System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14176, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14176 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14176
- **State**: PUBLISHED
- **Published Date**: November 27, 2017 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 19:20 UTC
- **Reserved Date**: September 07, 2017 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
Bazaar through 2.7.0, when Subprocess SSH is used, allows remote attackers to execute arbitrary commands via a bzr+ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-16228, CVE-2017-1000116, and CVE-2017-1000117.
### Affected Products
**n/a - Bazaar through 2.7.0**
Affected versions:
- Bazaar through 2.7.0 (Status: affected)
### References
1. [DSA-4052](https://www.debian.org/security/2017/dsa-4052)
2. [](https://bugzilla.suse.com/show_bug.cgi?id=1058214)
3. [](http://www.ubuntu.com/usn/usn-3411-1)
4. [](https://bugs.debian.org/874429)
5. [](http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-14176.html)
6. [](https://bugs.launchpad.net/bzr/+bug/1710979)
7. [](https://bugzilla.redhat.com/show_bug.cgi?id=1486685) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0759, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0759 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0759
- **State**: PUBLISHED
- **Published Date**: October 13, 2000 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:48 UTC
- **Reserved Date**: November 25, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in FuseMAIL POP service via long USER and PASS commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [634](http://www.securityfocus.com/bid/634)
2. [](http://www.crosswinds.net/~fuseware/faq.html#8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1073, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1073 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1073
- **State**: PUBLISHED
- **Published Date**: February 02, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:44 UTC
- **Reserved Date**: January 31, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Webridge PX Application Suite allows remote attackers to obtain sensitive information via a malformed request that generates a server error message, which includes full pathname or internal IP address information in the variables (1) APPL_PHYSICAL_PATH, (2) PATH_TRANSLATED, and (3) LOCAL_ADDR.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010815 webridge application suite gives up too much error information on Internal Server Error](http://www.securityfocus.com/archive/1/204725)
2. [webridge-px-reveal-information(6993)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6993)
3. [3182](http://www.securityfocus.com/bid/3182) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20905, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20905
- **State**: PUBLISHED
- **Published Date**: February 17, 2024 at 01:50 UTC
- **Last Updated**: November 13, 2024 at 16:02 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Enterprise Infrastructure SEC). Supported versions that are affected are Prior to 9.2.8.0. Easily exploitable vulnerability allows high privileged attacker with network access via JDENET to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
### CVSS Metrics
- **CVSS Base Score**: 2.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**Oracle Corporation - JD Edwards EnterpriseOne Tools**
Affected versions:
- * (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41375, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41375 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41375
- **State**: PUBLISHED
- **Published Date**: September 20, 2023 at 08:49 UTC
- **Last Updated**: September 24, 2024 at 19:08 UTC
- **Reserved Date**: August 29, 2023 at 07:40 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Use after free vulnerability exists in Kostac PLC Programming Software Version 1.6.11.0. Arbitrary code may be executed by having a user open a specially crafted project file which was saved using Kostac PLC Programming Software Version 1.6.9.0 and earlier because the issue exists in parsing of KPP project files. The vendor states that Kostac PLC Programming Software Version 1.6.10.0 or later implements the function which prevents a project file alteration. Therefore, to mitigate the impact of these vulnerabilities, a project file which was saved using Kostac PLC Programming Software Version 1.6.9.0 and earlier needs to be saved again using Kostac PLC Programming Software Version 1.6.10.0 or later.
### Affected Products
**JTEKT ELECTRONICS CORPORATION - Kostac PLC Programming Software**
Affected versions:
- Version 1.6.11.0 and earlier (Status: affected)
### References
1. [](https://www.electronics.jtekt.co.jp/en/topics/202309125391/)
2. [](https://jvn.jp/en/vu/JVNVU95282683/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42339
- **State**: PUBLISHED
- **Published Date**: August 25, 2024 at 07:08 UTC
- **Last Updated**: August 28, 2024 at 16:01 UTC
- **Reserved Date**: July 30, 2024 at 09:20 UTC
- **Assigned By**: INCD
### Vulnerability Description
CyberArk - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**CyberArk - CyberArk Identity Management**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://www.gov.il/en/Departments/faq/cve_advisories)
### Credits
- Dudu Moyal, Moriel Harush - Peer Security LTD |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37652, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37652 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37652
- **State**: PUBLISHED
- **Published Date**: August 12, 2021 at 21:15 UTC
- **Last Updated**: August 04, 2024 at 01:23 UTC
- **Reserved Date**: July 29, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.BoostedTreesCreateEnsemble` can result in a use after free error if an attacker supplies specially crafted arguments. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/boosted_trees/resource_ops.cc#L55) uses a reference counted resource and decrements the refcount if the initialization fails, as it should. However, when the code was written, the resource was represented as a naked pointer but later refactoring has changed it to be a smart pointer. Thus, when the pointer leaves the scope, a subsequent `free`-ing of the resource occurs, but this fails to take into account that the refcount has already reached 0, thus the resource has been already freed. During this double-free process, members of the resource object are accessed for cleanup but they are invalid as the entire resource has been freed. We have patched the issue in GitHub commit 5ecec9c6fbdbc6be03295685190a45e7eee726ab. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- >= 2.5.0, < 2.5.1 (Status: affected)
- >= 2.4.0, < 2.4.3 (Status: affected)
- < 2.3.4 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m7fm-4jfh-jrg6)
2. [](https://github.com/tensorflow/tensorflow/commit/5ecec9c6fbdbc6be03295685190a45e7eee726ab) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23949, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23949
- **State**: PUBLISHED
- **Published Date**: January 24, 2023 at 00:00 UTC
- **Last Updated**: April 02, 2025 at 14:36 UTC
- **Reserved Date**: January 19, 2023 at 00:00 UTC
- **Assigned By**: symantec
### Vulnerability Description
An authenticated user can supply malicious HTML and JavaScript code that will be executed in the client browser.
### Affected Products
**n/a - Symantec Identity Management And Governance**
Affected versions:
- 14.3, 14.4.1, 14.4.2 (Status: affected)
### References
1. [](https://support.broadcom.com/external/content/SecurityAdvisories/0/21174) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4386, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4386 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4386
- **State**: PUBLISHED
- **Published Date**: September 18, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 11:12 UTC
- **Reserved Date**: June 20, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Race condition in the App Installation feature in Apple iOS before 8 allows local users to gain privileges and install unverified apps by leveraging /tmp write access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT6441)
2. [1030866](http://www.securitytracker.com/id/1030866)
3. [69882](http://www.securityfocus.com/bid/69882)
4. [APPLE-SA-2014-09-17-1](http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html)
5. [appleios-cve20144386-priv-esc(96085)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96085)
6. [69936](http://www.securityfocus.com/bid/69936) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23681, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23681
- **State**: PUBLISHED
- **Published Date**: January 22, 2025 at 14:29 UTC
- **Last Updated**: January 23, 2025 at 17:01 UTC
- **Reserved Date**: January 16, 2025 at 11:28 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jannatqualitybacklinks.com REDIRECTION PLUS allows Reflected XSS. This issue affects REDIRECTION PLUS: from n/a through 2.0.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**jannatqualitybacklinks.com - REDIRECTION PLUS**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/redirection-plus/vulnerability/wordpress-redirection-plus-plugin-2-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9804, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9804 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9804
- **State**: PUBLISHED
- **Published Date**: April 26, 2019 at 16:13 UTC
- **Last Updated**: August 04, 2024 at 22:01 UTC
- **Reserved Date**: March 14, 2019 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
In Firefox Developer Tools it is possible that pasting the result of the 'Copy as cURL' command into a command shell on macOS will cause the execution of unintended additional bash script commands if the URL was maliciously crafted. This is the result of an issue with the native version of Bash on macOS. *Note: This issue only affects macOS. Other operating systems are unaffected.*. This vulnerability affects Firefox < 66.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2019-07/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1518026) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25135
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 23:09 UTC
- **Last Updated**: August 03, 2024 at 04:29 UTC
- **Reserved Date**: February 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A command injection vulnerability in the function recv_mesh_info_sync of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_19/19.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21974, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21974 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21974
- **State**: PUBLISHED
- **Published Date**: July 18, 2023 at 20:18 UTC
- **Last Updated**: September 13, 2024 at 17:53 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Application Express Team Calendar Plugin product of Oracle Application Express (component: User Account). Supported versions that are affected are Application Express Team Calendar Plugin: 18.2-22.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Application Express Team Calendar Plugin. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Application Express Team Calendar Plugin, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Application Express Team Calendar Plugin. CVSS 3.1 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H`
### Affected Products
**Oracle Corporation - Application Express (APEX)**
Affected versions:
- Application Express Team Calendar Plugin: 18.2 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujul2023.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27108, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27108 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27108
- **State**: PUBLISHED
- **Published Date**: April 06, 2022 at 14:40 UTC
- **Last Updated**: August 03, 2024 at 05:18 UTC
- **Reserved Date**: March 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OrangeHRM 4.10 is vulnerable to Insecure Direct Object Reference (IDOR) via the end point symfony/web/index.php/time/createTimesheet`. Any user can create a timesheet in another user's account.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/orangehrm/orangehrm/issues/1173) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2299, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2299 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2299
- **State**: PUBLISHED
- **Published Date**: June 03, 2023 at 04:35 UTC
- **Last Updated**: December 28, 2024 at 00:58 UTC
- **Reserved Date**: April 26, 2023 at 12:12 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to unauthorized medication of data via the /wp-json/vcita-wordpress/v1/actions/auth REST-API endpoint in versions up to, and including, 4.2.10 due to a missing capability check on the processAction function. This makes it possible for unauthenticated attackers modify the plugin's settings.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Affected Products
**vcita - Online Booking & Scheduling Calendar for WordPress by vcita**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/4855627a-de56-49ee-b0b0-01b9735d8557?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/meeting-scheduler-by-vcita/trunk/vcita-api-functions.php)
3. [](https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita)
### Credits
- Jonas Höbenreich |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3443, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3443 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3443
- **State**: PUBLISHED
- **Published Date**: May 14, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 10:43 UTC
- **Reserved Date**: May 09, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JetMPAd.ax in JetAudio 8.1.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted .ogg file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33332](http://www.exploit-db.com/exploits/33332)
2. [67319](http://www.securityfocus.com/bid/67319) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24144, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24144
- **State**: PUBLISHED
- **Published Date**: May 12, 2025 at 21:42 UTC
- **Last Updated**: May 15, 2025 at 13:18 UTC
- **Reserved Date**: January 17, 2025 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.6, visionOS 2.3, iPadOS 17.7.7, watchOS 11.3, macOS Ventura 13.7.6, iOS 18.3 and iPadOS 18.3, tvOS 18.3. An app may be able to leak sensitive kernel state.
### Affected Products
**Apple - visionOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122073)
2. [](https://support.apple.com/en-us/122072)
3. [](https://support.apple.com/en-us/122068)
4. [](https://support.apple.com/en-us/122405)
5. [](https://support.apple.com/en-us/122717)
6. [](https://support.apple.com/en-us/122718)
7. [](https://support.apple.com/en-us/122071)
8. [](https://support.apple.com/en-us/122066) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6523, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6523 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6523
- **State**: PUBLISHED
- **Published Date**: August 19, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 07:22 UTC
- **Reserved Date**: August 19, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the Portfolio plugin before 1.05 for WordPress allows remote attackers to hijack the authentication of administrators for requests that have unspecified impact via a request to the instagram-portfolio page in wp-admin/options-general.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/8108)
2. [](https://plugins.trac.wordpress.org/changeset/1175403/portfolio-by-lisa-westlund)
3. [20150721 Cross-Site Request Forgery Vulnerability in Portfolio Plugin Wordpress Plugin v1.0](http://seclists.org/fulldisclosure/2015/Jul/104) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2401, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2401 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2401
- **State**: PUBLISHED
- **Published Date**: July 14, 2022 at 17:20 UTC
- **Last Updated**: December 06, 2024 at 23:08 UTC
- **Reserved Date**: July 14, 2022 at 00:00 UTC
- **Assigned By**: Mattermost
### Vulnerability Description
Unrestricted information disclosure of all users in Mattermost version 6.7.0 and earlier allows team members to access some sensitive information by directly accessing the APIs.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Mattermost - Mattermost**
Affected versions:
- 6.7.x 6.7.0 (Status: affected)
- 6.x (Status: affected)
- 6.5.x (Status: affected)
- 6.6.x (Status: affected)
### References
1. [](https://mattermost.com/security-updates/)
### Credits
- Thanks to Elias Nahum for contributing to this improvement under the Mattermost responsible disclosure policy. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10937, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10937 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10937
- **State**: PUBLISHED
- **Published Date**: September 08, 2019 at 15:07 UTC
- **Last Updated**: August 06, 2024 at 03:38 UTC
- **Reserved Date**: September 08, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IMAPFilter through 2.6.12 does not validate the hostname in an SSL certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/lefcha/imapfilter/issues/142)
2. [](https://bugs.debian.org/939702)
3. [[debian-lts-announce] 20191030 [SECURITY] [DLA 1976-1] imapfilter security update](https://lists.debian.org/debian-lts-announce/2019/10/msg00040.html)
4. [FEDORA-2019-a6c5d70bde](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GBNDFMAIUA6PQMV2P6OKIP7JZQEWX7D2/)
5. [FEDORA-2019-90925dd5aa](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQUH2TOCNEST7JB2RJVVJT3RZS5XZCFZ/)
6. [openSUSE-SU-2020:0673](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00042.html)
7. [openSUSE-SU-2020:0765](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9683, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9683 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9683
- **State**: PUBLISHED
- **Published Date**: February 22, 2017 at 05:00 UTC
- **Last Updated**: August 06, 2024 at 02:59 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'extensionsettings' CGI (/cgi-bin/extensionsettings) component responsible for handling some of the server's internal configurations. The CGI application doesn't properly escape the information it's passed when processing a particular multi-part form request involving scripts. The filename of the 'scriptname' variable is read in unsanitized before a call to system() is performed - allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account. This is SonicWall Issue ID 181195.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2016-0004)
2. [](http://documents.software.dell.com/sonicwall-sma-100-series/8.1.0.7/release-notes/resolved-issues?ParentProduct=868)
3. [](http://pastebin.com/eJbeXgBr)
4. [96375](http://www.securityfocus.com/bid/96375) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22938, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22938 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22938
- **State**: PUBLISHED
- **Published Date**: January 30, 2024 at 00:00 UTC
- **Last Updated**: May 29, 2025 at 15:07 UTC
- **Reserved Date**: January 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Insecure Permissions vulnerability in BossCMS v.1.3.0 allows a local attacker to execute arbitrary code and escalate privileges via the init function in admin.class.php component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.bosscms.net/)
2. [](https://github.com/n0Sleeper/bosscmsVuln/issues/1)
3. [](https://github.com/n0Sleeper/bosscmsVuln) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0952, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0952 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0952
- **State**: PUBLISHED
- **Published Date**: March 09, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 01:06 UTC
- **Reserved Date**: March 09, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in OneCMS 2.5, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the user parameter in an elite action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.org/1003-exploits/onecmsv25-sql.txt)
2. [onecms-index-sql-injection(56700)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56700)
3. [38557](http://www.securityfocus.com/bid/38557)
4. [11635](http://www.exploit-db.com/exploits/11635)
5. [30378](http://secunia.com/advisories/30378) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23848
- **State**: PUBLISHED
- **Published Date**: February 20, 2022 at 18:09 UTC
- **Last Updated**: August 03, 2024 at 03:51 UTC
- **Reserved Date**: January 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Alluxio before 2.7.3, the logserver does not validate the input stream. NOTE: this is not the same as the CVE-2021-44228 Log4j vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.alluxio.io/download/releases/alluxio-2-7-3-release/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9879, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9879 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9879
- **State**: PUBLISHED
- **Published Date**: October 22, 2020 at 18:00 UTC
- **Last Updated**: August 04, 2024 at 10:43 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows (Legacy)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/kb/HT211289)
2. [](https://support.apple.com/kb/HT211288)
3. [](https://support.apple.com/kb/HT211290)
4. [](https://support.apple.com/kb/HT211291)
5. [](https://support.apple.com/kb/HT211293)
6. [](https://support.apple.com/kb/HT211294)
7. [](https://support.apple.com/kb/HT211295) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25034, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25034
- **State**: PUBLISHED
- **Published Date**: May 26, 2023 at 14:14 UTC
- **Last Updated**: August 02, 2024 at 14:48 UTC
- **Reserved Date**: February 02, 2023 at 09:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in BoLiQuan WP Clean Up plugin <= 1.2.3 versions.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**BoLiQuan - WP Clean Up**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-clean-up/wordpress-wp-clean-up-plugin-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26078, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26078 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26078
- **State**: PUBLISHED
- **Published Date**: June 13, 2024 at 07:53 UTC
- **Last Updated**: October 07, 2024 at 13:26 UTC
- **Reserved Date**: February 14, 2024 at 17:37 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1172, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1172 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1172
- **State**: PUBLISHED
- **Published Date**: June 22, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 22:21 UTC
- **Reserved Date**: March 03, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks](http://www.openwall.com/lists/oss-security/2011/03/18/15)
2. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6a8ab060779779de8aea92ce3337ca348f973f54)
3. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=689345)
5. [[linux-kernel] 20110310 [PATCH] ipv6: netfilter: ip6_tables: fix infoleak to userspace](http://marc.info/?l=linux-kernel&m=129978086410061&w=2)
6. [RHSA-2011:0833](http://rhn.redhat.com/errata/RHSA-2011-0833.html)
7. [](http://downloads.avaya.com/css/P8/documents/100145416)
8. [[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks](http://www.openwall.com/lists/oss-security/2011/03/21/4)
9. [8278](http://securityreason.com/securityalert/8278)
10. [[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks](http://www.openwall.com/lists/oss-security/2011/03/21/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4012, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4012
- **State**: PUBLISHED
- **Published Date**: December 08, 2010 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 20:46 UTC
- **Reserved Date**: October 20, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Race condition in Apple iOS 4.0 through 4.1 for iPhone 3G and later allows physically proximate attackers to bypass the passcode lock by making a call from the Emergency Call screen, then quickly pressing the Sleep/Wake button.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT4456) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41274, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41274 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41274
- **State**: PUBLISHED
- **Published Date**: December 13, 2022 at 03:11 UTC
- **Last Updated**: April 22, 2025 at 02:51 UTC
- **Reserved Date**: September 21, 2022 at 16:20 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Disclosure Management - version 10.1, allows an authenticated attacker to exploit certain misconfigured application endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation can lead to the exposure of data like financial reports.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**SAP - Disclosure Management**
Affected versions:
- 10.1 (Status: affected)
### References
1. [](https://launchpad.support.sap.com/#/notes/3266846)
2. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10836, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10836
- **State**: PUBLISHED
- **Published Date**: August 28, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 17:50 UTC
- **Reserved Date**: July 04, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Untrusted search path vulnerability in Optimal Guard 1.1.21 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
### Affected Products
**OPTiM Corporation - Optimal Guard**
Affected versions:
- 1.1.21 and earlier (Status: affected)
### References
1. [JVN#87540575](https://jvn.jp/en/jp/JVN87540575/index.html)
2. [](https://www.optim.co.jp/contents/23246) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43249, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43249 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43249
- **State**: PUBLISHED
- **Published Date**: November 02, 2022 at 00:00 UTC
- **Last Updated**: May 02, 2025 at 20:37 UTC
- **Reserved Date**: October 17, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_epel_hv_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/strukturag/libde265/issues/345)
2. [[debian-lts-announce] 20230124 [SECURITY] [DLA 3280-1] libde265 security update](https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html)
3. [DSA-5346](https://www.debian.org/security/2023/dsa-5346) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0853, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0853 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0853
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:37 UTC
- **Reserved Date**: October 18, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
YaBB Bulletin Board 9.1.2000 allows remote attackers to read arbitrary files via a .. (dot dot) attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1668](http://www.securityfocus.com/bid/1668)
2. [yabb-file-access(5254)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5254)
3. [20000909 YaBB 1.9.2000 Vulnerabilitie](http://archives.neohapsis.com/archives/bugtraq/2000-09/0072.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8024, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8024
- **State**: PUBLISHED
- **Published Date**: July 12, 2018 at 13:00 UTC
- **Last Updated**: September 17, 2024 at 02:10 UTC
- **Reserved Date**: March 09, 2018 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause script to execute and expose information from the user's view of the Spark UI. While some browsers like recent versions of Chrome and Safari are able to block this type of attack, current versions of Firefox (and possibly others) do not.
### Affected Products
**Apache Software Foundation - Apache Spark**
Affected versions:
- 1.0.0 to 2.1.2 (Status: affected)
- 2.2.0 to 2.2.1 (Status: affected)
- 2.3.0 (Status: affected)
### References
1. [](https://spark.apache.org/security.html#CVE-2018-8024)
2. [[dev] 20180711 CVE-2018-8024 Apache Spark XSS vulnerability in UI](https://lists.apache.org/thread.html/5f241d2cda21cbcb3b63e46e474cf5f50cce66927f08399f4fab0aba%40%3Cdev.spark.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8555
- **State**: PUBLISHED
- **Published Date**: September 07, 2024 at 14:31 UTC
- **Last Updated**: September 09, 2024 at 15:13 UTC
- **Reserved Date**: September 06, 2024 at 21:22 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Clinics Patient Management System 2.0. It has been classified as problematic. Affected is an unknown function of the file congratulations.php. The manipulation of the argument goto_page leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**SourceCodester - Clinics Patient Management System**
Affected versions:
- 2.0 (Status: affected)
### References
1. [VDB-276774 | SourceCodester Clinics Patient Management System congratulations.php redirect](https://vuldb.com/?id.276774)
2. [VDB-276774 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.276774)
3. [Submit #402386 | SourceCodester Clinics Patient Management System 2.0 Open Redirect](https://vuldb.com/?submit.402386)
4. [](https://github.com/gurudattch/CVEs/blob/main/Sourcecodester-Clinic's-Patient-Management-System-Open-Redirect.md)
5. [](https://www.sourcecodester.com/)
### Credits
- guru (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21875
- **State**: PUBLISHED
- **Published Date**: January 11, 2022 at 20:22 UTC
- **Last Updated**: January 02, 2025 at 18:22 UTC
- **Reserved Date**: December 14, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Storage Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Storage Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21875) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39017, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39017
- **State**: PUBLISHED
- **Published Date**: July 28, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 17:54 UTC
- **Reserved Date**: July 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
quartz-jobs 2.3.2 and below was discovered to contain a code injection vulnerability in the component org.quartz.jobs.ee.jms.SendQueueMessageJob.execute. This vulnerability is exploited via passing an unchecked argument. NOTE: this is disputed by multiple parties because it is not plausible that untrusted user input would reach the code location where injection must occur.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/quartz-scheduler/quartz/issues/943) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11724, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11724 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11724
- **State**: PUBLISHED
- **Published Date**: July 29, 2017 at 05:00 UTC
- **Last Updated**: August 05, 2024 at 18:19 UTC
- **Reserved Date**: July 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ReadMATImage function in coders/mat.c in ImageMagick through 6.9.9-3 and 7.x through 7.0.6-3 has memory leaks involving the quantum_info and clone_info data structures.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201711-07](https://security.gentoo.org/glsa/201711-07)
2. [](https://github.com/ImageMagick/ImageMagick/issues/624)
3. [104597](http://www.securityfocus.com/bid/104597) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42293, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42293 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42293
- **State**: PUBLISHED
- **Published Date**: August 17, 2024 at 09:09 UTC
- **Last Updated**: May 04, 2025 at 09:26 UTC
- **Reserved Date**: July 30, 2024 at 07:40 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
arm64: mm: Fix lockless walks with static and dynamic page-table folding
Lina reports random oopsen originating from the fast GUP code when
16K pages are used with 4-level page-tables, the fourth level being
folded at runtime due to lack of LPA2.
In this configuration, the generic implementation of
p4d_offset_lockless() will return a 'p4d_t *' corresponding to the
'pgd_t' allocated on the stack of the caller, gup_fast_pgd_range().
This is normally fine, but when the fourth level of page-table is folded
at runtime, pud_offset_lockless() will offset from the address of the
'p4d_t' to calculate the address of the PUD in the same page-table page.
This results in a stray stack read when the 'p4d_t' has been allocated
on the stack and can send the walker into the weeds.
Fix the problem by providing our own definition of p4d_offset_lockless()
when CONFIG_PGTABLE_LEVELS <= 4 which returns the real page-table
pointer rather than the address of the local stack variable.
### Affected Products
**Linux - Linux**
Affected versions:
- 0dd4f60a2c76938c2625f6c630c225699d97608b (Status: affected)
- 0dd4f60a2c76938c2625f6c630c225699d97608b (Status: affected)
**Linux - Linux**
Affected versions:
- 6.9 (Status: affected)
- 0 (Status: unaffected)
- 6.10.3 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/78672d49d3eebbcda3589f4d6e589caf357c5a59)
2. [](https://git.kernel.org/stable/c/36639013b3462c06ff8e3400a427f775b4fc97f5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32000, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32000 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32000
- **State**: PUBLISHED
- **Published Date**: July 28, 2021 at 09:35 UTC
- **Last Updated**: September 16, 2024 at 17:48 UTC
- **Reserved Date**: May 03, 2021 at 00:00 UTC
- **Assigned By**: suse
### Vulnerability Description
A UNIX Symbolic Link (Symlink) Following vulnerability in the clone-master-clean-up.sh script of clone-master-clean-up in SUSE Linux Enterprise Server 12 SP3, SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allows local attackers to delete arbitrary files. This issue affects: SUSE Linux Enterprise Server 12 SP3 clone-master-clean-up version 1.6-4.6.1 and prior versions. SUSE Linux Enterprise Server 15 SP1 clone-master-clean-up version 1.6-3.9.1 and prior versions. openSUSE Factory clone-master-clean-up version 1.6-1.4 and prior versions.
### CVSS Metrics
- **CVSS Base Score**: 3.2/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Affected Products
**SUSE - SUSE Linux Enterprise Server 12 SP3**
Affected versions:
- clone-master-clean-up (Status: affected)
**SUSE - SUSE Linux Enterprise Server 15 SP1**
Affected versions:
- clone-master-clean-up (Status: affected)
**openSUSE - Factory**
Affected versions:
- clone-master-clean-up (Status: affected)
### References
1. [](https://bugzilla.suse.com/show_bug.cgi?id=1181050)
### Credits
- Matthias Gerstner of SUSE |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20767
- **State**: PUBLISHED
- **Published Date**: May 03, 2022 at 03:15 UTC
- **Last Updated**: November 06, 2024 at 16:20 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Snort rule evaluation function of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of the DNS reputation enforcement rule. An attacker could exploit this vulnerability by sending crafted UDP packets through an affected device to force a buildup of UDP connections. A successful exploit could allow the attacker to cause traffic that is going through the affected device to be dropped, resulting in a DoS condition. Note: This vulnerability only affects Cisco FTD devices that are running Snort 3.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-399: Security Weakness
### Affected Products
**Cisco - Cisco Firepower Threat Defense Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20220427 Cisco Firepower Threat Defense Software DNS Enforcement Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FTD-snort3-DOS-Aq38LVdM) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0596, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0596 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0596
- **State**: PUBLISHED
- **Published Date**: February 15, 2022 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 23:32 UTC
- **Reserved Date**: February 14, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Improper Validation of Specified Quantity in Input in Packagist microweber/microweber prior to 1.2.11.
### Weakness Classification (CWE)
- CWE-1284: Security Weakness
### Affected Products
**microweber - microweber/microweber**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/f68b994e-2b8b-49f5-af2a-8cd99e8048a5)
2. [](https://github.com/microweber/microweber/commit/91a9d899741557c75050614ff7adb8c0e3feb005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22892, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22892 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22892
- **State**: PUBLISHED
- **Published Date**: September 25, 2024 at 00:00 UTC
- **Last Updated**: March 14, 2025 at 15:38 UTC
- **Reserved Date**: January 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OpenSlides 4.0.15 was discovered to be using a weak hashing algorithm to store passwords.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/mdickopp/0cab0d7f91b1f4ea0d326dd976db70e5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9729, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9729 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9729
- **State**: PUBLISHED
- **Published Date**: March 07, 2017 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 02:59 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM QRadar 7.2 does not perform an authentication check for a critical resource or functionality allowing anonymous users access to protected areas. IBM Reference #: 1999545.
### Affected Products
**IBM Corporation - QRadar SIEM**
Affected versions:
- 7.1 MR1 (Status: affected)
- 7.1 (Status: affected)
- 7.0 (Status: affected)
- 7.2 (Status: affected)
- 7.1 MR2 (Status: affected)
- 7 (Status: affected)
- 7.2.3 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg21999545)
2. [96538](http://www.securityfocus.com/bid/96538) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13336
- **State**: PUBLISHED
- **Published Date**: February 19, 2025 at 08:21 UTC
- **Last Updated**: February 19, 2025 at 19:48 UTC
- **Reserved Date**: January 10, 2025 at 18:18 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Disable Auto Updates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the 'disable-auto-updates' page. This makes it possible for unauthenticated attackers to disable all auto updates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**exeebit - Disable Auto Updates**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/60413b3b-f9b0-40ca-af0a-f7cf87ab793a?source=cve)
2. [](https://wordpress.org/plugins/disable-auto-updates/)
### Credits
- SOPROBRO |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45556, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45556
- **State**: PUBLISHED
- **Published Date**: April 07, 2025 at 10:15 UTC
- **Last Updated**: April 07, 2025 at 15:51 UTC
- **Reserved Date**: September 02, 2024 at 10:26 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Cryptographic issue may arise because the access control configuration permits Linux to read key registers in TCSR.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-1262: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Immersive Home 3210 Platform (Status: affected)
- Immersive Home 326 Platform (Status: affected)
- IPQ5300 (Status: affected)
- IPQ5302 (Status: affected)
- IPQ5312 (Status: affected)
- IPQ5332 (Status: affected)
- IPQ9008 (Status: affected)
- IPQ9048 (Status: affected)
- IPQ9554 (Status: affected)
- IPQ9570 (Status: affected)
- IPQ9574 (Status: affected)
- QCA0000 (Status: affected)
- QCA8075 (Status: affected)
- QCA8081 (Status: affected)
- QCA8082 (Status: affected)
- QCA8084 (Status: affected)
- QCA8085 (Status: affected)
- QCA8386 (Status: affected)
- QCF8000 (Status: affected)
- QCF8000SFP (Status: affected)
- QCF8001 (Status: affected)
- QCN5124 (Status: affected)
- QCN6224 (Status: affected)
- QCN6402 (Status: affected)
- QCN6412 (Status: affected)
- QCN6422 (Status: affected)
- QCN6432 (Status: affected)
- QCN9000 (Status: affected)
- QCN9012 (Status: affected)
- QCN9013 (Status: affected)
- QCN9024 (Status: affected)
- QCN9074 (Status: affected)
- QCN9160 (Status: affected)
- QCN9274 (Status: affected)
- QXM8083 (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SDM429W (Status: affected)
- SDX65M (Status: affected)
- Snapdragon 429 Mobile Platform (Status: affected)
- Snapdragon AR1 Gen 1 Platform (Status: affected)
- Snapdragon AR1 Gen 1 Platform "Luna1" (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon Wear 4100+ Platform (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SXR1230P (Status: affected)
- SXR2230P (Status: affected)
- SXR2250P (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3620 (Status: affected)
- WCN3660B (Status: affected)
- WCN3680B (Status: affected)
- WCN3980 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36841, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36841
- **State**: PUBLISHED
- **Published Date**: October 16, 2024 at 12:45 UTC
- **Last Updated**: October 16, 2024 at 17:25 UTC
- **Reserved Date**: October 15, 2024 at 18:51 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WooCommerce Smart Coupons plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the woocommerce_coupon_admin_init function in versions up to, and including, 4.6.0. This makes it possible for unauthenticated attackers to send themselves gift certificates of any value, which could be redeemed for products sold on the victim’s storefront.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**WooCommerce - WooCommerce Smart Coupons**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/eeeb03f7-5f78-4462-b0b4-5080bbc419a3?source=cve)
2. [](https://www.wordfence.com/blog/2020/03/coupon-creation-vulnerability-patched-in-woocommerce-smart-coupons/)
### Credits
- Aaron Averbuch |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38066, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38066
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 17:03 UTC
- **Last Updated**: May 05, 2025 at 17:01 UTC
- **Reserved Date**: June 11, 2024 at 22:36 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Win32k Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Win32k Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38066) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3371, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3371 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3371
- **State**: PUBLISHED
- **Published Date**: April 21, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 05:47 UTC
- **Reserved Date**: April 21, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Open redirect vulnerability in the Node Invite module before 6.x-2.5 for Drupal allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the destination parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/node/2415541)
2. [[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015](http://www.openwall.com/lists/oss-security/2015/01/29/6)
3. [](https://www.drupal.org/node/2415899)
4. [74287](http://www.securityfocus.com/bid/74287) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2333, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2333 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2333
- **State**: PUBLISHED
- **Published Date**: July 04, 2023 at 07:23 UTC
- **Last Updated**: November 21, 2024 at 15:11 UTC
- **Reserved Date**: April 27, 2023 at 09:33 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Ninja Forms Google Sheet Connector WordPress plugin before 1.2.7, gsheetconnector-ninja-forms-pro WordPress plugin through 1.2.7 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Ninja Forms Google Sheet Connector**
Affected versions:
- 0 (Status: affected)
**Unknown - gsheetconnector-ninja-forms-pro**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/13c4e065-fde6-41a4-a22b-bca1b10e0d30)
### Credits
- Erwan LR (WPScan)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21716, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21716 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21716
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 02:07 UTC
- **Last Updated**: May 04, 2025 at 07:19 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
vxlan: Fix uninit-value in vxlan_vnifilter_dump()
KMSAN reported an uninit-value access in vxlan_vnifilter_dump() [1].
If the length of the netlink message payload is less than
sizeof(struct tunnel_msg), vxlan_vnifilter_dump() accesses bytes
beyond the message. This can lead to uninit-value access. Fix this by
returning an error in such situations.
[1]
BUG: KMSAN: uninit-value in vxlan_vnifilter_dump+0x328/0x920 drivers/net/vxlan/vxlan_vnifilter.c:422
vxlan_vnifilter_dump+0x328/0x920 drivers/net/vxlan/vxlan_vnifilter.c:422
rtnl_dumpit+0xd5/0x2f0 net/core/rtnetlink.c:6786
netlink_dump+0x93e/0x15f0 net/netlink/af_netlink.c:2317
__netlink_dump_start+0x716/0xd60 net/netlink/af_netlink.c:2432
netlink_dump_start include/linux/netlink.h:340 [inline]
rtnetlink_dump_start net/core/rtnetlink.c:6815 [inline]
rtnetlink_rcv_msg+0x1256/0x14a0 net/core/rtnetlink.c:6882
netlink_rcv_skb+0x467/0x660 net/netlink/af_netlink.c:2542
rtnetlink_rcv+0x35/0x40 net/core/rtnetlink.c:6944
netlink_unicast_kernel net/netlink/af_netlink.c:1321 [inline]
netlink_unicast+0xed6/0x1290 net/netlink/af_netlink.c:1347
netlink_sendmsg+0x1092/0x1230 net/netlink/af_netlink.c:1891
sock_sendmsg_nosec net/socket.c:711 [inline]
__sock_sendmsg+0x330/0x3d0 net/socket.c:726
____sys_sendmsg+0x7f4/0xb50 net/socket.c:2583
___sys_sendmsg+0x271/0x3b0 net/socket.c:2637
__sys_sendmsg net/socket.c:2669 [inline]
__do_sys_sendmsg net/socket.c:2674 [inline]
__se_sys_sendmsg net/socket.c:2672 [inline]
__x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2672
x64_sys_call+0x3878/0x3d90 arch/x86/include/generated/asm/syscalls_64.h:47
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xd9/0x1d0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Uninit was created at:
slab_post_alloc_hook mm/slub.c:4110 [inline]
slab_alloc_node mm/slub.c:4153 [inline]
kmem_cache_alloc_node_noprof+0x800/0xe80 mm/slub.c:4205
kmalloc_reserve+0x13b/0x4b0 net/core/skbuff.c:587
__alloc_skb+0x347/0x7d0 net/core/skbuff.c:678
alloc_skb include/linux/skbuff.h:1323 [inline]
netlink_alloc_large_skb+0xa5/0x280 net/netlink/af_netlink.c:1196
netlink_sendmsg+0xac9/0x1230 net/netlink/af_netlink.c:1866
sock_sendmsg_nosec net/socket.c:711 [inline]
__sock_sendmsg+0x330/0x3d0 net/socket.c:726
____sys_sendmsg+0x7f4/0xb50 net/socket.c:2583
___sys_sendmsg+0x271/0x3b0 net/socket.c:2637
__sys_sendmsg net/socket.c:2669 [inline]
__do_sys_sendmsg net/socket.c:2674 [inline]
__se_sys_sendmsg net/socket.c:2672 [inline]
__x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2672
x64_sys_call+0x3878/0x3d90 arch/x86/include/generated/asm/syscalls_64.h:47
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xd9/0x1d0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
CPU: 0 UID: 0 PID: 30991 Comm: syz.4.10630 Not tainted 6.12.0-10694-gc44daa7e3c73 #29
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014
### Affected Products
**Linux - Linux**
Affected versions:
- f9c4bb0b245cee35ef66f75bf409c9573d934cf9 (Status: affected)
- f9c4bb0b245cee35ef66f75bf409c9573d934cf9 (Status: affected)
- f9c4bb0b245cee35ef66f75bf409c9573d934cf9 (Status: affected)
- f9c4bb0b245cee35ef66f75bf409c9573d934cf9 (Status: affected)
- f9c4bb0b245cee35ef66f75bf409c9573d934cf9 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.18 (Status: affected)
- 0 (Status: unaffected)
- 6.1.129 (Status: unaffected)
- 6.6.76 (Status: unaffected)
- 6.12.13 (Status: unaffected)
- 6.13.2 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/cb1de9309a48cc5b771115781eec05075fd67039)
2. [](https://git.kernel.org/stable/c/a84d511165d6ba7f331b90ae6b6ce180ec534daa)
3. [](https://git.kernel.org/stable/c/f554bce488605d2f70e06eeab5e4d2448c813713)
4. [](https://git.kernel.org/stable/c/1693d1fade71646a0731b6b213298cb443d186ea)
5. [](https://git.kernel.org/stable/c/5066293b9b7046a906eff60e3949a887ae185a43) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6211, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6211 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6211
- **State**: PUBLISHED
- **Published Date**: May 20, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 12:10 UTC
- **Reserved Date**: September 02, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The command-line scripts in IBM WebSphere Commerce 6.0 through 6.0.0.11, 7.0 through 7.0.0.9, and 7.0 Feature Pack 2 through 8, when debugging is configured, do not properly restrict the logging of personal data, which allows local users to obtain sensitive information by reading a log file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032248](http://www.securitytracker.com/id/1032248)
2. [JR52983](http://www-01.ibm.com/support/docview.wss?uid=swg1JR52983)
3. [JR52117](http://www-01.ibm.com/support/docview.wss?uid=swg1JR52117)
4. [](http://www-01.ibm.com/support/docview.wss?uid=swg21883875) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13719, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13719
- **State**: PUBLISHED
- **Published Date**: July 03, 2019 at 19:40 UTC
- **Last Updated**: August 05, 2024 at 19:05 UTC
- **Reserved Date**: August 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Amcrest IPM-721S Amcrest_IPC-AWXX_Eng_N_V2.420.AC00.17.R.20170322 allows HTTP requests that permit enabling various functionalities of the camera by using HTTP APIs, instead of the web management interface that is provided by the application. This HTTP API receives the credentials as base64 encoded in the Authorization HTTP header. However, a missing length check in the code allows an attacker to send a string of 1024 characters in the password field, and allows an attacker to exploit a memory corruption issue. This can allow an attacker to circumvent the account protection mechanism and brute force the credentials. If the firmware version Amcrest_IPC-AWXX_Eng_N_V2.420.AC00.17.R.20170322 is dissected using the binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that has many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that performs the credential check in the binary for the HTTP API specification. If we open this binary in IDA Pro we will notice that this follows an ARM little-endian format. The function at address 00415364 in IDA Pro starts the HTTP authentication process. This function calls another function at sub_ 0042CCA0 at address 0041549C. This function performs a strchr operation after base64 decoding the credentials, and stores the result on the stack, which results in a stack-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20190609 Newly releases IoT security issues](https://seclists.org/bugtraq/2019/Jun/8)
2. [](http://packetstormsecurity.com/files/153224/Amcrest-IPM-721S-Credential-Disclosure-Privilege-Escalation.html)
3. [](https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Amcrest_sec_issues.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5347, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5347 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5347
- **State**: PUBLISHED
- **Published Date**: December 05, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 10:49 UTC
- **Reserved Date**: December 04, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier allow untrusted applets and applications to gain privileges via vectors related to access to inner classes in the (1) JAX-WS and (2) JAXB packages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT090049](http://marc.info/?l=bugtraq&m=126583436323697&w=2)
2. [246366](http://sunsolve.sun.com/search/document.do?assetkey=1-26-246366-1)
3. [1021307](http://www.securitytracker.com/id?1021307)
4. [34259](http://secunia.com/advisories/34259)
5. [jre-jaxws-jaxb-privilege-escalation(47068)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47068)
6. [ADV-2009-0672](http://www.vupen.com/english/advisories/2009/0672)
7. [1019798](http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019798.1-1)
8. [RHSA-2008:1018](http://rhn.redhat.com/errata/RHSA-2008-1018.html)
9. [33015](http://secunia.com/advisories/33015)
10. [34233](http://secunia.com/advisories/34233)
11. [GLSA-200911-02](http://security.gentoo.org/glsa/glsa-200911-02.xml)
12. [](http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf)
13. [50506](http://osvdb.org/50506)
14. [SSRT080111](http://marc.info/?l=bugtraq&m=123678756409861&w=2)
15. [38539](http://secunia.com/advisories/38539)
16. [SUSE-SR:2009:006](http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html)
17. [33528](http://secunia.com/advisories/33528)
18. [HPSBMA02486](http://marc.info/?l=bugtraq&m=126583436323697&w=2)
19. [ADV-2008-3339](http://www.vupen.com/english/advisories/2008/3339)
20. [HPSBUX02411](http://marc.info/?l=bugtraq&m=123678756409861&w=2)
21. [TA08-340A](http://www.us-cert.gov/cas/techalerts/TA08-340A.html)
22. [33709](http://secunia.com/advisories/33709)
23. [](http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid=)
24. [RHSA-2009:0015](http://www.redhat.com/support/errata/RHSA-2009-0015.html)
25. [32991](http://secunia.com/advisories/32991)
26. [oval:org.mitre.oval:def:5633](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5633)
27. [32608](http://www.securityfocus.com/bid/32608)
28. [37386](http://secunia.com/advisories/37386) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4279, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4279
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0227, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0227 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0227
- **State**: PUBLISHED
- **Published Date**: May 12, 2009 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 04:24 UTC
- **Reserved Date**: January 20, 2009 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Stack-based buffer overflow in the PowerPoint 4.2 conversion filter (PP4X32.DLL) in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via a large number of structures in sound data in a file that uses a PowerPoint 4.0 native file format, leading to memory corruption, aka "Legacy File Format Vulnerability," a different vulnerability than CVE-2009-0222, CVE-2009-0223, CVE-2009-0226, and CVE-2009-1137.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32428](http://secunia.com/advisories/32428)
2. [ADV-2009-1290](http://www.vupen.com/english/advisories/2009/1290)
3. [MS09-017](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017)
4. [20090512 Microsoft PowerPoint 4.2 Conversion Filter Stack Buffer Overflow Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=787)
5. [54384](http://osvdb.org/54384)
6. [1022205](http://www.securitytracker.com/id?1022205)
7. [34882](http://www.securityfocus.com/bid/34882)
8. [TA09-132A](http://www.us-cert.gov/cas/techalerts/TA09-132A.html)
9. [oval:org.mitre.oval:def:6239](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6239) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24485, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24485 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24485
- **State**: PUBLISHED
- **Published Date**: February 17, 2021 at 13:35 UTC
- **Last Updated**: August 04, 2024 at 15:12 UTC
- **Reserved Date**: August 19, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper conditions check in the Intel(R) FPGA OPAE Driver for Linux before kernel version 4.17 may allow an authenticated user to potentially enable escalation of privilege via local access.
### Affected Products
**n/a - Intel(R) FPGA OPAE Driver for Linux**
Affected versions:
- See references (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00440.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1319, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1319
- **State**: PUBLISHED
- **Published Date**: February 09, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 22:55 UTC
- **Reserved Date**: January 04, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco Unified Communications Manager (aka CallManager) 9.1(2.10000.28), 10.5(2.10000.5), 10.5(2.12901.1), and 11.0(1.10000.10); Unified Communications Manager IM & Presence Service 10.5(2); Unified Contact Center Express 11.0(1); and Unity Connection 10.5(2) store a cleartext encryption key, which allows local users to obtain sensitive information via unspecified vectors, aka Bug ID CSCuv85958.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1034958](http://www.securitytracker.com/id/1034958)
2. [20160208 Cisco Unified Products Information Disclosure Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160208-ucm)
3. [1034959](http://www.securitytracker.com/id/1034959)
4. [1034960](http://www.securitytracker.com/id/1034960) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30456, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30456 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30456
- **State**: PUBLISHED
- **Published Date**: March 29, 2024 at 13:07 UTC
- **Last Updated**: August 02, 2024 at 01:32 UTC
- **Reserved Date**: March 27, 2024 at 06:54 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WPCS.This issue affects WPCS: from n/a through 1.2.0.1.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**realmag777 - WPCS**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/currency-switcher/wordpress-wpcs-wordpress-currency-switcher-professional-plugin-1-2-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Dhabaleshwar Das (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57992, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57992 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57992
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 02:07 UTC
- **Last Updated**: May 04, 2025 at 10:07 UTC
- **Reserved Date**: February 27, 2025 at 02:04 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: wilc1000: unregister wiphy only if it has been registered
There is a specific error path in probe functions in wilc drivers (both
sdio and spi) which can lead to kernel panic, as this one for example
when using SPI:
Unable to handle kernel paging request at virtual address 9f000000 when read
[9f000000] *pgd=00000000
Internal error: Oops: 5 [#1] ARM
Modules linked in: wilc1000_spi(+) crc_itu_t crc7 wilc1000 cfg80211 bluetooth ecdh_generic ecc
CPU: 0 UID: 0 PID: 106 Comm: modprobe Not tainted 6.13.0-rc3+ #22
Hardware name: Atmel SAMA5
PC is at wiphy_unregister+0x244/0xc40 [cfg80211]
LR is at wiphy_unregister+0x1c0/0xc40 [cfg80211]
[...]
wiphy_unregister [cfg80211] from wilc_netdev_cleanup+0x380/0x494 [wilc1000]
wilc_netdev_cleanup [wilc1000] from wilc_bus_probe+0x360/0x834 [wilc1000_spi]
wilc_bus_probe [wilc1000_spi] from spi_probe+0x15c/0x1d4
spi_probe from really_probe+0x270/0xb2c
really_probe from __driver_probe_device+0x1dc/0x4e8
__driver_probe_device from driver_probe_device+0x5c/0x140
driver_probe_device from __driver_attach+0x220/0x540
__driver_attach from bus_for_each_dev+0x13c/0x1a8
bus_for_each_dev from bus_add_driver+0x2a0/0x6a4
bus_add_driver from driver_register+0x27c/0x51c
driver_register from do_one_initcall+0xf8/0x564
do_one_initcall from do_init_module+0x2e4/0x82c
do_init_module from load_module+0x59a0/0x70c4
load_module from init_module_from_file+0x100/0x148
init_module_from_file from sys_finit_module+0x2fc/0x924
sys_finit_module from ret_fast_syscall+0x0/0x1c
The issue can easily be reproduced, for example by not wiring correctly
a wilc device through SPI (and so, make it unresponsive to early SPI
commands). It is due to a recent change decoupling wiphy allocation from
wiphy registration, however wilc_netdev_cleanup has not been updated
accordingly, letting it possibly call wiphy unregister on a wiphy which
has never been registered.
Fix this crash by moving wiphy_unregister/wiphy_free out of
wilc_netdev_cleanup, and by adjusting error paths in both drivers
### Affected Products
**Linux - Linux**
Affected versions:
- fbdf0c5248dce4b55181e9aff8f1b61819ba6bd7 (Status: affected)
- fbdf0c5248dce4b55181e9aff8f1b61819ba6bd7 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.13 (Status: affected)
- 0 (Status: unaffected)
- 6.13.2 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/c7115b8229f3e6cdfae43b1cdd180f5b6c67cd70)
2. [](https://git.kernel.org/stable/c/1be94490b6b8a06ff14cd23fda8714e6ec37cdfb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2890, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2890 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2890
- **State**: PUBLISHED
- **Published Date**: September 13, 2013 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 16:24 UTC
- **Reserved Date**: April 11, 2013 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
drivers/hid/hid-sony.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SONY is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details](http://marc.info/?l=linux-input&m=137772182814616&w=1)
2. [[oss-security] 20130828 Linux HID security flaws](http://openwall.com/lists/oss-security/2013/08/28/13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48956, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48956
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 20:05 UTC
- **Last Updated**: May 04, 2025 at 08:26 UTC
- **Reserved Date**: August 22, 2024 at 01:27 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ipv6: avoid use-after-free in ip6_fragment()
Blamed commit claimed rcu_read_lock() was held by ip6_fragment() callers.
It seems to not be always true, at least for UDP stack.
syzbot reported:
BUG: KASAN: use-after-free in ip6_dst_idev include/net/ip6_fib.h:245 [inline]
BUG: KASAN: use-after-free in ip6_fragment+0x2724/0x2770 net/ipv6/ip6_output.c:951
Read of size 8 at addr ffff88801d403e80 by task syz-executor.3/7618
CPU: 1 PID: 7618 Comm: syz-executor.3 Not tainted 6.1.0-rc6-syzkaller-00012-g4312098baf37 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:284 [inline]
print_report+0x15e/0x45d mm/kasan/report.c:395
kasan_report+0xbf/0x1f0 mm/kasan/report.c:495
ip6_dst_idev include/net/ip6_fib.h:245 [inline]
ip6_fragment+0x2724/0x2770 net/ipv6/ip6_output.c:951
__ip6_finish_output net/ipv6/ip6_output.c:193 [inline]
ip6_finish_output+0x9a3/0x1170 net/ipv6/ip6_output.c:206
NF_HOOK_COND include/linux/netfilter.h:291 [inline]
ip6_output+0x1f1/0x540 net/ipv6/ip6_output.c:227
dst_output include/net/dst.h:445 [inline]
ip6_local_out+0xb3/0x1a0 net/ipv6/output_core.c:161
ip6_send_skb+0xbb/0x340 net/ipv6/ip6_output.c:1966
udp_v6_send_skb+0x82a/0x18a0 net/ipv6/udp.c:1286
udp_v6_push_pending_frames+0x140/0x200 net/ipv6/udp.c:1313
udpv6_sendmsg+0x18da/0x2c80 net/ipv6/udp.c:1606
inet6_sendmsg+0x9d/0xe0 net/ipv6/af_inet6.c:665
sock_sendmsg_nosec net/socket.c:714 [inline]
sock_sendmsg+0xd3/0x120 net/socket.c:734
sock_write_iter+0x295/0x3d0 net/socket.c:1108
call_write_iter include/linux/fs.h:2191 [inline]
new_sync_write fs/read_write.c:491 [inline]
vfs_write+0x9ed/0xdd0 fs/read_write.c:584
ksys_write+0x1ec/0x250 fs/read_write.c:637
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fde3588c0d9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fde365b6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fde359ac050 RCX: 00007fde3588c0d9
RDX: 000000000000ffdc RSI: 00000000200000c0 RDI: 000000000000000a
RBP: 00007fde358e7ae9 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fde35acfb1f R14: 00007fde365b6300 R15: 0000000000022000
</TASK>
Allocated by task 7618:
kasan_save_stack+0x22/0x40 mm/kasan/common.c:45
kasan_set_track+0x25/0x30 mm/kasan/common.c:52
__kasan_slab_alloc+0x82/0x90 mm/kasan/common.c:325
kasan_slab_alloc include/linux/kasan.h:201 [inline]
slab_post_alloc_hook mm/slab.h:737 [inline]
slab_alloc_node mm/slub.c:3398 [inline]
slab_alloc mm/slub.c:3406 [inline]
__kmem_cache_alloc_lru mm/slub.c:3413 [inline]
kmem_cache_alloc+0x2b4/0x3d0 mm/slub.c:3422
dst_alloc+0x14a/0x1f0 net/core/dst.c:92
ip6_dst_alloc+0x32/0xa0 net/ipv6/route.c:344
ip6_rt_pcpu_alloc net/ipv6/route.c:1369 [inline]
rt6_make_pcpu_route net/ipv6/route.c:1417 [inline]
ip6_pol_route+0x901/0x1190 net/ipv6/route.c:2254
pol_lookup_func include/net/ip6_fib.h:582 [inline]
fib6_rule_lookup+0x52e/0x6f0 net/ipv6/fib6_rules.c:121
ip6_route_output_flags_noref+0x2e6/0x380 net/ipv6/route.c:2625
ip6_route_output_flags+0x76/0x320 net/ipv6/route.c:2638
ip6_route_output include/net/ip6_route.h:98 [inline]
ip6_dst_lookup_tail+0x5ab/0x1620 net/ipv6/ip6_output.c:1092
ip6_dst_lookup_flow+0x90/0x1d0 net/ipv6/ip6_output.c:1222
ip6_sk_dst_lookup_flow+0x553/0x980 net/ipv6/ip6_output.c:1260
udpv6_sendmsg+0x151d/0x2c80 net/ipv6/udp.c:1554
inet6_sendmsg+0x9d/0xe0 net/ipv6/af_inet6.c:665
sock_sendmsg_nosec n
---truncated---
### Affected Products
**Linux - Linux**
Affected versions:
- 1758fd4688eb92c796e75bdb1d256dc558ef9581 (Status: affected)
- 1758fd4688eb92c796e75bdb1d256dc558ef9581 (Status: affected)
- 1758fd4688eb92c796e75bdb1d256dc558ef9581 (Status: affected)
- 1758fd4688eb92c796e75bdb1d256dc558ef9581 (Status: affected)
- 1758fd4688eb92c796e75bdb1d256dc558ef9581 (Status: affected)
- 1758fd4688eb92c796e75bdb1d256dc558ef9581 (Status: affected)
- 1758fd4688eb92c796e75bdb1d256dc558ef9581 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.13 (Status: affected)
- 0 (Status: unaffected)
- 4.14.302 (Status: unaffected)
- 4.19.269 (Status: unaffected)
- 5.4.227 (Status: unaffected)
- 5.10.159 (Status: unaffected)
- 5.15.83 (Status: unaffected)
- 6.0.13 (Status: unaffected)
- 6.1 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/b3d7ff8c04a83279fb7641fc4d5aa82a602df7c0)
2. [](https://git.kernel.org/stable/c/7e0dcd5f3ade221a6126278aca60c8ab4cc3bce9)
3. [](https://git.kernel.org/stable/c/6b6d3be3661bff2746cab26147bd629aa034e094)
4. [](https://git.kernel.org/stable/c/8208d7e56b1e579320b9ff3712739ad2e63e1f86)
5. [](https://git.kernel.org/stable/c/7390c70bd431cbfa6951477e2c80a301643e284b)
6. [](https://git.kernel.org/stable/c/9b1a468a455d8319041528778d0e684a4c062792)
7. [](https://git.kernel.org/stable/c/803e84867de59a1e5d126666d25eb4860cfd2ebe) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16136, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16136 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16136
- **State**: PUBLISHED
- **Published Date**: May 13, 2019 at 20:16 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 29, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the administrator interface in IPBRICK OS 6.3. The application doesn't check for Anti-CSRF tokens, allowing the submission of multiple forms unwillingly by a victim.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.0x90.zone/web/multiple/2019/02/01/Multiple-Vulnerabilities-IPBrick.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12977, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12977 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12977
- **State**: PUBLISHED
- **Published Date**: June 26, 2019 at 17:09 UTC
- **Last Updated**: August 04, 2024 at 23:41 UTC
- **Reserved Date**: June 26, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ImageMagick/ImageMagick/issues/1518)
2. [108913](http://www.securityfocus.com/bid/108913)
3. [openSUSE-SU-2019:1983](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html)
4. [USN-4192-1](https://usn.ubuntu.com/4192-1/)
5. [DSA-4712](https://www.debian.org/security/2020/dsa-4712)
6. [[debian-lts-announce] 20200818 [SECURITY] [DLA 2333-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37393, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37393 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37393
- **State**: PUBLISHED
- **Published Date**: June 10, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 03:50 UTC
- **Reserved Date**: June 07, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://securenvoy.com/support/)
2. [](https://www.optistream.io/blogs/tech/securenvoy-cve-2024-37393)
3. [](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-ada2/ad2ce8fa-42a0-4371-ad18-5d1d1c488b22) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31427, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31427
- **State**: PUBLISHED
- **Published Date**: August 01, 2023 at 22:46 UTC
- **Last Updated**: February 13, 2025 at 16:50 UTC
- **Reserved Date**: April 28, 2023 at 00:14 UTC
- **Assigned By**: brocade
### Vulnerability Description
Brocade Fabric OS versions before Brocade Fabric OS v9.1.1c, and v9.2.0 Could allow an authenticated, local user with knowledge of full path names inside Brocade Fabric OS to execute any command regardless of assigned privilege. Starting with Fabric OS v9.1.0, “root” account access is disabled.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Brocade - Fabric OS**
Affected versions:
- after 9.1.0 and before Brocade Fabric OS v9.2.0 and v9.1.1c (Status: affected)
### References
1. [](https://support.broadcom.com/external/content/SecurityAdvisories/0/22379)
2. [](https://security.netapp.com/advisory/ntap-20230908-0007/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2482, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2482 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2482
- **State**: PUBLISHED
- **Published Date**: May 28, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: May 28, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in install_mod.php in insanevisions OneCMS 2.5 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the load parameter in a go action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29374](http://www.securityfocus.com/bid/29374)
2. [20080523 [DSECRG-08-025] Local File Include in OneCMS 2.5](http://www.securityfocus.com/archive/1/492513/100/0/threaded)
3. [5669](https://www.exploit-db.com/exploits/5669)
4. [30378](http://secunia.com/advisories/30378)
5. [onecms-installmod-file-include(42600)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42600)
6. [ADV-2008-1648](http://www.vupen.com/english/advisories/2008/1648/references) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3324, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3324 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3324
- **State**: PUBLISHED
- **Published Date**: September 14, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 23:56 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92809](http://www.securityfocus.com/bid/92809)
2. [MS16-104](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-104)
3. [40748](https://www.exploit-db.com/exploits/40748/)
4. [1036788](http://www.securitytracker.com/id/1036788) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47100, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47100 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47100
- **State**: PUBLISHED
- **Published Date**: March 04, 2024 at 18:10 UTC
- **Last Updated**: May 04, 2025 at 07:04 UTC
- **Reserved Date**: February 29, 2024 at 22:33 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module
Hi,
When testing install and uninstall of ipmi_si.ko and ipmi_msghandler.ko,
the system crashed.
The log as follows:
[ 141.087026] BUG: unable to handle kernel paging request at ffffffffc09b3a5a
[ 141.087241] PGD 8fe4c0d067 P4D 8fe4c0d067 PUD 8fe4c0f067 PMD 103ad89067 PTE 0
[ 141.087464] Oops: 0010 [#1] SMP NOPTI
[ 141.087580] CPU: 67 PID: 668 Comm: kworker/67:1 Kdump: loaded Not tainted 4.18.0.x86_64 #47
[ 141.088009] Workqueue: events 0xffffffffc09b3a40
[ 141.088009] RIP: 0010:0xffffffffc09b3a5a
[ 141.088009] Code: Bad RIP value.
[ 141.088009] RSP: 0018:ffffb9094e2c3e88 EFLAGS: 00010246
[ 141.088009] RAX: 0000000000000000 RBX: ffff9abfdb1f04a0 RCX: 0000000000000000
[ 141.088009] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246
[ 141.088009] RBP: 0000000000000000 R08: ffff9abfffee3cb8 R09: 00000000000002e1
[ 141.088009] R10: ffffb9094cb73d90 R11: 00000000000f4240 R12: ffff9abfffee8700
[ 141.088009] R13: 0000000000000000 R14: ffff9abfdb1f04a0 R15: ffff9abfdb1f04a8
[ 141.088009] FS: 0000000000000000(0000) GS:ffff9abfffec0000(0000) knlGS:0000000000000000
[ 141.088009] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 141.088009] CR2: ffffffffc09b3a30 CR3: 0000008fe4c0a001 CR4: 00000000007606e0
[ 141.088009] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 141.088009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 141.088009] PKRU: 55555554
[ 141.088009] Call Trace:
[ 141.088009] ? process_one_work+0x195/0x390
[ 141.088009] ? worker_thread+0x30/0x390
[ 141.088009] ? process_one_work+0x390/0x390
[ 141.088009] ? kthread+0x10d/0x130
[ 141.088009] ? kthread_flush_work_fn+0x10/0x10
[ 141.088009] ? ret_from_fork+0x35/0x40] BUG: unable to handle kernel paging request at ffffffffc0b28a5a
[ 200.223240] PGD 97fe00d067 P4D 97fe00d067 PUD 97fe00f067 PMD a580cbf067 PTE 0
[ 200.223464] Oops: 0010 [#1] SMP NOPTI
[ 200.223579] CPU: 63 PID: 664 Comm: kworker/63:1 Kdump: loaded Not tainted 4.18.0.x86_64 #46
[ 200.224008] Workqueue: events 0xffffffffc0b28a40
[ 200.224008] RIP: 0010:0xffffffffc0b28a5a
[ 200.224008] Code: Bad RIP value.
[ 200.224008] RSP: 0018:ffffbf3c8e2a3e88 EFLAGS: 00010246
[ 200.224008] RAX: 0000000000000000 RBX: ffffa0799ad6bca0 RCX: 0000000000000000
[ 200.224008] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246
[ 200.224008] RBP: 0000000000000000 R08: ffff9fe43fde3cb8 R09: 00000000000000d5
[ 200.224008] R10: ffffbf3c8cb53d90 R11: 00000000000f4240 R12: ffff9fe43fde8700
[ 200.224008] R13: 0000000000000000 R14: ffffa0799ad6bca0 R15: ffffa0799ad6bca8
[ 200.224008] FS: 0000000000000000(0000) GS:ffff9fe43fdc0000(0000) knlGS:0000000000000000
[ 200.224008] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 200.224008] CR2: ffffffffc0b28a30 CR3: 00000097fe00a002 CR4: 00000000007606e0
[ 200.224008] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 200.224008] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 200.224008] PKRU: 55555554
[ 200.224008] Call Trace:
[ 200.224008] ? process_one_work+0x195/0x390
[ 200.224008] ? worker_thread+0x30/0x390
[ 200.224008] ? process_one_work+0x390/0x390
[ 200.224008] ? kthread+0x10d/0x130
[ 200.224008] ? kthread_flush_work_fn+0x10/0x10
[ 200.224008] ? ret_from_fork+0x35/0x40
[ 200.224008] kernel fault(0x1) notification starting on CPU 63
[ 200.224008] kernel fault(0x1) notification finished on CPU 63
[ 200.224008] CR2: ffffffffc0b28a5a
[ 200.224008] ---[ end trace c82a412d93f57412 ]---
The reason is as follows:
T1: rmmod ipmi_si.
->ipmi_unregister_smi()
-> ipmi_bmc_unregister()
-> __ipmi_bmc_unregister()
-> kref_put(&bmc->usecount, cleanup_bmc_device);
-> schedule_work(&bmc->remove_work);
T2: rmmod ipmi_msghandl
---truncated---
### Affected Products
**Linux - Linux**
Affected versions:
- b2cfd8ab4add53c2070367bfee2f5b738f51698d (Status: affected)
- b2cfd8ab4add53c2070367bfee2f5b738f51698d (Status: affected)
- b2cfd8ab4add53c2070367bfee2f5b738f51698d (Status: affected)
- b2cfd8ab4add53c2070367bfee2f5b738f51698d (Status: affected)
- b2cfd8ab4add53c2070367bfee2f5b738f51698d (Status: affected)
**Linux - Linux**
Affected versions:
- 4.15 (Status: affected)
- 0 (Status: unaffected)
- 4.19.223 (Status: unaffected)
- 5.4.169 (Status: unaffected)
- 5.10.89 (Status: unaffected)
- 5.15.12 (Status: unaffected)
- 5.16 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012)
2. [](https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18)
3. [](https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad)
4. [](https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e)
5. [](https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28357, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28357
- **State**: PUBLISHED
- **Published Date**: September 19, 2023 at 00:00 UTC
- **Last Updated**: September 25, 2024 at 14:53 UTC
- **Reserved Date**: April 02, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NATS nats-server 2.2.0 through 2.7.4 allows directory traversal because of an unintended path to a management action from a management account.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nats-io/nats-server/releases)
2. [](https://advisories.nats.io/CVE/CVE-2022-28357.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36349, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36349
- **State**: PUBLISHED
- **Published Date**: November 11, 2022 at 15:48 UTC
- **Last Updated**: August 03, 2024 at 10:00 UTC
- **Reserved Date**: July 28, 2022 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Insecure default variable initialization in BIOS firmware for some Intel(R) NUC Boards and Intel(R) NUC Kits before version MYi30060 may allow an authenticated user to potentially enable denial of service via local access.
### CVSS Metrics
- **CVSS Base Score**: 5.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L`
### Affected Products
**n/a - Intel(R) NUC Boards and Intel(R) NUC Kits**
Affected versions:
- before version MYi30060 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13665, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13665 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13665
- **State**: PUBLISHED
- **Published Date**: November 25, 2019 at 14:22 UTC
- **Last Updated**: August 04, 2024 at 23:57 UTC
- **Reserved Date**: July 18, 2019 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient filtering in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass multiple file download protection via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/959640) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-10395, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-10395 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-10395
- **State**: PUBLISHED
- **Published Date**: August 27, 2019 at 11:50 UTC
- **Last Updated**: August 06, 2024 at 14:10 UTC
- **Reserved Date**: August 26, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The cp-polls plugin before 1.0.1 for WordPress has XSS in the votes list.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/cp-polls/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0165
- **State**: PUBLISHED
- **Published Date**: February 12, 2024 at 18:30 UTC
- **Last Updated**: May 06, 2025 at 21:04 UTC
- **Reserved Date**: December 14, 2023 at 05:35 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell Unity, versions prior to 5.4, contains an OS Command Injection Vulnerability in its svc_acldb_dump utility. An authenticated attacker could potentially exploit this vulnerability, leading to execution of arbitrary operating system commands with root privileges.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Dell - Unity**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000222010/dsa-2024-042-dell-unity-dell-unity-vsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52109, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52109 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52109
- **State**: PUBLISHED
- **Published Date**: January 16, 2024 at 07:53 UTC
- **Last Updated**: June 02, 2025 at 15:12 UTC
- **Reserved Date**: December 27, 2023 at 02:33 UTC
- **Assigned By**: huawei
### Vulnerability Description
Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality.
### Weakness Classification (CWE)
- CWE-345: Security Weakness
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 4.0.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 13.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/1/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4047, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4047 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4047
- **State**: PUBLISHED
- **Published Date**: September 16, 2013 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 16:30 UTC
- **Reserved Date**: June 07, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in IBM SPSS Analytical Decision Management 6.1 before IF1, 6.2 before IF1, and 7.0 before FP1 IF6 allows remote attackers to inject arbitrary web script or HTML via a crafted link.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ibm-spss-cve20134047-xss(86440)](https://exchange.xforce.ibmcloud.com/vulnerabilities/86440)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21648929) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5574, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5574 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5574
- **State**: REJECTED
- **Published Date**: December 23, 2019 at 20:41 UTC
- **Last Updated**: December 23, 2019 at 20:41 UTC
- **Reserved Date**: January 07, 2019 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1127, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1127 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1127
- **State**: PUBLISHED
- **Published Date**: April 25, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 18:45 UTC
- **Reserved Date**: February 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [48797](http://secunia.com/advisories/48797)
2. [48508](http://secunia.com/advisories/48508)
3. [48822](http://secunia.com/advisories/48822)
4. [MDVSA-2012:057](http://www.mandriva.com/security/advisories?name=MDVSA-2012:057)
5. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html)
6. [48758](http://secunia.com/advisories/48758)
7. [](http://support.apple.com/kb/HT5503)
8. [52318](http://www.securityfocus.com/bid/52318)
9. [USN-1403-1](http://www.ubuntu.com/usn/USN-1403-1)
10. [](https://bugzilla.mozilla.org/show_bug.cgi?id=733512)
11. [48918](http://secunia.com/advisories/48918)
12. [[oss-security] 20120306 Re: CVE Request -- FreeType: Multiple security flaws to be fixed in v2.4.9](http://www.openwall.com/lists/oss-security/2012/03/06/16)
13. [SUSE-SU-2012:0484](http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html)
14. [SUSE-SU-2012:0521](http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html)
15. [48973](http://secunia.com/advisories/48973)
16. [](http://www.mozilla.org/security/announce/2012/mfsa2012-21.html)
17. [RHSA-2012:0467](http://rhn.redhat.com/errata/RHSA-2012-0467.html)
18. [SUSE-SU-2012:0483](http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html)
19. [](https://bugzilla.redhat.com/show_bug.cgi?id=800583)
20. [1026765](http://www.securitytracker.com/id?1026765)
21. [openSUSE-SU-2012:0489](http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html)
22. [48951](http://secunia.com/advisories/48951)
23. [GLSA-201204-04](http://security.gentoo.org/glsa/glsa-201204-04.xml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0414, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0414 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0414
- **State**: PUBLISHED
- **Published Date**: October 05, 2018 at 14:00 UTC
- **Last Updated**: November 26, 2024 at 14:46 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based UI of Cisco Secure Access Control Server could allow an authenticated, remote attacker to gain read access to certain information in an affected system. The vulnerability is due to improper handling of XML External Entities (XXEs) when parsing an XML file. An attacker could exploit this vulnerability by convincing the administrator of an affected system to import a crafted XML file.
### Weakness Classification (CWE)
- CWE-611: Security Weakness
### Affected Products
**Cisco - Cisco Secure Access Control Server Solution Engine (ACSE)**
Affected versions:
- n/a (Status: affected)
### References
1. [105289](http://www.securityfocus.com/bid/105289)
2. [20180905 Cisco Secure Access Control Server XML External Entity Injection Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-acsxxe)
3. [1041688](http://www.securitytracker.com/id/1041688) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-21245, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-21245 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-21245
- **State**: PUBLISHED
- **Published Date**: June 15, 2020 at 16:50 UTC
- **Last Updated**: August 05, 2024 at 12:26 UTC
- **Reserved Date**: June 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pound before 2.8 allows HTTP request smuggling, a related issue to CVE-2016-10711.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://admin.hostpoint.ch/pipermail/pound_apsis.ch/2018-May/000054.html)
2. [](https://bugs.gentoo.org/714084) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6477, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6477 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6477
- **State**: PUBLISHED
- **Published Date**: December 20, 2006 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 20:26 UTC
- **Reserved Date**: December 11, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FRAgent.exe in Mandiant First Response (MFR) before 1.1.1, when run in daemon mode and configured to use only HTTP, allows local users to modify requests and responses between a client and an agent by hijacking an HTTP FRAgent daemon and conducting a man-in-the-middle (MITM) attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.mandiant.com/firstresponse.htm)
2. [20061218 SYMSA-2006-013: Multiple Vulnerabilities in Mandiant First Response](http://www.securityfocus.com/archive/1/454712/100/0/threaded)
3. [23393](http://secunia.com/advisories/23393)
4. [ADV-2006-5061](http://www.vupen.com/english/advisories/2006/5061)
5. [21548](http://www.securityfocus.com/bid/21548)
6. [2052](http://securityreason.com/securityalert/2052)
7. [1017394](http://securitytracker.com/id?1017394)
8. [](http://www.symantec.com/enterprise/research/SYMSA-2006-013.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7549, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7549 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7549
- **State**: PUBLISHED
- **Published Date**: May 29, 2019 at 15:42 UTC
- **Last Updated**: August 04, 2024 at 20:54 UTC
- **Reserved Date**: February 06, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in GitLab Community and Enterprise Edition 10.x and 11.x before 11.5.10, 11.6.x before 11.6.8, and 11.7.x before 11.7.3. It has Incorrect Access Control. The GitLab pipelines feature is vulnerable to authorization issues that allow unauthorized users to view job information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://about.gitlab.com/2019/01/31/security-release-gitlab-11-dot-7-dot-3-released/)
2. [](https://gitlab.com/gitlab-org/gitlab-ce/issues/54358) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56680, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56680 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56680
- **State**: PUBLISHED
- **Published Date**: December 28, 2024 at 09:46 UTC
- **Last Updated**: May 04, 2025 at 10:02 UTC
- **Reserved Date**: December 27, 2024 at 15:00 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
media: intel/ipu6: do not handle interrupts when device is disabled
Some IPU6 devices have shared interrupts. We need to handle properly
case when interrupt is triggered from other device on shared irq line
and IPU6 itself disabled. In such case we get 0xffffffff from
ISR_STATUS register and handle all irq's cases, for what we are not
not prepared and usually hang the whole system.
To avoid the issue use pm_runtime_get_if_active() to check if
the device is enabled and prevent suspending it when we handle irq
until the end of irq. Additionally use synchronize_irq() in suspend
### Affected Products
**Linux - Linux**
Affected versions:
- ab29a2478e709b8fbb4715c51709275907c185db (Status: affected)
- ab29a2478e709b8fbb4715c51709275907c185db (Status: affected)
- ab29a2478e709b8fbb4715c51709275907c185db (Status: affected)
**Linux - Linux**
Affected versions:
- 6.10 (Status: affected)
- 0 (Status: unaffected)
- 6.11.11 (Status: unaffected)
- 6.12.2 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/ed4524c87249edc3104f6bb28ab11325bed3d536)
2. [](https://git.kernel.org/stable/c/57241487a3648515c9aa6fa89e31f2414eccfdbc)
3. [](https://git.kernel.org/stable/c/1429826883bb18847092b2e04c6598ef34bae1d4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3517, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3517 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3517
- **State**: PUBLISHED
- **Published Date**: July 03, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:21 UTC
- **Reserved Date**: July 03, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Claroline 1.8.3 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO (PHP_SELF) to (1) index.php, (2) demo/claroline170/index.php, and possibly other scripts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.claroline.net/forum/viewtopic.php?t=11920)
2. [36334](http://osvdb.org/36334)
3. [ADV-2007-2402](http://www.vupen.com/english/advisories/2007/2402)
4. [36333](http://osvdb.org/36333)
5. [25887](http://secunia.com/advisories/25887)
6. [24742](http://www.securityfocus.com/bid/24742) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0806, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0806
- **State**: PUBLISHED
- **Published Date**: April 16, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:05 UTC
- **Reserved Date**: September 18, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [O-114](http://www.ciac.org/ciac/bulletins/o-114.shtml)
2. [10126](http://www.securityfocus.com/bid/10126)
3. [oval:org.mitre.oval:def:1054](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1054)
4. [MS04-011](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011)
5. [win-winlogon-bo(15702)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15702)
6. [oval:org.mitre.oval:def:896](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A896)
7. [TA04-104A](http://www.us-cert.gov/cas/techalerts/TA04-104A.html)
8. [oval:org.mitre.oval:def:895](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A895)
9. [VU#471260](http://www.kb.cert.org/vuls/id/471260) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14033, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14033 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14033
- **State**: PUBLISHED
- **Published Date**: June 15, 2020 at 16:11 UTC
- **Last Updated**: August 04, 2024 at 12:32 UTC
- **Reserved Date**: June 11, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in janus-gateway (aka Janus WebRTC Server) through 0.10.0. janus_streaming_rtsp_parse_sdp in plugins/janus_streaming.c has a Buffer Overflow via a crafted RTSP server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/meetecho/janus-gateway/blob/v0.10.0/plugins/janus_streaming.c#L6117)
2. [](https://github.com/meetecho/janus-gateway/blob/v0.10.0/plugins/janus_streaming.c#L6166)
3. [](https://github.com/meetecho/janus-gateway/pull/2229) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34374, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34374
- **State**: PUBLISHED
- **Published Date**: August 30, 2022 at 20:25 UTC
- **Last Updated**: September 16, 2024 at 20:32 UTC
- **Reserved Date**: June 23, 2022 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell Container Storage Modules 1.2 contains an OS command injection in goiscsi and gobrick libraries. A remote authenticated malicious user with low privileges could exploit this vulnerability leading to to execute arbitrary OS commands on the affected system.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Dell - Dell Container Storage Modules**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000201835/dsa-2022-202-dell-container-storage-modules-security-update-for-multiple-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49644, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49644 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49644
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:23 UTC
- **Last Updated**: May 04, 2025 at 08:42 UTC
- **Reserved Date**: February 26, 2025 at 02:21 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/i915: fix a possible refcount leak in intel_dp_add_mst_connector()
If drm_connector_init fails, intel_connector_free will be called to take
care of proper free. So it is necessary to drop the refcount of port
before intel_connector_free.
(cherry picked from commit cea9ed611e85d36a05db52b6457bf584b7d969e2)
### Affected Products
**Linux - Linux**
Affected versions:
- 091a4f91942a4396c67e5747f5cb38c6396d1fc5 (Status: affected)
- 091a4f91942a4396c67e5747f5cb38c6396d1fc5 (Status: affected)
- 091a4f91942a4396c67e5747f5cb38c6396d1fc5 (Status: affected)
- 091a4f91942a4396c67e5747f5cb38c6396d1fc5 (Status: affected)
- 091a4f91942a4396c67e5747f5cb38c6396d1fc5 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.15 (Status: affected)
- 0 (Status: unaffected)
- 5.4.207 (Status: unaffected)
- 5.10.132 (Status: unaffected)
- 5.15.56 (Status: unaffected)
- 5.18.13 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/72f231b9a88abcfac9f5ddaa1a0aacb3f9f87ba5)
2. [](https://git.kernel.org/stable/c/592f3bad00b7e2a95a6fb7a4f9e742c061c9c3c1)
3. [](https://git.kernel.org/stable/c/505114dda5bbfd07f4ce9a2df5b7d8ef5f2a1218)
4. [](https://git.kernel.org/stable/c/a91522b4279bebb098106a19b91f82b9c3213be9)
5. [](https://git.kernel.org/stable/c/85144df9ff4652816448369de76897c57cbb1b93) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11658, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11658 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11658
- **State**: PUBLISHED
- **Published Date**: August 29, 2019 at 22:23 UTC
- **Last Updated**: August 04, 2024 at 23:03 UTC
- **Reserved Date**: May 01, 2019 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
Information exposure in Micro Focus Content Manager, versions 9.1, 9.2 and 9.3. This vulnerability when configured to use an Oracle database, allows valid system users to gain access to a limited subset of records they would not normally be able to access when the system is in an undisclosed abnormal state.
### Affected Products
**Micro Focus - Content Manager**
Affected versions:
- 9.1 (Status: affected)
- 9.2 (Status: affected)
- 9.3 (Status: affected)
### References
1. [](https://softwaresupport.softwaregrp.com/doc/KM03496282) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3782, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3782 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3782
- **State**: PUBLISHED
- **Published Date**: July 17, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 16:22 UTC
- **Reserved Date**: June 03, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Secure Global Desktop component in Oracle Virtualization 4.6 prior to 4.63 and 4.7 prior to 4.71 allows remote attackers to affect integrity via unknown vectors related to Web UI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [95320](http://osvdb.org/95320)
2. [oracle-cpujuly2013-cve20133782(85707)](https://exchange.xforce.ibmcloud.com/vulnerabilities/85707)
3. [](http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html)
4. [61231](http://www.securityfocus.com/bid/61231)
5. [54238](http://secunia.com/advisories/54238)
6. [1028793](http://www.securitytracker.com/id/1028793) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26413, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26413 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26413
- **State**: PUBLISHED
- **Published Date**: April 13, 2021 at 19:32 UTC
- **Last Updated**: August 03, 2024 at 20:26 UTC
- **Reserved Date**: January 29, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Installer Spoofing Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26413) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53178, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53178 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53178
- **State**: PUBLISHED
- **Published Date**: December 27, 2024 at 13:49 UTC
- **Last Updated**: May 04, 2025 at 09:55 UTC
- **Reserved Date**: November 19, 2024 at 17:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
smb: Don't leak cfid when reconnect races with open_cached_dir
open_cached_dir() may either race with the tcon reconnection even before
compound_send_recv() or directly trigger a reconnection via
SMB2_open_init() or SMB_query_info_init().
The reconnection process invokes invalidate_all_cached_dirs() via
cifs_mark_open_files_invalid(), which removes all cfids from the
cfids->entries list but doesn't drop a ref if has_lease isn't true. This
results in the currently-being-constructed cfid not being on the list,
but still having a refcount of 2. It leaks if returned from
open_cached_dir().
Fix this by setting cfid->has_lease when the ref is actually taken; the
cfid will not be used by other threads until it has a valid time.
Addresses these kmemleaks:
unreferenced object 0xffff8881090c4000 (size 1024):
comm "bash", pid 1860, jiffies 4295126592
hex dump (first 32 bytes):
00 01 00 00 00 00 ad de 22 01 00 00 00 00 ad de ........".......
00 ca 45 22 81 88 ff ff f8 dc 4f 04 81 88 ff ff ..E"......O.....
backtrace (crc 6f58c20f):
[<ffffffff8b895a1e>] __kmalloc_cache_noprof+0x2be/0x350
[<ffffffff8bda06e3>] open_cached_dir+0x993/0x1fb0
[<ffffffff8bdaa750>] cifs_readdir+0x15a0/0x1d50
[<ffffffff8b9a853f>] iterate_dir+0x28f/0x4b0
[<ffffffff8b9a9aed>] __x64_sys_getdents64+0xfd/0x200
[<ffffffff8cf6da05>] do_syscall_64+0x95/0x1a0
[<ffffffff8d00012f>] entry_SYSCALL_64_after_hwframe+0x76/0x7e
unreferenced object 0xffff8881044fdcf8 (size 8):
comm "bash", pid 1860, jiffies 4295126592
hex dump (first 8 bytes):
00 cc cc cc cc cc cc cc ........
backtrace (crc 10c106a9):
[<ffffffff8b89a3d3>] __kmalloc_node_track_caller_noprof+0x363/0x480
[<ffffffff8b7d7256>] kstrdup+0x36/0x60
[<ffffffff8bda0700>] open_cached_dir+0x9b0/0x1fb0
[<ffffffff8bdaa750>] cifs_readdir+0x15a0/0x1d50
[<ffffffff8b9a853f>] iterate_dir+0x28f/0x4b0
[<ffffffff8b9a9aed>] __x64_sys_getdents64+0xfd/0x200
[<ffffffff8cf6da05>] do_syscall_64+0x95/0x1a0
[<ffffffff8d00012f>] entry_SYSCALL_64_after_hwframe+0x76/0x7e
And addresses these BUG splats when unmounting the SMB filesystem:
BUG: Dentry ffff888140590ba0{i=1000000000080,n=/} still in use (2) [unmount of cifs cifs]
WARNING: CPU: 3 PID: 3433 at fs/dcache.c:1536 umount_check+0xd0/0x100
Modules linked in:
CPU: 3 UID: 0 PID: 3433 Comm: bash Not tainted 6.12.0-rc4-g850925a8133c-dirty #49
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:umount_check+0xd0/0x100
Code: 8d 7c 24 40 e8 31 5a f4 ff 49 8b 54 24 40 41 56 49 89 e9 45 89 e8 48 89 d9 41 57 48 89 de 48 c7 c7 80 e7 db ac e8 f0 72 9a ff <0f> 0b 58 31 c0 5a 5b 5d 41 5c 41 5d 41 5e 41 5f e9 2b e5 5d 01 41
RSP: 0018:ffff88811cc27978 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff888140590ba0 RCX: ffffffffaaf20bae
RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff8881f6fb6f40
RBP: ffff8881462ec000 R08: 0000000000000001 R09: ffffed1023984ee3
R10: ffff88811cc2771f R11: 00000000016cfcc0 R12: ffff888134383e08
R13: 0000000000000002 R14: ffff8881462ec668 R15: ffffffffaceab4c0
FS: 00007f23bfa98740(0000) GS:ffff8881f6f80000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000556de4a6f808 CR3: 0000000123c80000 CR4: 0000000000350ef0
Call Trace:
<TASK>
d_walk+0x6a/0x530
shrink_dcache_for_umount+0x6a/0x200
generic_shutdown_super+0x52/0x2a0
kill_anon_super+0x22/0x40
cifs_kill_sb+0x159/0x1e0
deactivate_locked_super+0x66/0xe0
cleanup_mnt+0x140/0x210
task_work_run+0xfb/0x170
syscall_exit_to_user_mode+0x29f/0x2b0
do_syscall_64+0xa1/0x1a0
entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f23bfb93ae7
Code: ff ff ff ff c3 66 0f 1f 44 00 00 48 8b 0d 11 93 0d 00 f7 d8 64 89 01 b8 ff ff ff ff eb bf 0f 1f 44 00 00 b8 50 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e9 92 0d 00 f7 d8 64 89
---truncated---
### Affected Products
**Linux - Linux**
Affected versions:
- ebe98f1447bbccf8228335c62d86af02a0ed23f7 (Status: affected)
- ebe98f1447bbccf8228335c62d86af02a0ed23f7 (Status: affected)
- ebe98f1447bbccf8228335c62d86af02a0ed23f7 (Status: affected)
- ebe98f1447bbccf8228335c62d86af02a0ed23f7 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.1 (Status: affected)
- 0 (Status: unaffected)
- 6.6.64 (Status: unaffected)
- 6.11.11 (Status: unaffected)
- 6.12.2 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/31fabf70d58388d5475e48ca8a6b7d2847b36678)
2. [](https://git.kernel.org/stable/c/1d76332d783db12684b67592f1fb2057b88af4c3)
3. [](https://git.kernel.org/stable/c/73a57b25b4df23f22814fc06b7e8f9cf570be026)
4. [](https://git.kernel.org/stable/c/7afb86733685c64c604d32faf00fa4a1f22c2ab1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54347, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54347 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54347
- **State**: PUBLISHED
- **Published Date**: December 13, 2024 at 14:25 UTC
- **Last Updated**: December 13, 2024 at 14:49 UTC
- **Reserved Date**: December 02, 2024 at 12:05 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BAKKBONE Australia FloristPress allows Reflected XSS.This issue affects FloristPress: from n/a through 7.2.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**BAKKBONE Australia - FloristPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/bakkbone-florist-companion/vulnerability/wordpress-floristpress-plugin-7-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- thiennv (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35937, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35937 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35937
- **State**: PUBLISHED
- **Published Date**: July 06, 2023 at 13:50 UTC
- **Last Updated**: October 18, 2024 at 19:19 UTC
- **Reserved Date**: June 20, 2023 at 14:02 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Metersphere is an open source continuous testing platform. In versions prior to 2.10.2 LTS, some key APIs in Metersphere lack permission checks. This allows ordinary users to execute APIs that can only be executed by space administrators or project administrators. For example, ordinary users can be updated as space administrators. Version 2.10.2 LTS has a patch for this issue.
### CVSS Metrics
- **CVSS Base Score**: 6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**metersphere - metersphere**
Affected versions:
- < 2.10.2-LTS (Status: affected)
### References
1. [https://github.com/metersphere/metersphere/security/advisories/GHSA-7xj3-qrx5-524r](https://github.com/metersphere/metersphere/security/advisories/GHSA-7xj3-qrx5-524r) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16467, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16467 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16467
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 16:16 UTC
- **Last Updated**: August 05, 2024 at 01:17 UTC
- **Reserved Date**: September 19, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5, 6.4, 6.3, 6.2, 6.1, and 6.0 have a reflected cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 6.5, 6.4, 6.3, 6.2, 6.1, and 6.0 versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb20-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6992, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6992 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6992
- **State**: PUBLISHED
- **Published Date**: August 18, 2009 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 19:40 UTC
- **Reserved Date**: August 17, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GreenSQL Firewall (greensql-fw), possibly before 0.9.2 or 0.9.4, allows remote attackers to bypass the SQL injection protection mechanism via a WHERE clause containing an expression such as "x=y=z", which is successfully parsed by MySQL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sla.ckers.org/forum/read.php?16%2C24367)
2. [](http://www.greensql.net/security)
3. [](http://bugs.mysql.com/bug.php?id=39337)
4. [48910](http://osvdb.org/48910)
5. [](http://www.greensql.net/node/89)
6. [](http://www.greensql.net/node/98) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30107, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30107 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30107
- **State**: PUBLISHED
- **Published Date**: March 18, 2025 at 00:00 UTC
- **Last Updated**: March 24, 2025 at 21:28 UTC
- **Reserved Date**: March 17, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
On IROAD V9 devices, Managing Settings and Obtaining Sensitive Data and Sabotaging the Car Battery can be performed by unauthorized parties. A vulnerability in the dashcam's configuration management allows unauthorized users to modify settings, disable critical functions, and turn off battery protection, potentially causing physical damage to the vehicle.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://iroad-dashcam.nl/iroad/iroad-x5/%27)
2. [](https://github.com/geo-chen/IROAD-V) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0207
- **State**: PUBLISHED
- **Published Date**: January 04, 2025 at 12:31 UTC
- **Last Updated**: January 06, 2025 at 16:27 UTC
- **Reserved Date**: January 03, 2025 at 12:31 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in code-projects Online Shoe Store 1.0. Affected by this issue is some unknown functionality of the file /function/login.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**code-projects - Online Shoe Store**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-290144 | code-projects Online Shoe Store login.php sql injection](https://vuldb.com/?id.290144)
2. [VDB-290144 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.290144)
3. [Submit #474035 | code-projects Online Shoe Store 1.0 SQL Injection](https://vuldb.com/?submit.474035)
4. [](https://gist.github.com/th4s1s/d10dfaebae75c8dbe54ad83d63725d81)
5. [](https://code-projects.org/)
### Credits
- lio346 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4325, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4325 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4325
- **State**: PUBLISHED
- **Published Date**: August 14, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 20:35 UTC
- **Reserved Date**: August 14, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in upload/users.php in Utopia News Pro (UNP) 1.4.0 and earlier allows remote attackers to hijack the authentication of administrators for requests that add administrator accounts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18720](http://www.exploit-db.com/exploits/18720)
2. [80986](http://osvdb.org/80986)
3. [utopianewspro-users-csrf(74760)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74760) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1648, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1648
- **State**: PUBLISHED
- **Published Date**: April 06, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:19 UTC
- **Reserved Date**: April 06, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SMART SynchronEyes Student and Teacher 6.0, and possibly earlier versions, allows remote attackers to cause a denial of service (memory consumption) via a certain packet to the Teacher discovery port that causes SynchronEyes to connect to the attacker's machine and read a value that is used as a parameter to malloc.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060404 SMART Technologies SynchronEyes Remote Denial of Services](http://www.securityfocus.com/archive/1/429843/100/0/threaded)
2. [17373](http://www.securityfocus.com/bid/17373)
3. [ADV-2006-1241](http://www.vupen.com/english/advisories/2006/1241)
4. [1015869](http://securitytracker.com/id?1015869)
5. [24392](http://www.osvdb.org/24392)
6. [19535](http://secunia.com/advisories/19535)
7. [synchroneyes-packet-dos(25663)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25663) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.