System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-31974, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-31974 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-31974 - **State**: PUBLISHED - **Published Date**: May 09, 2023 at 00:00 UTC - **Last Updated**: January 28, 2025 at 19:15 UTC - **Reserved Date**: April 29, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description yasm v1.3.0 was discovered to contain a use after free via the function error at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/yasm/yasm/issues/208)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12424, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12424 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12424 - **State**: REJECTED - **Published Date**: December 09, 2019 at 17:24 UTC - **Last Updated**: December 09, 2019 at 17:24 UTC - **Reserved Date**: May 28, 2019 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-32938, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-32938 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-32938 - **State**: PUBLISHED - **Published Date**: February 12, 2025 at 21:19 UTC - **Last Updated**: February 13, 2025 at 20:19 UTC - **Reserved Date**: June 25, 2024 at 03:00 UTC - **Assigned By**: intel ### Vulnerability Description Uncontrolled search path for some Intel(R) MPI Library for Windows software before version 2021.13 may allow an authenticated user to potentially enable escalation of privilege via local access. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-427: Security Weakness ### Affected Products **n/a - Intel(R) MPI Library for Windows software** Affected versions: - before version 2021.13 (Status: affected) ### References 1. [https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01207.html](https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01207.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4244, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4244 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4244 - **State**: PUBLISHED - **Published Date**: May 03, 2025 at 20:00 UTC - **Last Updated**: May 05, 2025 at 14:50 UTC - **Reserved Date**: May 02, 2025 at 20:49 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in code-projects Online Bus Reservation System 1.0. This affects an unknown part of the file /seatlocation.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **code-projects - Online Bus Reservation System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-307335 | code-projects Online Bus Reservation System seatlocation.php sql injection](https://vuldb.com/?id.307335) 2. [VDB-307335 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.307335) 3. [Submit #562691 | code-projects.org Online Bus Reservation System v1.0 SQL Injection](https://vuldb.com/?submit.562691) 4. [](https://github.com/zzZxby/Vulnerability-Exploration/blob/main/Online%20Bus%20Reservation%20System/Online%20Bus%20Reservation%20System2.md) 5. [](https://code-projects.org/) ### Credits - zzzxby (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0366, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0366 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0366 - **State**: PUBLISHED - **Published Date**: March 01, 2012 at 01:00 UTC - **Last Updated**: September 16, 2024 at 19:46 UTC - **Reserved Date**: January 04, 2012 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco Unity Connection before 7.1.3b(Su2) allows remote authenticated users to change the administrative password by leveraging the Help Desk Administrator role, aka Bug ID CSCtd45141. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20120229 Multiple Vulnerabilities in Cisco Unity Connection](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cuc)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1655, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1655 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1655 - **State**: PUBLISHED - **Published Date**: June 22, 2018 at 14:00 UTC - **Last Updated**: September 17, 2024 at 01:31 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM AIX 5.3, 6.1, 7.1, and 7.2 contains a vulnerability in the rmsock command that may be used to expose kernel memory. IBM X-Force ID: 144748. ### Affected Products **IBM - AIX** Affected versions: - 6.1 (Status: affected) - 5.3 (Status: affected) - 7.1 (Status: affected) - 7.2 (Status: affected) ### References 1. [1041166](http://www.securitytracker.com/id/1041166) 2. [](http://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc) 3. [ibm-aix-cve20181655-info-disc(144748)](https://exchange.xforce.ibmcloud.com/vulnerabilities/144748) 4. [104542](http://www.securityfocus.com/bid/104542)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1324, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1324 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1324 - **State**: PUBLISHED - **Published Date**: June 01, 2024 at 06:51 UTC - **Last Updated**: August 15, 2024 at 15:01 UTC - **Reserved Date**: February 07, 2024 at 17:52 UTC - **Assigned By**: Wordfence ### Vulnerability Description The QQWorld Auto Save Images plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the save_remote_images_get_auto_saved_results() function hooked via a norpriv AJAX in all versions up to, and including, 1.9.8. This makes it possible for unauthenticated attackers to retrieve the contents of arbitrary posts that may not be public. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Affected Products **qqworld - QQWorld Auto Save Images** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/ed82f527-b7af-4466-a977-855f109ed997?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/qqworld-auto-save-images/trunk/qqworld-auto-save-images.php#L417) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4735, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4735 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4735 - **State**: PUBLISHED - **Published Date**: April 23, 2020 at 13:10 UTC - **Last Updated**: September 17, 2024 at 03:02 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM MaaS360 3.96.62 for iOS could allow an attacker with physical access to the device to obtain sensitive information from the agent outside of the container. IBM X-Force ID: 172705. ### Affected Products **IBM - MaaS360** Affected versions: - 3.96.62 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6151767) 2. [ibm-maas360-cve20194735-info-disc (172705)](https://exchange.xforce.ibmcloud.com/vulnerabilities/172705)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20197, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20197 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20197 - **State**: PUBLISHED - **Published Date**: March 26, 2021 at 16:47 UTC - **Last Updated**: August 03, 2024 at 17:30 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink. ### Weakness Classification (CWE) - CWE-59: Security Weakness ### Affected Products **n/a - binutils** Affected versions: - binutils 2.35 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1913743) 2. [](https://sourceware.org/bugzilla/show_bug.cgi?id=26945) 3. [](https://security.netapp.com/advisory/ntap-20210528-0009/) 4. [GLSA-202208-30](https://security.gentoo.org/glsa/202208-30)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20004, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20004 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20004 - **State**: PUBLISHED - **Published Date**: December 10, 2018 at 06:00 UTC - **Last Updated**: August 05, 2024 at 11:51 UTC - **Reserved Date**: December 10, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue has been found in Mini-XML (aka mxml) 2.12. It is a stack-based buffer overflow in mxml_write_node in mxml-file.c via vectors involving a double-precision floating point number and the '<order type="real">' substring, as demonstrated by testmxml. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/michaelrsweet/mxml/issues/233) 2. [[debian-lts-announce] 20190125 [SECURITY] [DLA 1641-1] mxml security update](https://lists.debian.org/debian-lts-announce/2019/01/msg00018.html) 3. [](https://github.com/fouzhe/security/tree/master/mxml#stack-buffer-overflow-in-function-mxml_write_node) 4. [FEDORA-2019-d333d01e08](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N53IJHDYR5HVQLKH4J6B27OEQLGKSGY5/) 5. [FEDORA-2019-f99619e34d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNWF6BAU7S42O4LE4B74KIMHFE2HDNMI/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30666, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30666 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30666 - **State**: PUBLISHED - **Published Date**: July 06, 2023 at 02:51 UTC - **Last Updated**: October 29, 2024 at 13:47 UTC - **Reserved Date**: April 14, 2023 at 01:59 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Improper input validation vulnerability in DoOemImeiSetPreconfig in libsec-ril prior to SMR Jul-2023 Release 1 allows local attackers to cause an Out-Of-Bounds write. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - SMR Jul-2023 Release 1 (Status: unaffected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18155, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18155 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18155 - **State**: PUBLISHED - **Published Date**: July 12, 2018 at 14:00 UTC - **Last Updated**: September 16, 2024 at 23:36 UTC - **Reserved Date**: February 05, 2018 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description While playing HEVC content using HD DMB in Snapdragon Automobile and Snapdragon Mobile in version MSM8996AU, SD 450, SD 625, SD 820, SD 820A, SD 835, an uninitialized variable can be used leading to a kernel fault. ### Affected Products **Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile** Affected versions: - MSM8996AU, SD 450, SD 625, SD 820, SD 820A, SD 835 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-06-01#qualcomm-components)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2165, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2165 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2165 - **State**: PUBLISHED - **Published Date**: May 25, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 23:17 UTC - **Reserved Date**: January 29, 2016 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description The Loggregator Traffic Controller endpoints in cf-release v231 and lower, Pivotal Elastic Runtime versions prior to 1.5.19 AND 1.6.x versions prior to 1.6.20 are not cleansing request URL paths when they are invalid and are returning them in the 404 response. This could allow malicious scripts to be written directly into the 404 response. ### Affected Products **Pivotal - Cloud Foundry** Affected versions: - cf-release v231 and lower (Status: affected) - Elastic Runtime versions prior to 1.5.19 AND 1.6.x versions prior to 1.6.20 (Status: affected) ### References 1. [](https://pivotal.io/security/cve-2016-2165)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3127, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3127 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3127 - **State**: PUBLISHED - **Published Date**: March 04, 2020 at 18:40 UTC - **Last Updated**: November 15, 2024 at 17:35 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements within a Webex recording that is stored in either the Advanced Recording Format (ARF) or the Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a malicious ARF or WRF file to a user through a link or email attachment and persuading the user to open the file on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Cisco - Cisco WebEx WRF Player** Affected versions: - unspecified (Status: affected) ### References 1. [20200304 Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200304-webex-player) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-269/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7005, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7005 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7005 - **State**: PUBLISHED - **Published Date**: April 03, 2018 at 06:00 UTC - **Last Updated**: August 05, 2024 at 15:49 UTC - **Reserved Date**: March 17, 2017 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. tvOS before 10.2.1 is affected. The issue involves the "JavaScriptCore" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [42188](https://www.exploit-db.com/exploits/42188/) 2. [](https://support.apple.com/HT207804) 3. [](https://github.com/Quindecim/Orbis-Exploit-5.x) 4. [](https://support.apple.com/HT207798) 5. [](https://support.apple.com/HT207801)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5827, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5827 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5827 - **State**: PUBLISHED - **Published Date**: June 27, 2019 at 16:13 UTC - **Last Updated**: August 04, 2024 at 20:09 UTC - **Reserved Date**: January 09, 2019 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Integer overflow in SQLite via WebSQL in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html) 2. [](https://crbug.com/952406) 3. [openSUSE-SU-2019:1666](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html) 4. [FEDORA-2019-8fb8240d14](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/) 5. [FEDORA-2019-a1af621faf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/) 6. [DSA-4500](https://www.debian.org/security/2019/dsa-4500) 7. [20190813 [SECURITY] [DSA 4500-1] chromium security update](https://seclists.org/bugtraq/2019/Aug/19) 8. [USN-4205-1](https://usn.ubuntu.com/4205-1/) 9. [GLSA-202003-16](https://security.gentoo.org/glsa/202003-16) 10. [[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update](https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29116, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29116 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29116 - **State**: PUBLISHED - **Published Date**: May 10, 2022 at 20:34 UTC - **Last Updated**: January 02, 2025 at 18:58 UTC - **Reserved Date**: April 12, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Kernel Information Disclosure Vulnerability ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) ### References 1. [Windows Kernel Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29116)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4919, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4919 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4919 - **State**: PUBLISHED - **Published Date**: September 21, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 19:32 UTC - **Reserved Date**: September 20, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in starnet/editors/htmlarea/popups/images.php in Site@School (S@S) 2.4.02 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20090915 Site@School 2.4.02 and below Multiple remote Command](http://marc.info/?l=bugtraq&m=115869368313367&w=2) 2. [2374](https://www.exploit-db.com/exploits/2374) 3. [ADV-2006-3664](http://www.vupen.com/english/advisories/2006/3664) 4. [21975](http://secunia.com/advisories/21975) 5. [1016887](http://securitytracker.com/id?1016887) 6. [20053](http://www.securityfocus.com/bid/20053)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0947, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0947 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0947 - **State**: PUBLISHED - **Published Date**: March 14, 2018 at 17:00 UTC - **Last Updated**: September 16, 2024 at 22:20 UTC - **Reserved Date**: December 01, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft SharePoint Foundation 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0910. CVE-2018-0911, CVE-2018-0912, CVE-2018-0913 CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923 and CVE-2018-0944. ### Affected Products **Microsoft Corporation - Microsoft SharePoint** Affected versions: - Microsoft SharePoint Foundation 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0947) 2. [103306](http://www.securityfocus.com/bid/103306) 3. [1040513](http://www.securitytracker.com/id/1040513)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1879, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1879 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1879 - **State**: PUBLISHED - **Published Date**: April 06, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 13:13 UTC - **Reserved Date**: April 05, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The StartUploading function in KL.SysInfo ActiveX control (AxKLSysInfo.dll) in Kaspersky Anti-Virus 6.0 and Internet Security 6.0 before Maintenance Pack 2 build 6.0.2.614 allows remote attackers to read arbitrary files by triggering an outbound anonymous FTP session that invokes the PUT command. NOTE: this issue might be related to CVE-2007-1112. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20070404 Kaspersky AntiVirus SysInfo ActiveX Control Information Disclosure Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=504) 2. [24778](http://secunia.com/advisories/24778) 3. [1017871](http://www.securitytracker.com/id?1017871) 4. [](http://www.kaspersky.com/technews?id=203038694) 5. [ADV-2007-1268](http://www.vupen.com/english/advisories/2007/1268) 6. [23325](http://www.securityfocus.com/bid/23325) 7. [kaspersky-startuploading-info-disclosure(33464)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33464)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0555, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0555 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0555 - **State**: PUBLISHED - **Published Date**: July 15, 2003 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:58 UTC - **Reserved Date**: July 14, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ImageMagick 5.4.3.x and earlier allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a "%x" filename, possibly triggering a format string vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20030714 ImageMagick's Overflow](http://marc.info/?l=bugtraq&m=105820576111599&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1066, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1066 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1066 - **State**: PUBLISHED - **Published Date**: March 24, 2009 at 19:00 UTC - **Last Updated**: August 07, 2024 at 04:57 UTC - **Reserved Date**: March 24, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the referral function in admin/lib/lib_logs.php in Pixie CMS 1.01a allows remote attackers to execute arbitrary SQL commands via the Referer HTTP header in a request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [34189](http://www.securityfocus.com/bid/34189) 2. [52833](http://osvdb.org/52833) 3. [](http://lampsecurity.org/Pixie-CMS-Multiple-Vulnerabilities) 4. [8252](https://www.exploit-db.com/exploits/8252) 5. [20090319 Pixie CMS Multiple Vulnerabilities](http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0324.html) 6. [pixiecms-referral-sql-injection(49335)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49335) 7. [34364](http://secunia.com/advisories/34364)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0158, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0158 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0158 - **State**: PUBLISHED - **Published Date**: April 12, 2016 at 23:00 UTC - **Last Updated**: August 05, 2024 at 22:08 UTC - **Reserved Date**: December 04, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Edge allows remote attackers to bypass the Same Origin Policy via unspecified vectors, aka "Microsoft Edge Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0161. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.zerodayinitiative.com/advisories/ZDI-16-233) 2. [1035522](http://www.securitytracker.com/id/1035522) 3. [MS16-038](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-038)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4106, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4106 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4106 - **State**: PUBLISHED - **Published Date**: September 18, 2008 at 17:47 UTC - **Last Updated**: August 07, 2024 at 10:00 UTC - **Reserved Date**: September 15, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description WordPress before 2.6.2 does not properly handle MySQL warnings about insertion of username strings that exceed the maximum column width of the user_login column, and does not properly handle space characters when comparing usernames, which allows remote attackers to change an arbitrary user's password to a random value by registering a similar username and then requesting a password reset, related to a "SQL column truncation vulnerability." NOTE: the attacker can discover the random password by also exploiting CVE-2008-4107. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [31737](http://secunia.com/advisories/31737) 2. [6421](https://www.exploit-db.com/exploits/6421) 3. [[oss-security] 20080916 Re: CVE request: wordpress < 2.6.2](http://marc.info/?l=oss-security&m=122152830017099&w=2) 4. [](http://www.suspekt.org/2008/08/18/mysql-and-sql-column-truncation-vulnerabilities/) 5. [ADV-2008-2553](http://www.vupen.com/english/advisories/2008/2553) 6. [6397](https://www.exploit-db.com/exploits/6397) 7. [DSA-1871](http://www.debian.org/security/2009/dsa-1871) 8. [[oss-security] 20080911 CVE request: wordpress < 2.6.2](http://www.openwall.com/lists/oss-security/2008/09/11/6) 9. [](http://www.sektioneins.de/advisories/SE-2008-05.txt) 10. [4272](http://securityreason.com/securityalert/4272) 11. [31068](http://www.securityfocus.com/bid/31068) 12. [31870](http://secunia.com/advisories/31870) 13. [20080911 Advisory 05/2008: Wordpress user_login Column SQL Truncation Vulnerability](http://www.securityfocus.com/archive/1/496287/100/0/threaded) 14. [1020869](http://securitytracker.com/id?1020869) 15. [FEDORA-2008-7902](https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00629.html) 16. [FEDORA-2008-7760](https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00607.html) 17. [](http://wordpress.org/development/2008/09/wordpress-262/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5038, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5038 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5038 - **State**: PUBLISHED - **Published Date**: April 24, 2017 at 23:00 UTC - **Last Updated**: August 05, 2024 at 14:47 UTC - **Reserved Date**: January 02, 2017 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Chrome Apps in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac had a use after free bug in GuestView, which allowed a remote attacker to perform an out of bounds memory read via a crafted Chrome extension. ### Affected Products **n/a - Google Chrome prior to 57.0.2987.98 for Linux, Windows and Mac** Affected versions: - Google Chrome prior to 57.0.2987.98 for Linux, Windows and Mac (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html) 2. [GLSA-201704-02](https://security.gentoo.org/glsa/201704-02) 3. [](https://crbug.com/695476) 4. [DSA-3810](http://www.debian.org/security/2017/dsa-3810) 5. [96767](http://www.securityfocus.com/bid/96767) 6. [RHSA-2017:0499](http://rhn.redhat.com/errata/RHSA-2017-0499.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6924, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6924 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6924 - **State**: PUBLISHED - **Published Date**: January 13, 2007 at 02:00 UTC - **Last Updated**: August 07, 2024 at 20:42 UTC - **Reserved Date**: January 12, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description bitweaver 1.3.1 and earlier allows remote attackers to obtain sensitive information via a sort_mode=-98 query string to (1) blogs/list_blogs.php, (2) fisheye/index.php, (3) wiki/orphan_pages.php, or (4) wiki/list_pages.php, which forces a SQL error. NOTE: the fisheye/list_galleries.php vector is already covered by CVE-2005-4380. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-4485](http://www.vupen.com/english/advisories/2006/4485) 2. [20996](http://www.securityfocus.com/bid/20996) 3. [22793](http://secunia.com/advisories/22793) 4. [bitweaver-sortmode-sql-injection(30165)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30165) 5. [20061106 bitweaver <=1.3.1 [injection sql (post) & xss (post)]](http://archives.neohapsis.com/archives/bugtraq/2006-11/0142.html) 6. [2144](http://securityreason.com/securityalert/2144)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3844, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3844 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3844 - **State**: PUBLISHED - **Published Date**: August 08, 2007 at 01:11 UTC - **Last Updated**: August 07, 2024 at 14:28 UTC - **Reserved Date**: July 18, 2007 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Mozilla Firefox 2.0.0.5, Thunderbird 2.0.0.5 and before 1.5.0.13, and SeaMonkey 1.1.3 allows remote attackers to conduct cross-site scripting (XSS) attacks with chrome privileges via an addon that inserts a (1) javascript: or (2) data: link into an about:blank document loaded by chrome via (a) the window.open function or (b) a content.location assignment, aka "Cross Context Scripting." NOTE: this issue is caused by a CVE-2007-3089 regression. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2007-2601](https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00285.html) 2. [](https://issues.rpath.com/browse/RPL-1600) 3. [USN-503-1](http://www.ubuntu.com/usn/usn-503-1) 4. [MDVSA-2008:047](http://www.mandriva.com/security/advisories?name=MDVSA-2008:047) 5. [ADV-2007-3587](http://www.vupen.com/english/advisories/2007/3587) 6. [27414](http://secunia.com/advisories/27414) 7. [HPSBUX02156](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579) 8. [](http://bugzilla.mozilla.org/show_bug.cgi?id=388121) 9. [26393](http://secunia.com/advisories/26393) 10. [26303](http://secunia.com/advisories/26303) 11. [ADV-2007-4256](http://www.vupen.com/english/advisories/2007/4256) 12. [26309](http://secunia.com/advisories/26309) 13. [HPSBUX02153](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742) 14. [27298](http://secunia.com/advisories/27298) 15. [MDKSA-2007:152](http://www.mandriva.com/security/advisories?name=MDKSA-2007:152) 16. [GLSA-200708-09](http://www.gentoo.org/security/en/glsa/glsa-200708-09.xml) 17. [1018481](http://securitytracker.com/id?1018481) 18. [DSA-1345](http://www.debian.org/security/2007/dsa-1345) 19. [26288](http://secunia.com/advisories/26288) 20. [27327](http://secunia.com/advisories/27327) 21. [27276](http://secunia.com/advisories/27276) 22. [DSA-1391](http://www.debian.org/security/2007/dsa-1391) 23. [DSA-1346](http://www.debian.org/security/2007/dsa-1346) 24. [RHSA-2007:0980](http://www.redhat.com/support/errata/RHSA-2007-0980.html) 25. [SUSE-SA:2007:057](http://www.novell.com/linux/security/advisories/2007_57_mozilla.html) 26. [MDVSA-2007:047](http://www.mandriva.com/security/advisories?name=MDVSA-2007:047) 27. [28135](http://secunia.com/advisories/28135) 28. [27356](http://secunia.com/advisories/27356) 29. [RHSA-2007:0981](http://www.redhat.com/support/errata/RHSA-2007-0981.html) 30. [25142](http://www.securityfocus.com/bid/25142) 31. [SSRT061236](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579) 32. [FEDORA-2007-3431](https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00498.html) 33. [](http://www.mozilla.org/security/announce/2007/mfsa2007-26.html) 34. [ADV-2008-0082](http://www.vupen.com/english/advisories/2008/0082) 35. [103177](http://sunsolve.sun.com/search/document.do?assetkey=1-26-103177-1) 36. [USN-493-1](http://www.ubuntu.com/usn/usn-493-1) 37. [26234](http://secunia.com/advisories/26234) 38. [SSRT061181](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742) 39. [DSA-1344](http://www.debian.org/security/2007/dsa-1344) 40. [1018480](http://securitytracker.com/id?1018480) 41. [27325](http://secunia.com/advisories/27325) 42. [RHSA-2007:0979](http://www.redhat.com/support/errata/RHSA-2007-0979.html) 43. [1018479](http://securitytracker.com/id?1018479) 44. [26258](http://secunia.com/advisories/26258) 45. [27326](http://secunia.com/advisories/27326) 46. [28363](http://secunia.com/advisories/28363) 47. [26331](http://secunia.com/advisories/26331) 48. [26460](http://secunia.com/advisories/26460) 49. [27680](http://secunia.com/advisories/27680) 50. [20070801 FLEA-2007-0039-1 firefox](http://www.securityfocus.com/archive/1/475265/100/200/threaded) 51. [](http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html) 52. [201516](http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1) 53. [oval:org.mitre.oval:def:9493](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9493) 54. [20070803 FLEA-2007-0040-1 thunderbird](http://www.securityfocus.com/archive/1/475450/30/5550/threaded) 55. [26335](http://secunia.com/advisories/26335) 56. [26572](http://secunia.com/advisories/26572) 57. [SSA:2007-213-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.010101)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31617, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31617 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31617 - **State**: PUBLISHED - **Published Date**: May 22, 2024 at 17:42 UTC - **Last Updated**: February 13, 2025 at 15:47 UTC - **Reserved Date**: April 05, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OpenLiteSpeed before 1.8.1 mishandles chunked encoding. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/litespeedtech/openlitespeed/releases/tag/v1.8.1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-26940, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-26940 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-26940 - **State**: REJECTED - **Published Date**: June 02, 2021 at 12:12 UTC - **Last Updated**: June 02, 2021 at 12:12 UTC - **Reserved Date**: February 09, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17377, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17377 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17377 - **State**: PUBLISHED - **Published Date**: September 28, 2018 at 00:00 UTC - **Last Updated**: August 05, 2024 at 10:47 UTC - **Reserved Date**: September 23, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL Injection exists in the Questions 1.4.3 component for Joomla! via the term, userid, users, or groups parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [45468](https://www.exploit-db.com/exploits/45468/) 2. [](http://packetstormsecurity.com/files/149523/Joomla-Questions-1.4.3-SQL-Injection.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32993, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32993 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32993 - **State**: PUBLISHED - **Published Date**: April 15, 2025 at 00:00 UTC - **Last Updated**: April 15, 2025 at 13:18 UTC - **Reserved Date**: April 15, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Vision Helpdesk through 5.7.0 allows Time-Based Blind SQL injection via the Forgot Password (aka index.php?/home/forgot-password) vis_username parameter. Authentication is not needed. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Vision Helpdesk - Vision Helpdesk** Affected versions: - 0 (Status: affected) ### References 1. [](https://nav1n.medium.com/sql-injection-in-vision-helpdesk-tools-a83dfc27f3ab) 2. [](https://www.visionhelpdesk.com/vision-helpdesk-v5-7-0-stable-version-released.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1782, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1782 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1782 - **State**: PUBLISHED - **Published Date**: April 02, 2021 at 17:59 UTC - **Last Updated**: February 03, 2025 at 14:09 UTC - **Reserved Date**: December 08, 2020 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A race condition was addressed with improved locking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited.. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT212147) 2. [](https://support.apple.com/en-us/HT212146) 3. [](https://support.apple.com/en-us/HT212148) 4. [](https://support.apple.com/en-us/HT212149)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10148, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10148 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10148 - **State**: REJECTED - **Published Date**: December 06, 2018 at 14:00 UTC - **Last Updated**: December 06, 2018 at 13:57 UTC - **Reserved Date**: April 16, 2018 at 00:00 UTC - **Assigned By**: palo_alto ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-36428, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-36428 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-36428 - **State**: PUBLISHED - **Published Date**: May 27, 2024 at 22:48 UTC - **Last Updated**: February 13, 2025 at 15:59 UTC - **Reserved Date**: May 27, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OrangeHRM 3.3.3 allows admin/viewProjects sortOrder SQL injection. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/4rdr/proofs/blob/main/info/OrangeHRM_3.3.3_SQLi_via_sortOrder.md) 2. [](https://sourceforge.net/projects/orangehrm/files/stable/3.3.3/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3339, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3339 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3339 - **State**: PUBLISHED - **Published Date**: July 28, 2008 at 16:00 UTC - **Last Updated**: August 07, 2024 at 09:37 UTC - **Reserved Date**: July 28, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description search_result.cfm in Jobbex JobSite allows remote attackers to obtain sensitive information via unspecified vectors that reveal the installation path in an error message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://holisticinfosec.org/content/view/78/45/) 2. [30302](http://www.securityfocus.com/bid/30302) 3. [jobbexjobsite-searchresult-path-disclosure(43915)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43915) 4. [](http://support.avidwebtech.com/index.php?_m=news&_a=viewnews&newsid=4) 5. [31089](http://secunia.com/advisories/31089)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2207, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2207 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2207 - **State**: PUBLISHED - **Published Date**: June 09, 2017 at 16:00 UTC - **Last Updated**: August 05, 2024 at 13:48 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Untrusted search path vulnerability in the installer of SaAT Personal ver.1.0.10.272 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. ### Affected Products **NetMove Corporation - The installer of SaAT Personal** Affected versions: - ver.1.0.10.272 and earlier (Status: affected) ### References 1. [JVN#08020381](https://jvn.jp/en/jp/JVN08020381/index.html) 2. [98809](http://www.securityfocus.com/bid/98809) 3. [](https://www.saat.jp/information/personal/2017/0531_security_update_info.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7367, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7367 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7367 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-34415, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-34415 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-34415 - **State**: PUBLISHED - **Published Date**: May 09, 2024 at 11:34 UTC - **Last Updated**: August 02, 2024 at 02:51 UTC - **Reserved Date**: May 03, 2024 at 07:31 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThimPress Thim Elementor Kit allows Stored XSS.This issue affects Thim Elementor Kit: from n/a through 1.1.8. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **ThimPress - Thim Elementor Kit** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/thim-elementor-kit/wordpress-thim-elementor-kit-plugin-1-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - 4rCanJ0x! (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20555, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20555 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20555 - **State**: PUBLISHED - **Published Date**: March 24, 2020 at 18:22 UTC - **Last Updated**: August 05, 2024 at 02:46 UTC - **Reserved Date**: March 23, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Samsung mobile devices with N(7.x) software. The Gallery app allows attackers to view all pictures of a locked device. The Samsung ID is SVE-2019-15189 (October 2019). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0637, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0637 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0637 - **State**: PUBLISHED - **Published Date**: July 04, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:56 UTC - **Reserved Date**: June 25, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description InterScan VirusWall 3.52 build 1462 allows remote attackers to bypass virus protection via e-mail messages with headers that violate RFC specifications by having (or missing) space characters in unexpected places (aka "space gap"), such as (1) Content-Type :", (2) "Content-Transfer-Encoding :", (3) no space before a boundary declaration, or (4) "boundary= ", which is processed by Outlook Express. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [interscan-viruswall-protection-bypass(9464)](http://www.iss.net/security_center/static/9464.php) 2. [](http://www.securiteam.com/securitynews/5KP000A7QE.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1304, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1304 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1304 - **State**: PUBLISHED - **Published Date**: March 12, 2008 at 17:00 UTC - **Last Updated**: August 07, 2024 at 08:17 UTC - **Reserved Date**: March 12, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) inviteemail parameter in an invite action to wp-admin/users.php and the (2) to parameter in a sent action to wp-admin/invites.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20080307 WordPress Multiple Cross-Site Scripting Vulnerabilities](http://www.securityfocus.com/archive/1/489241/100/0/threaded) 2. [](http://www.hackerscenter.com/index.php?/Latest-posts/114-WordPress-Multiple-Cross-Site-Scripting-Vulnerabilities.html?id=114) 3. [wordpress-users-xss(41055)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41055) 4. [wordpress-invites-xss(41056)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41056) 5. [28139](http://www.securityfocus.com/bid/28139) 6. [3732](http://securityreason.com/securityalert/3732) 7. [1019564](http://securitytracker.com/id?1019564)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4318, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4318 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4318 - **State**: PUBLISHED - **Published Date**: July 28, 2020 at 12:05 UTC - **Last Updated**: September 16, 2024 at 23:16 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Intelligent Operations Center for Emergency Management, Intelligent Operations Center (IOC), and IBM Water Operations for Waternamics are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 177356. ### Affected Products **IBM - Intelligent Operations Center for Emergency Management** Affected versions: - 5.1.0 (Status: affected) - 5.1.0.2 (Status: affected) - 5.1.0.3 (Status: affected) - 5.1.0.4 (Status: affected) - 5.1.0.6 (Status: affected) **IBM - Water Operations for Waternamics** Affected versions: - 5.1.0 (Status: affected) - 5.1.0.2 (Status: affected) - 5.1.0.3 (Status: affected) - 5.1.0.4 (Status: affected) - 5.1.0.6 (Status: affected) - 5.2 (Status: affected) - 5.2.1 (Status: affected) **IBM - Intelligent Operations Center** Affected versions: - 5.1.0 (Status: affected) - 5.1.0.2 (Status: affected) - 5.1.0.3 (Status: affected) - 5.1.0.4 (Status: affected) - 5.1.0.6 (Status: affected) - 5.2 (Status: affected) - 5.2.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6253297) 2. [ibm-ioc-cve20204318-xss (177356)](https://exchange.xforce.ibmcloud.com/vulnerabilities/177356)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49125, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49125 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49125 - **State**: PUBLISHED - **Published Date**: December 10, 2024 at 17:49 UTC - **Last Updated**: May 13, 2025 at 15:25 UTC - **Reserved Date**: October 11, 2024 at 20:57 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows Server 2025 (Server Core installation)** Affected versions: - 10.0.26100.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows Server 2025** Affected versions: - 10.0.26100.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49125)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4264, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4264 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4264 - **State**: PUBLISHED - **Published Date**: December 10, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 06:54 UTC - **Reserved Date**: December 10, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in components/core/connect.php in AROUNDMe 1.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the language_path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [10329](http://www.exploit-db.com/exploits/10329) 2. [37567](http://secunia.com/advisories/37567)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1278, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1278 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1278 - **State**: PUBLISHED - **Published Date**: January 20, 2021 at 19:56 UTC - **Last Updated**: November 12, 2024 at 20:25 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **Cisco - Cisco SD-WAN Solution** Affected versions: - n/a (Status: affected) ### References 1. [20210120 Cisco SD-WAN Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dosmulti-48jJuEUP)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-12175, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-12175 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-12175 - **State**: PUBLISHED - **Published Date**: September 12, 2018 at 19:00 UTC - **Last Updated**: September 17, 2024 at 03:08 UTC - **Reserved Date**: June 11, 2018 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Default install directory permissions in Intel Distribution for Python (IDP) version 2018 may allow an unprivileged user to escalate privileges via local access. ### Affected Products **Intel Corporation - Intel(R) Distribution for Python 2018** Affected versions: - Intel(R) Distribution for Python 2018 downloaded before Aug 6, 2018. (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00181.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14909, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14909 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14909 - **State**: PUBLISHED - **Published Date**: December 04, 2019 at 14:34 UTC - **Last Updated**: August 05, 2024 at 00:34 UTC - **Reserved Date**: August 10, 2019 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A vulnerability was found in Keycloak 7.x where the user federation LDAP bind type is none (LDAP anonymous bind), any password, invalid or valid will be accepted. ### Weakness Classification (CWE) - CWE-287: Improper Authentication - CWE-305: Security Weakness - CWE-592: Security Weakness ### Affected Products **n/a - Keycloak** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14909)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37459, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37459 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37459 - **State**: PUBLISHED - **Published Date**: September 15, 2023 at 19:19 UTC - **Last Updated**: September 25, 2024 at 18:04 UTC - **Reserved Date**: July 06, 2023 at 13:01 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Contiki-NG is an operating system for internet-of-things devices. In versions 4.9 and prior, when a packet is received, the Contiki-NG network stack attempts to start the periodic TCP timer if it is a TCP packet with the SYN flag set. But the implementation does not first verify that a full TCP header has been received. Specifically, the implementation attempts to access the flags field from the TCP buffer in the following conditional expression in the `check_for_tcp_syn` function. For this reason, an attacker can inject a truncated TCP packet, which will lead to an out-of-bound read from the packet buffer. As of time of publication, a patched version is not available. As a workaround, one can apply the changes in Contiki-NG pull request #2510 to patch the system. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **contiki-ng - contiki-ng** Affected versions: - <= 4.9 (Status: affected) ### References 1. [https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-6648-m23r-hq8c](https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-6648-m23r-hq8c) 2. [https://github.com/contiki-ng/contiki-ng/pull/2510](https://github.com/contiki-ng/contiki-ng/pull/2510)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-44686, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-44686 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-44686 - **State**: PUBLISHED - **Published Date**: December 06, 2021 at 23:41 UTC - **Last Updated**: August 04, 2024 at 04:25 UTC - **Reserved Date**: December 06, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in html_preprocess_rules in ebooks/conversion/preprocess.py. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.launchpad.net/calibre/+bug/1951979) 2. [](https://github.com/dwisiswant0/advisory/issues/18) 3. [](https://github.com/kovidgoyal/calibre/compare/v5.31.1...v5.32.0) 4. [FEDORA-2021-e42fadbcc3](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7QKFPYJ23KG6WJ5NIYAM4N2NWZCLQGL/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-29447, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-29447 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-29447 - **State**: PUBLISHED - **Published Date**: January 10, 2024 at 20:24 UTC - **Last Updated**: September 11, 2024 at 15:45 UTC - **Reserved Date**: April 06, 2023 at 17:45 UTC - **Assigned By**: Dragos ### Vulnerability Description An insufficiently protected credentials vulnerability in KEPServerEX could allow an adversary to capture user credentials as the web server uses basic authentication. ### CVSS Metrics - **CVSS Base Score**: 5.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-522: Security Weakness ### Affected Products **PTC - Kepware KEPServerEX** Affected versions: - 0 (Status: affected) **PTC - ThingWorx Kepware Server** Affected versions: - 0 (Status: affected) **PTC - ThingWorx Industrial Connectivity** Affected versions: - 8.0 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-03) 2. [](https://www.ptc.com/en/support/article/cs399528) 3. [](https://www.dragos.com/advisory/ptcs-kepserverex-vulnerabilities/) ### Credits - Sam Hanson of Dragos
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10070, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10070 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10070 - **State**: PUBLISHED - **Published Date**: June 05, 2020 at 17:37 UTC - **Last Updated**: September 16, 2024 at 23:06 UTC - **Reserved Date**: March 04, 2020 at 00:00 UTC - **Assigned By**: zephyr ### Vulnerability Description In the Zephyr Project MQTT code, improper bounds checking can result in memory corruption and possibly remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions. ### CVSS Metrics - **CVSS Base Score**: 9/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness - CWE-190: Security Weakness ### Affected Products **zephyrproject-rtos - zephyr** Affected versions: - 2.2.0 (Status: affected) ### References 1. [](https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment) 2. [](https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-85) 3. [](https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10070) 4. [](https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/0b39cbf3c01d7feec9d0dd7cc7e0e374b6113542) ### Credits - NCC Group for report
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1925, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1925 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1925 - **State**: PUBLISHED - **Published Date**: June 28, 2005 at 04:00 UTC - **Last Updated**: September 17, 2024 at 02:10 UTC - **Reserved Date**: June 28, 2005 at 04:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tiny Personal Firewall 3.0 through 3.0.6 allows remote attackers to cause a denial of service (crash) by via SYN, UDP, ICMP and TCP portscans when the administrator selects the Log tab of the Personal Firewall Agent module. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [tinyfw-portscan-log-dos(9918)](http://www.iss.net/security_center/static/9918.php) 2. [5525](http://www.securityfocus.com/bid/5525) 3. [20020820 NSSI-2002-tpfw: Tiny Personal Firewall 3.0 Denial of Service Vulnerabilities](http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00298.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2434, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2434 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2434 - **State**: PUBLISHED - **Published Date**: May 17, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:51 UTC - **Reserved Date**: May 17, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in WebSphere 5.1.1 (or any earlier cumulative fix) Common Configuration Mode + CommonArchive and J2EE Models might allow attackers to obtain sensitive information via the trace. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27006879) 2. [910](http://securityreason.com/securityalert/910) 3. [ADV-2006-1736](http://www.vupen.com/english/advisories/2006/1736) 4. [ADV-2006-2552](http://www.vupen.com/english/advisories/2006/2552) 5. [20032](http://secunia.com/advisories/20032) 6. [20060509 IBM Websphere Application Server Multiple Vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2006-05/0175.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2039, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2039 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2039 - **State**: PUBLISHED - **Published Date**: March 14, 2014 at 16:00 UTC - **Last Updated**: August 06, 2024 at 15:20 UTC - **Reserved Date**: February 19, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Directory traversal vulnerability in lib/files/view.php in ownCloud before 4.0.15, 4.5.x 4.5.11, and 5.x before 5.0.6 allows remote authenticated users to access arbitrary files via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://owncloud.org/about/security/advisories/oC-SA-2013-020/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000845, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000845 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000845 - **State**: REJECTED - **Published Date**: December 20, 2018 at 15:00 UTC - **Last Updated**: January 30, 2019 at 16:57 UTC - **Reserved Date**: December 20, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45994, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45994 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45994 - **State**: PUBLISHED - **Published Date**: February 04, 2022 at 01:33 UTC - **Last Updated**: August 04, 2024 at 04:54 UTC - **Reserved Date**: January 03, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a stack overflow in the function formDelDhcpRule. This vulnerability allows attackers to cause a Denial of Service (DoS) via the delDhcpIndex parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/pjqwudi/my_vuln/blob/main/Tenda/vuln_12/12.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22450, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22450 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22450 - **State**: PUBLISHED - **Published Date**: October 28, 2021 at 12:31 UTC - **Last Updated**: August 03, 2024 at 18:44 UTC - **Reserved Date**: January 05, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description A component of the HarmonyOS has a Incomplete Cleanup vulnerability. Local attackers may exploit this vulnerability to cause memory exhaustion. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) ### References 1. [](https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30337, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30337 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30337 - **State**: PUBLISHED - **Published Date**: July 21, 2022 at 16:02 UTC - **Last Updated**: February 20, 2025 at 20:17 UTC - **Reserved Date**: June 08, 2022 at 00:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in JoomUnited WP Meta SEO plugin <= 4.4.8 at WordPress allows an attacker to update the social settings. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **JoomUnited - WP Meta SEO (WordPress plugin)** Affected versions: - <= 4.4.8 (Status: affected) ### References 1. [](https://wordpress.org/plugins/wp-meta-seo/#developers) 2. [](https://patchstack.com/database/vulnerability/wp-meta-seo/wordpress-wp-meta-seo-plugin-4-4-8-social-settings-update-vis-cross-site-request-forgery-csrf-vulnerability) ### Credits - Vulnerability discovered by Rafie Muhammad aka Yeraisci (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15788, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15788 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15788 - **State**: PUBLISHED - **Published Date**: September 09, 2020 at 18:11 UTC - **Last Updated**: August 04, 2024 at 13:22 UTC - **Reserved Date**: July 15, 2020 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in Polarion Subversion Webclient (All versions). The Polarion subversion web application does not filter user input in a way that prevents Cross-Site Scripting. If a user is enticed into passing specially crafted, malicious input to the web client (e.g. by clicking on a malicious URL with embedded JavaScript), then JavaScript code can be returned and may then be executed by the user’s client. Various actions could be triggered by running malicious JavaScript code. ### Weakness Classification (CWE) - CWE-80: Security Weakness ### Affected Products **Siemens AG - Polarion Subversion Webclient** Affected versions: - All versions (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-436520.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0291, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0291 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0291 - **State**: PUBLISHED - **Published Date**: January 17, 2007 at 02:00 UTC - **Last Updated**: August 07, 2024 at 12:12 UTC - **Reserved Date**: January 16, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Oracle E-Business Suite and Applications 6.2.3 has unknown impact and attack vectors related to Oracle Exchange, aka APPS02. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [32889](http://osvdb.org/32889) 2. [23794](http://secunia.com/advisories/23794) 3. [22083](http://www.securityfocus.com/bid/22083) 4. [](http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html) 5. [TA07-017A](http://www.us-cert.gov/cas/techalerts/TA07-017A.html) 6. [oracle-cpu-jan2007(31541)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31541) 7. [1017522](http://securitytracker.com/id?1017522)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17626, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17626 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17626 - **State**: PUBLISHED - **Published Date**: October 16, 2019 at 11:29 UTC - **Last Updated**: August 05, 2024 at 01:47 UTC - **Reserved Date**: October 16, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bitbucket.org/rptlab/reportlab/issues/199/eval-in-colorspy-leads-to-remote-code) 2. [](https://bitbucket.org/rptlab/reportlab/src/default/CHANGES.md) 3. [RHSA-2020:0197](https://access.redhat.com/errata/RHSA-2020:0197) 4. [RHSA-2020:0195](https://access.redhat.com/errata/RHSA-2020:0195) 5. [FEDORA-2020-d2fb999600](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZZPHP2BJSTP4IYCSJRQINP763IHO6ASL/) 6. [RHSA-2020:0230](https://access.redhat.com/errata/RHSA-2020:0230) 7. [RHSA-2020:0201](https://access.redhat.com/errata/RHSA-2020:0201) 8. [FEDORA-2020-f3e0ba2f79](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSCTOE3DITFICY2XKBYZ5WAF5TSQ52DM/) 9. [openSUSE-SU-2020:0160](http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00002.html) 10. [USN-4273-1](https://usn.ubuntu.com/4273-1/) 11. [[debian-lts-announce] 20200220 [SECURITY] [DLA 2112-1] python-reportlab security update](https://lists.debian.org/debian-lts-announce/2020/02/msg00019.html) 12. [DSA-4663](https://www.debian.org/security/2020/dsa-4663) 13. [GLSA-202007-35](https://security.gentoo.org/glsa/202007-35) 14. [](https://security.netapp.com/advisory/ntap-20240719-0006/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28436, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28436 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28436 - **State**: PUBLISHED - **Published Date**: April 22, 2024 at 00:00 UTC - **Last Updated**: November 05, 2024 at 18:14 UTC - **Reserved Date**: March 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross Site Scripting vulnerability in D-Link DAP products DAP-2230, DAP-2310, DAP-2330, DAP-2360, DAP-2553, DAP-2590, DAP-2690, DAP-2695, DAP-3520, DAP-3662 allows a remote attacker to execute arbitrary code via the reload parameter in the session_login.php component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.dlink.com/en/security-bulletin/) 2. [](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10380) 3. [](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10382) 4. [](https://djallalakira.medium.com/cve-2024-28436-cross-site-scripting-vulnerability-in-d-link-dap-products-3596976cc99f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4126, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4126 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4126 - **State**: PUBLISHED - **Published Date**: April 24, 2024 at 19:31 UTC - **Last Updated**: August 01, 2024 at 20:33 UTC - **Reserved Date**: April 24, 2024 at 08:19 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Tenda W15E 15.11.0.14 and classified as critical. This issue affects the function formSetSysTime of the file /goform/SetSysTimeCfg. The manipulation of the argument manualTime leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261869 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Tenda - W15E** Affected versions: - 15.11.0.14 (Status: affected) ### References 1. [VDB-261869 | Tenda W15E SetSysTimeCfg formSetSysTime stack-based overflow](https://vuldb.com/?id.261869) 2. [VDB-261869 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.261869) 3. [Submit #317831 | Tenda W15EV1.0 V15.11.0.14 Buffer Overflow](https://vuldb.com/?submit.317831) 4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetSysTime.md) ### Credits - wxhwxhwxh_mie (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0409, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0409 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0409 - **State**: PUBLISHED - **Published Date**: January 25, 2006 at 02:00 UTC - **Last Updated**: August 07, 2024 at 16:34 UTC - **Reserved Date**: January 25, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in index.php in Pixelpost Photoblog 1.4.3 allows remote attackers to inject arbitrary web script or HTML via the "Add Comment" field in a comment popup. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1015529](http://securitytracker.com/id?1015529) 2. [pixelpost-index-xss(24261)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24261) 3. [ADV-2006-0309](http://www.vupen.com/english/advisories/2006/0309) 4. [](http://evuln.com/vulns/45/summary.html) 5. [18572](http://secunia.com/advisories/18572) 6. [20060123 [eVuln] Pixelpost Photoblog XSS Vulnerability](http://www.securityfocus.com/archive/1/423384/100/0/threaded) 7. [16362](http://www.securityfocus.com/bid/16362)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25395, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25395 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25395 - **State**: PUBLISHED - **Published Date**: June 11, 2021 at 14:45 UTC - **Last Updated**: February 04, 2025 at 21:25 UTC - **Reserved Date**: January 19, 2021 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description A race condition in MFC charger driver prior to SMR MAY-2021 Release 1 allows local attackers to bypass signature check given a radio privilege is compromised. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-362: Security Weakness ### Affected Products **Samsung Mobile - Samsung Mobile Devices ** Affected versions: - O(8.x), P(9.0), Q(10.0), R(11.0) (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0004, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0004 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0004 - **State**: PUBLISHED - **Published Date**: January 09, 2013 at 18:00 UTC - **Last Updated**: August 06, 2024 at 14:10 UTC - **Reserved Date**: November 27, 2012 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly validate the permissions of objects in memory, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application, aka "Double Construction Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [TA13-008A](http://www.us-cert.gov/cas/techalerts/TA13-008A.html) 2. [oval:org.mitre.oval:def:16339](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16339) 3. [MS13-004](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-004)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1537, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1537 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1537 - **State**: REJECTED - **Published Date**: September 10, 2020 at 13:46 UTC - **Last Updated**: September 10, 2020 at 14:40 UTC - **Reserved Date**: November 28, 2018 at 00:00 UTC - **Assigned By**: openssl ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1046, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1046 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1046 - **State**: PUBLISHED - **Published Date**: April 23, 2025 at 16:43 UTC - **Last Updated**: April 23, 2025 at 18:31 UTC - **Reserved Date**: February 04, 2025 at 21:01 UTC - **Assigned By**: zdi ### Vulnerability Description Luxion KeyShot SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23646. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Luxion - KeyShot** Affected versions: - 2024 13.0.0 Build 92 4.10.171 (Status: affected) ### References 1. [ZDI-25-231](https://www.zerodayinitiative.com/advisories/ZDI-25-231/) 2. [vendor-provided URL](https://download.keyshot.com/cert/ksa-113962/ksa-113962.pdf?version=1.0&_gl=1*1x6i3a*_gcl_au*MTU0ODMwNDI4Ny4xNzQzNTUyMjcx)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5569, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5569 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5569 - **State**: PUBLISHED - **Published Date**: October 18, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 15:39 UTC - **Reserved Date**: October 18, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cisco PIX and ASA appliances with 7.1 and 7.2 software, when configured for TLS sessions to the device, allow remote attackers to cause a denial of service (device reload) via a crafted TLS packet, aka CSCsg43276 and CSCsh97120. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20071017 Multiple Vulnerabilities in Cisco PIX and ASA Appliance](http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda56.shtml) 2. [1018827](http://www.securitytracker.com/id?1018827) 3. [27193](http://secunia.com/advisories/27193) 4. [ADV-2007-3531](http://www.vupen.com/english/advisories/2007/3531) 5. [1018826](http://www.securitytracker.com/id?1018826) 6. [cisco-asa-pix-tls-dos(37260)](https://exchange.xforce.ibmcloud.com/vulnerabilities/37260) 7. [26104](http://www.securityfocus.com/bid/26104)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5164, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5164 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5164 - **State**: PUBLISHED - **Published Date**: September 26, 2012 at 00:00 UTC - **Last Updated**: August 06, 2024 at 20:58 UTC - **Reserved Date**: September 25, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Fork CMS before 3.2.7 allow remote attackers to inject arbitrary web script or HTML via the term parameter to (1) autocomplete.php, (2) search/ajax/autosuggest.php, (3) livesuggest.php, or (4) save.php in frontend/modules/search/ajax. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/forkcms/forkcms/commit/641e27bf1e9a7e320d6856399a7c274934bb351e) 2. [](https://github.com/forkcms/forkcms/commit/03e8f5b53f193a87116b3875eec39769d5c07114) 3. [](http://www.fork-cms.com/blog/detail/fork-cms-3-2-7-released) 4. [](https://github.com/forkcms/forkcms/pull/247) 5. [fork-multiple-xss(78957)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78957)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14875, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14875 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14875 - **State**: PUBLISHED - **Published Date**: March 30, 2018 at 21:00 UTC - **Last Updated**: September 16, 2024 at 22:03 UTC - **Reserved Date**: September 28, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In the handler for the ioctl command VIDIOC_MSM_ISP_DUAL_HW_LPM_MODE in Android for MSM, Firefox OS for MSM, and QRD Android before 2017-05-23, a heap overread vulnerability exists. ### Affected Products **Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android** Affected versions: - All Android releases from CAF using the Linux kernel (Status: affected) ### References 1. [](https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=755261330733bb2440907a8407ed691c99451ddc) 2. [](https://source.android.com/security/bulletin/pixel/2018-02-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-20006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-20006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-20006 - **State**: PUBLISHED - **Published Date**: February 05, 2024 at 05:59 UTC - **Last Updated**: August 01, 2024 at 21:52 UTC - **Reserved Date**: November 02, 2023 at 13:35 UTC - **Assigned By**: MediaTek ### Vulnerability Description In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08477148; Issue ID: ALPS08477148. ### Affected Products **MediaTek, Inc. - MT2713, MT6781, MT6880, MT6890, MT8188T** Affected versions: - Android 11.0 / OpenWrt 19.07, 21.02 / RDK-B 22Q3 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/February-2024)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2461, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2461 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2461 - **State**: PUBLISHED - **Published Date**: June 06, 2006 at 20:03 UTC - **Last Updated**: August 07, 2024 at 22:30 UTC - **Reserved Date**: August 05, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in the calendar feature in Kayako liveResponse 2.x allow remote attackers to execute arbitrary SQL commands via the (1) year or (2) date parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [14425](http://www.securityfocus.com/bid/14425) 2. [20050730 Kayako liveResponse Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=112274359718863&w=2) 3. [16286](http://secunia.com/advisories/16286) 4. [](http://www.gulftech.org/?node=research&article_id=00092-07302005) 5. [18396](http://www.osvdb.org/18396)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-9107, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-9107 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-9107 - **State**: PUBLISHED - **Published Date**: February 25, 2019 at 01:00 UTC - **Last Updated**: August 04, 2024 at 21:38 UTC - **Reserved Date**: February 24, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description XSS exists in WUZHI CMS 4.1.0 via index.php?m=attachment&f=imagecut&v=init&imgurl=[XSS] to coreframe/app/attachment/imagecut.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/redeye5/ccbbc43330cc9821062249b78c916317) 2. [](https://github.com/wuzhicms/wuzhicms/issues/169)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25836, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25836 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25836 - **State**: PUBLISHED - **Published Date**: December 12, 2022 at 00:00 UTC - **Last Updated**: April 22, 2025 at 20:15 UTC - **Reserved Date**: February 24, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Bluetooth® Low Energy Pairing in Bluetooth Core Specification v4.0 through v5.3 may permit an unauthenticated MITM to acquire credentials with two pairing devices via adjacent access when the MITM negotiates Legacy Passkey Pairing with the pairing Initiator and Secure Connections Passkey Pairing with the pairing Responder and brute forces the Passkey entered by the user into the Initiator. The MITM attacker can use the identified Passkey value to complete authentication with the Responder via Bluetooth pairing method confusion. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9918, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9918 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9918 - **State**: PUBLISHED - **Published Date**: July 05, 2017 at 19:00 UTC - **Last Updated**: August 05, 2024 at 17:24 UTC - **Reserved Date**: June 25, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IrfanView version 4.44 (32bit) with TOOLS Plugin 4.50 might allow attackers to cause a denial of service or execute arbitrary code via a crafted file, related to "Data from Faulting Address controls Branch Selection starting at KERNELBASE!QueryOptionalDelayLoadedAPI+0x0000000000000c42." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9918)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-18440, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-18440 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-18440 - **State**: PUBLISHED - **Published Date**: November 02, 2021 at 17:44 UTC - **Last Updated**: August 04, 2024 at 14:00 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow vulnerability in framework/init.php in qinggan phpok 5.1, allows attackers to execute arbitrary code. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/qinggan/phpok/issues/4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21077, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21077 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21077 - **State**: PUBLISHED - **Published Date**: March 24, 2023 at 00:00 UTC - **Last Updated**: February 20, 2025 at 15:40 UTC - **Reserved Date**: November 03, 2022 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In rtt_unpack_xtlv_cbfn of dhd_rtt.c, there is a possible out of bounds write due to a buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-257289560References: N/A ### Affected Products **n/a - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2023-03-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16848, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16848 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16848 - **State**: PUBLISHED - **Published Date**: November 16, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 20:35 UTC - **Reserved Date**: November 16, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Zoho ManageEngine Applications Manager 13 allows SQL injection via the /manageConfMons.do groupname parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10034, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10034 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10034 - **State**: PUBLISHED - **Published Date**: December 30, 2016 at 19:00 UTC - **Last Updated**: August 06, 2024 at 03:07 UTC - **Reserved Date**: December 23, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The setFrom function in the Sendmail adapter in the zend-mail component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and Zend Framework before 2.4.11 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201804-10](https://security.gentoo.org/glsa/201804-10) 2. [42221](https://www.exploit-db.com/exploits/42221/) 3. [](https://framework.zend.com/security/advisory/ZF2016-04) 4. [](https://legalhackers.com/advisories/ZendFramework-Exploit-ZendMail-Remote-Code-Exec-CVE-2016-10034-Vuln.html) 5. [40979](https://www.exploit-db.com/exploits/40979/) 6. [1037539](http://www.securitytracker.com/id/1037539) 7. [40986](https://www.exploit-db.com/exploits/40986/) 8. [95144](http://www.securityfocus.com/bid/95144)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-5131, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-5131 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-5131 - **State**: PUBLISHED - **Published Date**: August 30, 2012 at 22:00 UTC - **Last Updated**: August 07, 2024 at 00:23 UTC - **Reserved Date**: August 30, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in global.php in MyBB before 1.6.5 allows remote attackers to hijack the authentication of a user for requests that change the user's language via the language parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://dev.mybb.com/issues/1729) 2. [77327](http://www.osvdb.org/77327) 3. [46951](http://secunia.com/advisories/46951) 4. [mybb-language-setting-csrf(71462)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71462) 5. [](http://blog.mybb.com/2011/11/25/mybb-1-6-5-released-feature-update-security-maintenance-release/) 6. [50816](http://www.securityfocus.com/bid/50816)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-38707, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-38707 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-38707 - **State**: PUBLISHED - **Published Date**: May 05, 2023 at 13:54 UTC - **Last Updated**: January 29, 2025 at 16:56 UTC - **Reserved Date**: August 23, 2022 at 16:35 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Cognos Command Center 10.2.4.1 could allow a local attacker to obtain sensitive information due to insufficient session expiration. IBM X-Force ID: 234179. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-613: Security Weakness ### Affected Products **IBM - Cognos Command Center** Affected versions: - 10.2.4.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6983274) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/234179)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30894, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30894 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30894 - **State**: PUBLISHED - **Published Date**: August 24, 2021 at 18:49 UTC - **Last Updated**: August 03, 2024 at 22:48 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 15.1 and iPadOS 15.1, tvOS 15.1. An application may be able to execute arbitrary code with kernel privileges. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT212867) 2. [](https://support.apple.com/en-us/HT212876)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0051, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0051 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0051 - **State**: PUBLISHED - **Published Date**: March 12, 2010 at 21:00 UTC - **Last Updated**: August 07, 2024 at 00:37 UTC - **Reserved Date**: December 15, 2009 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit in Apple Safari before 4.0.5 does not properly validate the cross-origin loading of stylesheets, which allows remote attackers to obtain sensitive information via a crafted HTML document. NOTE: this might overlap CVE-2010-0651. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MDVSA-2011:039](http://www.mandriva.com/security/advisories?name=MDVSA-2011:039) 2. [APPLE-SA-2010-03-11-1](http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html) 3. [ADV-2010-2722](http://www.vupen.com/english/advisories/2010/2722) 4. [43068](http://secunia.com/advisories/43068) 5. [](http://scarybeastsecurity.blogspot.com/2009/12/generic-cross-browser-cross-domain.html) 6. [USN-1006-1](http://www.ubuntu.com/usn/USN-1006-1) 7. [1023708](http://www.securitytracker.com/id?1023708) 8. [41856](http://secunia.com/advisories/41856) 9. [ADV-2011-0212](http://www.vupen.com/english/advisories/2011/0212) 10. [](http://websec.sv.cmu.edu/css/css.pdf) 11. [](http://support.apple.com/kb/HT4225) 12. [62944](http://osvdb.org/62944) 13. [](http://support.apple.com/kb/HT4070) 14. [SUSE-SR:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html) 15. [42314](http://secunia.com/advisories/42314) 16. [ADV-2011-0552](http://www.vupen.com/english/advisories/2011/0552) 17. [](http://code.google.com/p/chromium/issues/detail?id=9877) 18. [](http://support.apple.com/kb/HT4456) 19. [oval:org.mitre.oval:def:7554](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7554) 20. [APPLE-SA-2010-06-21-1](http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html) 21. [38671](http://www.securityfocus.com/bid/38671) 22. [APPLE-SA-2010-11-22-1](http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html) 23. [safari-stylesheet-info-disclosure(56837)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56837)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3488, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3488 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3488 - **State**: PUBLISHED - **Published Date**: July 28, 2023 at 15:36 UTC - **Last Updated**: October 11, 2024 at 14:07 UTC - **Reserved Date**: June 30, 2023 at 18:47 UTC - **Assigned By**: Silabs ### Vulnerability Description Uninitialized buffer in GBL parser in Silicon Labs GSDK v4.3.0 and earlier allows attacker to leak data from Secure stack via malformed GBL file. ### CVSS Metrics - **CVSS Base Score**: 3.8/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-908: Security Weakness ### Affected Products **silabs.com - Gecko Bootloader** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/SiliconLabs/gecko_sdk/releases) 2. [](https://community.silabs.com/sfc/servlet.shepherd/document/download/0698Y00000Wi3HwQAJ?operationContext=S1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26719, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26719 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26719 - **State**: PUBLISHED - **Published Date**: November 01, 2022 at 00:00 UTC - **Last Updated**: May 06, 2025 at 14:21 UTC - **Reserved Date**: March 08, 2022 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213258) 2. [](https://support.apple.com/en-us/HT213253) 3. [](https://support.apple.com/en-us/HT213254) 4. [](https://support.apple.com/en-us/HT213257) 5. [](https://support.apple.com/en-us/HT213260)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41515, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41515 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41515 - **State**: PUBLISHED - **Published Date**: October 04, 2024 at 00:00 UTC - **Last Updated**: October 04, 2024 at 18:27 UTC - **Reserved Date**: July 18, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A reflected cross-site scripting (XSS) vulnerability in "ccHandlerResource.ashx" in CADClick <= 1.11.0 allows remote attackers to inject arbitrary web script or HTML via the "res_url" parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://cadclick.de/) 2. [](http://kimweb.de/) 3. [](https://piuswalter.de/blog/multiple-critical-vulnerabilities-in-cadclick/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31786, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31786 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31786 - **State**: PUBLISHED - **Published Date**: September 07, 2021 at 06:05 UTC - **Last Updated**: August 03, 2024 at 23:10 UTC - **Reserved Date**: April 23, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Bluetooth Classic Audio implementation on Actions ATS2815 and ATS2819 devices does not properly handle a connection attempt from a host with the same BDAddress as the current connected BT host, allowing attackers to trigger a disconnection and deadlock of the device by connecting with a forged BDAddress that matches the original connected host. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.actions-semi.com/index.php?id=3581&siteId=4) 2. [](https://launchstudio.bluetooth.com/ListingDetails/76427) 3. [](https://dl.packetstormsecurity.net/papers/general/braktooth.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39815, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39815 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39815 - **State**: PUBLISHED - **Published Date**: September 13, 2022 at 20:36 UTC - **Last Updated**: August 03, 2024 at 12:07 UTC - **Reserved Date**: September 05, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In NOKIA 1350 OMS R14.2, multiple OS Command Injection vulnerabilities occurs. This vulnerability allow unauthenticated users to execute commands on the operating system. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.gruppotim.it/it/footer/red-team.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-42559, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-42559 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-42559 - **State**: PUBLISHED - **Published Date**: December 05, 2023 at 02:44 UTC - **Last Updated**: August 02, 2024 at 19:23 UTC - **Reserved Date**: September 11, 2023 at 23:55 UTC - **Assigned By**: SamsungMobile ### Vulnerability Description Improper exception management vulnerability in Knox Guard prior to SMR Dec-2023 Release 1 allows Knox Guard lock bypass via changing system time. ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N` ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - SMR Dec-2023 Release in Android 11, 12, 13, 14 (Status: unaffected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8092, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8092 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8092 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: trellix ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3210, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3210 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3210 - **State**: PUBLISHED - **Published Date**: March 29, 2023 at 00:00 UTC - **Last Updated**: February 14, 2025 at 16:34 UTC - **Reserved Date**: September 13, 2022 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the xupnpd service, which listens on TCP port 4044 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15905. ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **D-Link - DIR-2150** Affected versions: - 4.0.1 (Status: affected) ### References 1. [](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10304) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1222/) ### Credits - Anonymous
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2252, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2252 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2252 - **State**: PUBLISHED - **Published Date**: March 22, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 10:06 UTC - **Reserved Date**: February 28, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted PROFINET packets, a different vulnerability than CVE-2014-2253. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf) 2. [](http://ics-cert.us-cert.gov/advisories/ICSA-14-079-02) 3. [](https://cert-portal.siemens.com/productcert/pdf/ssa-654382.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18578, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18578 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18578 - **State**: PUBLISHED - **Published Date**: October 22, 2018 at 21:00 UTC - **Last Updated**: September 17, 2024 at 04:04 UTC - **Reserved Date**: October 22, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description DedeCMS 5.7 SP2 allows XSS via the plus/qrcode.php type parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ky-j/dedecms/files/2500328/Reflected.XSS.Vulnerability.exists.in.the.file.of.DedeCMS.V5.docx) 2. [](https://github.com/ky-j/dedecms/issues/5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0662, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0662 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0662 - **State**: PUBLISHED - **Published Date**: March 09, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:30 UTC - **Reserved Date**: August 15, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description RPC endpoint mapper in Windows NT 4.0 allows remote attackers to cause a denial of service (loss of RPC services) via a malformed request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [L-142](http://www.ciac.org/ciac/bulletins/l-142.shtml) 2. [3313](http://www.securityfocus.com/bid/3313) 3. [MS01-048](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-048) 4. [winnt-rpc-endpoint-dos(7105)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7105)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27768 - **State**: REJECTED - **Last Updated**: March 17, 2025 at 22:36 UTC - **Reserved Date**: March 06, 2025 at 14:36 UTC - **Assigned By**: fortinet ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1148, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1148 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1148 - **State**: PUBLISHED - **Published Date**: March 09, 2002 at 05:00 UTC - **Last Updated**: August 01, 2024 at 17:02 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FTP service in IIS 4.0 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via many passive (PASV) connections at the same time. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [Q189262](http://support.microsoft.com/support/kb/articles/Q189/2/62.ASP) 2. [MS98-006](https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-006) 3. [iis-passive-ftp(1215)](https://exchange.xforce.ibmcloud.com/vulnerabilities/1215)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15767, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15767 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15767 - **State**: PUBLISHED - **Published Date**: October 22, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 20:04 UTC - **Reserved Date**: October 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "User Mode Write AV near NULL starting at CADIMAGE+0x00000000003d5b52." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15767)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24724, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24724 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24724 - **State**: PUBLISHED - **Published Date**: March 03, 2022 at 19:35 UTC - **Last Updated**: April 22, 2025 at 18:20 UTC - **Reserved Date**: February 10, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description cmark-gfm is GitHub's extended version of the C reference implementation of CommonMark. Prior to versions 0.29.0.gfm.3 and 0.28.3.gfm.21, an integer overflow in cmark-gfm's table row parsing `table.c:row_from_string` may lead to heap memory corruption when parsing tables who's marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution depending on how and where `cmark-gfm` is used. If `cmark-gfm` is used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE) in applications employing affected versions of the `cmark-gfm` library. This vulnerability has been patched in the following cmark-gfm versions 0.29.0.gfm.3 and 0.28.3.gfm.21. A workaround is available. The vulnerability exists in the table markdown extensions of cmark-gfm. Disabling the table extension will prevent this vulnerability from being triggered. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-190: Security Weakness ### Affected Products **github - cmark-gfm** Affected versions: - < 0.28.3.gfm.21 (Status: affected) - >= 0.29.0.gfm.0, < 0.29.0.gfm.3 (Status: affected) ### References 1. [](https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x) 2. [FEDORA-2022-557ad15f2e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z55K6VNVKO2G5SNKRCQ2KDG5SKTX5PVV/) 3. [FEDORA-2022-725edc74c0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TJBFIJEHJZEEDG6MO4MQHZYKUXELH77O/) 4. [FEDORA-2022-bc43bafcfd](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7V3HAM5H6YFJG2QFEXACZR3XVWFTXTC/) 5. [FEDORA-2022-c42d02e5e5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5CYUU662VO6CCXQKVZVOHXX3RGIF2DLQ/) 6. [FEDORA-2022-79b9a59e3b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSKUOJ2VAYGTJXPDE2RRPMNLVVMKCI77/) 7. [FEDORA-2022-1f981071eb](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KH4UQA6VWVZU5EW3HNEAB7D7BTCNJSJ2/) 8. [](http://packetstormsecurity.com/files/166599/cmark-gfm-Integer-overflow.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22090, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22090 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22090 - **State**: PUBLISHED - **Published Date**: April 16, 2025 at 14:12 UTC - **Last Updated**: May 26, 2025 at 05:18 UTC - **Reserved Date**: December 29, 2024 at 08:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: x86/mm/pat: Fix VM_PAT handling when fork() fails in copy_page_range() If track_pfn_copy() fails, we already added the dst VMA to the maple tree. As fork() fails, we'll cleanup the maple tree, and stumble over the dst VMA for which we neither performed any reservation nor copied any page tables. Consequently untrack_pfn() will see VM_PAT and try obtaining the PAT information from the page table -- which fails because the page table was not copied. The easiest fix would be to simply clear the VM_PAT flag of the dst VMA if track_pfn_copy() fails. However, the whole thing is about "simply" clearing the VM_PAT flag is shaky as well: if we passed track_pfn_copy() and performed a reservation, but copying the page tables fails, we'll simply clear the VM_PAT flag, not properly undoing the reservation ... which is also wrong. So let's fix it properly: set the VM_PAT flag only if the reservation succeeded (leaving it clear initially), and undo the reservation if anything goes wrong while copying the page tables: clearing the VM_PAT flag after undoing the reservation. Note that any copied page table entries will get zapped when the VMA will get removed later, after copy_page_range() succeeded; as VM_PAT is not set then, we won't try cleaning VM_PAT up once more and untrack_pfn() will be happy. Note that leaving these page tables in place without a reservation is not a problem, as we are aborting fork(); this process will never run. A reproducer can trigger this usually at the first try: https://gitlab.com/davidhildenbrand/scratchspace/-/raw/main/reproducers/pat_fork.c WARNING: CPU: 26 PID: 11650 at arch/x86/mm/pat/memtype.c:983 get_pat_info+0xf6/0x110 Modules linked in: ... CPU: 26 UID: 0 PID: 11650 Comm: repro3 Not tainted 6.12.0-rc5+ #92 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014 RIP: 0010:get_pat_info+0xf6/0x110 ... Call Trace: <TASK> ... untrack_pfn+0x52/0x110 unmap_single_vma+0xa6/0xe0 unmap_vmas+0x105/0x1f0 exit_mmap+0xf6/0x460 __mmput+0x4b/0x120 copy_process+0x1bf6/0x2aa0 kernel_clone+0xab/0x440 __do_sys_clone+0x66/0x90 do_syscall_64+0x95/0x180 Likely this case was missed in: d155df53f310 ("x86/mm/pat: clear VM_PAT if copy_p4d_range failed") ... and instead of undoing the reservation we simply cleared the VM_PAT flag. Keep the documentation of these functions in include/linux/pgtable.h, one place is more than sufficient -- we should clean that up for the other functions like track_pfn_remap/untrack_pfn separately. ### Affected Products **Linux - Linux** Affected versions: - 2ab640379a0ab4cef746ced1d7e04a0941774bcb (Status: affected) - 2ab640379a0ab4cef746ced1d7e04a0941774bcb (Status: affected) - 2ab640379a0ab4cef746ced1d7e04a0941774bcb (Status: affected) - 2ab640379a0ab4cef746ced1d7e04a0941774bcb (Status: affected) - 2ab640379a0ab4cef746ced1d7e04a0941774bcb (Status: affected) **Linux - Linux** Affected versions: - 2.6.29 (Status: affected) - 0 (Status: unaffected) - 6.6.87 (Status: unaffected) - 6.12.23 (Status: unaffected) - 6.13.11 (Status: unaffected) - 6.14.2 (Status: unaffected) - 6.15 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/b07398e8a5da517083f5c3f2daa8f6681b48ab28) 2. [](https://git.kernel.org/stable/c/8d6373f83f367dbed316ddeb178130a3a64b5b67) 3. [](https://git.kernel.org/stable/c/da381c33f3aa6406406c9fdf07b8b0b63e0ce722) 4. [](https://git.kernel.org/stable/c/de6185b8892d88142ef69768fe4077cbf40109c0) 5. [](https://git.kernel.org/stable/c/dc84bc2aba85a1508f04a936f9f9a15f64ebfb31)