repos/kopanocore/browse/RELNOTES.txt) 3. [[debian-lts-announce] 20230306 [SECURITY] [DLA 3354-1] kopanocore security update](https://lists.debian.org/debian-lts-announce/2023/03/msg00006.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-28330, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-28330 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-28330 - **State**: PUBLISHED - **Published Date**: November 24, 2020 at 18:11 UTC - **Last Updated**: August 04, 2024 at 16:33 UTC - **Reserved Date**: November 06, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Barco wePresent WiPG-1600W devices have Unprotected Transport of Credentials. Affected Version(s): 2.5.1.8. An attacker armed with hardcoded API credentials (retrieved by exploiting CVE-2020-28329) can issue an authenticated query to display the admin password for the main web user interface listening on port 443/tcp of a Barco wePresent WiPG-1600W device. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://korelogic.com/Resources/Advisories/KL-001-2020-005.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-47167, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-47167 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-47167 - **State**: PUBLISHED - **Published Date**: February 06, 2024 at 16:20 UTC - **Last Updated**: August 19, 2024 at 20:27 UTC - **Reserved Date**: November 07, 2023 at 23:09 UTC - **Assigned By**: talos ### Vulnerability Description A post authentication command injection vulnerability exists in the GRE policy functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Tp-Link - ER7206 Omada Gigabit VPN Router** Affected versions: - 1.3.0 build 20230322 Rel.70591 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1855](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1855) ### Credits - Discovered by the Vulnerability Discovery and Research team of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10258, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10258 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10258 - **State**: PUBLISHED - **Published Date**: April 11, 2018 at 14:00 UTC - **Last Updated**: September 17, 2024 at 02:37 UTC - **Reserved Date**: March 23, 2017 at 00:00 UTC - **Assigned By**: symantec ### Vulnerability Description Unrestricted file upload vulnerability in the Symantec Advanced Secure Gateway (ASG) and ProxySG management consoles. A malicious appliance administrator can upload arbitrary malicious files to the management console and trick another administrator user into downloading and executing malicious code. ### Affected Products **Symantec Corporation - Advanced Secure Gateway (ASG)** Affected versions: - 6.6 prior to 6.6.5.14 (Status: affected) - 6.7 prior to 6.7.3.1 (Status: affected) **Symantec Corporation - ProxySG** Affected versions: - 6.5 prior to 6.5.10.8 (Status: affected) - 6.6 prior to 6.6.5.14 (Status: affected) - 6.7 prior to 6.7.3.1 (Status: affected) ### References 1. [](https://www.symantec.com/security-center/network-protection-security-advisories/SA162) 2. [103685](http://www.securityfocus.com/bid/103685) 3. [1040757](http://www.securitytracker.com/id/1040757)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-22257, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-22257 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-22257 - **State**: PUBLISHED - **Published Date**: March 18, 2024 at 14:18 UTC - **Last Updated**: February 13, 2025 at 17:33 UTC - **Reserved Date**: January 08, 2024 at 18:43 UTC - **Assigned By**: vmware ### Vulnerability Description In Spring Security, versions 5.7.x prior to 5.7.12, 5.8.x prior to 5.8.11, versions 6.0.x prior to 6.0.9, versions 6.1.x prior to 6.1.8, versions 6.2.x prior to 6.2.3, an application is possible vulnerable to broken access control when it directly uses the AuthenticatedVoter#vote passing a null Authentication parameter. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N` ### Affected Products **N/A - Spring Security** Affected versions: - 6.2.0 to 6.2.2, 6.1.0 to 6.1.7, 6.0.0 to 6.0.9, 5.8.0 to 5.8.10, 5.7.0 to 5.7.11 (Status: affected) ### References 1. [](https://spring.io/security/cve-2024-22257) 2. [](https://security.netapp.com/advisory/ntap-20240419-0005/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0630, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0630 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0630 - **State**: PUBLISHED - **Published Date**: March 04, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:21 UTC - **Reserved Date**: March 04, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description sendpm.php in PBLang 4.63 allows remote authenticated users to read arbitrary files via a full pathname in the orig parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [pblang-sendpm-obtain-information(19544)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19544) 2. [](http://pblforum.drmartinus.de/post.php?cat=2&fid=2&pid=40&page=1) 3. [20050301 Software PBLang 4.63 sendpm.php reply file read vulnerability](http://marc.info/?l=bugtraq&m=110971002211589&w=2) 4. [12690](http://www.securityfocus.com/bid/12690)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36284, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36284 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36284 - **State**: PUBLISHED - **Published Date**: April 06, 2021 at 15:36 UTC - **Last Updated**: August 04, 2024 at 17:23 UTC - **Reserved Date**: March 30, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Union Pay up to 3.4.93.4.9, for android, contains a CWE-347: Improper Verification of Cryptographic Signature vulnerability, allows attackers to shop for free in merchants' websites and mobile apps, via a crafted authentication code (MAC) which is generated based on a secret key which is NULL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.dropbox.com/s/6smwnbrp0kgsgrc/poc_code.py?dl=0) 2. [](https://www.dropbox.com/s/czbkdr73tclq2nr/UnionPay_Vulnerability_Report.txt?dl=0) 3. [](http://mobitec.ie.cuhk.edu.hk/cve_2020/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9082, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9082 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9082 - **State**: PUBLISHED - **Published Date**: September 22, 2024 at 08:00 UTC - **Last Updated**: March 31, 2025 at 05:47 UTC - **Reserved Date**: September 21, 2024 at 09:55 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /classes/Users.php?f=save of the component User Creation Handler. The manipulation of the argument Type with the input 1 leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-285: Security Weakness - CWE-266: Security Weakness ### Affected Products **SourceCodester - Online Eyewear Shop** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-278252 | SourceCodester Online Eyewear Shop User Creation Users.php improper authorization](https://vuldb.com/?id.278252) 2. [VDB-278252 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.278252) 3. [Submit #411565 | sourcecodester Online Eyewear Shop Website v1.0 Any user added](https://vuldb.com/?submit.411565) 4. [](https://github.com/41lai/cve/blob/main/add.md) 5. [](https://www.sourcecodester.com/) ### Credits - 5hu1K (VulDB User) - 5hu1K (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1989, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1989 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1989 - **State**: PUBLISHED - **Published Date**: November 08, 2015 at 22:00 UTC - **Last Updated**: August 06, 2024 at 05:02 UTC - **Reserved Date**: February 19, 2015 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description SQL injection vulnerability in IBM Security QRadar Incident Forensics 7.2.x before 7.2.5 Patch 5 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21970116)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2095, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2095 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2095 - **State**: PUBLISHED - **Published Date**: May 27, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:15 UTC - **Reserved Date**: May 27, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1008818](http://www.securitytracker.com/id?1008818) 2. [honeyd-nmap-information-disclosure(14905)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14905) 3. [10695](http://secunia.com/advisories/10695) 4. [3690](http://www.osvdb.org/3690) 5. [20040121 Honeyd Security Advisory 2004-001: Remote Detection Via Simple Probe Packet](http://marc.info/?l=bugtraq&m=107471181426047&w=2) 6. [9464](http://www.securityfocus.com/bid/9464) 7. [20040121 [ GLSA 200401-02 ] Honeyd remote detection vulnerability via a probe packet](http://marc.info/?l=bugtraq&m=107473095118505&w=2) 8. [10694](http://secunia.com/advisories/10694)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2498, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2498 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2498 - **State**: PUBLISHED - **Published Date**: February 20, 2020 at 03:59 UTC - **Last Updated**: August 06, 2024 at 23:00 UTC - **Reserved Date**: June 15, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The Linux kernel from v2.3.36 before v2.6.39 allows local unprivileged users to cause a denial of service (memory consumption) by triggering creation of PTE pages. ### Affected Products **n/a - Linux kernel** Affected versions: - v2.3.36 before v2.6.39 (Status: affected) ### References 1. [](http://marc.info/?l=oss-security&m=130923704824984&w=2) 2. [](https://www.rapid7.com/db/vulnerabilities/ubuntu-USN-1383-1) 3. [](https://security-tracker.debian.org/tracker/CVE-2011-2498) 4. [](https://usn.ubuntu.com/1167-1/) 5. [](https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-2498.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25592, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25592 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25592 - **State**: PUBLISHED - **Published Date**: March 15, 2024 at 13:56 UTC - **Last Updated**: August 01, 2024 at 23:44 UTC - **Reserved Date**: February 08, 2024 at 13:14 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPMU DEV Broken Link Checker allows Stored XSS.This issue affects Broken Link Checker: from n/a through 2.2.3. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **WPMU DEV - Broken Link Checker** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/broken-link-checker/wordpress-broken-link-checker-plugin-2-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Dhabaleshwar Das (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1041, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1041 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1041 - **State**: PUBLISHED - **Published Date**: July 26, 2022 at 04:25 UTC - **Last Updated**: September 17, 2024 at 00:11 UTC - **Reserved Date**: March 22, 2022 at 00:00 UTC - **Assigned By**: zephyr ### Vulnerability Description In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **zephyrproject-rtos - zephyr** Affected versions: - unspecified (Status: affected) ### References 1. [](http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p449-9hv9-pj38)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5163, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5163 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5163 - **State**: PUBLISHED - **Published Date**: August 19, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 06:41 UTC - **Reserved Date**: July 01, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The import task action in OpenStack Image Service (Glance) 2015.1.x before 2015.1.2 (kilo), when using the V2 API, allows remote authenticated users to read arbitrary files via a crafted backing file for a qcow2 image. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2015:1639](http://rhn.redhat.com/errata/RHSA-2015-1639.html) 2. [[openstack-announce] 20150813 [OSSA 2015-014] Glance v2 API host file disclosure through qcow2 backing file (CVE-2015-5163)](http://lists.openstack.org/pipermail/openstack-announce/2015-August/000527.html) 3. [76346](http://www.securityfocus.com/bid/76346) 4. [](https://bugs.launchpad.net/glance/+bug/1471912)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4121, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4121 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4121 - **State**: PUBLISHED - **Published Date**: August 03, 2023 at 09:31 UTC - **Last Updated**: August 02, 2024 at 07:17 UTC - **Reserved Date**: August 02, 2023 at 20:35 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Byzoro Smart S85F Management Platform up to 20230722. It has been classified as critical. Affected is an unknown function. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235968. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **Byzoro - Smart S85F Management Platform** Affected versions: - 20230722 (Status: affected) ### References 1. [VDB-235968 | Byzoro Smart S85F Management Platform unrestricted upload](https://vuldb.com/?id.235968) 2. [VDB-235968 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.235968) 3. [Submit #185755 | A file upload vulnerability exists in the database management of the Smart S85F management platform](https://vuldb.com/?submit.185755) 4. [](https://github.com/torres14852/cve/blob/main/upload.md) ### Credits - torres14852 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1324, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1324 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1324 - **State**: PUBLISHED - **Published Date**: March 09, 2002 at 05:00 UTC - **Last Updated**: August 01, 2024 at 17:11 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description VAXstations running Open VMS 5.3 through 5.5-2 with VMS DECwindows or MOTIF do not properly disable access to user accounts that exceed the break-in limit threshold for failed login attempts, which makes it easier for attackers to conduct brute force password guessing. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openvms-sysgen-enabled(7225)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7225) 2. [D-06](http://ciac.llnl.gov/ciac/bulletins/d-06.shtml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0003, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0003 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0003 - **State**: PUBLISHED - **Published Date**: March 20, 2014 at 19:00 UTC - **Last Updated**: August 06, 2024 at 08:58 UTC - **Reserved Date**: December 03, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [57125](http://secunia.com/advisories/57125) 2. [RHSA-2014:0254](http://rhn.redhat.com/errata/RHSA-2014-0254.html) 3. [RHSA-2014:0371](http://rhn.redhat.com/errata/RHSA-2014-0371.html) 4. [65902](http://www.securityfocus.com/bid/65902) 5. [57719](http://secunia.com/advisories/57719) 6. [RHSA-2014:0245](http://rhn.redhat.com/errata/RHSA-2014-0245.html) 7. [57716](http://secunia.com/advisories/57716) 8. [](http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc) 9. [RHSA-2014:0372](http://rhn.redhat.com/errata/RHSA-2014-0372.html) 10. [[camel-commits] 20190430 svn commit: r1044347 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0194.txt.asc security-advisories.html](https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E) 11. [[camel-commits] 20190524 svn commit: r1045395 - in /websites/production/camel/content: cache/main.pageCache security-advisories.data/CVE-2019-0188.txt.asc security-advisories.html](https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18714, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18714 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18714 - **State**: PUBLISHED - **Published Date**: November 01, 2018 at 17:00 UTC - **Last Updated**: August 05, 2024 at 11:16 UTC - **Reserved Date**: October 27, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description RegFilter.sys in IOBit Malware Fighter 6.2 and earlier is susceptible to a stack-based buffer overflow when an attacker uses IOCTL 0x8006E010. This can lead to denial of service (DoS) or code execution with root privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://downwithup.github.io/CVEPosts.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40708, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40708 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40708 - **State**: PUBLISHED - **Published Date**: August 24, 2023 at 16:08 UTC - **Last Updated**: October 02, 2024 at 20:20 UTC - **Reserved Date**: August 18, 2023 at 19:31 UTC - **Assigned By**: Dragos ### Vulnerability Description The File Transfer Protocol (FTP) port is open by default in the SNAP PAC S1 Firmware version R10.3b. This could allow an adversary to access some device files. ### CVSS Metrics - **CVSS Base Score**: 5.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-1188: Security Weakness ### Affected Products **OPTO 22 - SNAP PAC S1** Affected versions: - R10.3b (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-02) ### Credits - Nicolas Cano
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43744, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43744 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43744 - **State**: PUBLISHED - **Published Date**: December 10, 2024 at 22:03 UTC - **Last Updated**: December 11, 2024 at 17:09 UTC - **Reserved Date**: August 15, 2024 at 17:12 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24548, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24548 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24548 - **State**: PUBLISHED - **Published Date**: April 15, 2022 at 19:04 UTC - **Last Updated**: January 02, 2025 at 18:51 UTC - **Reserved Date**: February 05, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Defender Denial of Service Vulnerability ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Microsoft Malware Protection Engine** Affected versions: - 1.1.0.0 (Status: affected) ### References 1. [Microsoft Defender Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24548)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0296, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0296 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0296 - **State**: PUBLISHED - **Published Date**: January 22, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:14 UTC - **Reserved Date**: April 26, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description fcheck allows local users to gain privileges by embedding shell metacharacters into file names that are processed by fcheck. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20000331 fcheck v.2.7.45 and insecure use of Perl's system()](http://archives.neohapsis.com/archives/bugtraq/current/0011.html) 2. [1086](http://www.securityfocus.com/bid/1086)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8466, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8466 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8466 - **State**: PUBLISHED - **Published Date**: June 15, 2017 at 01:00 UTC - **Last Updated**: August 05, 2024 at 16:34 UTC - **Reserved Date**: May 03, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Cursor in Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and Windows Server 2016 allows improper elevation of privilege, aka "Windows Cursor Elevation of Privilege Vulnerability". ### Affected Products **Microsoft Corporation - Windows Cursor** Affected versions: - Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and Windows Server 2016 (Status: affected) ### References 1. [98844](http://www.securityfocus.com/bid/98844) 2. [1038671](http://www.securitytracker.com/id/1038671) 3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8466)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41779, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41779 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41779 - **State**: PUBLISHED - **Published Date**: November 22, 2024 at 12:02 UTC - **Last Updated**: November 22, 2024 at 15:34 UTC - **Reserved Date**: July 22, 2024 at 12:03 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Engineering Systems Design Rhapsody - Model Manager 7.0.2 and 7.0.3 could allow a remote attacker to bypass security restrictions, caused by a race condition. By sending a specially crafted request, an attacker could exploit this vulnerability to remotely execute code. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-367: Security Weakness ### Affected Products **IBM - Engineering Systems Design Rhapsody - Model Manager** Affected versions: - 7.0.2, 7.0.3 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7172535)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25539, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25539 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25539 - **State**: PUBLISHED - **Published Date**: May 21, 2025 at 00:00 UTC - **Last Updated**: May 21, 2025 at 19:42 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Local File Inclusion vulnerability in Vasco v3.14and before allows a remote attacker to obtain sensitive information via help menu. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://drive.google.com/drive/folders/1Va0QP5TtsRprk-pXL3bUfCwTSjYbqnLK?usp=sharing) 2. [](https://gist.github.com/sornram9254/15eb12579b7acda8ba021217366960bd)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17536, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17536 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17536 - **State**: PUBLISHED - **Published Date**: December 11, 2017 at 07:00 UTC - **Last Updated**: September 16, 2024 at 22:40 UTC - **Reserved Date**: December 11, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Phabricator before 2017-11-10 does not block the --config and --debugger flags to the Mercurial hg program, which allows remote attackers to execute arbitrary code by using the web UI to browse a branch whose name begins with a --config= or --debugger= substring. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://hackerone.com/reports/288704) 2. [](https://secure.phabricator.com/T13012)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1922, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1922 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1922 - **State**: PUBLISHED - **Published Date**: June 30, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:06 UTC - **Reserved Date**: June 08, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The MS-Expand file handling in Clam AntiVirus (ClamAV) before 0.86 allows remote attackers to cause a denial of service (file descriptor and memory consumption) via a crafted file that causes repeated errors in the cli_msexpand function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050629 Clam AntiVirus ClamAV MS-Expand File Handling DoS Vulnerability](http://www.idefense.com/application/poi/display?id=276&type=vulnerabilities&flashstatus=true) 2. [](http://sourceforge.net/project/shownotes.php?release_id=336462) 3. [DSA-737](http://www.debian.org/security/2005/dsa-737)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44081, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44081 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44081 - **State**: PUBLISHED - **Published Date**: October 29, 2024 at 00:00 UTC - **Last Updated**: October 30, 2024 at 14:47 UTC - **Reserved Date**: August 19, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Jitsi Meet before 2.0.9779, the functionality to share a video file was implemented in an insecure way, resulting in clients loading videos from an arbitrary URL if a message from another participant contains a URL encoded in the expected format. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/jitsi/jitsi-meet/compare/jitsi-meet_9672...jitsi-meet_9673) 2. [](https://github.com/jitsi/security-advisories/blob/master/advisories/JSA-2024-0003.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-42735, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-42735 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-42735 - **State**: PUBLISHED - **Published Date**: December 04, 2023 at 00:54 UTC - **Last Updated**: August 02, 2024 at 19:30 UTC - **Reserved Date**: September 13, 2023 at 07:40 UTC - **Assigned By**: Unisoc ### Vulnerability Description In telephony service, there is a possible missing permission check. This could lead to local information disclosure with System execution privileges needed ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000** Affected versions: - Android11/Android12/Android13 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1168, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1168 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1168 - **State**: PUBLISHED - **Published Date**: March 05, 2008 at 23:00 UTC - **Last Updated**: August 07, 2024 at 08:08 UTC - **Reserved Date**: March 05, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Squid Analysis Report Generator (Sarg) 2.2.3.1 allows remote attackers to inject arbitrary web script or HTML via the User-Agent header, which is not properly handled when displaying the Squid proxy log. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-0750](http://www.vupen.com/english/advisories/2008/0750/references) 2. [28668](http://secunia.com/advisories/28668) 3. [GLSA-200803-21](http://www.gentoo.org/security/en/glsa/glsa-200803-21.xml) 4. [sarg-useragent-xss(40972)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40972) 5. [](http://sourceforge.net/project/shownotes.php?release_id=581509) 6. [MDVSA-2008:079](http://www.mandriva.com/security/advisories?name=MDVSA-2008:079) 7. [29309](http://secunia.com/advisories/29309) 8. [29500](http://secunia.com/advisories/29500) 9. [28077](http://www.securityfocus.com/bid/28077)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4174, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4174 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4174 - **State**: PUBLISHED - **Published Date**: August 27, 2020 at 12:40 UTC - **Last Updated**: September 17, 2024 at 04:25 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Guardium Insights 2.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 174683. ### Affected Products **IBM - Security Guardium Insights** Affected versions: - 2.0.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6323297) 2. [ibm-guardium-cve20204174-info-disc (174683)](https://exchange.xforce.ibmcloud.com/vulnerabilities/174683)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0056, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0056 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0056 - **State**: PUBLISHED - **Published Date**: March 17, 2017 at 00:00 UTC - **Last Updated**: August 05, 2024 at 12:55 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The kernel-mode drivers in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0026, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, CVE-2017-0081, CVE-2017-0082. ### Affected Products **Microsoft Corporation - Win32k** Affected versions: - The kernel-mode drivers in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0056) 2. [1038017](http://www.securitytracker.com/id/1038017) 3. [96630](http://www.securityfocus.com/bid/96630)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49349, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49349 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49349 - **State**: PUBLISHED - **Published Date**: January 31, 2025 at 16:14 UTC - **Last Updated**: January 31, 2025 at 16:47 UTC - **Reserved Date**: October 14, 2024 at 12:05 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4.0 through 3.2.4.1 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **IBM - Financial Transaction Manager for SWIFT Services for Multiplatforms** Affected versions: - 3.2.4.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7182203)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4008, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4008 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4008 - **State**: PUBLISHED - **Published Date**: June 02, 2011 at 20:00 UTC - **Last Updated**: September 16, 2024 at 18:38 UTC - **Reserved Date**: November 19, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unbound before 1.4.4 does not send responses for signed zones after mishandling an unspecified query, which allows remote attackers to cause a denial of service (DNSSEC outage) via a crafted query. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://unbound.nlnetlabs.nl/downloads/unbound-1.4.4.tar.gz) 2. [](http://packages.debian.org/changelogs/pool/main/u/unbound/unbound_1.4.6-1/changelog) 3. [DSA-2243](http://www.debian.org/security/2011/dsa-2243)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1014, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1014 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1014 - **State**: PUBLISHED - **Published Date**: December 15, 2021 at 18:06 UTC - **Last Updated**: August 03, 2024 at 15:55 UTC - **Reserved Date**: November 06, 2020 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In getNetworkTypeForSubscriber of PhoneInterfaceManager.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-186776740 ### Affected Products **n/a - Android** Affected versions: - Android-12 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2021-12-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5136, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5136 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5136 - **State**: PUBLISHED - **Published Date**: July 23, 2016 at 19:00 UTC - **Last Updated**: August 06, 2024 at 00:53 UTC - **Reserved Date**: May 31, 2016 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use-after-free vulnerability in extensions/renderer/user_script_injector.cc in the Extensions subsystem in Google Chrome before 52.0.2743.82 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to script deletion. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://codereview.chromium.org/2134613002/) 2. [openSUSE-SU-2016:1868](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html) 3. [openSUSE-SU-2016:1869](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html) 4. [](https://crbug.com/625393) 5. [92053](http://www.securityfocus.com/bid/92053) 6. [](http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html) 7. [openSUSE-SU-2016:1918](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html) 8. [](https://codereview.chromium.org/2116923002/) 9. [GLSA-201610-09](https://security.gentoo.org/glsa/201610-09) 10. [openSUSE-SU-2016:1865](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html) 11. [RHSA-2016:1485](http://rhn.redhat.com/errata/RHSA-2016-1485.html) 12. [1036428](http://www.securitytracker.com/id/1036428) 13. [DSA-3637](http://www.debian.org/security/2016/dsa-3637)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7914, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7914 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7914 - **State**: REJECTED - **Published Date**: March 05, 2019 at 20:00 UTC - **Last Updated**: March 05, 2019 at 19:57 UTC - **Reserved Date**: March 09, 2018 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-34679, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-34679 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-34679 - **State**: PUBLISHED - **Published Date**: November 06, 2024 at 02:17 UTC - **Last Updated**: November 06, 2024 at 11:21 UTC - **Reserved Date**: May 07, 2024 at 04:43 UTC - **Assigned By**: SamsungMobile ### Vulnerability Description Incorrect default permissions in Crane prior to SMR Nov-2024 Release 1 allows local attackers to access files with phone privilege. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - SMR Nov-2024 Release in Android 14 (Status: unaffected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41312, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41312 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41312 - **State**: PUBLISHED - **Published Date**: November 03, 2021 at 03:50 UTC - **Last Updated**: October 10, 2024 at 13:45 UTC - **Reserved Date**: September 16, 2021 at 00:00 UTC - **Assigned By**: atlassian ### Vulnerability Description Affected versions of Atlassian Jira Server and Data Center allow a remote attacker who has had their access revoked from Jira Service Management to enable and disable Issue Collectors on Jira Service Management projects via an Improper Authentication vulnerability in the /secure/ViewCollectors endpoint. The affected versions are before version 8.19.1. ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **Atlassian - Jira Server** Affected versions: - unspecified (Status: affected) **Atlassian - Jira Data Center** Affected versions: - unspecified (Status: affected) ### References 1. [](https://jira.atlassian.com/browse/JRASERVER-72801)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20739, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20739 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20739 - **State**: PUBLISHED - **Published Date**: April 16, 2020 at 19:18 UTC - **Last Updated**: August 05, 2024 at 02:53 UTC - **Reserved Date**: April 15, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description NETGEAR R8500 devices before v1.0.2.128 are affected by a buffer overflow by an unauthenticated attacker. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000061179/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-R8500-PSV-2017-0636)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2874, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2874 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2874 - **State**: PUBLISHED - **Published Date**: July 23, 2019 at 22:31 UTC - **Last Updated**: October 01, 2024 at 16:34 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 3.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L). ### Affected Products **Oracle Corporation - VM VirtualBox** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html) 2. [openSUSE-SU-2019:1814](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html) 3. [GLSA-202101-09](https://security.gentoo.org/glsa/202101-09)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37635, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37635 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37635 - **State**: PUBLISHED - **Published Date**: October 23, 2023 at 00:00 UTC - **Last Updated**: September 11, 2024 at 19:52 UTC - **Reserved Date**: July 10, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description UVDesk Community Skeleton v1.1.1 allows unauthenticated attackers to perform brute force attacks on the login page to gain access to the application. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.esecforte.com/cve-2023-37635-login-bruteforce/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31181, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31181 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31181 - **State**: PUBLISHED - **Published Date**: September 18, 2024 at 13:57 UTC - **Last Updated**: September 18, 2024 at 17:13 UTC - **Reserved Date**: March 29, 2024 at 08:24 UTC - **Assigned By**: Nozomi ### Vulnerability Description Out-of-bounds Read vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routine fluid_msg::of13::GroupStats::unpack. This issue affects libfluid: 0.1.0. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Open Networking Foundation (ONF) - libfluid** Affected versions: - 0.1.0 (Status: affected) ### References 1. [](https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31181)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-25152, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-25152 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-25152 - **State**: PUBLISHED - **Published Date**: April 14, 2022 at 20:05 UTC - **Last Updated**: April 16, 2025 at 16:30 UTC - **Reserved Date**: September 04, 2020 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description A session fixation vulnerability in the B. Braun Melsungen AG SpaceCom administrative interface Version L81/U61 and earlier, and the Data module compactplus Versions A10 and A11 allows remote attackers to hijack web sessions and escalate privileges. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-384: Security Weakness ### Affected Products **B. Braun Melsungen AG - SpaceCom** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) **B. Braun Melsungen AG - Battery pack with Wi-Fi** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) **B. Braun Melsungen AG - Data module compactplus** Affected versions: - A10 (Status: affected) - A11 (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsma-20-296-02) 2. [](https://www.bbraun.com/en/products-and-therapies/services/b-braun-vulnerability-disclosure-policy/security-advisory.html) ### Credits - Julian Suleder, Nils Emmerich, and Birk Kauer of ERNW Research GmbH; Dr. Oliver Matula of ERNW Enno Rey Netzwerke GmbH, reported these vulnerabilities to the Federal Office for Information Security (BSI), Germany, in the context of the BSI project ManiMed (Manipulation of medical devices).
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-12319, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-12319 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-12319 - **State**: PUBLISHED - **Published Date**: December 04, 2018 at 17:00 UTC - **Last Updated**: August 05, 2024 at 08:30 UTC - **Reserved Date**: June 13, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Denial-of-service in the login page of ASUSTOR ADM 3.1.1 allows attackers to prevent users from signing in by placing malformed text in the title. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.securityevaluators.com/over-a-dozen-vulnerabilities-discovered-in-asustor-as-602t-8dd5832a82cc)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4690, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4690 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4690 - **State**: PUBLISHED - **Published Date**: October 22, 2008 at 17:00 UTC - **Last Updated**: August 07, 2024 at 10:24 UTC - **Reserved Date**: October 22, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929. NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2008-9597](https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00143.html) 2. [RHSA-2008:0965](http://www.redhat.com/support/errata/RHSA-2008-0965.html) 3. [[oss-security] 20081009 lynx lynxcgi handler flaw](http://www.openwall.com/lists/oss-security/2008/10/09/2) 4. [32967](http://secunia.com/advisories/32967) 5. [MDVSA-2008:218](http://www.mandriva.com/security/advisories?name=MDVSA-2008:218) 6. [SUSE-SR:2009:002](http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html) 7. [FEDORA-2008-9550](https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00066.html) 8. [33568](http://secunia.com/advisories/33568) 9. [lynx-lynxcgi-code-execution(46228)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46228) 10. [MDVSA-2008:217](http://www.mandriva.com/security/advisories?name=MDVSA-2008:217) 11. [1021105](http://www.securitytracker.com/id?1021105) 12. [32416](http://secunia.com/advisories/32416) 13. [oval:org.mitre.oval:def:11204](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11204)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29680, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29680 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29680 - **State**: PUBLISHED - **Published Date**: May 26, 2022 at 13:27 UTC - **Last Updated**: August 03, 2024 at 06:26 UTC - **Reserved Date**: April 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/user/zu_del. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/chshcms/cscms/issues/31#issue-1209052957)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21913, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21913 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21913 - **State**: PUBLISHED - **Published Date**: September 23, 2021 at 14:48 UTC - **Last Updated**: August 03, 2024 at 18:30 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An information disclosure vulnerability exists in the WiFi Smart Mesh functionality of D-LINK DIR-3040 1.13B03. A specially-crafted network request can lead to command execution. An attacker can connect to the MQTT service to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-798: Cross-site Scripting (XSS) ### Affected Products **n/a - D-Link** Affected versions: - D-LINK DIR-3040 1.13B03 (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1361)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29948, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29948 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29948 - **State**: PUBLISHED - **Published Date**: April 02, 2024 at 11:07 UTC - **Last Updated**: November 06, 2024 at 21:00 UTC - **Reserved Date**: March 22, 2024 at 02:34 UTC - **Assigned By**: hikvision ### Vulnerability Description There is an out-of-bounds read vulnerability in some Hikvision NVRs. An authenticated attacker could exploit this vulnerability by sending specially crafted messages to a vulnerable device, causing a service abnormality. ### CVSS Metrics - **CVSS Base Score**: 3.8/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L` ### Affected Products **Hikvision - DS-7604NXI-K1/4P** Affected versions: - V4.76.005 build231012 and the versions prior to it (Status: affected) ### References 1. [](https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikvision-nvr-devices/) ### Credits - KITRI BoB 12th
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7793, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7793 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7793 - **State**: PUBLISHED - **Published Date**: June 11, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 16:12 UTC - **Reserved Date**: April 12, 2017 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) **Mozilla - Firefox ESR** Affected versions: - unspecified (Status: affected) **Mozilla - Thunderbird** Affected versions: - unspecified (Status: affected) ### References 1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1371889) 2. [[debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update](https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html) 3. [](https://www.mozilla.org/security/advisories/mfsa2017-22/) 4. [1039465](http://www.securitytracker.com/id/1039465) 5. [RHSA-2017:2831](https://access.redhat.com/errata/RHSA-2017:2831) 6. [RHSA-2017:2885](https://access.redhat.com/errata/RHSA-2017:2885) 7. [](https://www.mozilla.org/security/advisories/mfsa2017-21/) 8. [101055](http://www.securityfocus.com/bid/101055) 9. [DSA-4014](https://www.debian.org/security/2017/dsa-4014) 10. [](https://www.mozilla.org/security/advisories/mfsa2017-23/) 11. [DSA-3987](https://www.debian.org/security/2017/dsa-3987) 12. [GLSA-201803-14](https://security.gentoo.org/glsa/201803-14)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6149, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6149 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6149 - **State**: PUBLISHED - **Published Date**: November 13, 2020 at 14:44 UTC - **Last Updated**: August 04, 2024 at 08:55 UTC - **Reserved Date**: January 07, 2020 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file in an instance in USDC file format PATHS section. ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **n/a - Pixar** Affected versions: - Pixar OpenUSD 20.05, Apple macOS Catalina 10.15.3 (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3155, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3155 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3155 - **State**: PUBLISHED - **Published Date**: July 11, 2008 at 22:00 UTC - **Last Updated**: August 07, 2024 at 09:28 UTC - **Reserved Date**: July 11, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in the ActiveX control (as2guiie.dll) in Panda ActiveScan before 1.02.00 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long argument to the Update method. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [panda-activescan-bo(43588)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43588) 2. [ADV-2008-2008](http://www.vupen.com/english/advisories/2008/2008/references) 3. [30086](http://www.securityfocus.com/bid/30086) 4. [6004](https://www.exploit-db.com/exploits/6004) 5. [20080705 Panda ActiveScan 2.0 remote code execution](http://lists.grok.org.uk/pipermail/full-disclosure/2008-July/063061.html) 6. [30841](http://secunia.com/advisories/30841) 7. [20080704 Panda ActiveScan 2.0 remote code execution](http://lists.grok.org.uk/pipermail/full-disclosure/2008-July/063068.html) 8. [1020432](http://www.securitytracker.com/id?1020432) 9. [](http://karol.wiesek.pl/files/panda.tgz)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3029, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3029 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3029 - **State**: PUBLISHED - **Published Date**: January 07, 2021 at 13:55 UTC - **Last Updated**: August 03, 2024 at 16:45 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description EVOLUCARE ECSIMAGING (aka ECS Imaging) through 6.21.5 has an OS Command Injection vulnerability via shell metacharacters and an IFS manipulation. The parameter "file" on the webpage /showfile.php can be exploited to gain root access. NOTE: This vulnerability only affects products that are no longer supported by the maintainer ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.evolucare.com) 2. [](https://shoxxdj.fr/ecsimaging-os-injection-cve-2021-3029/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4817, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4817 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4817 - **State**: PUBLISHED - **Published Date**: September 11, 2007 at 19:00 UTC - **Last Updated**: August 07, 2024 at 15:08 UTC - **Reserved Date**: September 11, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unrestricted file upload vulnerability in the Restaurante (com_restaurante) component for Joomla! allows remote attackers to upload and execute arbitrary PHP code via an upload action specifying a filename with a double extension such as .php.jpg, which creates an accessible file under img_original/. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4383](https://www.exploit-db.com/exploits/4383) 2. [[VIM] 20070911 MIL 4383](http://www.attrition.org/pipermail/vim/2007-September/001779.html) 3. [26756](http://secunia.com/advisories/26756) 4. [25612](http://www.securityfocus.com/bid/25612) 5. [ADV-2007-3139](http://www.vupen.com/english/advisories/2007/3139) 6. [comprestaurante-index-file-upload(36538)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36538)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0849, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0849 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0849 - **State**: PUBLISHED - **Published Date**: April 09, 2019 at 20:18 UTC - **Last Updated**: August 04, 2024 at 17:58 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0802. ### Affected Products **Microsoft - Windows** Affected versions: - 7 for 32-bit Systems Service Pack 1 (Status: affected) - 7 for x64-based Systems Service Pack 1 (Status: affected) - 8.1 for 32-bit systems (Status: affected) - 8.1 for x64-based systems (Status: affected) - RT 8.1 (Status: affected) - 10 for 32-bit Systems (Status: affected) - 10 for x64-based Systems (Status: affected) - 10 Version 1607 for 32-bit Systems (Status: affected) - 10 Version 1607 for x64-based Systems (Status: affected) - 10 Version 1703 for 32-bit Systems (Status: affected) - 10 Version 1703 for x64-based Systems (Status: affected) - 10 Version 1709 for 32-bit Systems (Status: affected) - 10 Version 1709 for x64-based Systems (Status: affected) - 10 Version 1803 for 32-bit Systems (Status: affected) - 10 Version 1803 for x64-based Systems (Status: affected) - 10 Version 1803 for ARM64-based Systems (Status: affected) - 10 Version 1809 for 32-bit Systems (Status: affected) - 10 Version 1809 for x64-based Systems (Status: affected) - 10 Version 1809 for ARM64-based Systems (Status: affected) - 10 Version 1709 for ARM64-based Systems (Status: affected) **Microsoft - Windows Server** Affected versions: - 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected) - 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected) - 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) - 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected) - 2012 (Status: affected) - 2012 (Core installation) (Status: affected) - 2012 R2 (Status: affected) - 2012 R2 (Core installation) (Status: affected) - 2016 (Status: affected) - 2016 (Core installation) (Status: affected) - version 1709 (Core Installation) (Status: affected) - version 1803 (Core Installation) (Status: affected) - 2019 (Status: affected) - 2019 (Core installation) (Status: affected) - 2008 for Itanium-Based Systems Service Pack 2 (Status: affected) - 2008 for 32-bit Systems Service Pack 2 (Status: affected) - 2008 for x64-based Systems Service Pack 2 (Status: affected) - 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0849)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1977, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1977 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1977 - **State**: PUBLISHED - **Published Date**: April 21, 2006 at 22:00 UTC - **Last Updated**: August 07, 2024 at 17:35 UTC - **Reserved Date**: April 21, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in FlexBB 0.5.7 BETA and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) name and (2) message parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-1393](http://www.vupen.com/english/advisories/2006/1393) 2. [777](http://securityreason.com/securityalert/777) 3. [20060415 FlexBB <= 0.5.7 BETA XSS](http://www.securityfocus.com/archive/1/431071/100/0/threaded) 4. [1015946](http://securitytracker.com/id?1015946) 5. [flexbb-newthread-xss(25868)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25868)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32166, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32166 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32166 - **State**: PUBLISHED - **Published Date**: September 28, 2022 at 09:30 UTC - **Last Updated**: May 21, 2025 at 14:13 UTC - **Reserved Date**: May 31, 2022 at 00:00 UTC - **Assigned By**: Mend ### Vulnerability Description In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks” function could lead access to an unmapped region of memory. This vulnerability is capable of crashing the software, memory modification, and possible remote execution. ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **ovs - ovs** Affected versions: - v0.90.0 (Status: affected) - unspecified (Status: affected) ### References 1. [](https://www.mend.io/vulnerability-database/CVE-2022-32166) 2. [](https://github.com/cloudbase/ovs/commit/2ed6505555cdcb46f9b1f0329d1491b75290fc73) 3. [[debian-lts-announce] 20221029 [SECURITY] [DLA 3168-1] openvswitch security update](https://lists.debian.org/debian-lts-announce/2022/10/msg00036.html) ### Credits - Mend Vulnerability Research Team (MVR)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20792, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20792 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20792 - **State**: PUBLISHED - **Published Date**: February 25, 2019 at 06:00 UTC - **Last Updated**: August 05, 2024 at 12:12 UTC - **Reserved Date**: February 25, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description tecrail Responsive FileManager 9.13.4 allows remote attackers to read arbitrary file via path traversal with the path parameter, through the get_file action in ajax_calls.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [45987](https://www.exploit-db.com/exploits/45987)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20601, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20601 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20601 - **State**: PUBLISHED - **Published Date**: November 23, 2021 at 14:42 UTC - **Last Updated**: August 03, 2024 at 17:45 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: Mitsubishi ### Vulnerability Description Improper input validation vulnerability in GOT2000 series GT27 model all versions, GOT2000 series GT25 model all versions, GOT2000 series GT23 model all versions, GOT2000 series GT21 model all versions, GOT SIMPLE series GS21 model all versions, and GT SoftGOT2000 all versions allows an remote unauthenticated attacker to write a value that exceeds the configured input range limit by sending a malicious packet to rewrite the device value. As a result, the system operation may be affected, such as malfunction. ### Affected Products **n/a - GOT2000 series GT27 model; GOT2000 series GT25 model; GOT2000 series GT23 model; GOT2000 series GT21 model; GOT SIMPLE series GS21 model; GT SoftGOT2000** Affected versions: - All versions (Status: affected) ### References 1. [](https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2021-018.pdf) 2. [](https://jvn.jp/vu/JVNVU98072504) 3. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-320-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5590, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5590 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5590 - **State**: PUBLISHED - **Published Date**: October 30, 2013 at 10:00 UTC - **Last Updated**: August 06, 2024 at 17:15 UTC - **Reserved Date**: August 26, 2013 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openSUSE-SU-2013:1633](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=860123) 3. [GLSA-201504-01](https://security.gentoo.org/glsa/201504-01) 4. [](http://www.mozilla.org/security/announce/2013/mfsa2013-93.html) 5. [](https://bugzilla.mozilla.org/show_bug.cgi?id=893572) 6. [RHSA-2013:1480](http://rhn.redhat.com/errata/RHSA-2013-1480.html) 7. [RHSA-2013:1476](http://rhn.redhat.com/errata/RHSA-2013-1476.html) 8. [oval:org.mitre.oval:def:19001](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19001) 9. [openSUSE-SU-2013:1634](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html) 10. [DSA-2788](http://www.debian.org/security/2013/dsa-2788) 11. [SUSE-SU-2013:1678](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html) 12. [DSA-2797](http://www.debian.org/security/2013/dsa-2797)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28992, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28992 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28992 - **State**: PUBLISHED - **Published Date**: May 20, 2022 at 12:53 UTC - **Last Updated**: August 03, 2024 at 06:10 UTC - **Reserved Date**: April 11, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Cross-Site Request Forgery (CSRF) in Online Banquet Booking System v1.0 allows attackers to change admin credentials via a crafted POST request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com/files/166587/Online-Banquet-Booking-System-1.0-Cross-Site-Request-Forgery.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0665, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0665 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0665 - **State**: PUBLISHED - **Published Date**: February 13, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 16:41 UTC - **Reserved Date**: February 13, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in (1) query_store.php and (2) manage_proj_create.php in Mantis before 1.0.0 has unknown impact and attack vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. An original vendor bug report is referenced, but not accessible to the general public. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-0485](http://www.vupen.com/english/advisories/2006/0485) 2. [21400](http://secunia.com/advisories/21400) 3. [DSA-1133](http://www.debian.org/security/2006/dsa-1133) 4. [16561](http://www.securityfocus.com/bid/16561)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50492, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50492 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50492 - **State**: PUBLISHED - **Published Date**: October 28, 2024 at 11:25 UTC - **Last Updated**: October 28, 2024 at 12:12 UTC - **Reserved Date**: October 24, 2024 at 07:26 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Control of Generation of Code ('Code Injection') vulnerability in Scott Paterson ScottCart allows Code Injection.This issue affects ScottCart: from n/a through 1.1. ### CVSS Metrics - **CVSS Base Score**: 8.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **Scott Paterson - ScottCart** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/scottcart/wordpress-scottcart-plugin-1-1-remote-code-execution-rce-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0268, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0268 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0268 - **State**: PUBLISHED - **Published Date**: February 18, 2013 at 02:00 UTC - **Last Updated**: August 06, 2024 at 14:18 UTC - **Reserved Date**: December 06, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openSUSE-SU-2013:1187](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html) 2. [[oss-security] 20130207 Re: CVE request -- Linux kernel: x86/msr: /dev/cpu/*/msr local privilege escalation](http://www.openwall.com/lists/oss-security/2013/02/07/12) 3. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c903f0456bc69176912dee6dd25c6a66ee1aed00) 4. [](http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.6) 5. [](https://bugzilla.redhat.com/show_bug.cgi?id=908693) 6. [SUSE-SU-2013:0674](http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html) 7. [](https://github.com/torvalds/linux/commit/c903f0456bc69176912dee6dd25c6a66ee1aed00)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5705, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5705 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5705 - **State**: PUBLISHED - **Published Date**: October 29, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 15:39 UTC - **Reserved Date**: October 29, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the Settings component in the administration system in Jeebles Directory 2.9.60 allows remote authenticated administrators to execute arbitrary PHP code via unspecified vectors related to settings.inc.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [jeebles-settings-code-execution(37379)](https://exchange.xforce.ibmcloud.com/vulnerabilities/37379) 2. [27345](http://secunia.com/advisories/27345)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37956, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37956 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37956 - **State**: PUBLISHED - **Published Date**: July 20, 2024 at 08:16 UTC - **Last Updated**: August 02, 2024 at 04:04 UTC - **Reserved Date**: June 10, 2024 at 21:15 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Vektor,Inc. VK All in One Expansion Unit allows Stored XSS.This issue affects VK All in One Expansion Unit: from n/a through 9.99.1.0. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Vektor,Inc. - VK All in One Expansion Unit** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/vk-all-in-one-expansion-unit/wordpress-vk-all-in-one-expansion-unit-plugin-9-97-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Savphill (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5308, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5308 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5308 - **State**: PUBLISHED - **Published Date**: October 08, 2012 at 10:00 UTC - **Last Updated**: September 16, 2024 at 20:22 UTC - **Reserved Date**: October 08, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in servlet/traveler in IBM Lotus Notes Traveler through 8.5.3.3 Interim Fix 1 allows remote attackers to hijack the authentication of arbitrary users for requests that create problem reports via a getReportProblem upload action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20121001 BF, XSS, CSRF and Redirector vulnerabilities in IBM Lotus Notes Traveler](http://archives.neohapsis.com/archives/fulldisclosure/2012-10/0001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2658, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2658 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2658 - **State**: PUBLISHED - **Published Date**: September 12, 2006 at 16:00 UTC - **Last Updated**: August 07, 2024 at 17:58 UTC - **Reserved Date**: May 30, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in the xsp component in mod_mono in Mono/C# web server, as used in SUSE Open-Enterprise-Server 1 and SUSE Linux 9.2 through 10.0, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an HTTP request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [21847](http://secunia.com/advisories/21847) 2. [ADV-2006-3552](http://www.vupen.com/english/advisories/2006/3552) 3. [1016821](http://securitytracker.com/id?1016821) 4. [SUSE-SR:2006:022](http://lists.suse.com/archive/suse-security-announce/2006-Sep/0005.html) 5. [19929](http://www.securityfocus.com/bid/19929) 6. [21840](http://secunia.com/advisories/21840)