System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27787, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27787 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27787 - **State**: PUBLISHED - **Published Date**: March 19, 2025 at 20:41 UTC - **Last Updated**: March 20, 2025 at 20:41 UTC - **Reserved Date**: March 06, 2025 at 18:06 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to denial of service (DoS) in restart.py. `model_name` in train.py takes user input, and passes it to the `stop_train` function in restart.py, which uses it construct a path to a folder with `config.json`. That `config.json` is opened and the list of values under "process_pids" are read. Next all the process IDs listed in the JSON are killed. Using one of the arbitrary file writes, one can write to `logs/foobar` a `config.json` file, which contains a list of process IDs. Then one can access this endpoint to kill these processes. Since an attacker can't know what process is running on which process ID, they can send a list of hundreds of process IDs, which can kill the process that applio is using to run, as well as other, potentially important processes, which leads to DoS. Note that constructing a path with user input also enables path traversal. For example, by supplying "../../" in `model_name` one can access `config.json` freom locations two folders down on the server. As of time of publication, no known patches are available. ### Weakness Classification (CWE) - CWE-74: Security Weakness - CWE-22: Path Traversal ### Affected Products **IAHispano - Applio** Affected versions: - <= 3.2.8-bugfix (Status: affected) ### References 1. [https://securitylab.github.com/advisories/GHSL-2024-354_Applio/](https://securitylab.github.com/advisories/GHSL-2024-354_Applio/) 2. [https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/tabs/settings/sections/restart.py#L9](https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/tabs/settings/sections/restart.py#L9) 3. [https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/tabs/train/train.py#L306](https://github.com/IAHispano/Applio/blob/29b4a00e4be209f9aac51cd9ccffcc632dfb2973/tabs/train/train.py#L306)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0280, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0280 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0280 - **State**: PUBLISHED - **Published Date**: February 12, 2014 at 02:00 UTC - **Last Updated**: August 06, 2024 at 09:13 UTC - **Reserved Date**: December 03, 2013 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS14-010](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-010) 2. [103179](http://osvdb.org/103179) 3. [ms-ie-cve20140280-code-exec(90770)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90770) 4. [1029741](http://www.securitytracker.com/id/1029741) 5. [56796](http://secunia.com/advisories/56796) 6. [65380](http://www.securityfocus.com/bid/65380)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15788, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15788 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15788 - **State**: PUBLISHED - **Published Date**: October 22, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 20:04 UTC - **Reserved Date**: October 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description XnView Classic for Windows Version 2.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "User Mode Write AV starting at CADImage+0x0000000000002d83." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15788)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12462, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12462 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12462 - **State**: PUBLISHED - **Published Date**: January 07, 2025 at 04:21 UTC - **Last Updated**: January 07, 2025 at 16:26 UTC - **Reserved Date**: December 10, 2024 at 21:43 UTC - **Assigned By**: Wordfence ### Vulnerability Description The YOGO Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'yogo-calendar' shortcode in all versions up to, and including, 1.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **andersyogo - YOGO Booking** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/151b0aa9-c5c9-48ab-8b73-22ee42666824?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/yogo-booking/trunk/src/shortcodes.php#L13) 3. [](https://wordpress.org/plugins/yogo-booking) ### Credits - Djaidja Moundjid
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44202, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44202 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44202 - **State**: PUBLISHED - **Published Date**: September 16, 2024 at 23:22 UTC - **Last Updated**: September 18, 2024 at 18:03 UTC - **Reserved Date**: August 20, 2024 at 21:42 UTC - **Assigned By**: apple ### Vulnerability Description An authentication issue was addressed with improved state management. This issue is fixed in iOS 18 and iPadOS 18. Private Browsing tabs may be accessed without authentication. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/121250)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31769, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31769 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31769 - **State**: PUBLISHED - **Published Date**: June 21, 2021 at 10:59 UTC - **Last Updated**: August 03, 2024 at 23:03 UTC - **Reserved Date**: April 23, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MyQ Server in MyQ X Smart before 8.2 allows remote code execution by unprivileged users because administrative session data can be read in the %PROGRAMFILES%\MyQ\PHP\Sessions directory. The "Select server file" feature is only intended for administrators but actually does not require authorization. An attacker can inject arbitrary OS commands (such as commands to create new .php files) via the Task Scheduler component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/bc0d3/6d55866a78f66569383241406e18794f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25872, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25872 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25872 - **State**: PUBLISHED - **Published Date**: March 27, 2023 at 00:00 UTC - **Last Updated**: March 05, 2025 at 19:20 UTC - **Reserved Date**: February 15, 2023 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Adobe - Substance3D - Stager** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39732, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39732 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39732 - **State**: PUBLISHED - **Published Date**: July 14, 2024 at 12:39 UTC - **Last Updated**: August 02, 2024 at 04:26 UTC - **Reserved Date**: June 28, 2024 at 09:34 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Datacap Navigator 9.1.5, 9.1.6, 9.1.7, 9.1.8, and 9.1.9 temporarily stores data from different environments that could be obtained by a malicious user. IBM X-Force ID: 295791. ### CVSS Metrics - **CVSS Base Score**: 4.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-316: Security Weakness ### Affected Products **IBM - Datacap Navigator** Affected versions: - 9.1.5, 9.1.6, 9.1.7, 9.1.8, 9.1.9 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7160185) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/295791)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3467, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3467 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3467 - **State**: PUBLISHED - **Published Date**: July 19, 2023 at 18:35 UTC - **Last Updated**: October 24, 2024 at 17:43 UTC - **Reserved Date**: June 29, 2023 at 21:04 UTC - **Assigned By**: Citrix ### Vulnerability Description Privilege Escalation to root administrator (nsroot) ### CVSS Metrics - **CVSS Base Score**: 8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **Citrix - NetScaler ADC ** Affected versions: - 13.1 (Status: affected) - 13.0 (Status: affected) - 13.1-FIPS (Status: affected) - 12.1-FIPS (Status: affected) - 12.1-NDcPP (Status: affected) **Citrix - NetScaler Gateway** Affected versions: - 13.1 (Status: affected) - 13.0 (Status: affected) ### References 1. [](https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-20042, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-20042 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-20042 - **State**: PUBLISHED - **Published Date**: March 04, 2025 at 03:44 UTC - **Last Updated**: March 04, 2025 at 14:30 UTC - **Reserved Date**: January 20, 2025 at 01:59 UTC - **Assigned By**: OpenHarmony ### Vulnerability Description in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **OpenHarmony - OpenHarmony** Affected versions: - v4.1.0 (Status: affected) ### References 1. [](https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7545, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7545 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7545 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2425, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2425 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2425 - **State**: PUBLISHED - **Published Date**: July 14, 2015 at 21:00 UTC - **Last Updated**: February 10, 2025 at 18:49 UTC - **Reserved Date**: March 19, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2383 and CVE-2015-2384. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1032894](http://www.securitytracker.com/id/1032894) 2. [MS15-065](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1934, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1934 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1934 - **State**: PUBLISHED - **Published Date**: November 26, 2019 at 21:03 UTC - **Last Updated**: August 06, 2024 at 22:46 UTC - **Reserved Date**: May 09, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description lilo-uuid-diskid causes lilo.conf to be world-readable in lilo 23.1. ### Affected Products **lilo - lilo** Affected versions: - 23.1 (Status: affected) ### References 1. [](https://security-tracker.debian.org/tracker/CVE-2011-1934) 2. [](https://access.redhat.com/security/cve/cve-2011-1934) 3. [[oss-security] 20110519 Re: CVE requests: ffmpeg/widelands/jifty::db/lilo/libpcap](https://seclists.org/oss-sec/2011/q2/464) 4. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=615103)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-28019, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-28019 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-28019 - **State**: PUBLISHED - **Published Date**: May 06, 2021 at 04:03 UTC - **Last Updated**: August 04, 2024 at 16:25 UTC - **Reserved Date**: October 30, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4854, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4854 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4854 - **State**: PUBLISHED - **Published Date**: October 05, 2011 at 10:00 UTC - **Last Updated**: August 07, 2024 at 04:02 UTC - **Reserved Date**: October 04, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in ajax/coupon.php in Zuitu 1.6, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the id parameter in a consume action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [zuitu-coupon-sql-injection(62397)](https://exchange.xforce.ibmcloud.com/vulnerabilities/62397) 2. [41732](http://secunia.com/advisories/41732) 3. [](http://bbs.wolvez.org/viewtopic.php?id=170)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0040, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0040 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0040 - **State**: PUBLISHED - **Published Date**: September 01, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:43 UTC - **Reserved Date**: January 27, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the PostgreSQL auth module for courier 0.40 and earlier allows remote attackers to execute SQL code via the user name. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-247](http://www.debian.org/security/2003/dsa-247) 2. [courierimap-authmysqllib-sql-injection(11213)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11213) 3. [6738](http://www.securityfocus.com/bid/6738)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1573, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1573 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1573 - **State**: PUBLISHED - **Published Date**: May 06, 2009 at 17:00 UTC - **Last Updated**: August 07, 2024 at 05:20 UTC - **Reserved Date**: May 06, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description xvfb-run 1.6.1 in Debian GNU/Linux, Ubuntu, Fedora 10, and possibly other operating systems place the magic cookie (MCOOKIE) on the command line, which allows local users to gain privileges by listing the process and its arguments. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20090505 CVE id request: Debian/Ubuntu specific issue in xvfb-run (xorg)](http://www.openwall.com/lists/oss-security/2009/05/05/2) 2. [[oss-security] 20090505 Re: CVE id request: Debian/Ubuntu specific issue in xvfb-run (xorg)](http://www.openwall.com/lists/oss-security/2009/05/05/4) 3. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526678) 4. [39834](http://secunia.com/advisories/39834) 5. [34828](http://www.securityfocus.com/bid/34828) 6. [xvfbrun-magiccookie-info-disclosure(50348)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50348) 7. [ADV-2010-1185](http://www.vupen.com/english/advisories/2010/1185) 8. [USN-939-1](http://www.ubuntu.com/usn/USN-939-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4413, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4413 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4413 - **State**: PUBLISHED - **Published Date**: November 04, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 10:17 UTC - **Reserved Date**: October 03, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in HP System Management Homepage (SMH) 2.2.6 and earlier on HP-UX B.11.11 and B.11.23, and SMH 2.2.6 and 2.2.8 and earlier on HP-UX B.11.23 and B.11.31, allows local users to gain "unauthorized access" via unknown vectors, possibly related to temporary file permissions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [HPSBMA02380](http://marc.info/?l=bugtraq&m=122581539223159&w=2) 2. [49521](http://osvdb.org/49521) 3. [smh-unspecified-priv-escalation(46313)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46313) 4. [ADV-2008-2999](http://www.vupen.com/english/advisories/2008/2999) 5. [32544](http://secunia.com/advisories/32544) 6. [SSRT080121](http://marc.info/?l=bugtraq&m=122581539223159&w=2) 7. [1021133](http://www.securitytracker.com/id?1021133) 8. [4545](http://securityreason.com/securityalert/4545)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14875, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14875 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14875 - **State**: PUBLISHED - **Published Date**: October 21, 2020 at 14:04 UTC - **Last Updated**: September 26, 2024 at 20:07 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Marketing accessible data as well as unauthorized access to critical data or complete access to all Oracle Marketing accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N` ### Affected Products **Oracle Corporation - Marketing** Affected versions: - 12.1.1 - 12.1.3 (Status: affected) - 12.2.3 - 12.2.10 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39359, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39359 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39359 - **State**: PUBLISHED - **Published Date**: August 22, 2021 at 00:00 UTC - **Last Updated**: August 04, 2024 at 02:06 UTC - **Reserved Date**: August 22, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In GNOME libgda through 6.0.0, gda-web-provider.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blogs.gnome.org/mcatanzaro/2021/05/25/reminder-soupsessionsync-and-soupsessionasync-default-to-no-tls-certificate-verification/) 2. [](https://gitlab.gnome.org/GNOME/libgda/-/issues/249) 3. [FEDORA-2021-084f819da6](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLMVVIJNY5NMOT3FH36RFBWOTPVW7GME/) 4. [FEDORA-2021-06510d73f1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRPPP47WRCAPAEJGRMEKYYJZBQCYXTLQ/) 5. [](https://github.com/GNOME/libgda/commit/bd7b9568bcd9f6d3e6680bb04323a670c842a62d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31302, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31302 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31302 - **State**: PUBLISHED - **Published Date**: April 10, 2024 at 15:32 UTC - **Last Updated**: August 02, 2024 at 01:52 UTC - **Reserved Date**: March 29, 2024 at 17:34 UTC - **Assigned By**: Patchstack ### Vulnerability Description Exposure of Sensitive Information to an Unauthorized Actor vulnerability in CodePeople Contact Form Email.This issue affects Contact Form Email: from n/a through 1.3.44. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **CodePeople - Contact Form Email** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/contact-form-to-email/wordpress-contact-form-email-plugin-1-3-44-sensitive-data-exposure-vulnerability?_s_id=cve) ### Credits - Joshua Chan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41191, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41191 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41191 - **State**: PUBLISHED - **Published Date**: October 27, 2021 at 20:30 UTC - **Last Updated**: August 04, 2024 at 03:08 UTC - **Reserved Date**: September 15, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Roblox-Purchasing-Hub is an open source Roblox product purchasing hub. A security risk in versions 1.0.1 and prior allowed people who have someone's API URL to get product files without an API key. This issue is fixed in version 1.0.2. As a workaround, add `@require_apikey` in `BOT/lib/cogs/website.py` under the route for `/v1/products`. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-116: Security Weakness ### Affected Products **Redon-Tech - Roblox-Purchasing-Hub** Affected versions: - < 1.0.2 (Status: affected) ### References 1. [](https://github.com/Redon-Tech/Roblox-Purchasing-Hub/security/advisories/GHSA-76mx-6584-4v8q) 2. [](https://github.com/Redon-Tech/Roblox-Purchasing-Hub/commit/58a22260eca40b1a0377daf61ccd8c4dc1440e03) 3. [](https://github.com/Redon-Tech/Roblox-Purchasing-Hub/releases/tag/V1.0.2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17662, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17662 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17662 - **State**: PUBLISHED - **Published Date**: January 24, 2019 at 04:00 UTC - **Last Updated**: August 05, 2024 at 10:54 UTC - **Reserved Date**: September 28, 2018 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the beep method of a Host object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6514. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Foxit - Reader** Affected versions: - 9.2.0.9297 (Status: affected) ### References 1. [](https://www.foxitsoftware.com/support/security-bulletins.php) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-18-1188/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1297, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1297 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1297 - **State**: PUBLISHED - **Published Date**: February 04, 2021 at 16:56 UTC - **Last Updated**: November 08, 2024 at 23:43 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to conduct directory traversal attacks and overwrite certain files that should be restricted on an affected system. These vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by using the web-based management interface to upload a file to location on an affected device that they should not have access to. A successful exploit could allow the attacker to overwrite files on the file system of the affected device. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-36: Security Weakness ### Affected Products **Cisco - Cisco Small Business RV Series Router Firmware** Affected versions: - n/a (Status: affected) ### References 1. [20210203 Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers Arbitrary File Write Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-filewrite-7x9mnKjn)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8028, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8028 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8028 - **State**: PUBLISHED - **Published Date**: October 30, 2015 at 16:00 UTC - **Last Updated**: September 16, 2024 at 18:24 UTC - **Reserved Date**: October 30, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple buffer overflows in SAP 3D Visual Enterprise Viewer (VEV) allow remote attackers to execute arbitrary code via a crafted (1) 3DM or (2) Flic Animation file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.zerodayinitiative.com/advisories/ZDI-15-526) 2. [](http://www.zerodayinitiative.com/advisories/ZDI-15-531)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30373, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30373 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30373 - **State**: PUBLISHED - **Published Date**: April 24, 2023 at 00:00 UTC - **Last Updated**: February 04, 2025 at 20:04 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Tenda AC15 V15.03.05.19, the function "xian_pppoe_user" contains a stack-based buffer overflow vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/2205794866/Tenda/blob/main/AC15/8.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51903, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51903 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51903 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:31 UTC - **Last Updated**: November 20, 2024 at 14:26 UTC - **Reserved Date**: November 04, 2024 at 09:59 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in imFORZA WP Listings Pro allows Stored XSS.This issue affects WP Listings Pro: from n/a through 3.0.14. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **imFORZA - WP Listings Pro** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-listings-pro/wordpress-wp-listings-pro-plugin-3-0-14-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18440, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18440 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18440 - **State**: PUBLISHED - **Published Date**: August 02, 2019 at 16:16 UTC - **Last Updated**: August 05, 2024 at 21:20 UTC - **Reserved Date**: July 31, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description cPanel before 64.0.21 allows demo users to execute traceroute via api2 (SEC-244). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://documentation.cpanel.net/display/CL/64+Change+Log)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7388, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7388 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7388 - **State**: PUBLISHED - **Published Date**: November 08, 2016 at 20:37 UTC - **Last Updated**: August 06, 2024 at 01:57 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: nvidia ### Vulnerability Description For the NVIDIA Quadro, NVS, and GeForce products, NVIDIA Windows GPU Display Driver R340 before 342.00 and R375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler where a NULL pointer dereference caused by invalid user input may lead to denial of service or potential escalation of privileges. ### Affected Products **n/a - Quadro, NVS, and GeForce (all versions)** Affected versions: - Quadro, NVS, and GeForce (all versions) (Status: affected) ### References 1. [94172](http://www.securityfocus.com/bid/94172) 2. [](https://support.lenovo.com/us/en/solutions/LEN-10822) 3. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4247)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2470, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2470 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2470 - **State**: PUBLISHED - **Published Date**: June 13, 2016 at 01:00 UTC - **Last Updated**: August 05, 2024 at 23:32 UTC - **Reserved Date**: February 18, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description The Qualcomm Wi-Fi driver in Android before 2016-06-01 on Nexus 7 (2013) devices allows attackers to gain privileges via a crafted application, aka internal bug 27662174. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://source.android.com/security/bulletin/2016-06-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-125028, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-125028 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-125028 - **State**: PUBLISHED - **Published Date**: December 31, 2022 at 19:11 UTC - **Last Updated**: August 06, 2024 at 14:10 UTC - **Reserved Date**: December 31, 2022 at 19:11 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in valtech IDP Test Client and classified as problematic. Affected by this issue is some unknown functionality of the file python-flask/main.py. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The name of the patch is f1e7b3d431c8681ec46445557125890c14fa295f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217148. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **valtech - IDP Test Client** Affected versions: - n/a (Status: affected) ### References 1. [](https://vuldb.com/?id.217148) 2. [](https://vuldb.com/?ctiid.217148) 3. [](https://github.com/valtech/valtech-idp-test-clients/commit/f1e7b3d431c8681ec46445557125890c14fa295f) ### Credits - VulDB GitHub Commit Analyzer
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3432, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3432 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3432 - **State**: PUBLISHED - **Published Date**: February 11, 2025 at 23:56 UTC - **Last Updated**: February 26, 2025 at 18:00 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the uninstaller component of Cisco AnyConnect Secure Mobility Client for Mac OS could allow an authenticated, local attacker to corrupt the content of any file in the filesystem. The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a symbolic link (symlink) to a target file on a specific path. A successful exploit could allow the attacker to corrupt the contents of the file. If the file is a critical systems file, the exploit could lead to a denial of service condition. To exploit this vulnerability, the attacker would need to have valid credentials on the system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. ### Affected Products **Cisco - Cisco Secure Client** Affected versions: - N/A (Status: affected) ### References 1. [cisco-sa-anyconnect-mac-dos-36s2y3Lv](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-mac-dos-36s2y3Lv)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7510, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7510 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7510 - **State**: PUBLISHED - **Published Date**: March 25, 2019 at 17:50 UTC - **Last Updated**: August 05, 2024 at 16:04 UTC - **Reserved Date**: April 05, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface. ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **[UNKNOWN] - RHV** Affected versions: - 4.1 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7510)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4801, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4801 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4801 - **State**: PUBLISHED - **Published Date**: July 26, 2013 at 18:00 UTC - **Last Updated**: August 06, 2024 at 16:52 UTC - **Reserved Date**: July 12, 2013 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1736. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SSRT101085](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03862772) 2. [hp-loadrunner-cve20134801-code-exec(85961)](https://exchange.xforce.ibmcloud.com/vulnerabilities/85961) 3. [95645](http://osvdb.org/95645) 4. [HPSBGN02905](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03862772) 5. [61445](http://www.securityfocus.com/bid/61445)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0923, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0923 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0923 - **State**: PUBLISHED - **Published Date**: January 26, 2024 at 14:00 UTC - **Last Updated**: June 03, 2025 at 17:56 UTC - **Reserved Date**: January 26, 2024 at 08:21 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in Tenda AC10U 15.03.06.49_multi_TDE01. Affected by this issue is the function formSetDeviceName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252128. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Tenda - AC10U** Affected versions: - 15.03.06.49_multi_TDE01 (Status: affected) ### References 1. [](https://vuldb.com/?id.252128) 2. [](https://vuldb.com/?ctiid.252128) 3. [](https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetDeviceName.md) ### Credits - chenjun ma (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1961, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1961 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1961 - **State**: PUBLISHED - **Published Date**: July 18, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 19:17 UTC - **Reserved Date**: March 30, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly handle duplicate values in X-Frame-Options headers, which makes it easier for remote attackers to conduct clickjacking attacks via a FRAME element referencing a web site that produces these duplicate values. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [49977](http://secunia.com/advisories/49977) 2. [49992](http://secunia.com/advisories/49992) 3. [54584](http://www.securityfocus.com/bid/54584) 4. [1027256](http://www.securitytracker.com/id?1027256) 5. [RHSA-2012:1088](http://rhn.redhat.com/errata/RHSA-2012-1088.html) 6. [USN-1509-2](http://www.ubuntu.com/usn/USN-1509-2) 7. [1027258](http://www.securitytracker.com/id?1027258) 8. [49979](http://secunia.com/advisories/49979) 9. [](https://bugzilla.mozilla.org/show_bug.cgi?id=761655) 10. [SUSE-SU-2012:0895](http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html) 11. [USN-1510-1](http://www.ubuntu.com/usn/USN-1510-1) 12. [](http://www.mozilla.org/security/announce/2012/mfsa2012-51.html) 13. [49965](http://secunia.com/advisories/49965) 14. [1027257](http://www.securitytracker.com/id?1027257) 15. [openSUSE-SU-2012:0917](http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html) 16. [SUSE-SU-2012:0896](http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html) 17. [49994](http://secunia.com/advisories/49994) 18. [openSUSE-SU-2012:0899](http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html) 19. [49968](http://secunia.com/advisories/49968) 20. [USN-1509-1](http://www.ubuntu.com/usn/USN-1509-1) 21. [84003](http://osvdb.org/84003) 22. [49993](http://secunia.com/advisories/49993) 23. [49972](http://secunia.com/advisories/49972) 24. [oval:org.mitre.oval:def:16993](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16993)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46654, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46654 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46654 - **State**: PUBLISHED - **Published Date**: February 18, 2022 at 19:46 UTC - **Last Updated**: August 04, 2024 at 05:10 UTC - **Reserved Date**: January 26, 2022 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15540. ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Bentley - View** Affected versions: - 10.15.0.75 (Status: affected) ### References 1. [](https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0009) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-241/) ### Credits - Mat Powell of Trend Micro Zero Day Initiative
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50611, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50611 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50611 - **State**: PUBLISHED - **Published Date**: October 27, 2024 at 00:00 UTC - **Last Updated**: October 30, 2024 at 18:25 UTC - **Reserved Date**: October 27, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CycloneDX cdxgen through 10.10.7, when run against an untrusted codebase, may execute code contained within build-related files such as build.gradle.kts, a similar issue to CVE-2022-24441. cdxgen is used by, for example, OWASP dep-scan. NOTE: this has been characterized as a design limitation, rather than an implementation mistake. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/CycloneDX/cdxgen/releases) 2. [](https://github.com/CycloneDX/cdxgen/issues/1328) 3. [](https://owasp.org/www-project-dep-scan/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5586, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5586 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5586 - **State**: REJECTED - **Published Date**: October 19, 2007 at 21:00 UTC - **Last Updated**: November 09, 2007 at 10:00 UTC - **Reserved Date**: October 19, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12131, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12131 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12131 - **State**: PUBLISHED - **Published Date**: March 18, 2020 at 17:26 UTC - **Last Updated**: August 04, 2024 at 23:10 UTC - **Reserved Date**: May 15, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was detected in ONAP APPC through Dublin and SDC through Dublin. By setting a USER_ID parameter in an HTTP header, an attacker may impersonate an arbitrary existing user without any authentication. All APPC and SDC setups are affected. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://jira.onap.org/browse/OJSI-93)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4751, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4751 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4751 - **State**: PUBLISHED - **Published Date**: May 16, 2025 at 06:00 UTC - **Last Updated**: May 16, 2025 at 13:14 UTC - **Reserved Date**: May 15, 2025 at 09:03 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as problematic, was found in D-Link DI-7003GV2 24.04.18D1 R(68125). Affected is an unknown function of the file /index.data. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation - CWE-284: Security Weakness ### Affected Products **D-Link - DI-7003GV2** Affected versions: - 24.04.18D1 R(68125) (Status: affected) ### References 1. [VDB-309054 | D-Link DI-7003GV2 index.data information disclosure](https://vuldb.com/?id.309054) 2. [VDB-309054 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309054) 3. [Submit #571070 | D-Link DI-7003GV2 24.04.18D1 R(68125) Improper Access Controls](https://vuldb.com/?submit.571070) 4. [](https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/index.md) 5. [](https://www.dlink.com/) ### Credits - 153528990 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0673, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0673 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0673 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:40 UTC - **Reserved Date**: January 12, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1340, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1340 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1340 - **State**: PUBLISHED - **Published Date**: February 07, 2019 at 22:00 UTC - **Last Updated**: September 16, 2024 at 19:20 UTC - **Reserved Date**: December 07, 2017 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain. ### Affected Products **Apache Software Foundation - Apache Guacamole** Affected versions: - Apache Guacamole 0.9.4 to 0.9.14 (Status: affected) ### References 1. [](https://lists.apache.org/thread.html/af1632e13dd9acf7537546660cae9143cbb10fdd2f9bb0832a690979%40%3Cannounce.guacamole.apache.org%3E) 2. [106768](http://www.securityfocus.com/bid/106768)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1631, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1631 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1631 - **State**: PUBLISHED - **Published Date**: February 21, 2024 at 02:12 UTC - **Last Updated**: August 16, 2024 at 14:55 UTC - **Reserved Date**: February 19, 2024 at 15:58 UTC - **Assigned By**: Dfinity ### Vulnerability Description Impact: The library offers a function to generate an ed25519 key pair via Ed25519KeyIdentity.generate with an optional param to provide a 32 byte seed value, which will then be used as the secret key. When no seed value is provided, it is expected that the library generates the secret key using secure randomness. However, a recent change broke this guarantee and uses an insecure seed for key pair generation. Since the private key of this identity (535yc-uxytb-gfk7h-tny7p-vjkoe-i4krp-3qmcl-uqfgr-cpgej-yqtjq-rqe) is compromised, one could lose funds associated with the principal on ledgers or lose access to a canister where this principal is the controller. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-321: Security Weakness - CWE-330: Security Weakness ### Affected Products **Internet Computer - agent-js** Affected versions: - v0.20.0-beta.0 (Status: affected) ### References 1. [](https://github.com/dfinity/agent-js/pull/851) 2. [](https://www.npmjs.com/package/@dfinity/identity/v/1.0.1) 3. [](https://github.com/dfinity/agent-js) 4. [](https://agent-js.icp.xyz/identity/index.html) 5. [](https://github.com/dfinity/agent-js/security/advisories/GHSA-c9vv-fhgv-cjc3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20482, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20482 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20482 - **State**: PUBLISHED - **Published Date**: March 30, 2021 at 16:00 UTC - **Last Updated**: September 16, 2024 at 16:18 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Cloud Pak for Automation 20.0.2 and 20.0.3 IF002 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 197504. ### Affected Products **IBM - Cloud Pak for Automation** Affected versions: - 20.0.2 (Status: affected) - 20.0.3.IF002 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6437577) 2. [ibm-baw-cve202120482-xxe (197504)](https://exchange.xforce.ibmcloud.com/vulnerabilities/197504)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4220, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4220 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4220 - **State**: PUBLISHED - **Published Date**: June 06, 2019 at 00:35 UTC - **Last Updated**: September 16, 2024 at 22:30 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM InfoSphere Information Server 11.7.1.0 stores a common hard coded encryption key that could be used to decrypt sensitive information. IBM X-Force ID: 159229. ### Affected Products **IBM - InfoSphere Information Server** Affected versions: - 11.7.1.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/docview.wss?uid=ibm10881197) 2. [ibm-infosphere-cve20194220-info-disc (159229)](https://exchange.xforce.ibmcloud.com/vulnerabilities/159229)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20511, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20511 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20511 - **State**: PUBLISHED - **Published Date**: December 27, 2018 at 14:00 UTC - **Last Updated**: August 05, 2024 at 12:05 UTC - **Reserved Date**: December 27, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next fields via an SIOCFINDIPDDPRT ioctl call. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9824dfae5741275473a23a7ed5756c7b6efacc9d) 2. [](https://lkml.org/lkml/2018/9/27/480) 3. [](https://github.com/torvalds/linux/commit/9824dfae5741275473a23a7ed5756c7b6efacc9d) 4. [](https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.11) 5. [106347](http://www.securityfocus.com/bid/106347) 6. [[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html) 7. [[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update](https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html) 8. [USN-4094-1](https://usn.ubuntu.com/4094-1/) 9. [USN-4118-1](https://usn.ubuntu.com/4118-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2243, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2243 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2243 - **State**: PUBLISHED - **Published Date**: April 25, 2007 at 16:00 UTC - **Last Updated**: August 07, 2024 at 13:33 UTC - **Reserved Date**: April 25, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20070421 OpenSSH - System Account Enumeration if S/Key is used](http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053906.html) 2. [23601](http://www.securityfocus.com/bid/23601) 3. [2631](http://securityreason.com/securityalert/2631) 4. [34600](http://www.osvdb.org/34600) 5. [openssh-challenge-information-disclosure(33794)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33794) 6. [20070424 OpenSSH - System Account Enumeration if S/Key is used](http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053951.html) 7. [](https://security.netapp.com/advisory/ntap-20191107-0003/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15767, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15767 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15767 - **State**: PUBLISHED - **Published Date**: September 18, 2020 at 13:44 UTC - **Last Updated**: August 04, 2024 at 13:22 UTC - **Reserved Date**: July 15, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Gradle Enterprise before 2020.2.5. The cookie used to convey the CSRF prevention token is not annotated with the “secure” attribute, which allows an attacker with the ability to MITM plain HTTP requests to obtain it, if the user mistakenly uses a HTTP instead of HTTPS address to access the server. This cookie value could then be used to perform CSRF. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gradle/gradle/security/advisories) 2. [](https://security.gradle.com/advisory/CVE-2020-15767)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16970, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16970 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16970 - **State**: PUBLISHED - **Published Date**: September 12, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 10:39 UTC - **Reserved Date**: September 12, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Wisetail Learning Ecosystem (LE) through v4.11.6 allows insecure direct object reference (IDOR) attacks to download non-purchased course files via a modified id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.ziaurrashid.com/wisetail-learning-ecosystem-multiple-idor-vunlerability/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27347, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27347 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27347 - **State**: PUBLISHED - **Published Date**: June 10, 2021 at 15:37 UTC - **Last Updated**: August 03, 2024 at 20:48 UTC - **Reserved Date**: February 16, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Use after free in lzma_decompress_buf function in stream.c in Irzip 0.631 allows attackers to cause Denial of Service (DoS) via a crafted compressed file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ckolivas/lrzip/issues/165) 2. [[debian-lts-announce] 20220413 [SECURITY] [DLA 2981-1] lrzip security update](https://lists.debian.org/debian-lts-announce/2022/04/msg00012.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48110, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48110 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48110 - **State**: PUBLISHED - **Published Date**: February 13, 2023 at 00:00 UTC - **Last Updated**: March 24, 2025 at 12:58 UTC - **Reserved Date**: December 29, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CKSource CKEditor 5 35.4.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Full Featured CKEditor5 widget. NOTE: the vendor's position is that this is not a vulnerability. The CKEditor 5 documentation discusses that it is the responsibility of an integrator (who is adding CKEditor 5 functionality to a website) to choose the correct security settings for their use case. Also, safe default values are established (e.g., config.htmlEmbed.showPreviews is false). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html) 2. [](https://packetstormsecurity.com/files/170927/CKSource-CKEditor5-35.4.0-Cross-Site-Scripting.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6485, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6485 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6485 - **State**: PUBLISHED - **Published Date**: February 01, 2018 at 14:00 UTC - **Last Updated**: August 05, 2024 at 06:01 UTC - **Reserved Date**: February 01, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=22343) 2. [102912](http://www.securityfocus.com/bid/102912) 3. [](http://bugs.debian.org/878159) 4. [RHSA-2018:3092](https://access.redhat.com/errata/RHSA-2018:3092) 5. [](https://security.netapp.com/advisory/ntap-20190404-0003/) 6. [](https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html) 7. [RHBA-2019:0327](https://access.redhat.com/errata/RHBA-2019:0327) 8. [USN-4218-1](https://usn.ubuntu.com/4218-1/) 9. [USN-4416-1](https://usn.ubuntu.com/4416-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12177, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12177 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12177 - **State**: PUBLISHED - **Published Date**: January 30, 2025 at 13:42 UTC - **Last Updated**: January 30, 2025 at 14:39 UTC - **Reserved Date**: December 04, 2024 at 16:17 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Ai Image Alt Text Generator for WP plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **boomdevs - Ai Image Alt Text Generator for WP** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/902ec583-c072-4c6d-8250-ad08d7ecf239?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/ai-image-alt-text-generator-for-wp/tags/1.0.2/includes/class-boomdevs-ai-image-alt-text-generator-custom-menu.php#L218) ### Credits - Dale Mavers
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44717, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44717 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44717 - **State**: PUBLISHED - **Published Date**: August 29, 2024 at 00:00 UTC - **Last Updated**: March 13, 2025 at 15:06 UTC - **Reserved Date**: August 21, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site scripting (XSS) vulnerability in DedeBIZ v6.3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitee.com/DedeBIZ/DedeV6/releases/tag/6.3.0) 2. [](https://github.com/Jingyi-u/DedeBIZ2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8568, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8568 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8568 - **State**: PUBLISHED - **Published Date**: February 03, 2017 at 15:00 UTC - **Last Updated**: August 06, 2024 at 02:27 UTC - **Reserved Date**: October 08, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The git_commit_message function in oid.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a cat-file command with a crafted object file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1383211) 2. [FEDORA-2016-616a35205b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3JBSNJAXP7JA3TGE2NPNRTD77JXFG4E/) 3. [](https://github.com/libgit2/libgit2/issues/3936) 4. [[oss-security] 20161008 Re: CVE request: invalid memory accesses parsing object files in libgit2](http://www.openwall.com/lists/oss-security/2016/10/08/7) 5. [](https://github.com/libgit2/libgit2/releases/tag/v0.24.3) 6. [openSUSE-SU-2016:3097](http://lists.opensuse.org/opensuse-updates/2016-12/msg00075.html) 7. [FEDORA-2016-505d7fe198](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVUEIG6EESZB6BRU2IE3F5NRUEHMAEKC/) 8. [openSUSE-SU-2017:0208](http://lists.opensuse.org/opensuse-updates/2017-01/msg00114.html) 9. [openSUSE-SU-2017:0195](http://lists.opensuse.org/opensuse-updates/2017-01/msg00110.html) 10. [openSUSE-SU-2017:0184](http://lists.opensuse.org/opensuse-updates/2017-01/msg00103.html) 11. [FEDORA-2016-bc51f4636f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4E77DG5KGQ7L34U75QY7O6NIPKZNQHQJ/) 12. [93466](http://www.securityfocus.com/bid/93466)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39227, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39227 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39227 - **State**: PUBLISHED - **Published Date**: August 06, 2024 at 00:00 UTC - **Last Updated**: August 15, 2024 at 15:40 UTC - **Reserved Date**: June 21, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Access%20to%20the%20C%20library%20without%20logging%20in.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3172, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3172 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3172 - **State**: PUBLISHED - **Published Date**: June 09, 2023 at 00:00 UTC - **Last Updated**: January 06, 2025 at 17:12 UTC - **Reserved Date**: June 09, 2023 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Path Traversal in GitHub repository froxlor/froxlor prior to 2.0.20. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **froxlor - froxlor/froxlor** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/e50966cd-9222-46b9-aedc-1feb3f2a0b0e) 2. [](https://github.com/froxlor/froxlor/commit/da810ea95393dfaec68a70e30b7c887c50563a7e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7050, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7050 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7050 - **State**: PUBLISHED - **Published Date**: October 16, 2014 at 19:00 UTC - **Last Updated**: August 06, 2024 at 12:40 UTC - **Reserved Date**: September 19, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The givenu give (aka com.givenu.give) application 1.5.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#621569](http://www.kb.cert.org/vuls/id/621569) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12558, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12558 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12558 - **State**: PUBLISHED - **Published Date**: February 15, 2018 at 22:00 UTC - **Last Updated**: September 16, 2024 at 23:45 UTC - **Reserved Date**: August 05, 2017 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A Remote Code Execution vulnerability in HPE intelligent Management Center (iMC) PLAT version IMC Plat 7.3 E0504P2 and earlier was found. ### Affected Products **Hewlett Packard Enterprise - intelligent Management Center (iMC) PLAT** Affected versions: - iMC Plat 7.3 E0504P2 and earlier (Status: affected) ### References 1. [101152](http://www.securityfocus.com/bid/101152) 2. [1039495](http://www.securitytracker.com/id/1039495) 3. [](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03778en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2130, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2130 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2130 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: February 27, 2015 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-47893, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-47893 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-47893 - **State**: REJECTED - **Last Updated**: May 14, 2025 at 02:55 UTC - **Reserved Date**: May 13, 2025 at 12:23 UTC - **Assigned By**: fortinet ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34584, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34584 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34584 - **State**: PUBLISHED - **Published Date**: October 26, 2021 at 09:55 UTC - **Last Updated**: September 16, 2024 at 22:25 UTC - **Reserved Date**: June 10, 2021 at 00:00 UTC - **Assigned By**: CERTVDE ### Vulnerability Description Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H` ### Weakness Classification (CWE) - CWE-126: Security Weakness ### Affected Products **CODESYS - CODESYS V2** Affected versions: - all web servers (Status: affected) ### References 1. [](https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16876&token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7&download=) 2. [](https://www.tenable.com/security/research/tra-2021-47) ### Credits - This vulnerability was discovered by Tenable Research.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0500, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0500 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0500 - **State**: PUBLISHED - **Published Date**: October 13, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:21 UTC - **Reserved Date**: July 11, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The default configuration of BEA WebLogic 5.1.0 allows a remote attacker to view source code of programs by requesting a URL beginning with /file/, which causes the default servlet to display the file without further processing. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20000621 BEA WebLogic /file/ showcode vulnerability](http://marc.info/?l=bugtraq&m=96161462915381&w=2) 2. [](http://www.weblogic.com/docs51/admindocs/http.html#file) 3. [1378](http://www.securityfocus.com/bid/1378) 4. [weblogic-file-source-read(4775)](https://exchange.xforce.ibmcloud.com/vulnerabilities/4775)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38256, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38256 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38256 - **State**: PUBLISHED - **Published Date**: September 11, 2023 at 19:34 UTC - **Last Updated**: January 16, 2025 at 21:30 UTC - **Reserved Date**: September 01, 2023 at 20:57 UTC - **Assigned By**: icscert ### Vulnerability Description Dover Fueling Solutions MAGLINK LX Web Console Configuration versions 2.5.1, 2.5.2, 2.5.3, 2.6.1, 2.11, 3.0, 3.2, and 3.3 vulnerable to a path traversal attack, which could allow an attacker to access files stored on the system. ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Dover Fueling Solutions - MAGLINK LX Web Console Configuration** Affected versions: - 2.5.1 (Status: affected) - 2.5.2 (Status: affected) - 2.5.3 (Status: affected) - 2.6.1 (Status: affected) - 2.11 (Status: affected) - 3.0 (Status: affected) - 3.2 (Status: affected) - 3.3 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-01) ### Credits - Soufian El Yadmani of Darktrace / CSIRT.global reported these vulnerabilities
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45766, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45766 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45766 - **State**: PUBLISHED - **Published Date**: January 02, 2025 at 11:59 UTC - **Last Updated**: January 03, 2025 at 19:10 UTC - **Reserved Date**: October 12, 2023 at 12:45 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Poll Maker Team Poll Maker allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Poll Maker: from n/a through 4.7.1. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Poll Maker Team - Poll Maker** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/poll-maker/vulnerability/wordpress-poll-maker-plugin-4-7-1-broken-access-control-vulnerability?_s_id=cve) ### Credits - Revan Arifio (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18082, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18082 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18082 - **State**: PUBLISHED - **Published Date**: October 09, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 11:01 UTC - **Reserved Date**: October 09, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description XSS exists in Waimai Super Cms 20150505 via the fname parameter to the admin.php?m=Food&a=addsave or admin.php?m=Food&a=editsave URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/caokang/waimai/issues/6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27292, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27292 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27292 - **State**: PUBLISHED - **Published Date**: April 17, 2025 at 15:48 UTC - **Last Updated**: April 17, 2025 at 18:20 UTC - **Reserved Date**: February 21, 2025 at 16:45 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPyog WPYog Documents allows Reflected XSS. This issue affects WPYog Documents: from n/a through 1.3.3. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **WPyog - WPYog Documents** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wpyog-documents/vulnerability/wordpress-wpyog-documents-plugin-1-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - 0xd4rk5id3 (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21526, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21526 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21526 - **State**: PUBLISHED - **Published Date**: July 19, 2022 at 21:07 UTC - **Last Updated**: September 24, 2024 at 20:02 UTC - **Reserved Date**: November 15, 2021 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 8.0.29 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujul2022.html) 2. [](https://security.netapp.com/advisory/ntap-20220729-0004/) 3. [FEDORA-2022-9178229cd7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0398, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0398 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0398 - **State**: PUBLISHED - **Published Date**: May 24, 2001 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:21 UTC - **Reserved Date**: May 24, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment's type with a different icon. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2530](http://www.securityfocus.com/bid/2530) 2. [20010402 ~..~!guano](http://archives.neohapsis.com/archives/bugtraq/2001-04/0013.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8806, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8806 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8806 - **State**: PUBLISHED - **Published Date**: November 22, 2024 at 21:02 UTC - **Last Updated**: December 03, 2024 at 17:55 UTC - **Reserved Date**: September 13, 2024 at 18:03 UTC - **Assigned By**: zdi ### Vulnerability Description Cohesive Networks VNS3 Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cohesive Networks VNS3. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 8000 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24160. ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Cohesive Networks - VNS3** Affected versions: - 6.2.3-20240417 (Status: affected) ### References 1. [ZDI-24-1230](https://www.zerodayinitiative.com/advisories/ZDI-24-1230/) 2. [vendor-provided URL](https://cohesive.net/support/security-responses/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2703, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2703 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2703 - **State**: PUBLISHED - **Published Date**: October 06, 2007 at 21:00 UTC - **Last Updated**: August 08, 2024 at 01:36 UTC - **Reserved Date**: October 06, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Clearswift MIMEsweeper 5.0.5, when it has been upgraded from MAILsweeper for SMTP version 4.3 or MAILsweeper Business Suite I or II, allows remote attackers to bypass scanning by including encrypted data in a mail message, which causes the message to be marked as "Clean" instead of "Encrypted". ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [mimesweeper-smtp-scan-bypass(18035)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18035) 2. [11669](http://www.securityfocus.com/bid/11669) 3. [13160](http://secunia.com/advisories/13160) 4. [11602](http://www.osvdb.org/11602) 5. [](http://download.mimesweeper.com/www/TechnicalDocumentation/MSWSMTP505UpdateReadMe.htm)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-1887, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-1887 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-1887 - **State**: PUBLISHED - **Published Date**: March 03, 2014 at 02:00 UTC - **Last Updated**: August 06, 2024 at 09:58 UTC - **Reserved Date**: February 07, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The DrinkedIn BarFinder application for Android, when Adobe PhoneGap 2.9.0 or earlier is used, allows remote attackers to execute arbitrary JavaScript code, and consequently obtain sensitive fine-geolocation information, by leveraging control over one of a number of adult sites, as demonstrated by (1) freelifetimecheating.com and (2) www.babesroulette.com. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf) 2. [](http://www.internetsociety.org/ndss2014/programme#session3) 3. [[oss-security] 20140207 Re: CVE request: multiple issues in Apache Cordova/PhoneGap](http://openwall.com/lists/oss-security/2014/02/07/9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9714, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9714 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9714 - **State**: PUBLISHED - **Published Date**: November 22, 2024 at 20:51 UTC - **Last Updated**: December 04, 2024 at 21:41 UTC - **Reserved Date**: October 09, 2024 at 19:38 UTC - **Assigned By**: zdi ### Vulnerability Description Trimble SketchUp Viewer SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24097. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Trimble - SketchUp Viewer** Affected versions: - 22.0.316.0 (Status: affected) ### References 1. [ZDI-24-1483](https://www.zerodayinitiative.com/advisories/ZDI-24-1483/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9265, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9265 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9265 - **State**: PUBLISHED - **Published Date**: April 04, 2018 at 07:00 UTC - **Last Updated**: August 05, 2024 at 07:17 UTC - **Reserved Date**: April 04, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-tn3270.c has a memory leak. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14480) 2. [](https://www.wireshark.org/security/wnpa-sec-2018-24.html) 3. [[debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update](https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html) 4. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b12cc581cd4878d74b6116ca02c7dbe650c1f242)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26248, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26248 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26248 - **State**: PUBLISHED - **Published Date**: October 25, 2024 at 00:00 UTC - **Last Updated**: October 25, 2024 at 19:56 UTC - **Reserved Date**: February 21, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Kademlia DHT (go-libp2p-kad-dht 0.20.0 and earlier) used in IPFS (0.18.1 and earlier) assigns routing information for content (i.e., information about who holds the content) to be stored by peers whose peer IDs have a small DHT distance from the content ID. This allows an attacker to censor content by generating many Sybil peers whose peer IDs have a small distance from the content ID, thus hijacking the content resolution process. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/libp2p/go-libp2p-kad-dht) 2. [](https://arxiv.org/abs/2307.12212)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2596, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2596 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2596 - **State**: PUBLISHED - **Published Date**: July 01, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 02:39 UTC - **Reserved Date**: July 01, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The OJPEGPostDecode function in tif_ojpeg.c in LibTIFF 3.9.0 and 3.9.2, as used in tiff2ps, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF image, related to "downsampled OJPEG input." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20100623 CVE requests: LibTIFF](http://marc.info/?l=oss-security&m=127731610612908&w=2) 2. [](http://bugzilla.maptools.org/show_bug.cgi?id=2209) 3. [GLSA-201209-02](http://security.gentoo.org/glsa/glsa-201209-02.xml) 4. [40422](http://secunia.com/advisories/40422) 5. [50726](http://secunia.com/advisories/50726) 6. [](https://bugzilla.redhat.com/show_bug.cgi?id=583081)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36512, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36512 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36512 - **State**: PUBLISHED - **Published Date**: December 26, 2021 at 21:53 UTC - **Last Updated**: August 04, 2024 at 17:30 UTC - **Reserved Date**: December 26, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the buffoon crate through 2020-12-31 for Rust. InputStream::read_exact may read from uninitialized memory locations. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rustsec.org/advisories/RUSTSEC-2020-0154.html) 2. [](https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/buffoon/RUSTSEC-2020-0154.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45805, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45805 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45805 - **State**: PUBLISHED - **Published Date**: December 26, 2024 at 21:34 UTC - **Last Updated**: December 27, 2024 at 16:19 UTC - **Reserved Date**: September 09, 2024 at 14:23 UTC - **Assigned By**: GitHub_M ### Vulnerability Description OpenCTI is an open-source cyber threat intelligence platform. Before 6.3.0, general users can access information that can only be accessed by users with access privileges to admin and support information (SETTINGS_SUPPORT). This is due to inadequate access control for support information (http://<opencti_domain>/storage/get/support/UUID/UUID.zip), and that the UUID is available to general users using an attached query (logs query). This vulnerability is fixed in 6.3.0. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation - CWE-285: Security Weakness ### Affected Products **OpenCTI-Platform - opencti** Affected versions: - < 6.3.0 (Status: affected) ### References 1. [https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-42mm-c8x3-g5q6](https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-42mm-c8x3-g5q6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46849, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46849 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46849 - **State**: PUBLISHED - **Published Date**: November 11, 2023 at 00:05 UTC - **Last Updated**: February 13, 2025 at 17:14 UTC - **Reserved Date**: October 27, 2023 at 13:38 UTC - **Assigned By**: OpenVPN ### Vulnerability Description Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service. ### Weakness Classification (CWE) - CWE-369: Security Weakness ### Affected Products **OpenVPN - OpenVPN 2 (Community)** Affected versions: - 2.6.0 (Status: affected) **OpenVPN - Access Server** Affected versions: - 2.11.0 (Status: affected) - 2.12.0 (Status: affected) ### References 1. [](https://community.openvpn.net/openvpn/wiki/CVE-2023-46849) 2. [](https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/) 3. [](https://www.debian.org/security/2023/dsa-5555) 4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/) 5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-5253, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-5253 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-5253 - **State**: PUBLISHED - **Published Date**: September 07, 2012 at 10:00 UTC - **Last Updated**: September 16, 2024 at 22:14 UTC - **Reserved Date**: September 07, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Untrusted search path vulnerability in WinImage 8.50 allows local users to gain privileges via a Trojan horse wnaspi32.dll file in the current working directory, as demonstrated by a directory that contains a .imz file. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/) 2. [41225](http://secunia.com/advisories/41225)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0333, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0333 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0333 - **State**: PUBLISHED - **Published Date**: October 08, 2011 at 01:00 UTC - **Last Updated**: September 16, 2024 at 17:54 UTC - **Reserved Date**: January 06, 2011 at 00:00 UTC - **Assigned By**: flexera ### Vulnerability Description Heap-based buffer overflow in the NgwiCalVTimeZoneBody::ParseSelf function in gwwww1.dll in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before HP3 allows remote attackers to execute arbitrary code via a crafted TZNAME variable in a VCALENDAR attachment in an e-mail message, related to an "integer truncation error." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20110926 Novell GroupWise iCal TZNAME Heap Overflow Vulnerability](https://labs.idefense.com/verisign/intelligence/2009/vulnerabilities/display.php?id=943) 2. [](http://secunia.com/secunia_research/2011-66/) 3. [](https://bugzilla.novell.com/show_bug.cgi?id=678715) 4. [](http://www.novell.com/support/viewContent.do?externalId=7009208)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27239, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27239 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27239 - **State**: PUBLISHED - **Published Date**: February 25, 2025 at 20:33 UTC - **Last Updated**: March 06, 2025 at 18:49 UTC - **Reserved Date**: February 21, 2024 at 21:15 UTC - **Assigned By**: Zoom ### Vulnerability Description Use after free in some Zoom Workplace Apps and SDKs may allow an authenticated user to conduct a denial of service via network access. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-369: Security Weakness ### Affected Products **Zoom Communications, Inc - Zoom Workplace Apps and SDKs** Affected versions: - See references (Status: affected) ### References 1. [](https://www.zoom.com/en/trust/security-bulletin/zsb-24018/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40035, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40035 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40035 - **State**: PUBLISHED - **Published Date**: January 25, 2023 at 00:00 UTC - **Last Updated**: April 01, 2025 at 15:25 UTC - **Reserved Date**: September 06, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description File Upload Vulnerability found in Rawchen Blog-ssm v1.0 allowing attackers to execute arbitrary commands and gain escalated privileges via the /uploadFileList component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/rawchen/blog-ssm/issues/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-46781, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-46781 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-46781 - **State**: REJECTED - **Last Updated**: April 30, 2025 at 02:55 UTC - **Reserved Date**: April 29, 2025 at 08:42 UTC - **Assigned By**: fortinet ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2756, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2756 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2756 - **State**: PUBLISHED - **Published Date**: May 18, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 13:49 UTC - **Reserved Date**: May 18, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [26231](http://secunia.com/advisories/26231) 2. [36643](http://osvdb.org/36643) 3. [1018187](http://www.securitytracker.com/id?1018187) 4. [29157](http://secunia.com/advisories/29157) 5. [25658](http://secunia.com/advisories/25658) 6. [27110](http://secunia.com/advisories/27110) 7. [25590](http://secunia.com/advisories/25590) 8. [26048](http://secunia.com/advisories/26048) 9. [gd-gdpngreaddata-dos(34420)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34420) 10. [25362](http://secunia.com/advisories/25362) 11. [OpenPKG-SA-2007.020](http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html) 12. [25657](http://secunia.com/advisories/25657) 13. [FEDORA-2007-709](https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html) 14. [25855](http://secunia.com/advisories/25855) 15. [26967](http://secunia.com/advisories/26967) 16. [MDKSA-2007:122](http://www.mandriva.com/security/advisories?name=MDKSA-2007:122) 17. [ADV-2007-2016](http://www.vupen.com/english/advisories/2007/2016) 18. [GLSA-200805-13](http://security.gentoo.org/glsa/glsa-200805-13.xml) 19. [GLSA-200710-02](http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml) 20. [MDKSA-2007:123](http://www.mandriva.com/security/advisories?name=MDKSA-2007:123) 21. [24089](http://www.securityfocus.com/bid/24089) 22. [](http://www.libgd.org/ReleaseNote020035) 23. [GLSA-200708-05](http://security.gentoo.org/glsa/glsa-200708-05.xml) 24. [30168](http://secunia.com/advisories/30168) 25. [MDKSA-2007:124](http://www.mandriva.com/security/advisories?name=MDKSA-2007:124) 26. [ADV-2007-1904](http://www.vupen.com/english/advisories/2007/1904) 27. [26930](http://secunia.com/advisories/26930) 28. [35788](http://osvdb.org/35788) 29. [FEDORA-2007-2215](https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html) 30. [ADV-2007-2336](http://www.vupen.com/english/advisories/2007/2336) 31. [RHSA-2007:0889](http://rhn.redhat.com/errata/RHSA-2007-0889.html) 32. [2007-0023](http://www.trustix.org/errata/2007/0023/) 33. [25353](http://secunia.com/advisories/25353) 34. [ADV-2007-3386](http://www.vupen.com/english/advisories/2007/3386) 35. [](http://bugs.libgd.org/?do=details&task_id=86) 36. [2007-0019](http://www.trustix.org/errata/2007/0019/) 37. [27037](http://secunia.com/advisories/27037) 38. [SUSE-SR:2007:013](http://www.novell.com/linux/security/advisories/2007_13_sr.html) 39. [25378](http://secunia.com/advisories/25378) 40. [27545](http://secunia.com/advisories/27545) 41. [GLSA-200711-34](http://security.gentoo.org/glsa/glsa-200711-34.xml) 42. [](http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm) 43. [SSA:2007-152-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863) 44. [25646](http://secunia.com/advisories/25646) 45. [RHSA-2008:0146](http://www.redhat.com/support/errata/RHSA-2008-0146.html) 46. [](http://www.php.net/releases/5_2_3.php) 47. [SSRT071447](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795) 48. [](https://issues.rpath.com/browse/RPL-1394) 49. [HPSBUX02262](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795) 50. [25535](http://secunia.com/advisories/25535) 51. [MDKSA-2007:187](http://www.mandriva.com/security/advisories?name=MDKSA-2007:187) 52. [27102](http://secunia.com/advisories/27102) 53. [oval:org.mitre.oval:def:10779](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779) 54. [26895](http://secunia.com/advisories/26895) 55. [25787](http://secunia.com/advisories/25787) 56. [25575](http://secunia.com/advisories/25575) 57. [RHSA-2007:0890](http://www.redhat.com/support/errata/RHSA-2007-0890.html) 58. [ADV-2007-1905](http://www.vupen.com/english/advisories/2007/1905) 59. [26390](http://secunia.com/advisories/26390) 60. [RHSA-2007:0891](http://www.redhat.com/support/errata/RHSA-2007-0891.html) 61. [USN-473-1](http://www.ubuntu.com/usn/usn-473-1) 62. [26871](http://secunia.com/advisories/26871) 63. [SUSE-SA:2007:044](http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-3668, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-3668 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-3668 - **State**: PUBLISHED - **Published Date**: July 10, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 04:50 UTC - **Reserved Date**: December 28, 2017 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Unquoted service paths in Intel Processor Diagnostic Tool (IPDT) before version 4.1.0.27 allows a local attacker to potentially execute arbitrary code. ### Affected Products **Intel Corporation - Intel Processor Diagnostic Tool** Affected versions: - 4.1.0.24 (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00140.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3319, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3319 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3319 - **State**: PUBLISHED - **Published Date**: May 15, 2024 at 15:44 UTC - **Last Updated**: August 16, 2024 at 15:01 UTC - **Reserved Date**: April 04, 2024 at 16:14 UTC - **Assigned By**: SailPoint ### Vulnerability Description An issue was identified in the Identity Security Cloud (ISC) Transform preview and IdentityProfile preview API endpoints that allowed an authenticated administrator to execute user-defined templates as part of attribute transforms which could allow remote code execution on the host. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **SailPoint - Identity Security Cloud** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.sailpoint.com/security-advisories/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51375, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51375 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51375 - **State**: PUBLISHED - **Published Date**: June 21, 2024 at 13:37 UTC - **Last Updated**: August 02, 2024 at 22:32 UTC - **Reserved Date**: December 18, 2023 at 15:51 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in WPDeveloper EmbedPress.This issue affects EmbedPress: from n/a through 3.8.3. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **WPDeveloper - EmbedPress** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/embedpress/wordpress-embedpress-plugin-3-8-3-broken-access-control-vulnerability?_s_id=cve) ### Credits - Abdi Pranata (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-6708, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-6708 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-6708 - **State**: PUBLISHED - **Published Date**: January 23, 2019 at 19:00 UTC - **Last Updated**: August 04, 2024 at 20:31 UTC - **Reserved Date**: January 23, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHPSHE 1.7 has SQL injection via the admin.php?mod=order state parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/kk98kk0/exploit/issues/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15272, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15272 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15272 - **State**: PUBLISHED - **Published Date**: October 26, 2020 at 18:20 UTC - **Last Updated**: August 04, 2024 at 13:15 UTC - **Reserved Date**: June 25, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In the git-tag-annotation-action (open source GitHub Action) before version 1.0.1, an attacker can execute arbitrary (*) shell commands if they can control the value of [the `tag` input] or manage to alter the value of [the `GITHUB_REF` environment variable]. The problem has been patched in version 1.0.1. If you don't use the `tag` input you are most likely safe. The `GITHUB_REF` environment variable is protected by the GitHub Actions environment so attacks from there should be impossible. If you must use the `tag` input and cannot upgrade to `> 1.0.0` make sure that the value is not controlled by another Action. ### CVSS Metrics - **CVSS Base Score**: 8.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **ericcornelissen - git-tag-annotation-action** Affected versions: - < 1.0.1 (Status: affected) ### References 1. [](https://github.com/ericcornelissen/git-tag-annotation-action/security/advisories/GHSA-hgx2-4pp9-357g) 2. [](https://github.com/ericcornelissen/git-tag-annotation-action/commit/9f30756375cc4b1b6c66f274fc9c591fa901455a) 3. [](https://github.com/ericcornelissen/git-tag-annotation-action/releases/tag/v1.0.1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35135, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35135 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35135 - **State**: PUBLISHED - **Published Date**: October 13, 2022 at 00:00 UTC - **Last Updated**: May 15, 2025 at 15:28 UTC - **Reserved Date**: July 04, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Boodskap IoT Platform v4.4.9-02 allows attackers to escalate privileges via a crafted request sent to /api/user/upsert/<uuid>. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35135-cve-2022-35136.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52339, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52339 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52339 - **State**: PUBLISHED - **Published Date**: November 18, 2024 at 22:15 UTC - **Last Updated**: November 19, 2024 at 14:01 UTC - **Reserved Date**: November 08, 2024 at 17:48 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mage Cast Mage Front End Forms allows Stored XSS.This issue affects Mage Front End Forms: from n/a through 1.1.4. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Mage Cast - Mage Front End Forms** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/mage-forms/wordpress-mage-front-end-forms-plugin-1-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33949, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33949 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33949 - **State**: PUBLISHED - **Published Date**: May 24, 2023 at 16:01 UTC - **Last Updated**: October 22, 2024 at 15:51 UTC - **Reserved Date**: May 24, 2023 at 02:36 UTC - **Assigned By**: Liferay ### Vulnerability Description In Liferay Portal 7.3.0 and earlier, and Liferay DXP 7.2 and earlier the default configuration does not require users to verify their email address, which allows remote attackers to create accounts using fake email addresses or email addresses which they don't control. The portal property `company.security.strangers.verify` should be set to true. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-1188: Security Weakness ### Affected Products **Liferay - Portal** Affected versions: - 0 (Status: affected) **Liferay - DXP** Affected versions: - 0 (Status: affected) ### References 1. [](https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33949)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3581, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3581 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3581 - **State**: PUBLISHED - **Published Date**: June 09, 2025 at 06:00 UTC - **Last Updated**: June 10, 2025 at 15:13 UTC - **Reserved Date**: April 14, 2025 at 11:40 UTC - **Assigned By**: WPScan ### Vulnerability Description The Newsletter WordPress plugin before 8.8.5 does not validate and escape some of its Widget options before outputting them back in a page/post where the block is embed, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Newsletter** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/2d96f018-510d-40ab-9e73-76fa44784813/) ### Credits - Dmitrii Ignatyev - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6190, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6190 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6190 - **State**: PUBLISHED - **Published Date**: January 24, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 05:54 UTC - **Reserved Date**: January 24, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Netis WF2419 V3.2.41381 devices allow XSS via the Description field on the MAC Filtering page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com/files/146032/Netis-WF2419-3.2.41381-Cross-Site-Scripting.html) 2. [43981](https://www.exploit-db.com/exploits/43981/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10419, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10419 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10419 - **State**: PUBLISHED - **Published Date**: September 25, 2019 at 15:05 UTC - **Last Updated**: August 04, 2024 at 22:24 UTC - **Reserved Date**: March 29, 2019 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins vFabric Application Director Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. ### Affected Products **Jenkins project - Jenkins vFabric Application Director Plugin** Affected versions: - 1.3 and earlier (Status: affected) ### References 1. [](https://jenkins.io/security/advisory/2019-09-25/#SECURTIY-1541) 2. [[oss-security] 20190925 Multiple vulnerabilities in Jenkins and Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/09/25/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-37108, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-37108 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-37108 - **State**: PUBLISHED - **Published Date**: September 07, 2022 at 13:06 UTC - **Last Updated**: August 03, 2024 at 10:21 UTC - **Reserved Date**: August 01, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An injection vulnerability in the syslog-ng configuration wizard in Securonix Snypr 6.4 allows an application user with the "Manage Ingesters" permission to execute arbitrary code on remote ingesters by appending arbitrary text to text files that are executed by the system, such as users' crontab files. The patch for this was present in SNYPR version 6.4 Jun 2022 R3_[06170871], but may have been introduced sooner. ### CVSS Metrics - **CVSS Base Score**: 8.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:H/C:N/I:H/PR:H/S:C/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://conway.scot/securonix-rce/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50304, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50304 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50304 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 17:19 UTC - **Last Updated**: May 04, 2025 at 09:51 UTC - **Reserved Date**: October 21, 2024 at 19:36 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() The per-netns IP tunnel hash table is protected by the RTNL mutex and ip_tunnel_find() is only called from the control path where the mutex is taken. Add a lockdep expression to hlist_for_each_entry_rcu() in ip_tunnel_find() in order to validate that the mutex is held and to silence the suspicious RCU usage warning [1]. [1] WARNING: suspicious RCU usage 6.12.0-rc3-custom-gd95d9a31aceb #139 Not tainted ----------------------------- net/ipv4/ip_tunnel.c:221 RCU-list traversed in non-reader section!! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by ip/362: #0: ffffffff86fc7cb0 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x377/0xf60 stack backtrace: CPU: 12 UID: 0 PID: 362 Comm: ip Not tainted 6.12.0-rc3-custom-gd95d9a31aceb #139 Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Call Trace: <TASK> dump_stack_lvl+0xba/0x110 lockdep_rcu_suspicious.cold+0x4f/0xd6 ip_tunnel_find+0x435/0x4d0 ip_tunnel_newlink+0x517/0x7a0 ipgre_newlink+0x14c/0x170 __rtnl_newlink+0x1173/0x19c0 rtnl_newlink+0x6c/0xa0 rtnetlink_rcv_msg+0x3cc/0xf60 netlink_rcv_skb+0x171/0x450 netlink_unicast+0x539/0x7f0 netlink_sendmsg+0x8c1/0xd80 ____sys_sendmsg+0x8f9/0xc20 ___sys_sendmsg+0x197/0x1e0 __sys_sendmsg+0x122/0x1f0 do_syscall_64+0xbb/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f ### Affected Products **Linux - Linux** Affected versions: - c54419321455631079c7d6e60bc732dd0c5914c5 (Status: affected) - c54419321455631079c7d6e60bc732dd0c5914c5 (Status: affected) - c54419321455631079c7d6e60bc732dd0c5914c5 (Status: affected) - c54419321455631079c7d6e60bc732dd0c5914c5 (Status: affected) - c54419321455631079c7d6e60bc732dd0c5914c5 (Status: affected) - c54419321455631079c7d6e60bc732dd0c5914c5 (Status: affected) **Linux - Linux** Affected versions: - 3.10 (Status: affected) - 0 (Status: unaffected) - 5.10.234 (Status: unaffected) - 5.15.178 (Status: unaffected) - 6.1.128 (Status: unaffected) - 6.6.75 (Status: unaffected) - 6.11.7 (Status: unaffected) - 6.12 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/31bd7378c6fe100a8af0e996ea0b5dafd3579df6) 2. [](https://git.kernel.org/stable/c/6ac5dfa575136da8dd8a9e7c1437c41f3a593993) 3. [](https://git.kernel.org/stable/c/ce11424026cbf87d5861b09e5e33565ff7f2ec8d) 4. [](https://git.kernel.org/stable/c/e0500e4373cd3d5eace1f1712444ab830b82c114) 5. [](https://git.kernel.org/stable/c/f20fe2cfe06ca1b008b09da4f2b4e0c5547ccef6) 6. [](https://git.kernel.org/stable/c/90e0569dd3d32f4f4d2ca691d3fa5a8a14a13c12)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5093, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5093 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5093 - **State**: PUBLISHED - **Published Date**: September 26, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 15:17 UTC - **Reserved Date**: September 26, 2007 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The disconnect method in the Philips USB Webcam (pwc) driver in Linux kernel 2.6.x before 2.6.22.6 "relies on user space to close the device," which allows user-assisted local attackers to cause a denial of service (USB subsystem hang and CPU consumption in khubd) by not closing the device after the disconnect is invoked. NOTE: this rarely crosses privilege boundaries, unless the attacker can convince the victim to unplug the affected device. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2008:0275](http://www.redhat.com/support/errata/RHSA-2008-0275.html) 2. [30294](http://secunia.com/advisories/30294) 3. [20070902 Oops in pwc v4l driver](http://marc.info/?l=linux-kernel&m=118873457814808&w=2) 4. [20070903 Re: Oops in pwc v4l driver](http://marc.info/?l=linux-kernel&m=118880154122548&w=2) 5. [RHSA-2008:0972](http://rhn.redhat.com/errata/RHSA-2008-0972.html) 6. [28706](http://secunia.com/advisories/28706) 7. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.6) 8. [26994](http://secunia.com/advisories/26994) 9. [DSA-1504](http://www.debian.org/security/2008/dsa-1504) 10. [MDVSA-2008:008](http://www.mandriva.com/security/advisories?name=MDVSA-2008:008) 11. [oval:org.mitre.oval:def:10494](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10494) 12. [USN-558-1](http://www.ubuntu.com/usn/usn-558-1) 13. [DSA-1381](http://www.debian.org/security/2007/dsa-1381) 14. [MDVSA-2008:105](http://www.mandriva.com/security/advisories?name=MDVSA-2008:105) 15. [DSA-1503](http://www.debian.org/security/2008/dsa-1503) 16. [USN-574-1](http://www.ubuntu.com/usn/usn-574-1) 17. [29058](http://secunia.com/advisories/29058) 18. [28971](http://secunia.com/advisories/28971) 19. [25504](http://www.securityfocus.com/bid/25504) 20. [28170](http://secunia.com/advisories/28170) 21. [32799](http://secunia.com/advisories/32799) 22. [USN-578-1](http://www.ubuntu.com/usn/usn-578-1)