System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47485, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47485 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47485
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 14:19 UTC
- **Last Updated**: May 08, 2025 at 16:18 UTC
- **Reserved Date**: May 07, 2025 at 09:39 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in CozyThemes Cozy Blocks allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Cozy Blocks: from n/a through 2.1.22.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**CozyThemes - Cozy Blocks**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/cozy-addons/vulnerability/wordpress-cozy-blocks-2-1-22-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Marek Mikita (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20689, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20689 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20689
- **State**: PUBLISHED
- **Published Date**: July 04, 2023 at 01:44 UTC
- **Last Updated**: December 04, 2024 at 16:24 UTC
- **Reserved Date**: October 28, 2022 at 02:03 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In wlan firmware, there is possible system crash due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07664741; Issue ID: ALPS07664741.
### Affected Products
**MediaTek, Inc. - MT6739, MT8167, MT8321, MT8365, MT8385, MT8666, MT8765, MT8788**
Affected versions:
- Android 11.0 / IOT-v23.0 (Yocto 4.0) (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/July-2023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4157
- **State**: PUBLISHED
- **Published Date**: December 10, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 03:34 UTC
- **Reserved Date**: November 04, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[linux-scsi] 20101008 [patch] gdth: integer overflow in ioctl](http://ns3.spinics.net/lists/linux-scsi/msg47361.html)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=651147)
3. [42789](http://secunia.com/advisories/42789)
4. [ADV-2011-0024](http://www.vupen.com/english/advisories/2011/0024)
5. [SUSE-SA:2011:004](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html)
6. [42778](http://secunia.com/advisories/42778)
7. [RHSA-2011:0004](http://www.redhat.com/support/errata/RHSA-2011-0004.html)
8. [[oss-security] 20101108 Re: CVE request: kernel: gdth: integer overflow in ioc_general()](http://openwall.com/lists/oss-security/2010/11/09/3)
9. [42801](http://secunia.com/advisories/42801)
10. [20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console](http://www.securityfocus.com/archive/1/520102/100/0/threaded)
11. [46397](http://secunia.com/advisories/46397)
12. [SUSE-SA:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html)
13. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f63ae56e4e97fb12053590e41a4fa59e7daa74a4)
14. [FEDORA-2010-18983](http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html)
15. [SUSE-SA:2011:001](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html)
16. [42932](http://secunia.com/advisories/42932)
17. [[oss-security] 20101108 CVE request: kernel: gdth: integer overflow in ioc_general()](http://openwall.com/lists/oss-security/2010/11/09/1)
18. [[oss-security] 20101109 Re: CVE request: kernel: gdth: integer overflow in ioc_general()](http://openwall.com/lists/oss-security/2010/11/09/4)
19. [ADV-2011-0124](http://www.vupen.com/english/advisories/2011/0124)
20. [[oss-security] 20101109 Re: CVE request: kernel: gdth: integer overflow in ioc_general()](http://openwall.com/lists/oss-security/2010/11/09/5)
21. [SUSE-SA:2011:007](http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html)
22. [SUSE-SA:2010:060](http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html)
23. [ADV-2010-3321](http://www.vupen.com/english/advisories/2010/3321)
24. [ADV-2011-0298](http://www.vupen.com/english/advisories/2011/0298)
25. [RHSA-2010:0958](http://www.redhat.com/support/errata/RHSA-2010-0958.html)
26. [42963](http://secunia.com/advisories/42963)
27. [](http://www.vmware.com/security/advisories/VMSA-2011-0012.html)
28. [[oss-security] 20101110 Re: CVE request: kernel: gdth: integer overflow in ioc_general()](http://openwall.com/lists/oss-security/2010/11/10/12)
29. [44648](http://www.securityfocus.com/bid/44648)
30. [ADV-2011-0375](http://www.vupen.com/english/advisories/2011/0375)
31. [RHSA-2011:0162](http://www.redhat.com/support/errata/RHSA-2011-0162.html)
32. [ADV-2011-0012](http://www.vupen.com/english/advisories/2011/0012)
33. [SUSE-SA:2011:008](http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html)
34. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.1)
35. [ADV-2011-0168](http://www.vupen.com/english/advisories/2011/0168)
36. [42745](http://secunia.com/advisories/42745)
37. [43291](http://secunia.com/advisories/43291) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34992, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34992 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34992
- **State**: PUBLISHED
- **Published Date**: November 15, 2021 at 15:40 UTC
- **Last Updated**: August 04, 2024 at 00:26 UTC
- **Reserved Date**: June 17, 2021 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Orckestra C1 CMS 6.10. Authentication is required to exploit this vulnerability. The specific flaw exists within Composite.dll. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-14740.
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Orckestra - C1 CMS**
Affected versions:
- 6.10 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1304/)
2. [](https://github.com/Orckestra/C1-CMS-Foundation/releases/tag/v6.11)
### Credits
- Le Ngoc Anh - Sun* Cyber Security Research Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38123, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38123 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38123
- **State**: PUBLISHED
- **Published Date**: August 13, 2024 at 17:29 UTC
- **Last Updated**: May 21, 2025 at 21:06 UTC
- **Reserved Date**: June 11, 2024 at 22:36 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Bluetooth Driver Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
### References
1. [Windows Bluetooth Driver Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38123) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45413, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45413 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45413
- **State**: PUBLISHED
- **Published Date**: September 16, 2024 at 00:00 UTC
- **Last Updated**: September 18, 2024 at 15:22 UTC
- **Reserved Date**: August 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in rsa_decrypt function. This function is an API wrapper for LUA to decrypt RSA encrypted ciphertext, the decrypted data is stored on the stack without checking its length. An authenticated attacker can get RCE as root by exploiting this vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wr3nchsr.github.io/zte-multiple-routers-httpd-vulnerabilities-advisory/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30178, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30178 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30178
- **State**: PUBLISHED
- **Published Date**: April 06, 2021 at 23:29 UTC
- **Last Updated**: August 03, 2024 at 22:24 UTC
- **Reserved Date**: April 06, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Linux kernel through 5.11.11. synic_get in arch/x86/kvm/hyperv.c has a NULL pointer dereference for certain accesses to the SynIC Hyper-V context, aka CID-919f4ebc5987.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=919f4ebc598701670e80e31573a58f1f2d2bf918)
2. [FEDORA-2021-e71c033f88](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5YFGIIF24475A2LNW3UWHW2SNCS3G7M/)
3. [FEDORA-2021-57a7ba61f8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGQDVYCDM3F5VXUZIADIV2ERL3AJXNJS/)
4. [FEDORA-2021-8b64847a44](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ5GEETMX3ERQ4DF3GSS2XPNSOOK44OB/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13273, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13273 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13273
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 19:26 UTC
- **Last Updated**: January 09, 2025 at 21:11 UTC
- **Reserved Date**: January 09, 2025 at 18:28 UTC
- **Assigned By**: drupal
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Open Social allows Cross-Site Scripting (XSS).This issue affects Open Social: from 0.0.0 before 12.3.8, from 12.4.0 before 12.4.5, from 13.0.0 before 13.0.0-alpha11.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Drupal - Open Social**
Affected versions:
- 0.0.0 (Status: affected)
- 12.4.0 (Status: affected)
### References
1. [](https://www.drupal.org/sa-contrib-2024-037)
### Credits
- Thiago Régis
- Thiago Régis
- Ronald te Brake
- Greg Knaddison
- Juraj Nemec |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-29608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-29608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-29608
- **State**: PUBLISHED
- **Published Date**: April 02, 2021 at 17:40 UTC
- **Last Updated**: August 04, 2024 at 16:55 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, watchOS 7.2. A remote attacker may be able to leak memory.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212011)
2. [](https://support.apple.com/en-us/HT212147)
3. [](https://support.apple.com/en-us/HT212003)
4. [](https://support.apple.com/en-us/HT212005)
5. [](https://support.apple.com/en-us/HT212009) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3234, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3234 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3234
- **State**: PUBLISHED
- **Published Date**: June 22, 2015 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 05:39 UTC
- **Reserved Date**: April 10, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The OpenID module in Drupal 6.x before 6.36 and 7.x before 7.38 allows remote attackers to log into other users' accounts by leveraging an OpenID identity from certain providers, as demonstrated by the Verisign, LiveJournal, and StackExchange providers.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2015-10189](http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161265.html)
2. [75294](http://www.securityfocus.com/bid/75294)
3. [DSA-3291](http://www.debian.org/security/2015/dsa-3291)
4. [FEDORA-2015-10290](http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161261.html)
5. [](https://www.drupal.org/SA-CORE-2015-002) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6354, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6354
- **State**: PUBLISHED
- **Published Date**: June 27, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 12:10 UTC
- **Reserved Date**: September 11, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11 allows remote attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-15-032)
2. [MS14-051](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2276, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2276 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2276
- **State**: PUBLISHED
- **Published Date**: May 20, 2023 at 03:35 UTC
- **Last Updated**: January 13, 2025 at 16:48 UTC
- **Reserved Date**: April 25, 2023 at 11:43 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WCFM Membership – WooCommerce Memberships for Multivendor Marketplace plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 2.10.7. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**wclovers - WCFM Membership – WooCommerce Memberships for Multivendor Marketplace**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/42222c64-6492-4774-b5bc-8e62a1a328cf?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/wc-multivendor-membership/tags/2.10.7/controllers/wcfmvm-controller-memberships-registration.php#L124)
3. [](https://plugins.trac.wordpress.org/changeset/2907455/)
4. [](https://lana.codes/lanavdb/3a841453-d083-4f97-a7f1-b398c7304284/)
### Credits
- Lana Codes |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21653, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21653
- **State**: PUBLISHED
- **Published Date**: January 19, 2025 at 10:18 UTC
- **Last Updated**: May 04, 2025 at 07:18 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute
syzbot found that TCA_FLOW_RSHIFT attribute was not validated.
Right shitfing a 32bit integer is undefined for large shift values.
UBSAN: shift-out-of-bounds in net/sched/cls_flow.c:329:23
shift exponent 9445 is too large for 32-bit type 'u32' (aka 'unsigned int')
CPU: 1 UID: 0 PID: 54 Comm: kworker/u8:3 Not tainted 6.13.0-rc3-syzkaller-00180-g4f619d518db9 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: ipv6_addrconf addrconf_dad_work
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
ubsan_epilogue lib/ubsan.c:231 [inline]
__ubsan_handle_shift_out_of_bounds+0x3c8/0x420 lib/ubsan.c:468
flow_classify+0x24d5/0x25b0 net/sched/cls_flow.c:329
tc_classify include/net/tc_wrapper.h:197 [inline]
__tcf_classify net/sched/cls_api.c:1771 [inline]
tcf_classify+0x420/0x1160 net/sched/cls_api.c:1867
sfb_classify net/sched/sch_sfb.c:260 [inline]
sfb_enqueue+0x3ad/0x18b0 net/sched/sch_sfb.c:318
dev_qdisc_enqueue+0x4b/0x290 net/core/dev.c:3793
__dev_xmit_skb net/core/dev.c:3889 [inline]
__dev_queue_xmit+0xf0e/0x3f50 net/core/dev.c:4400
dev_queue_xmit include/linux/netdevice.h:3168 [inline]
neigh_hh_output include/net/neighbour.h:523 [inline]
neigh_output include/net/neighbour.h:537 [inline]
ip_finish_output2+0xd41/0x1390 net/ipv4/ip_output.c:236
iptunnel_xmit+0x55d/0x9b0 net/ipv4/ip_tunnel_core.c:82
udp_tunnel_xmit_skb+0x262/0x3b0 net/ipv4/udp_tunnel_core.c:173
geneve_xmit_skb drivers/net/geneve.c:916 [inline]
geneve_xmit+0x21dc/0x2d00 drivers/net/geneve.c:1039
__netdev_start_xmit include/linux/netdevice.h:5002 [inline]
netdev_start_xmit include/linux/netdevice.h:5011 [inline]
xmit_one net/core/dev.c:3590 [inline]
dev_hard_start_xmit+0x27a/0x7d0 net/core/dev.c:3606
__dev_queue_xmit+0x1b73/0x3f50 net/core/dev.c:4434
### Affected Products
**Linux - Linux**
Affected versions:
- e5dfb815181fcb186d6080ac3a091eadff2d98fe (Status: affected)
- e5dfb815181fcb186d6080ac3a091eadff2d98fe (Status: affected)
- e5dfb815181fcb186d6080ac3a091eadff2d98fe (Status: affected)
- e5dfb815181fcb186d6080ac3a091eadff2d98fe (Status: affected)
- e5dfb815181fcb186d6080ac3a091eadff2d98fe (Status: affected)
- e5dfb815181fcb186d6080ac3a091eadff2d98fe (Status: affected)
- e5dfb815181fcb186d6080ac3a091eadff2d98fe (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.25 (Status: affected)
- 0 (Status: unaffected)
- 5.4.290 (Status: unaffected)
- 5.10.234 (Status: unaffected)
- 5.15.177 (Status: unaffected)
- 6.1.125 (Status: unaffected)
- 6.6.72 (Status: unaffected)
- 6.12.10 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/9858f4afeb2e59506e714176bd3e135539a3eeec)
2. [](https://git.kernel.org/stable/c/43658e4a5f2770ad94e93362885ff51c10cf3179)
3. [](https://git.kernel.org/stable/c/a313d6e6d5f3a631cae5a241c392c28868aa5c5e)
4. [](https://git.kernel.org/stable/c/2011749ca96460386844dfc7e0fde53ebee96f3c)
5. [](https://git.kernel.org/stable/c/e54beb9aed2a90dddf4c5d68fcfc9a01f3e40a61)
6. [](https://git.kernel.org/stable/c/6fde663f7321418996645ee602a473457640542f)
7. [](https://git.kernel.org/stable/c/a039e54397c6a75b713b9ce7894a62e06956aa92) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39152, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39152
- **State**: PUBLISHED
- **Published Date**: July 26, 2023 at 13:54 UTC
- **Last Updated**: October 23, 2024 at 14:47 UTC
- **Reserved Date**: July 25, 2023 at 11:16 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Always-incorrect control flow implementation in Jenkins Gradle Plugin 2.8 may result in credentials not being masked (i.e., replaced with asterisks) in the build log in some circumstances.
### Affected Products
**Jenkins Project - Jenkins Gradle Plugin**
Affected versions:
- 2.8 (Status: affected)
### References
1. [Jenkins Security Advisory 2023-07-26](https://www.jenkins.io/security/advisory/2023-07-26/#SECURITY-3208)
2. [](http://www.openwall.com/lists/oss-security/2023/07/26/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1209, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1209 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1209
- **State**: PUBLISHED
- **Published Date**: February 06, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 04:33 UTC
- **Reserved Date**: January 21, 2015 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in core/editing/VisibleSelection.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper handling of a shadow-root anchor.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [google-chrome-cve20151209-code-exec(100715)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100715)
2. [72497](http://www.securityfocus.com/bid/72497)
3. [](http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html)
4. [62818](http://secunia.com/advisories/62818)
5. [62925](http://secunia.com/advisories/62925)
6. [](http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html)
7. [GLSA-201502-13](http://security.gentoo.org/glsa/glsa-201502-13.xml)
8. [](https://code.google.com/p/chromium/issues/detail?id=447906)
9. [62917](http://secunia.com/advisories/62917)
10. [](https://src.chromium.org/viewvc/blink?revision=188788&view=revision)
11. [RHSA-2015:0163](http://rhn.redhat.com/errata/RHSA-2015-0163.html)
12. [62670](http://secunia.com/advisories/62670)
13. [1031709](http://www.securitytracker.com/id/1031709)
14. [openSUSE-SU-2015:0441](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html)
15. [USN-2495-1](http://www.ubuntu.com/usn/USN-2495-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4369, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4369 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4369
- **State**: PUBLISHED
- **Published Date**: September 18, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 11:12 UTC
- **Reserved Date**: June 20, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The IOAcceleratorFamily API implementation in Apple iOS before 8 and Apple TV before 7 allows attackers to cause a denial of service (NULL pointer dereference and device crash) via an application that uses crafted arguments.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT6441)
2. [1030866](http://www.securitytracker.com/id/1030866)
3. [69929](http://www.securityfocus.com/bid/69929)
4. [](http://support.apple.com/kb/HT6442)
5. [APPLE-SA-2014-09-17-2](http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html)
6. [69882](http://www.securityfocus.com/bid/69882)
7. [appleios-cve20144369-dos(96106)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96106)
8. [APPLE-SA-2014-09-17-1](http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11661, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11661 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11661
- **State**: PUBLISHED
- **Published Date**: August 17, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 18:12 UTC
- **Reserved Date**: July 26, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The _WM_SetupMidiEvent function in internal_midi.c:2318 in WildMIDI 0.4.2 can cause a denial of service (invalid memory read and application crash) via a crafted mid file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [42433](https://www.exploit-db.com/exploits/42433/)
2. [20170808 wildmidi multiple vulnerabilities](http://seclists.org/fulldisclosure/2017/Aug/12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1491, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1491
- **State**: PUBLISHED
- **Published Date**: February 06, 2014 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 09:42 UTC
- **Reserved Date**: January 16, 2014 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2119-1](http://www.ubuntu.com/usn/USN-2119-1)
2. [](http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html)
3. [1029721](http://www.securitytracker.com/id/1029721)
4. [](http://hg.mozilla.org/projects/nss/rev/12c42006aed8)
5. [openSUSE-SU-2014:0212](http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.html)
6. [firefox-nss-cve20141491-unspecified(90886)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90886)
7. [1029717](http://www.securitytracker.com/id/1029717)
8. [](http://www.vmware.com/security/advisories/VMSA-2014-0012.html)
9. [DSA-2994](http://www.debian.org/security/2014/dsa-2994)
10. [65332](http://www.securityfocus.com/bid/65332)
11. [56922](http://secunia.com/advisories/56922)
12. [](https://bugzilla.mozilla.org/show_bug.cgi?id=934545)
13. [1029720](http://www.securitytracker.com/id/1029720)
14. [56858](http://secunia.com/advisories/56858)
15. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html)
16. [DSA-2858](http://www.debian.org/security/2014/dsa-2858)
17. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://www.securityfocus.com/archive/1/534161/100/0/threaded)
18. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html)
19. [USN-2102-2](http://www.ubuntu.com/usn/USN-2102-2)
20. [GLSA-201504-01](https://security.gentoo.org/glsa/201504-01)
21. [](http://www.mozilla.org/security/announce/2014/mfsa2014-12.html)
22. [](http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html)
23. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761)
24. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://seclists.org/fulldisclosure/2014/Dec/23)
25. [56888](http://secunia.com/advisories/56888)
26. [FEDORA-2014-2083](http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129218.html)
27. [openSUSE-SU-2014:0419](http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html)
28. [](http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html)
29. [FEDORA-2014-2041](http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html)
30. [SUSE-SU-2014:0248](http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html)
31. [openSUSE-SU-2014:0213](http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html)
32. [USN-2102-1](http://www.ubuntu.com/usn/USN-2102-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14199, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14199 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14199
- **State**: PUBLISHED
- **Published Date**: April 12, 2019 at 16:20 UTC
- **Last Updated**: August 05, 2024 at 19:20 UTC
- **Reserved Date**: September 07, 2017 at 00:00 UTC
- **Assigned By**: zephyr
### Vulnerability Description
A buffer overflow has been found in the Zephyr Project's getaddrinfo() implementation in 1.9.0 and 1.10.0.
### Affected Products
**Zephyr - getaddrinfo**
Affected versions:
- 1.9.0 (Status: affected)
- 1.10.0 (Status: affected)
### References
1. [](https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-12)
2. [](https://github.com/zephyrproject-rtos/zephyr/pull/6158) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20622, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20622
- **State**: PUBLISHED
- **Published Date**: April 15, 2022 at 14:17 UTC
- **Last Updated**: November 06, 2024 at 16:25 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in IP ingress packet processing of the Cisco Embedded Wireless Controller with Catalyst Access Points Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, causing a denial of service (DoS) condition. The device may experience a performance degradation in traffic processing or high CPU usage prior to the unexpected reload. This vulnerability is due to improper rate limiting of IP packets to the management interface. An attacker could exploit this vulnerability by sending a steady stream of IP traffic at a high rate to the management interface of the affected device. A successful exploit could allow the attacker to cause the device to reload.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**Cisco - Cisco Aironet Access Point Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20220413 Cisco Embedded Wireless Controller with Catalyst Access Points IP Flood Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ip-flood-dos-6hxxENVQ) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19386, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19386 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19386
- **State**: PUBLISHED
- **Published Date**: August 14, 2019 at 19:30 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SolarWinds Database Performance Analyzer 11.1.457 contains an instance of Reflected XSS in its idcStateError component, where the page parameter is reflected into the HREF of the 'Try Again' Button on the page, aka a /iwc/idcStateError.iwc?page= URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://i.imgur.com/Y7t2AD6.png)
2. [](https://medium.com/greenwolf-security/reflected-xss-in-solarwinds-database-performance-analyzer-988bd7a5cd5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2980, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2980 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2980
- **State**: PUBLISHED
- **Published Date**: August 09, 2010 at 19:23 UTC
- **Last Updated**: September 17, 2024 at 04:20 UTC
- **Reserved Date**: August 09, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cisco Unified Wireless Network (UWN) Solution 7.x before 7.0.98.0 on 5508 series controllers allows remote attackers to cause a denial of service (pbuf exhaustion and device crash) via fragmented traffic, aka Bug ID CSCtd26794.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6599, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6599 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6599
- **State**: PUBLISHED
- **Published Date**: January 30, 2018 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 01:36 UTC
- **Reserved Date**: August 04, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting configuration service (ConfigurationService) on port 9010. This service contains a method that can be used to retrieve a configuration file that contains the application database name, username and password as well as the domain administrator username and password. These are encrypted with a fixed key and IV ("NumaraIT") using the DES algorithm. The domain administrator username and password can only be obtained if the Self-Service component is enabled, which is the most common scenario in enterprise deployments.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20180126 [CVE-2016-6598/9]: RCE and admin cred disclosure in BMC Track-It! 11.4](http://seclists.org/fulldisclosure/2018/Jan/92)
2. [](https://github.com/pedrib/PoC/blob/master/advisories/bmc-track-it-11.4.txt)
3. [](https://communities.bmc.com/community/bmcdn/bmc_track-it/blog/2016/01/04/track-it-security-advisory-24-dec-2015)
4. [](http://packetstormsecurity.com/files/146110/BMC-Track-It-11.4-Code-Execution-Information-Disclosure.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-23205, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-23205 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23205
- **State**: PUBLISHED
- **Published Date**: July 01, 2021 at 20:09 UTC
- **Last Updated**: August 04, 2024 at 14:58 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross site scripting (XSS) vulnerability in Monstra CMS version 3.0.4 allows attackers to execute arbitrary web scripts or HTML via crafted a payload entered into the "Site Name" field under the "Site Settings" module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/monstra-cms/monstra/issues/465) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5888, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5888 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5888
- **State**: PUBLISHED
- **Published Date**: November 17, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 21:21 UTC
- **Reserved Date**: November 17, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Basic SEO Features (seo_basics) extension before 0.8.2 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://forge.typo3.org/issues/35532)
2. [typo3-seobasics-unspecified-xss(74483)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74483)
3. [52772](http://www.securityfocus.com/bid/52772)
4. [](http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-006/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47045, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47045
- **State**: PUBLISHED
- **Published Date**: February 28, 2024 at 08:13 UTC
- **Last Updated**: May 04, 2025 at 07:03 UTC
- **Reserved Date**: February 27, 2024 at 18:42 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb()
It is possible to call lpfc_issue_els_plogi() passing a did for which no
matching ndlp is found. A call is then made to lpfc_prep_els_iocb() with a
null pointer to a lpfc_nodelist structure resulting in a null pointer
dereference.
Fix by returning an error status if no valid ndlp is found. Fix up comments
regarding ndlp reference counting.
### Affected Products
**Linux - Linux**
Affected versions:
- 4430f7fd09ecb037570119e0aacbf0c17b8f98b2 (Status: affected)
- 4430f7fd09ecb037570119e0aacbf0c17b8f98b2 (Status: affected)
- 4430f7fd09ecb037570119e0aacbf0c17b8f98b2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.11 (Status: affected)
- 0 (Status: unaffected)
- 5.11.21 (Status: unaffected)
- 5.12.4 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/a09677de458d500b00701f6036baa423d9995408)
2. [](https://git.kernel.org/stable/c/9bdcfbed2a9fe24d2c7eaa1bad7c705e18de8cc7)
3. [](https://git.kernel.org/stable/c/8dd1c125f7f838abad009b64bff5f0a11afe3cb6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6301, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6301 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6301
- **State**: PUBLISHED
- **Published Date**: February 24, 2017 at 04:23 UTC
- **Last Updated**: August 05, 2024 at 15:25 UTC
- **Reserved Date**: February 23, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "4 of 9. Out of Bounds Reads."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [96423](http://www.securityfocus.com/bid/96423)
2. [](http://www.openwall.com/lists/oss-security/2017/02/15/4)
3. [](https://github.com/Yeraze/ytnef/pull/27)
4. [DSA-3846](http://www.debian.org/security/2017/dsa-3846)
5. [](https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/)
6. [FEDORA-2019-7d7083b8be](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LFJWMUEUC4ILH2HEOCYVVLQT654ZMCGQ/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2223, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2223 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2223
- **State**: PUBLISHED
- **Published Date**: July 15, 2020 at 17:00 UTC
- **Last Updated**: August 04, 2024 at 07:01 UTC
- **Reserved Date**: December 05, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape correctly the 'href' attribute of links to downstream jobs displayed in the build console page, resulting in a stored cross-site scripting vulnerability.
### Affected Products
**Jenkins project - Jenkins**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2020-07-15/#SECURITY-1945)
2. [[oss-security] 20200715 Multiple vulnerabilities in Jenkins and Jenkins plugins](http://www.openwall.com/lists/oss-security/2020/07/15/5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3261, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3261 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3261
- **State**: PUBLISHED
- **Published Date**: July 13, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 11 allows remote attackers to obtain sensitive information via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036283](http://www.securitytracker.com/id/1036283)
2. [MS16-084](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-084)
3. [91575](http://www.securityfocus.com/bid/91575) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30513, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30513 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30513
- **State**: PUBLISHED
- **Published Date**: March 29, 2024 at 15:50 UTC
- **Last Updated**: August 02, 2024 at 01:38 UTC
- **Reserved Date**: March 27, 2024 at 12:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authorization Bypass Through User-Controlled Key vulnerability in Metagauss ProfileGrid.This issue affects ProfileGrid : from n/a through 5.7.2.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**Metagauss - ProfileGrid **
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/profilegrid-user-profiles-groups-and-communities/wordpress-profilegrid-plugin-5-7-2-insecure-direct-object-references-idor-vulnerability?_s_id=cve)
### Credits
- Van Lyubov (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45078, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45078 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45078
- **State**: PUBLISHED
- **Published Date**: December 15, 2021 at 19:37 UTC
- **Last Updated**: August 04, 2024 at 04:32 UTC
- **Reserved Date**: December 15, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=28694)
2. [](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=161e87d12167b1e36193385485c1f6ce92f74f02)
3. [FEDORA-2021-f2c6802743](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/)
4. [FEDORA-2021-3614c0b466](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/)
5. [](https://security.netapp.com/advisory/ntap-20220107-0002/)
6. [GLSA-202208-30](https://security.gentoo.org/glsa/202208-30) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38548, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38548 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38548
- **State**: PUBLISHED
- **Published Date**: August 11, 2021 at 15:24 UTC
- **Last Updated**: August 04, 2024 at 01:44 UTC
- **Reserved Date**: August 11, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JBL Go 2 devices through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nassiben.com/glowworm-attack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5202, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5202 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5202
- **State**: PUBLISHED
- **Published Date**: November 21, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 10:49 UTC
- **Reserved Date**: November 21, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in index.php in OTManager CMS 24a allows remote attackers to inject arbitrary web script or HTML via the conteudo parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [otmanager-conteudo-xss(43457)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43457)
2. [4644](http://securityreason.com/securityalert/4644)
3. [29992](http://www.securityfocus.com/bid/29992)
4. [5957](https://www.exploit-db.com/exploits/5957) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0362
- **State**: PUBLISHED
- **Published Date**: February 13, 2009 at 01:00 UTC
- **Last Updated**: September 16, 2024 at 20:26 UTC
- **Reserved Date**: January 29, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
filter.d/wuftpd.conf in Fail2ban 0.8.3 uses an incorrect regular expression that allows remote attackers to cause a denial of service (forced authentication failures) via a crafted reverse-resolved DNS name (rhost) entry that contains a substring that is interpreted as an IP address, a different vulnerability than CVE-2007-4321.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33890](http://secunia.com/advisories/33890)
2. [33734](http://www.securityfocus.com/bid/33734)
3. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=514163) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0486, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0486 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0486
- **State**: PUBLISHED
- **Published Date**: July 14, 2021 at 13:43 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In onPackageAddedInternal of PermissionManagerService.java, there is possible access to external storage due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-171430330
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-07-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-21238, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-21238 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-21238
- **State**: PUBLISHED
- **Published Date**: December 27, 2021 at 22:23 UTC
- **Last Updated**: August 04, 2024 at 14:22 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the user login box of CSCMS v4.0 allows attackers to hijack user accounts via brute force attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/chshcms/cscms/issues/5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16073, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16073 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16073
- **State**: PUBLISHED
- **Published Date**: June 27, 2019 at 16:13 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 29, 2018 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient policy enforcement in site isolation in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass site isolation via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/863069) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40780, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40780 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40780
- **State**: PUBLISHED
- **Published Date**: March 16, 2022 at 14:02 UTC
- **Last Updated**: April 23, 2025 at 18:52 UTC
- **Reserved Date**: September 08, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Media Encoder version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-788: OS Command Injection
### Affected Products
**Adobe - Media Encoder**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3997, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3997
- **State**: PUBLISHED
- **Published Date**: April 28, 2025 at 02:31 UTC
- **Last Updated**: April 28, 2025 at 18:11 UTC
- **Reserved Date**: April 26, 2025 at 08:18 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in dazhouda lecms 3.0.3. This affects an unknown part of the file /index.php?my-profile-ajax-1 of the component Personal Information Page. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
- CWE-862: Missing Authorization
### Affected Products
**dazhouda - lecms**
Affected versions:
- 3.0.3 (Status: affected)
### References
1. [VDB-306333 | dazhouda lecms Personal Information Page index.php cross-site request forgery](https://vuldb.com/?id.306333)
2. [VDB-306333 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.306333)
3. [Submit #557956 | https://gitee.com/dazhouda/lecms3.0.3 lecms 3.0.3 Cross-Site Request Forgery](https://vuldb.com/?submit.557956)
4. [](https://github.com/dtwin88/cve-md/blob/main/lecms%20V3.0.3/lecms_4.md)
### Credits
- dtwin (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48813, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48813 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48813
- **State**: PUBLISHED
- **Published Date**: July 16, 2024 at 11:44 UTC
- **Last Updated**: May 04, 2025 at 08:23 UTC
- **Reserved Date**: July 16, 2024 at 11:38 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: felix: don't use devres for mdiobus
As explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")
mdiobus_free() will panic when called from devm_mdiobus_free() <-
devres_release_all() <- __device_release_driver(), and that mdiobus was
not previously unregistered.
The Felix VSC9959 switch is a PCI device, so the initial set of
constraints that I thought would cause this (I2C or SPI buses which call
->remove on ->shutdown) do not apply. But there is one more which
applies here.
If the DSA master itself is on a bus that calls ->remove from ->shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the felix switch driver on shutdown.
So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.
The felix driver has the code structure in place for orderly mdiobus
removal, so just replace devm_mdiobus_alloc_size() with the non-devres
variant, and add manual free where necessary, to ensure that we don't
let devres free a still-registered bus.
### Affected Products
**Linux - Linux**
Affected versions:
- ac3a68d56651c3dad2c12c7afce065fe15267f44 (Status: affected)
- ac3a68d56651c3dad2c12c7afce065fe15267f44 (Status: affected)
- ac3a68d56651c3dad2c12c7afce065fe15267f44 (Status: affected)
- ac3a68d56651c3dad2c12c7afce065fe15267f44 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.9 (Status: affected)
- 0 (Status: unaffected)
- 5.10.101 (Status: unaffected)
- 5.15.24 (Status: unaffected)
- 5.16.10 (Status: unaffected)
- 5.17 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/95e5402f9430b3c7d885dd3ec4c8c02c17936923)
2. [](https://git.kernel.org/stable/c/8cda7577a0b4018572f31e0caadfabd305ea2786)
3. [](https://git.kernel.org/stable/c/9db6f056efd089e80d81c774c01b639adf30c097)
4. [](https://git.kernel.org/stable/c/209bdb7ec6a28c7cdf580a0a98afbc9fc3b98932) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0943, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0943 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0943
- **State**: PUBLISHED
- **Published Date**: November 21, 2003 at 05:00 UTC
- **Last Updated**: September 17, 2024 at 01:16 UTC
- **Reserved Date**: November 11, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
web-tools in SAP DB before 7.4.03.30 installs several services that are enabled by default, which could allow remote attackers to obtain potentially sensitive information or redirect attacks against internal databases via (1) waecho, (2) Web SQL Interface (websql), or (3) Web Database Manager (webdbm).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [A111703-2](http://www.atstake.com/research/advisories/2003/a111703-2.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50071, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50071 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50071
- **State**: PUBLISHED
- **Published Date**: December 29, 2023 at 00:00 UTC
- **Last Updated**: September 03, 2024 at 19:54 UTC
- **Reserved Date**: December 04, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_department via id or name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/geraldoalcantara/CVE-2023-50071)
2. [](https://medium.com/%40geraldoalcantarapro/cve-2023-50071-a20767cb3c7b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6532, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6532 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6532
- **State**: PUBLISHED
- **Published Date**: December 14, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 20:26 UTC
- **Reserved Date**: December 13, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Vt-Forum Lite 1.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) StrMsg or (2) Topic_ID parameter to (a) vf_info.asp, (b) vf_newtopic.asp, (c) vf_settings.asp, and (d) vf_replytopic.asp, different vectors than CVE-2006-6447. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [vtforum-multiple-xss(30725)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30725)
2. [ADV-2006-4850](http://www.vupen.com/english/advisories/2006/4850) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3452, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3452 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3452
- **State**: PUBLISHED
- **Published Date**: June 27, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 14:14 UTC
- **Reserved Date**: June 26, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in essentials/minutes/doc.php in eDocStore allows remote attackers to execute arbitrary SQL commands via the doc_id parameter in an inline action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-2327](http://www.vupen.com/english/advisories/2007/2327)
2. [4108](https://www.exploit-db.com/exploits/4108)
3. [25831](http://secunia.com/advisories/25831)
4. [edocstore-doc-sql-injection(35057)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35057)
5. [36292](http://osvdb.org/36292) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2685, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2685
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 05:22 UTC
- **Last Updated**: March 27, 2025 at 14:38 UTC
- **Reserved Date**: March 22, 2025 at 16:55 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The TablePress – Tables in WordPress made easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘table-name’ parameter in all versions up to, and including, 3.0.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**tobiasbg - TablePress – Tables in WordPress made easy**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/e285849f-886e-49ba-bb43-8c67655fe239?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/tablepress/trunk/views/class-all-tables-list-table.php#L242)
3. [](https://plugins.trac.wordpress.org/changeset/3261229/)
### Credits
- SavPhill |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49701, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49701 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49701
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:24 UTC
- **Last Updated**: May 04, 2025 at 08:43 UTC
- **Reserved Date**: February 26, 2025 at 02:21 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: ibmvfc: Allocate/free queue resource only during probe/remove
Currently, the sub-queues and event pool resources are allocated/freed for
every CRQ connection event such as reset and LPM. This exposes the driver
to a couple issues. First the inefficiency of freeing and reallocating
memory that can simply be resued after being sanitized. Further, a system
under memory pressue runs the risk of allocation failures that could result
in a crippled driver. Finally, there is a race window where command
submission/compeletion can try to pull/return elements from/to an event
pool that is being deleted or already has been deleted due to the lack of
host state around freeing/allocating resources. The following is an example
of list corruption following a live partition migration (LPM):
Oops: Exception in kernel mode, sig: 5 [#1]
LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries
Modules linked in: vfat fat isofs cdrom ext4 mbcache jbd2 nft_counter nft_compat nf_tables nfnetlink rpadlpar_io rpaphp xsk_diag nfsv3 nfs_acl nfs lockd grace fscache netfs rfkill bonding tls sunrpc pseries_rng drm drm_panel_orientation_quirks xfs libcrc32c dm_service_time sd_mod t10_pi sg ibmvfc scsi_transport_fc ibmveth vmx_crypto dm_multipath dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse
CPU: 0 PID: 2108 Comm: ibmvfc_0 Kdump: loaded Not tainted 5.14.0-70.9.1.el9_0.ppc64le #1
NIP: c0000000007c4bb0 LR: c0000000007c4bac CTR: 00000000005b9a10
REGS: c00000025c10b760 TRAP: 0700 Not tainted (5.14.0-70.9.1.el9_0.ppc64le)
MSR: 800000000282b033 <SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE> CR: 2800028f XER: 0000000f
CFAR: c0000000001f55bc IRQMASK: 0
GPR00: c0000000007c4bac c00000025c10ba00 c000000002a47c00 000000000000004e
GPR04: c0000031e3006f88 c0000031e308bd00 c00000025c10b768 0000000000000027
GPR08: 0000000000000000 c0000031e3009dc0 00000031e0eb0000 0000000000000000
GPR12: c0000031e2ffffa8 c000000002dd0000 c000000000187108 c00000020fcee2c0
GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
GPR20: 0000000000000000 0000000000000000 0000000000000000 c008000002f81300
GPR24: 5deadbeef0000100 5deadbeef0000122 c000000263ba6910 c00000024cc88000
GPR28: 000000000000003c c0000002430a0000 c0000002430ac300 000000000000c300
NIP [c0000000007c4bb0] __list_del_entry_valid+0x90/0x100
LR [c0000000007c4bac] __list_del_entry_valid+0x8c/0x100
Call Trace:
[c00000025c10ba00] [c0000000007c4bac] __list_del_entry_valid+0x8c/0x100 (unreliable)
[c00000025c10ba60] [c008000002f42284] ibmvfc_free_queue+0xec/0x210 [ibmvfc]
[c00000025c10bb10] [c008000002f4246c] ibmvfc_deregister_scsi_channel+0xc4/0x160 [ibmvfc]
[c00000025c10bba0] [c008000002f42580] ibmvfc_release_sub_crqs+0x78/0x130 [ibmvfc]
[c00000025c10bc20] [c008000002f4f6cc] ibmvfc_do_work+0x5c4/0xc70 [ibmvfc]
[c00000025c10bce0] [c008000002f4fdec] ibmvfc_work+0x74/0x1e8 [ibmvfc]
[c00000025c10bda0] [c0000000001872b8] kthread+0x1b8/0x1c0
[c00000025c10be10] [c00000000000cd64] ret_from_kernel_thread+0x5c/0x64
Instruction dump:
40820034 38600001 38210060 4e800020 7c0802a6 7c641b78 3c62fe7a 7d254b78
3863b590 f8010070 4ba309cd 60000000 <0fe00000> 7c0802a6 3c62fe7a 3863b640
---[ end trace 11a2b65a92f8b66c ]---
ibmvfc 30000003: Send warning. Receive queue closed, will retry.
Add registration/deregistration helpers that are called instead during
connection resets to sanitize and reconfigure the queues.
### Affected Products
**Linux - Linux**
Affected versions:
- 3034ebe26389740bb6b4a463e05afb51dc93c336 (Status: affected)
- 3034ebe26389740bb6b4a463e05afb51dc93c336 (Status: affected)
- 3034ebe26389740bb6b4a463e05afb51dc93c336 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.12 (Status: affected)
- 0 (Status: unaffected)
- 5.15.51 (Status: unaffected)
- 5.18.8 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/161ec2a0807ddd58bc0f24f3e1e7e3d4fef5297f)
2. [](https://git.kernel.org/stable/c/9f23c499ca601b2a1e1d2e761d03964b739bca0e)
3. [](https://git.kernel.org/stable/c/72ea7fe0db73d65c7d977208842d8ade9b823de9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26556, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26556
- **State**: PUBLISHED
- **Published Date**: October 07, 2021 at 01:00 UTC
- **Last Updated**: August 03, 2024 at 20:26 UTC
- **Reserved Date**: February 02, 2021 at 00:00 UTC
- **Assigned By**: Octopus
### Vulnerability Description
When Octopus Server is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access.
### Affected Products
**Octopus Deploy - Octopus Server**
Affected versions:
- 0.9 (Status: affected)
- unspecified (Status: affected)
- 2020.5.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://advisories.octopus.com/adv/2021-01---Local-privilege-escalation-in-Octopus-Server-%28CVE-2021-26556%29.1733296189.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32585, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32585 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32585
- **State**: PUBLISHED
- **Published Date**: April 11, 2025 at 08:42 UTC
- **Last Updated**: April 11, 2025 at 13:54 UTC
- **Reserved Date**: April 09, 2025 at 11:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Path Traversal vulnerability in Trusty Plugins Shop Products Filter allows PHP Local File Inclusion. This issue affects Shop Products Filter: from n/a through 1.2.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-35: Security Weakness
### Affected Products
**Trusty Plugins - Shop Products Filter**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/trusty-woo-products-filter/vulnerability/wordpress-shop-products-filter-plugin-1-2-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13720
- **State**: PUBLISHED
- **Published Date**: November 25, 2019 at 14:22 UTC
- **Last Updated**: February 03, 2025 at 14:19 UTC
- **Reserved Date**: July 18, 2019 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://crbug.com/1019226)
2. [](https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html)
3. [openSUSE-SU-2019:2664](http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00022.html)
4. [GLSA-202004-04](https://security.gentoo.org/glsa/202004-04)
5. [](http://packetstormsecurity.com/files/167066/Google-Chrome-78.0.3904.70-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4397, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4397 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4397
- **State**: PUBLISHED
- **Published Date**: August 18, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 18, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple CRLF injection vulnerabilities in (1) xmms-thing 1.0, (2) XMMS Remote Control Script 1.07, (3) Disrok 1.0, (4) a2x 0.0.1, (5) Another xmms-info script 1.0, (6) XChat-XMMS 0.8.1, and other unspecified scripts for XChat allow user-assisted remote attackers to execute arbitrary IRC commands via CRLF sequences in the name of the song in a .mp3 file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26485](http://secunia.com/advisories/26485)
2. [25281](http://www.securityfocus.com/bid/25281)
3. [3036](http://securityreason.com/securityalert/3036)
4. [26488](http://secunia.com/advisories/26488)
5. [26484](http://secunia.com/advisories/26484)
6. [26486](http://secunia.com/advisories/26486)
7. [20070812 Vulnerability in multiple "now playing" scripts for various IRC clients](http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065227.html)
8. [39575](http://osvdb.org/39575)
9. [26487](http://secunia.com/advisories/26487)
10. [20070812 Vulnerability in multiple "now playing" scripts for various IRC clients](http://www.securityfocus.com/archive/1/476283/100/0/threaded)
11. [irc-multiple-command-execution(35985)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35985)
12. [26454](http://secunia.com/advisories/26454)
13. [](http://wouter.coekaerts.be/site/security/nowplaying)
14. [26455](http://secunia.com/advisories/26455)
15. [39574](http://osvdb.org/39574) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51000, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51000 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51000
- **State**: PUBLISHED
- **Published Date**: November 05, 2024 at 00:00 UTC
- **Last Updated**: November 05, 2024 at 16:15 UTC
- **Reserved Date**: October 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netgear R8500 v1.0.2.160 was discovered to contain multiple stack overflow vulnerabilities in the component wireless.cgi via the opmode, opmode_an, and opmode_an_2 parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.netgear.com/about/security/)
2. [](https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_35/35.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4102, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4102 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4102
- **State**: PUBLISHED
- **Published Date**: November 04, 2019 at 14:45 UTC
- **Last Updated**: August 06, 2024 at 16:30 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cryptocat before 2.0.22 strophe.js Math.random() Random Number Generator Weakness
### Affected Products
**n/a - n/a**
Affected versions:
- before 2.0.22 (Status: affected)
### References
1. [](https://www.openwall.com/lists/oss-security/2013/07/10/15)
2. [](https://tobtu.com/decryptocat.php)
3. [](https://vuldb.com/?id.9443)
4. [](https://www.securityfocus.com/bid/61095) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5431, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5431 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5431
- **State**: PUBLISHED
- **Published Date**: May 06, 2019 at 16:47 UTC
- **Last Updated**: August 04, 2024 at 19:54 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
This vulnerability was caused by an incomplete fix to CVE-2017-0911. Twitter Kit for iOS versions 3.0 to 3.4.0 is vulnerable to a callback verification flaw in the "Login with Twitter" component allowing an attacker to provide alternate credentials. In the final step of "Login with Twitter" authentication information is passed back to the application using the registered custom URL scheme (typically twitterkit-<consumer-key>) on iOS. Because the callback handler did not verify the authenticity of the response, this step is vulnerable to forgery, potentially allowing attacker to associate a Twitter account with a third-party service.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**n/a - Twitter Kit for iOS**
Affected versions:
- v3.4.2 (Status: affected)
### References
1. [](https://blog.twitter.com/developer/en_us/topics/tips/2018/vulnerability-in-twitter-kit-for-ios.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21293, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21293 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21293
- **State**: PUBLISHED
- **Published Date**: February 02, 2021 at 21:35 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 22, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
blaze is a Scala library for building asynchronous pipelines, with a focus on network IO. All servers running blaze-core before version 0.14.15 are affected by a vulnerability in which unbounded connection acceptance leads to file handle exhaustion. Blaze, accepts connections unconditionally on a dedicated thread pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. The vast majority of affected users are using it as part of http4s-blaze-server <= 0.21.16. http4s provides a mechanism for limiting open connections, but is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. The issue is fixed in version 0.14.15 for "NIO1SocketServerGroup". A "maxConnections" parameter is added, with a default value of 512. Concurrent connections beyond this limit are rejected. To run unbounded, which is not recommended, set a negative number. The "NIO2SocketServerGroup" has no such setting and is now deprecated. There are several possible workarounds described in the refrenced GitHub Advisory GHSA-xmw9-q7x9-j5qc.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**http4s - blaze**
Affected versions:
- < 0.14.15 (Status: affected)
### References
1. [](https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc)
2. [](https://github.com/http4s/http4s/security/advisories/GHSA-xhv5-w9c5-2r2w)
3. [](https://github.com/http4s/blaze/commit/4f786177f9fb71ab272f3a5f6c80bca3e5662aa1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0020
- **State**: PUBLISHED
- **Published Date**: February 16, 2024 at 19:33 UTC
- **Last Updated**: March 19, 2025 at 13:59 UTC
- **Reserved Date**: November 16, 2023 at 22:58 UTC
- **Assigned By**: google_android
### Vulnerability Description
In onActivityResult of NotificationSoundPreference.java, there is a possible way to hear audio files belonging to a different user due to a confused deputy. This could lead to local information disclosure across users of a device with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
- 13 (Status: affected)
- 12L (Status: affected)
- 12 (Status: affected)
- 11 (Status: affected)
### References
1. [](https://android.googlesource.com/platform/packages/apps/Settings/+/87f791f2351e366f842a0fd6fcb744069160d9a1)
2. [](https://source.android.com/security/bulletin/2024-01-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1062, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1062 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1062
- **State**: PUBLISHED
- **Published Date**: February 14, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 18:45 UTC
- **Reserved Date**: February 13, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine Applications Manager 9.x and 10.x allow remote attackers to inject arbitrary web script or HTML via the (1) period parameter to showHistoryData.do; (2) selectedNetwork, (3) network, or (4) group parameters to showresource.do; (5) header parameter to AlarmView.do; or (6) attName parameter to jsp/PopUp_Graph.jsp. NOTE: the Search.do/query vector is already covered by CVE-2008-1566, and the jsp/ThresholdActionConfiguration.jsp redirectto vector is already covered by CVE-2008-0474.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [meapplicationsmanager-multiple-xss(72830)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72830)
2. [](http://www.vulnerability-lab.com/get_content.php?id=115)
3. [](http://packetstormsecurity.org/files/view/109238/VL-115.txt)
4. [78722](http://osvdb.org/78722)
5. [47724](http://secunia.com/advisories/47724)
6. [51796](http://www.securityfocus.com/bid/51796)
7. [78721](http://osvdb.org/78721) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0551, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0551 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0551
- **State**: PUBLISHED
- **Published Date**: April 16, 2018 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 03:28 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in Cybozu Garoon 3.0.0 to 4.6.1 allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**Cybozu, Inc. - Cybozu Garoon**
Affected versions:
- 3.0.0 to 4.6.1 (Status: affected)
### References
1. [](https://support.cybozu.com/ja-jp/article/10211)
2. [JVN#65268217](http://jvn.jp/en/jp/JVN65268217/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5140, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5140
- **State**: PUBLISHED
- **Published Date**: May 25, 2025 at 01:31 UTC
- **Last Updated**: May 28, 2025 at 17:39 UTC
- **Reserved Date**: May 23, 2025 at 19:02 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in Seeyon Zhiyuan OA Web Application System up to 8.1 SP2. This affects the function this.oursNetService.getData of the file com\ours\www\ehr\openPlatform1\open4ClientType\controller\ThirdMenuController.class. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**Seeyon - Zhiyuan OA Web Application System**
Affected versions:
- 8.1 SP2 (Status: affected)
### References
1. [VDB-310221 | Seeyon Zhiyuan OA Web Application System ThirdMenuController.class this.oursNetService.getData server-side request forgery](https://vuldb.com/?id.310221)
2. [VDB-310221 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.310221)
3. [Submit #574440 | Seeyon Zhiyuan OA Web Application System V8.1 SP2 Server-Side Request Forgery Vulnerability](https://vuldb.com/?submit.574440)
4. [](https://wx.mail.qq.com/s?k=i0-p-2N4MHcFOeM00E)
### Credits
- caichaoxiong (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49060, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49060
- **State**: PUBLISHED
- **Published Date**: November 15, 2024 at 20:25 UTC
- **Last Updated**: January 30, 2025 at 00:10 UTC
- **Reserved Date**: October 11, 2024 at 20:57 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Azure Stack HCI Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**Microsoft - Azure Stack HCI**
Affected versions:
- 10.2408.1.9 (Status: affected)
### References
1. [Azure Stack HCI Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49060) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0772, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0772 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0772
- **State**: PUBLISHED
- **Published Date**: July 26, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:03 UTC
- **Reserved Date**: July 25, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in dsnmanager.asp for Hosting Controller allows remote attackers to read arbitrary files and directories via a .. (dot dot) in the RootName parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [hosting-controller-dsnmanager-traversal(9104)](http://www.iss.net/security_center/static/9104.php)
2. [20020517 Hosting Controller still have dangerous bugs!](http://archives.neohapsis.com/archives/bugtraq/2002-05/0142.html)
3. [4759](http://www.securityfocus.com/bid/4759) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1241
- **State**: PUBLISHED
- **Published Date**: March 27, 2008 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 08:17 UTC
- **Reserved Date**: March 10, 2008 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
GUI overlay vulnerability in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 allows remote attackers to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20080327 rPSA-2008-0128-1 firefox](http://www.securityfocus.com/archive/1/490196/100/0/threaded)
2. [29541](http://secunia.com/advisories/29541)
3. [29539](http://secunia.com/advisories/29539)
4. [](http://www.mozilla.org/security/announce/2008/mfsa2008-19.html)
5. [30620](http://secunia.com/advisories/30620)
6. [29560](http://secunia.com/advisories/29560)
7. [DSA-1532](http://www.debian.org/security/2008/dsa-1532)
8. [30327](http://secunia.com/advisories/30327)
9. [238492](http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1)
10. [USN-592-1](http://www.ubuntu.com/usn/usn-592-1)
11. [29616](http://secunia.com/advisories/29616)
12. [29550](http://secunia.com/advisories/29550)
13. [29645](http://secunia.com/advisories/29645)
14. [29607](http://secunia.com/advisories/29607)
15. [oval:org.mitre.oval:def:11163](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11163)
16. [ADV-2008-1793](http://www.vupen.com/english/advisories/2008/1793/references)
17. [29558](http://secunia.com/advisories/29558)
18. [RHSA-2008:0208](http://rhn.redhat.com/errata/RHSA-2008-0208.html)
19. [29526](http://secunia.com/advisories/29526)
20. [SUSE-SA:2008:019](http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html)
21. [TA08-087A](http://www.us-cert.gov/cas/techalerts/TA08-087A.html)
22. [29391](http://secunia.com/advisories/29391)
23. [1019700](http://www.securitytracker.com/id?1019700)
24. [RHSA-2008:0209](http://www.redhat.com/support/errata/RHSA-2008-0209.html)
25. [28448](http://www.securityfocus.com/bid/28448)
26. [RHSA-2008:0207](http://www.redhat.com/support/errata/RHSA-2008-0207.html)
27. [DSA-1534](http://www.debian.org/security/2008/dsa-1534)
28. [29547](http://secunia.com/advisories/29547)
29. [firefox-xul-popup-spoofing(41454)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41454)
30. [GLSA-200805-18](http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml)
31. [](http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128)
32. [ADV-2008-0998](http://www.vupen.com/english/advisories/2008/0998/references)
33. [DSA-1535](http://www.debian.org/security/2008/dsa-1535)
34. [MDVSA-2008:080](http://www.mandriva.com/security/advisories?name=MDVSA-2008:080) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-20583, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-20583 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-20583
- **State**: PUBLISHED
- **Published Date**: July 08, 2021 at 15:44 UTC
- **Last Updated**: August 04, 2024 at 14:22 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQL injection vulnerability in /question.php of LJCMS Version v4.3.R60321 allows attackers to obtain sensitive database information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/0xyu/PHP_Learning/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4321, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4321
- **State**: PUBLISHED
- **Published Date**: December 14, 2009 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 07:01 UTC
- **Reserved Date**: December 14, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
extras/curltest.php in Zen Cart 1.3.8 and 1.3.8a, and possibly other versions, allows remote attackers to read arbitrary files via a file:// URI. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2009-3474](http://www.vupen.com/english/advisories/2009/3474)
2. [60892](http://osvdb.org/60892)
3. [37283](http://www.securityfocus.com/bid/37283)
4. [zencart-curltest-file-include(54687)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54687)
5. [](http://www.acunetix.com/blog/websecuritynews/acusensor-curl-and-zen-cart/)
6. [](http://www.zen-cart.com/forum/showthread.php?t=142784)
7. [20091209 Zen Cart local file disclosure vulnerability](http://www.securityfocus.com/archive/1/508340/100/0/threaded)
8. [37630](http://secunia.com/advisories/37630) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34550, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34550
- **State**: PUBLISHED
- **Published Date**: May 09, 2024 at 12:10 UTC
- **Last Updated**: August 02, 2024 at 02:59 UTC
- **Reserved Date**: May 06, 2024 at 19:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Insertion of Sensitive Information into Log File vulnerability in AlexaCRM Dynamics 365 Integration.This issue affects Dynamics 365 Integration: from n/a through 1.3.17.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-532: Security Weakness
### Affected Products
**AlexaCRM - Dynamics 365 Integration**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/integration-dynamics/wordpress-dynamics-365-integration-plugin-1-3-17-sensitive-data-exposure-vulnerability?_s_id=cve)
### Credits
- Joshua Chan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20410, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20410 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20410
- **State**: PUBLISHED
- **Published Date**: June 29, 2020 at 05:20 UTC
- **Last Updated**: September 17, 2024 at 02:16 UTC
- **Reserved Date**: January 23, 2020 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to view sensitive information via an Information Disclosure vulnerability in the comment restriction feature. The affected versions are before version 7.6.17, from version 7.7.0 before 7.13.9, and from version 8.0.0 before 8.4.2.
### Affected Products
**Atlassian - Jira Server**
Affected versions:
- unspecified (Status: affected)
- 7.7.0 (Status: affected)
- unspecified (Status: affected)
- 8.0.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/JRASERVER-70884) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5487, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5487 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5487
- **State**: PUBLISHED
- **Published Date**: January 15, 2017 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 15:04 UTC
- **Reserved Date**: January 14, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [41497](https://www.exploit-db.com/exploits/41497/)
2. [](https://wpvulndb.com/vulnerabilities/8715)
3. [](https://codex.wordpress.org/Version_4.7.1)
4. [](https://github.com/WordPress/WordPress/commit/daf358983cc1ce0c77bf6d2de2ebbb43df2add60)
5. [[oss-security] 20170114 Re: CVE Request: Wordpress: 8 security issues in 4.7](http://www.openwall.com/lists/oss-security/2017/01/14/6)
6. [](https://www.wordfence.com/blog/2016/12/wordfence-blocks-username-harvesting-via-new-rest-api-wp-4-7/)
7. [1037591](http://www.securitytracker.com/id/1037591)
8. [](https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/)
9. [95391](http://www.securityfocus.com/bid/95391) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12030, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12030 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12030
- **State**: PUBLISHED
- **Published Date**: June 15, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 08:24 UTC
- **Reserved Date**: June 07, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Chevereto Free before 1.0.13 has XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://edricteo.com/chevereto-free-xss-vulnerability-in-version-1.0.12/)
2. [](https://github.com/Chevereto/Chevereto-Free/commit/159daeab6adfe828bd06e6e74f5b647bf9b1bb70) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0889, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0889 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0889
- **State**: PUBLISHED
- **Published Date**: January 25, 2024 at 22:31 UTC
- **Last Updated**: November 13, 2024 at 15:36 UTC
- **Reserved Date**: January 25, 2024 at 14:16 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Kmint21 Golden FTP Server 2.02b and classified as problematic. This issue affects some unknown processing of the component PASV Command Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252041 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-404: Security Weakness
### Affected Products
**Kmint21 - Golden FTP Server**
Affected versions:
- 2.02b (Status: affected)
### References
1. [](https://vuldb.com/?id.252041)
2. [](https://vuldb.com/?ctiid.252041)
3. [](https://packetstormsecurity.com/files/176661/Golden-FTP-Server-2.02b-Denial-Of-Service.html)
### Credits
- fernando.mengali (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16871, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16871 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16871
- **State**: PUBLISHED
- **Published Date**: December 19, 2019 at 20:42 UTC
- **Last Updated**: August 05, 2024 at 01:24 UTC
- **Reserved Date**: September 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Beckhoff Embedded Windows PLCs through 3.1.4024.0, and Beckhoff Twincat on Windows Engineering stations, allow an attacker to achieve Remote Code Execution (as SYSTEM) via the Beckhoff ADS protocol.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ic4.be/2019/12/18/beckhoff-cve-2019-16871/#more-648)
2. [](https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2017-001.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27246, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27246 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27246
- **State**: PUBLISHED
- **Published Date**: May 11, 2021 at 10:48 UTC
- **Last Updated**: August 04, 2024 at 16:11 UTC
- **Reserved Date**: October 19, 2020 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable SQL injection vulnerability exists in ‘listImmoLabels.jsp’ page of OpenClinic GA 5.173.3 application. The immoComment parameter in the ‘listImmoLabels.jsp’ page is vulnerable to authenticated SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**n/a - OpenClinic GA**
Affected versions:
- OpenClinic GA 5.173.3 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48011, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48011
- **State**: PUBLISHED
- **Published Date**: November 15, 2023 at 00:00 UTC
- **Last Updated**: August 29, 2024 at 19:47 UTC
- **Reserved Date**: November 13, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a heap-use-after-free via the flush_ref_samples function at /gpac/src/isomedia/movie_fragments.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gpac/gpac/issues/2611)
2. [](https://github.com/gpac/gpac/commit/c70f49dda4946d6db6aa55588f6a756b76bd84ea) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6584, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6584 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6584
- **State**: PUBLISHED
- **Published Date**: April 03, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 11:34 UTC
- **Reserved Date**: April 03, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
html/index.php in TorrentFlux 2.3 allows remote authenticated users to execute arbitrary code via a URL with a file containing an executable extension in the url_upload parameter, which is downloaded by TorrentFlux and can be accessed via a direct request in a html/downloads/ user directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44645](http://osvdb.org/44645)
2. [29935](http://secunia.com/advisories/29935)
3. [torrentflux-torrent-code-execution(41925)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41925)
4. [20080418 BitTorrent Clients and CSRF](http://www.securityfocus.com/archive/1/491066/100/0/threaded)
5. [28846](http://www.securityfocus.com/bid/28846) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3598, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3598 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3598
- **State**: PUBLISHED
- **Published Date**: October 08, 2020 at 04:21 UTC
- **Last Updated**: November 13, 2024 at 17:51 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to access confidential information or make configuration changes. The vulnerability is due to missing authentication for a specific section of the web-based management interface. An attacker could exploit this vulnerability by accessing a crafted URL. A successful exploit could allow the attacker to obtain access to a section of the interface, which they could use to read confidential information or make configuration changes.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**Cisco - Cisco Vision Dynamic Signage Director**
Affected versions:
- n/a (Status: affected)
### References
1. [20201007 Cisco Vision Dynamic Signage Director Missing Authentication Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvdsd-missing-auth-rQO88rnj) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2342, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2342 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2342
- **State**: PUBLISHED
- **Published Date**: July 14, 2017 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 16:27 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
MACsec feature on Juniper Networks Junos OS 15.1X49 prior to 15.1X49-D100 on SRX300 series does not report errors when a secure link can not be established. It falls back to an unencrypted link. This can happen when MACsec is configured on ports that are not capable of MACsec or when a secure link can not be established. This can mislead customers into believing that a link is secure. On SRX 300 series devices, prior to 15.1X49-D100, MACsec was only supported on control and fabric ports of SRX340 and SRX345 devices. SRX300 and and SRX320 did not have any MACsec capable ports. Configuring MACsec on ports that were not MACsec capable would have resulted in this issue. Affected releases are Juniper Networks Junos OS 15.1X49 prior to 15.1X49-D100 on SRX300 series.
### Weakness Classification (CWE)
- CWE-392: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 15.1X49 prior to 15.1X49-D100 (Status: affected)
### References
1. [](https://kb.juniper.net/JSA10790)
2. [1038890](http://www.securitytracker.com/id/1038890)
### Credits
- Eric Haszlakiewicz and Thor Simon of Two Sigma Investments, LP |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6260
- **State**: PUBLISHED
- **Published Date**: June 10, 2020 at 12:44 UTC
- **Last Updated**: August 04, 2024 at 08:55 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to inject superflous data that can be displayed by the application, due to Incomplete XML Validation. The application shows additional data that do not actually exist.
### Affected Products
**SAP SE - SAP Solution Manager (Trace Analysis)**
Affected versions:
- < 7.20 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775)
2. [](https://launchpad.support.sap.com/#/notes/2915126) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7222, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7222 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7222
- **State**: PUBLISHED
- **Published Date**: November 10, 2016 at 06:16 UTC
- **Last Updated**: August 06, 2024 at 01:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Task Scheduler in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to gain privileges via a crafted UNC pathname in a task, aka "Task Scheduler Elevation of Privilege Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS16-130](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-130)
2. [1037241](http://www.securitytracker.com/id/1037241)
3. [94023](http://www.securityfocus.com/bid/94023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8182
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 13, 2015 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43006
- **State**: PUBLISHED
- **Published Date**: December 07, 2021 at 19:58 UTC
- **Last Updated**: August 04, 2024 at 03:47 UTC
- **Reserved Date**: October 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AmZetta Amzetta zPortal DVM Tools is affected by Integer Overflow. IOCTL Handler 0x22001B in the Amzetta zPortal DVM Tools <= v3.3.148.148 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28573, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28573 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28573
- **State**: PUBLISHED
- **Published Date**: March 20, 2024 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 18:48 UTC
- **Reserved Date**: March 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the jpeg_read_exif_profile() function when reading images in JPEG format.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20528, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20528 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20528
- **State**: PUBLISHED
- **Published Date**: May 19, 2021 at 19:40 UTC
- **Last Updated**: September 17, 2024 at 02:32 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Control Center 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 198761.
### Affected Products
**IBM - Control Center**
Affected versions:
- 6.2.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6454215)
2. [ibm-sterling-cve202120528-xss (198761)](https://exchange.xforce.ibmcloud.com/vulnerabilities/198761) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9808, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9808 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9808
- **State**: PUBLISHED
- **Published Date**: March 30, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 13:55 UTC
- **Reserved Date**: June 02, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted dpc image.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20160602 Re: ImageMagick CVEs](http://www.openwall.com/lists/oss-security/2016/06/02/13)
2. [[oss-security] 20141224 Imagemagick fuzzing bug](http://www.openwall.com/lists/oss-security/2014/12/24/1)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1343464)
4. [](https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=82f779cbc24045af2eaecb95d0842ca7b97c71f4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0141, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0141 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0141
- **State**: PUBLISHED
- **Published Date**: May 01, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 14:18 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Directory traversal vulnerability in McAfee ePolicy Orchestrator (ePO) before 4.5.7 and 4.6.x before 4.6.6 allows remote attackers to upload arbitrary files via a crafted request over the Agent-Server communication channel, as demonstrated by writing to the Software/ directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#209131](http://www.kb.cert.org/vuls/id/209131)
2. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10042)
3. [TA13-193A](http://www.us-cert.gov/ncas/alerts/TA13-193A)
4. [20140427 Re: Exploit: McAfee ePolicy 0wner (ePowner ) ââ¬â Release](http://seclists.org/fulldisclosure/2014/Apr/289) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1472, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1472 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1472
- **State**: PUBLISHED
- **Published Date**: December 10, 2019 at 21:41 UTC
- **Last Updated**: August 04, 2024 at 18:20 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1474.
### Affected Products
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1472) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4063, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4063
- **State**: PUBLISHED
- **Published Date**: April 23, 2024 at 18:31 UTC
- **Last Updated**: August 01, 2024 at 20:26 UTC
- **Reserved Date**: April 23, 2024 at 13:06 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in EZVIZ CS-C6-21WFR-8 5.2.7 Build 170628. It has been classified as problematic. This affects an unknown part of the component Davinci Application. The manipulation leads to improper certificate validation. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The identifier VDB-261789 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-295: Security Weakness
### Affected Products
**EZVIZ - CS-C6-21WFR-8**
Affected versions:
- 5.2.7 Build 170628 (Status: affected)
### References
1. [VDB-261789 | EZVIZ CS-C6-21WFR-8 Davinci Application certificate validation](https://vuldb.com/?id.261789)
2. [VDB-261789 | CTI Indicators (IOB, IOC, TTP)](https://vuldb.com/?ctiid.261789)
3. [Submit #316408 | EZVIZ Camera model: CS-C6-21WFR-8, firmware: V5.2.7 build 170628 Improper Certificate Validation](https://vuldb.com/?submit.316408)
4. [](https://github.com/kzLiu2017/CVE_Document/blob/main/CVE_%20advisory_ezviz.pdf)
### Credits
- kaizheng (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4512, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4512
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:41 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1103, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1103 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1103
- **State**: PUBLISHED
- **Published Date**: February 07, 2025 at 15:00 UTC
- **Last Updated**: February 07, 2025 at 15:45 UTC
- **Reserved Date**: February 07, 2025 at 09:37 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in D-Link DIR-823X 240126/240802. This affects the function set_wifi_blacklists of the file /goform/set_wifi_blacklists of the component HTTP POST Request Handler. The manipulation of the argument macList leads to null pointer dereference. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
- CWE-404: Security Weakness
### Affected Products
**D-Link - DIR-823X**
Affected versions:
- 240126 (Status: affected)
- 240802 (Status: affected)
### References
1. [VDB-294933 | D-Link DIR-823X HTTP POST Request set_wifi_blacklists null pointer dereference](https://vuldb.com/?id.294933)
2. [VDB-294933 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.294933)
3. [Submit #489603 | D-Link DIR-823X 240126、240802 NULL Pointer Dereference](https://vuldb.com/?submit.489603)
4. [](https://tasty-foxtrot-3a8.notion.site/D-link-DIR-823X-set_wifi_blacklists-Vulnerability-1870448e619580e5bf09cf628692f7a9?pvs=73)
5. [](https://www.dlink.com/)
### Credits
- hand_king (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12108, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12108 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12108
- **State**: PUBLISHED
- **Published Date**: May 06, 2020 at 14:50 UTC
- **Last Updated**: August 04, 2024 at 11:48 UTC
- **Reserved Date**: April 23, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
/options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://code.launchpad.net/mailman)
2. [](https://mail.python.org/pipermail/mailman-announce/)
3. [](https://bugs.launchpad.net/mailman/+bug/1873722)
4. [[debian-lts-announce] 20200507 [SECURITY] [DLA 2204-1] mailman security update](https://lists.debian.org/debian-lts-announce/2020/05/msg00007.html)
5. [openSUSE-SU-2020:0661](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00036.html)
6. [USN-4354-1](https://usn.ubuntu.com/4354-1/)
7. [openSUSE-SU-2020:0764](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00003.html)
8. [[debian-lts-announce] 20200710 [SECURITY] [DLA 2276-1] mailman security update](https://lists.debian.org/debian-lts-announce/2020/07/msg00007.html)
9. [FEDORA-2020-62f2df3ca4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74EQIVFB34Q4UYAQLCUWG55YLKAUWCHD/)
10. [openSUSE-SU-2020:1707](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html)
11. [openSUSE-SU-2020:1752](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html)
12. [DSA-4991](https://www.debian.org/security/2021/dsa-4991) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31203, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31203 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31203
- **State**: PUBLISHED
- **Published Date**: April 29, 2025 at 02:05 UTC
- **Last Updated**: April 30, 2025 at 15:42 UTC
- **Reserved Date**: March 27, 2025 at 16:13 UTC
- **Assigned By**: apple
### Vulnerability Description
An integer overflow was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, watchOS 11.4, visionOS 2.4. An attacker on the local network may be able to cause a denial-of-service.
### Affected Products
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - visionOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122376)
2. [](https://support.apple.com/en-us/122377)
3. [](https://support.apple.com/en-us/122371)
4. [](https://support.apple.com/en-us/122372)
5. [](https://support.apple.com/en-us/122373)
6. [](https://support.apple.com/en-us/122378)
7. [](https://support.apple.com/en-us/122374) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2571, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2571 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2571
- **State**: PUBLISHED
- **Published Date**: May 24, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 17:58 UTC
- **Reserved Date**: May 24, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in search.html in Alkacon OpenCms 6.0.0, 6.0.2, and 6.0.3 allows remote attackers to inject arbitrary web script or HTML via the query parameter in a search action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25710](http://www.osvdb.org/25710)
2. [](http://www.eazel.es/media/advisory002-OpenCms-Xml-Content-Demo-search-engine-Cross-site-scripting.html)
3. [1016158](http://securitytracker.com/id?1016158)
4. [ADV-2006-1931](http://www.vupen.com/english/advisories/2006/1931)
5. [20251](http://secunia.com/advisories/20251)
6. [20060522 OpenCms version 6.0.x Xml Content Demo search engine Cross site scripting](http://www.securityfocus.com/archive/1/434932/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29502, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29502 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29502
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 21:50 UTC
- **Last Updated**: January 06, 2025 at 20:59 UTC
- **Reserved Date**: April 24, 2023 at 23:30 UTC
- **Assigned By**: icscert
### Vulnerability Description
Before importing a project into Vuforia, a user could modify the
“resourceDirectory” attribute in the appConfig.json file to be a
different path.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**PTC - Vuforia Studio**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-13)
### Credits
- Lockheed Martin—Red Team reported these vulnerabilities to PTC. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1860, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1860 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1860
- **State**: PUBLISHED
- **Published Date**: June 28, 2005 at 04:00 UTC
- **Last Updated**: September 17, 2024 at 03:28 UTC
- **Reserved Date**: June 28, 2005 at 04:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pramati Server 3.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5119](http://www.securityfocus.com/bid/5119)
2. [webinf-dot-file-retrieval(9446)](http://www.iss.net/security_center/static/9446.php)
3. [](http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt)
4. [20020628 wp-02-0002: 'WEB-INF' Folder accessible in Multiple Web Application Servers](http://online.securityfocus.com/archive/1/279582) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10135
- **State**: PUBLISHED
- **Published Date**: May 19, 2020 at 15:50 UTC
- **Last Updated**: September 17, 2024 at 02:57 UTC
- **Reserved Date**: March 05, 2020 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-757: Security Weakness
### Affected Products
**Bluetooth - BR/EDR**
Affected versions:
- 5.2 (Status: affected)
### References
1. [VU#647177](https://kb.cert.org/vuls/id/647177/)
2. [20200602 BIAS (Bluetooth Impersonation Attack) CVE 2020-10135 reproduction](http://seclists.org/fulldisclosure/2020/Jun/5)
3. [openSUSE-SU-2020:1153](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html)
4. [openSUSE-SU-2020:1236](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html)
5. [](https://francozappa.github.io/about-bias/)
6. [](https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/bias-vulnerability/)
7. [](http://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30272, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30272 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30272
- **State**: PUBLISHED
- **Published Date**: July 26, 2022 at 22:10 UTC
- **Last Updated**: August 03, 2024 at 06:48 UTC
- **Reserved Date**: May 04, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Motorola ACE1000 RTU through 2022-05-02 mishandles firmware integrity. It utilizes either the STS software suite or ACE1000 Easy Configurator for performing firmware updates. In case of the Easy Configurator, firmware updates are performed through access to the Web UI where file system, kernel, package, bundle, or application images can be installed. Firmware updates for the Front End Processor (FEP) module are performed via access to the SSH interface (22/TCP), where a .hex file image is transferred and a bootloader script invoked. File system, kernel, package, and bundle updates are supplied as RPM (RPM Package Manager) files while FEP updates are supplied as S-rec files. In all cases, firmware images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.forescout.com/blog/)
2. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-06) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22515, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22515
- **State**: PUBLISHED
- **Published Date**: July 12, 2021 at 10:04 UTC
- **Last Updated**: September 17, 2024 at 02:36 UTC
- **Reserved Date**: January 05, 2021 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
Multi-Factor Authentication (MFA) functionality can be bypassed, allowing the use of single factor authentication in NetIQ Advanced Authentication versions prior to 6.3 SP4 Patch 1.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Micro Focus - NetIQ Advanced Authentication**
Affected versions:
- NetIQ Advanced Authentication (Status: affected)
### References
1. [](https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6341/data/advanced-authentication-releasenotes-6341.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18496, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18496 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18496
- **State**: REJECTED
- **Published Date**: October 28, 2019 at 14:42 UTC
- **Last Updated**: October 28, 2019 at 14:42 UTC
- **Reserved Date**: October 28, 2019 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21132
- **State**: PUBLISHED
- **Published Date**: August 14, 2023 at 20:57 UTC
- **Last Updated**: October 09, 2024 at 19:13 UTC
- **Reserved Date**: November 03, 2022 at 22:37 UTC
- **Assigned By**: google_android
### Vulnerability Description
In onCreate of ManagePermissionsActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with physical access to a device that's been factory reset with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 13 (Status: affected)
- 12L (Status: affected)
- 12 (Status: affected)
### References
1. [](https://android.googlesource.com/platform/packages/modules/Permission/+/0679e4f35055729be7276536fe45fe8ec18a0453)
2. [](https://source.android.com/security/bulletin/2023-08-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0381, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0381
- **State**: PUBLISHED
- **Published Date**: April 06, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:17 UTC
- **Reserved Date**: April 05, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:11557](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557)
2. [9976](http://www.securityfocus.com/bid/9976)
3. [mysql-mysqlbug-symlink(15617)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15617)
4. [DSA-483](http://www.debian.org/security/2004/dsa-483)
5. [GLSA-200405-20](http://security.gentoo.org/glsa/glsa-200405-20.xml)
6. [MDKSA-2004:034](http://www.mandriva.com/security/advisories?name=MDKSA-2004:034)
7. [RHSA-2004:597](http://www.redhat.com/support/errata/RHSA-2004-597.html)
8. [P-018](http://www.ciac.org/ciac/bulletins/p-018.shtml)
9. [20040414 [OpenPKG-SA-2004.014] OpenPKG Security Advisory (mysql)](http://marc.info/?l=bugtraq&m=108206802810402&w=2)
10. [RHSA-2004:569](http://www.redhat.com/support/errata/RHSA-2004-569.html)
11. [20040324 mysqlbug tmpfile/symlink vulnerability.](http://marc.info/?l=bugtraq&m=108023246916294&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-5074, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-5074 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-5074
- **State**: PUBLISHED
- **Published Date**: January 29, 2012 at 11:00 UTC
- **Last Updated**: September 17, 2024 at 01:06 UTC
- **Reserved Date**: January 28, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in Support Incident Tracker (aka SiT!) before 3.65 allow remote attackers to hijack the authentication of administrators for requests that change administrator email, add a new administrator, or insert arbitrary script via (1) user_profile_edit.php or (2) user_add.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sitracker.org/wiki/ReleaseNotes365)
2. [20110914 Multiple vulnerabilities in SiT! Support Incident Tracker](http://www.securityfocus.com/archive/1/519636)
3. [46019](http://secunia.com/advisories/46019)
4. [](https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_sit_support_incident_tracker.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10171, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10171 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10171
- **State**: PUBLISHED
- **Published Date**: March 14, 2017 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 03:14 UTC
- **Reserved Date**: January 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The unreorder_channels function in cli/wvunpack.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/wavpack/mailman/message/35561939/)
2. [95883](http://www.securityfocus.com/bid/95883)
3. [[oss-security] 20170128 Re: wavpack: multiple out of bounds memory reads](http://www.openwall.com/lists/oss-security/2017/01/28/9)
4. [](https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0114, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0114 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0114
- **State**: PUBLISHED
- **Published Date**: December 22, 2010 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 00:37 UTC
- **Reserved Date**: December 31, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
fw_charts.php in the reporting module in the Manager (aka SEPM) component in Symantec Endpoint Protection (SEP) 11.x before 11 RU6 MP2 allows remote attackers to bypass intended restrictions on report generation, overwrite arbitrary PHP scripts, and execute arbitrary code via a crafted request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1024900](http://securitytracker.com/id?1024900)
2. [symantec-endpoint-fwcharts-code-execution(64118)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64118)
3. [45372](http://www.securityfocus.com/bid/45372)
4. [](http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20101215_00)
5. [ADV-2010-3252](http://www.vupen.com/english/advisories/2010/3252)
6. [](http://www.zerodayinitiative.com/advisories/ZDI-10-291/)
7. [42643](http://secunia.com/advisories/42643) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.