System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52905, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52905 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52905 - **State**: PUBLISHED - **Published Date**: March 10, 2025 at 16:05 UTC - **Last Updated**: March 10, 2025 at 16:31 UTC - **Reserved Date**: November 17, 2024 at 14:25 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 could disclose sensitive database information to a privileged user. ### CVSS Metrics - **CVSS Base Score**: 2.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-497: Security Weakness ### Affected Products **IBM - Sterling B2B Integrator Standard Edition** Affected versions: - 6.0.0.0 (Status: affected) - 6.2.0.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7185264)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-29449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-29449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-29449 - **State**: PUBLISHED - **Published Date**: April 17, 2025 at 00:00 UTC - **Last Updated**: April 21, 2025 at 19:15 UTC - **Reserved Date**: March 11, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in twonav v.2.1.18-20241105 allows a remote attacker to obtain sensitive information via the link identification function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.yuque.com/morysummer/vx41bz/tawn9fxg1ggv1sdr)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33375, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33375 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33375 - **State**: PUBLISHED - **Published Date**: August 04, 2023 at 00:00 UTC - **Last Updated**: October 17, 2024 at 15:30 UTC - **Reserved Date**: May 22, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Connected IO v2.1.0 and prior has a stack-based buffer overflow vulnerability in its communication protocol, enabling attackers to take control over devices. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.connectedio.com/products/routers) 2. [](https://claroty.com/team82/disclosure-dashboard/cve-2023-33375)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2291, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2291 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2291 - **State**: PUBLISHED - **Published Date**: April 22, 2021 at 21:54 UTC - **Last Updated**: September 26, 2024 at 14:12 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Affected Products **Oracle Corporation - VM VirtualBox** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2021.html) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-457/) 3. [GLSA-202208-36](https://security.gentoo.org/glsa/202208-36)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14664, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14664 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14664 - **State**: PUBLISHED - **Published Date**: October 12, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 09:38 UTC - **Reserved Date**: July 27, 2018 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in foreman from versions 1.18. A stored cross-site scripting vulnerability exists due to an improperly escaped HTML code in the breadcrumbs bar. This allows a user with permissions to edit which attribute is used in the breadcrumbs bar to store code that will be executed on the client side. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **[UNKNOWN] - foreman** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14664) 2. [](https://projects.theforeman.org/issues/25169) 3. [106553](http://www.securityfocus.com/bid/106553) 4. [RHSA-2019:1222](https://access.redhat.com/errata/RHSA-2019:1222)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-31348, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-31348 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-31348 - **State**: PUBLISHED - **Published Date**: August 13, 2024 at 16:57 UTC - **Last Updated**: August 14, 2024 at 14:23 UTC - **Reserved Date**: April 27, 2023 at 15:25 UTC - **Assigned By**: AMD ### Vulnerability Description A DLL hijacking vulnerability in AMD μProf could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Affected Products **AMD - μProf Tool** Affected versions: - μProf Tool (Status: affected) ### References 1. [](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-9001)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000011, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000011 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000011 - **State**: PUBLISHED - **Published Date**: July 13, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 21:53 UTC - **Reserved Date**: July 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MyWebSQL version 3.6 is vulnerable to stored XSS in the database manager component resulting in account takeover or stealing of information ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Samnan/MyWebSQL)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9013, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9013 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9013 - **State**: PUBLISHED - **Published Date**: April 04, 2018 at 18:00 UTC - **Last Updated**: September 17, 2024 at 03:43 UTC - **Reserved Date**: March 28, 2017 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36393251. ### Affected Products **Google Inc. - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-06-01) 2. [98874](http://www.securityfocus.com/bid/98874) 3. [1038623](http://www.securitytracker.com/id/1038623)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-42197, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-42197 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-42197 - **State**: PUBLISHED - **Published Date**: May 31, 2022 at 16:51 UTC - **Last Updated**: August 04, 2024 at 03:30 UTC - **Reserved Date**: October 11, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in swftools through 20201222 through a memory leak in the swftools when swfdump is used. It allows an attacker to cause code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/matthiaskramm/swftools/issues/177)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28438, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28438 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28438 - **State**: PUBLISHED - **Published Date**: April 21, 2022 at 19:04 UTC - **Last Updated**: August 03, 2024 at 05:56 UTC - **Reserved Date**: April 04, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=type&userrole=User&userid=. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/janobe/baby-care-system/SQLi-20.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1918, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1918 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1918 - **State**: PUBLISHED - **Published Date**: February 27, 2024 at 13:00 UTC - **Last Updated**: August 01, 2024 at 18:56 UTC - **Reserved Date**: February 27, 2024 at 06:59 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in Byzoro Smart S42 Management Platform up to 20240219 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /useratte/userattestation.php. The manipulation of the argument hidwel leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-254839. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **Byzoro - Smart S42 Management Platform** Affected versions: - 20240219 (Status: affected) ### References 1. [VDB-254839 | Byzoro Smart S42 Management Platform userattestation.php unrestricted upload](https://vuldb.com/?id.254839) 2. [VDB-254839 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.254839) 3. [Submit #284382 | 北京百卓网络技术有限公司 Smart S42网关智能管理平台 S42 File Upload vulnerability](https://vuldb.com/?submit.284382) 4. [](https://github.com/Echosssy/CVE/blob/main/%E5%85%B3%E4%BA%8ESmart%20S42%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E%E7%9A%84%E6%83%85%E5%86%B5%E9%80%9A%E6%8A%A5-userattestation.php.docx) ### Credits - Ting (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-49180, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-49180 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-49180 - **State**: PUBLISHED - **Published Date**: December 15, 2023 at 14:47 UTC - **Last Updated**: August 02, 2024 at 21:53 UTC - **Reserved Date**: November 22, 2023 at 23:36 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ternstyle LLC Automatic Youtube Video Posts Plugin allows Stored XSS.This issue affects Automatic Youtube Video Posts Plugin: from n/a through 5.2.2. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Ternstyle LLC - Automatic Youtube Video Posts Plugin** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/automatic-youtube-video-posts/wordpress-automatic-youtube-video-posts-plugin-plugin-5-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - yuyudhn (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2575, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2575 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2575 - **State**: PUBLISHED - **Published Date**: July 22, 2009 at 18:00 UTC - **Last Updated**: September 16, 2024 at 20:17 UTC - **Reserved Date**: July 22, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Research In Motion (RIM) BlackBerry 8800 allows remote attackers to cause a denial of service (memory consumption and browser crash) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20090721 Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....](http://lists.grok.org.uk/pipermail/full-disclosure/2009-July/069772.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5483, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5483 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5483 - **State**: REJECTED - **Published Date**: August 25, 2022 at 17:22 UTC - **Last Updated**: August 25, 2022 at 17:22 UTC - **Reserved Date**: January 12, 2018 at 00:00 UTC - **Assigned By**: netapp ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24341, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24341 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24341 - **State**: PUBLISHED - **Published Date**: June 14, 2021 at 13:37 UTC - **Last Updated**: August 03, 2024 at 19:28 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description When deleting a date in the Xllentech English Islamic Calendar WordPress plugin before 2.6.8, the year_number and month_number POST parameters are not sanitised, escaped or validated before being used in a SQL statement, leading to SQL injection. ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Unknown - Xllentech English Islamic Calendar** Affected versions: - 2.6.8 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/1eba1c73-a19b-4226-afec-d27c48388a04) 2. [](https://codevigilant.com/disclosure/2021/xllentech-english-islamic-calendar/) ### Credits - Syed Sheeraz Ali of Codevigilant
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36426, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36426 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36426 - **State**: REJECTED - **Last Updated**: May 28, 2025 at 18:20 UTC - **Reserved Date**: August 02, 2022 at 03:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30392, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30392 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30392 - **State**: PUBLISHED - **Published Date**: April 30, 2025 at 17:14 UTC - **Last Updated**: June 04, 2025 at 17:53 UTC - **Reserved Date**: March 21, 2025 at 19:09 UTC - **Assigned By**: microsoft ### Vulnerability Description Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-285: Security Weakness ### Affected Products **Microsoft - Azure AI Bot Service** Affected versions: - N/A (Status: affected) ### References 1. [Azure AI bot Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30392)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15976, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15976 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15976 - **State**: PUBLISHED - **Published Date**: October 17, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 10:10 UTC - **Reserved Date**: August 28, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Technical Communications Suite versions 1.0.5.1 and below have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation. ### Affected Products **Adobe - Adobe Technical Communications Suite** Affected versions: - 1.0.5.1 and below versions (Status: affected) ### References 1. [105535](http://www.securityfocus.com/bid/105535) 2. [1041820](http://www.securitytracker.com/id/1041820) 3. [](https://helpx.adobe.com/security/products/techcommsuite/apsb18-38.html) 4. [1041819](http://www.securitytracker.com/id/1041819)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16761, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16761 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16761 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:51 UTC - **Last Updated**: December 20, 2021 at 22:51 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8999, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8999 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8999 - **State**: PUBLISHED - **Published Date**: November 20, 2014 at 11:00 UTC - **Last Updated**: September 16, 2024 at 17:14 UTC - **Reserved Date**: November 19, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in htdocs/modules/system/admin.php in XOOPS before 2.5.7 Final allows remote authenticated users to execute arbitrary SQL commands via the selgroups parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20141117 XOOPS <= 2.5.6 - Blind SQL Injection](http://seclists.org/fulldisclosure/2014/Nov/39) 2. [](http://packetstormsecurity.com/files/129134/XOOPS-2.5.6-SQL-Injection.html) 3. [](http://xoops.org/modules/news/article.php?storyid=6658) 4. [71117](http://www.securityfocus.com/bid/71117)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4325, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4325 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4325 - **State**: PUBLISHED - **Published Date**: August 24, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 19:06 UTC - **Reserved Date**: August 23, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in gbook.php in Doika guestbook 2.5, and possibly earlier, allows remote attackers to inject arbitrary web script or HTML via the page parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-3342](http://www.vupen.com/english/advisories/2006/3342) 2. [20060912 [eVuln] Doika guestbook 'page' XSS Vulnerability](http://www.securityfocus.com/archive/1/445903/100/0/threaded) 3. [21549](http://secunia.com/advisories/21549) 4. [28068](http://www.osvdb.org/28068) 5. [](http://evuln.com/vulns/134/description.html) 6. [doikaguestbook-gbook-xss(28503)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28503) 7. [19656](http://www.securityfocus.com/bid/19656)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52666, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52666 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52666 - **State**: REJECTED - **Published Date**: May 17, 2024 at 14:01 UTC - **Last Updated**: June 12, 2024 at 08:21 UTC - **Reserved Date**: March 07, 2024 at 14:49 UTC - **Assigned By**: Linux ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4728, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4728 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4728 - **State**: PUBLISHED - **Published Date**: June 06, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 16:52 UTC - **Reserved Date**: June 29, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description DDSN Interactive cm3 Acora CMS 6.0.6/1a, 6.0.2/1a, 5.5.7/12b, 5.5.0/1b-p1, and possibly other versions, allows remote attackers to obtain sensitive information via a .. (dot dot) in the "l" parameter, which reveals the installation path in an error message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [96667](http://osvdb.org/96667) 2. [](http://www.digitalsec.net/stuff/explt+advs/CM3.AcoraCMS.v6.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1245, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1245 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1245 - **State**: PUBLISHED - **Published Date**: March 03, 2007 at 19:00 UTC - **Last Updated**: August 07, 2024 at 12:50 UTC - **Reserved Date**: March 03, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IrfanView 3.99 allows remote attackers to cause a denial of service (application crash) via a malformed WMF file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20070225 Few unreported vulnerabilities by SehaTo](http://www.securityfocus.com/archive/1/461373/100/0/threaded) 2. [34487](http://osvdb.org/34487) 3. [](http://securityvulns.com/news/IrfanView/WMF/DoS.html) 4. [](http://securityvulns.com/Qdocument120.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1648, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1648 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1648 - **State**: PUBLISHED - **Published Date**: September 09, 2012 at 21:00 UTC - **Last Updated**: August 06, 2024 at 19:01 UTC - **Reserved Date**: March 12, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Cool Aid module before 6.x-1.9 for Drupal allows remote authenticated users with the administer coolaid permission to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [coolaid-helpmessages-xss(73607)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73607) 2. [48196](http://secunia.com/advisories/48196) 3. [52232](http://www.securityfocus.com/bid/52232) 4. [](http://drupal.org/node/1461438) 5. [[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)](http://www.openwall.com/lists/oss-security/2012/04/07/1) 6. [](http://drupal.org/node/1417186) 7. [79712](http://osvdb.org/79712)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2637, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2637 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2637 - **State**: PUBLISHED - **Published Date**: May 14, 2024 at 18:49 UTC - **Last Updated**: April 24, 2025 at 06:52 UTC - **Reserved Date**: March 19, 2024 at 08:15 UTC - **Assigned By**: ABB ### Vulnerability Description An Uncontrolled Search Path Element vulnerability in B&R Industrial Automation Scene Viewer, B&R Industrial Automation Automation Runtime, B&R Industrial Automation mapp Vision, B&R Industrial Automation mapp View, B&R Industrial Automation mapp Cockpit, B&R Industrial Automation mapp Safety, B&R Industrial Automation VC4, B&R Industrial Automation APROL, B&R Industrial Automation CAN Driver, B&R Industrial Automation CAN Driver CC770, B&R Industrial Automation CAN Driver SJA1000, B&R Industrial Automation Tou0ch Lock, B&R Industrial Automation B&R Single-Touch Driver, B&R Industrial Automation Serial User Mode Touch Driver, B&R Industrial Automation Windows Settings Changer (LTSC), B&R Industrial Automation Windows Settings Changer (2019 LTSC), B&R Industrial Automation Windows 10 Recovery Solution, B&R Industrial Automation ADI driver universal, B&R Industrial Automation ADI Development Kit, B&R Industrial Automation ADI .NET SDK, B&R Industrial Automation SRAM driver, B&R Industrial Automation HMI Service Center, B&R Industrial Automation HMI Service Center Maintenance, B&R Industrial Automation Windows 10 IoT Enterprise 2019 LTSC, B&R Industrial Automation KCF Editor could allow an authenticated local attacker to execute malicious code by placing specially crafted files in the loading search path..This issue affects Scene Viewer: before 4.4.0; Automation Runtime: before J4.93; mapp Vision: before 5.26.1; mapp View: before 5.24.2; mapp Cockpit: before 5.24.2; mapp Safety: before 5.24.2; VC4: before 4.73.2; APROL: before 4.4-01; CAN Driver: before 1.1.0; CAN Driver CC770: before 3.3.0; CAN Driver SJA1000: before 1.3.0; Tou0ch Lock: before 2.1.0; B&R Single-Touch Driver: before 2.0.0; Serial User Mode Touch Driver: before 1.7.1; Windows Settings Changer (LTSC): before 3.2.0; Windows Settings Changer (2019 LTSC): before 2.2.0; Windows 10 Recovery Solution: before 3.2.0; ADI driver universal: before 3.2.0; ADI Development Kit: before 5.5.0; ADI .NET SDK: before 4.1.0; SRAM driver: before 1.2.0; HMI Service Center: before 3.1.0; HMI Service Center Maintenance: before 2.1.0; Windows 10 IoT Enterprise 2019 LTSC: through 1.1; KCF Editor: before 1.1.0. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-427: Security Weakness ### Affected Products **B&R Industrial Automation - Scene Viewer** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - Automation Runtime** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - mapp Vision** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - mapp View** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - mapp Cockpit** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - mapp Safety** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - VC4** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - APROL** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - CAN Driver** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - CAN Driver CC770** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - CAN Driver SJA1000** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - Tou0ch Lock** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - B&R Single-Touch Driver** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - Serial User Mode Touch Driver** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - Windows Settings Changer (LTSC)** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - Windows Settings Changer (2019 LTSC)** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - Windows 10 Recovery Solution** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - ADI driver universal** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - ADI Development Kit** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - ADI .NET SDK** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - SRAM driver** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - HMI Service Center** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - HMI Service Center Maintenance** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - Windows 10 IoT Enterprise 2019 LTSC** Affected versions: - 0 (Status: affected) **B&R Industrial Automation - KCF Editor** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.br-automation.com/fileadmin/SA24P005_Insecure_Loading_of_Code-c7d9e49c.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6318, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6318 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6318 - **State**: PUBLISHED - **Published Date**: December 28, 2006 at 20:00 UTC - **Last Updated**: August 07, 2024 at 20:19 UTC - **Reserved Date**: December 06, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The show_elog_list function in elogd.c in elog 2.6.2 and earlier allows remote authenticated users to cause a denial of service (daemon crash) by attempting to access a logbook whose name begins with "global," which results in a NULL pointer dereference. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-4423](http://www.vupen.com/english/advisories/2006/4423) 2. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=397875) 3. [23580](http://secunia.com/advisories/23580) 4. [1017450](http://securitytracker.com/id?1017450) 5. [30272](http://www.osvdb.org/30272) 6. [DSA-1242](http://www.debian.org/security/2006/dsa-1242) 7. [22800](http://secunia.com/advisories/22800) 8. [2060](http://securityreason.com/securityalert/2060) 9. [21028](http://www.securityfocus.com/bid/21028) 10. [20061112 ELOG Web Logbook Remote Denial of Service Vulnerability](http://archives.neohapsis.com/archives/fulldisclosure/2006-11/0198.html) 11. [20061113 ELOG Web Logbook Remote Denial of Service Vulnerability](http://www.securityfocus.com/archive/1/451351)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23484, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23484 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23484 - **State**: PUBLISHED - **Published Date**: January 28, 2022 at 21:31 UTC - **Last Updated**: September 16, 2024 at 21:56 UTC - **Reserved Date**: January 08, 2021 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description The package zip-local before 0.3.5 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) which can lead to an extraction of a crafted file outside the intended extraction directory. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-JS-ZIPLOCAL-2327477) 2. [](https://github.com/Mostafa-Samir/zip-local/blob/master/main.js%23L365) 3. [](https://github.com/Mostafa-Samir/zip-local/commit/949446a95a660c0752b1db0c654f0fd619ae6085) ### Credits - 7he6uzzer
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7226, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7226 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7226 - **State**: PUBLISHED - **Published Date**: June 27, 2019 at 15:52 UTC - **Last Updated**: August 04, 2024 at 20:46 UTC - **Reserved Date**: January 30, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The ABB IDAL HTTP server CGI interface contains a URL that allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. Specifically, /cgi/loginDefaultUser creates a session in an authenticated state and returns the session ID along with what may be the username and cleartext password of the user. An attacker can then supply an IDALToken value in a cookie, which will allow them to perform privileged operations such as restarting the service with /cgi/restart. A GET request to /cgi/loginDefaultUser may result in "1 #S_OK IDALToken=532c8632b86694f0232a68a0897a145c admin admin" or a similar response. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20190624 XL-19-010 - ABB IDAL HTTP Server Authentication Bypass Vulnerability](http://seclists.org/fulldisclosure/2019/Jun/39) 2. [](http://packetstormsecurity.com/files/153402/ABB-IDAL-HTTP-Server-Authentication-Bypass.html) 3. [108886](http://www.securityfocus.com/bid/108886) 4. [](https://www.darkmatter.ae/xen1thlabs/abb-idal-http-server-authentication-bypass-vulnerability-xl-19-010/) 5. [20190620 XL-19-010 - ABB IDAL HTTP Server Authentication Bypass Vulnerability](http://seclists.org/fulldisclosure/2019/Jun/39)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3278, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3278 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3278 - **State**: PUBLISHED - **Published Date**: June 19, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 14:14 UTC - **Reserved Date**: June 19, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PostgreSQL 8.1 and probably later versions, when local trust authentication is enabled and the Database Link library (dblink) is installed, allows remote attackers to access arbitrary accounts and execute arbitrary SQL queries via a dblink host parameter that proxies the connection from 127.0.0.1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-1460](http://www.debian.org/security/2008/dsa-1460) 2. [28445](http://secunia.com/advisories/28445) 3. [RHSA-2008:0038](http://www.redhat.com/support/errata/RHSA-2008-0038.html) 4. [20070618 Re: Having Fun With PostgreSQL](http://www.securityfocus.com/archive/1/471644/100/0/threaded) 5. [28454](http://secunia.com/advisories/28454) 6. [](http://www.leidecker.info/pgshell/Having_Fun_With_PostgreSQL.txt) 7. [28679](http://secunia.com/advisories/28679) 8. [ADV-2008-0109](http://www.vupen.com/english/advisories/2008/0109) 9. [MDKSA-2007:188](http://www.mandriva.com/security/advisories?name=MDKSA-2007:188) 10. [postgresql-dblink-sql-injection(35142)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35142) 11. [28376](http://secunia.com/advisories/28376) 12. [103197](http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1) 13. [28437](http://secunia.com/advisories/28437) 14. [28477](http://secunia.com/advisories/28477) 15. [29638](http://secunia.com/advisories/29638) 16. [28479](http://secunia.com/advisories/28479) 17. [DSA-1463](http://www.debian.org/security/2008/dsa-1463) 18. [RHSA-2008:0040](http://www.redhat.com/support/errata/RHSA-2008-0040.html) 19. [SSRT080006](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154) 20. [200559](http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1) 21. [oval:org.mitre.oval:def:10334](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10334) 22. [USN-568-1](https://usn.ubuntu.com/568-1/) 23. [28438](http://secunia.com/advisories/28438) 24. [](http://www.portcullis.co.uk/uplds/whitepapers/Having_Fun_With_PostgreSQL.pdf) 25. [20070616 Having Fun With PostgreSQL](http://www.securityfocus.com/archive/1/471541/100/0/threaded) 26. [RHSA-2008:0039](http://www.redhat.com/support/errata/RHSA-2008-0039.html) 27. [HPSBTU02325](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154) 28. [GLSA-200801-15](http://security.gentoo.org/glsa/glsa-200801-15.xml) 29. [40899](http://osvdb.org/40899) 30. [ADV-2008-1071](http://www.vupen.com/english/advisories/2008/1071/references)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3675, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3675 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3675 - **State**: PUBLISHED - **Published Date**: September 13, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 20:13 UTC - **Reserved Date**: June 19, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2012-09-19-3](http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html) 2. [](http://support.apple.com/kb/HT5485) 3. [oval:org.mitre.oval:def:17144](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17144) 4. [](http://support.apple.com/kb/HT5502) 5. [55534](http://www.securityfocus.com/bid/55534) 6. [apple-itunes-webkit-cve20123675(78551)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78551) 7. [APPLE-SA-2012-09-12-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html) 8. [85373](http://osvdb.org/85373)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2346, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2346 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2346 - **State**: REJECTED - **Published Date**: January 22, 2019 at 20:00 UTC - **Last Updated**: January 22, 2019 at 17:57 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6580, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6580 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6580 - **State**: PUBLISHED - **Published Date**: December 28, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 16:11 UTC - **Reserved Date**: December 28, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in Wallpaper Site 1.0.09 allow remote attackers to execute arbitrary SQL commands via (1) the catid parameter to category.php or (2) the groupid parameter to editadgroup.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [26984](http://www.securityfocus.com/bid/26984) 2. [4770](https://www.exploit-db.com/exploits/4770) 3. [40369](http://osvdb.org/40369) 4. [40368](http://osvdb.org/40368)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11137, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11137 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11137 - **State**: PUBLISHED - **Published Date**: November 14, 2019 at 16:56 UTC - **Last Updated**: August 04, 2024 at 22:48 UTC - **Reserved Date**: April 11, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. ### Affected Products **n/a - 2019.2 IPU – UEFI** Affected versions: - See provided reference (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html) 2. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03967en_us) 3. [](https://support.f5.com/csp/article/K56215245?utm_source=f5support&amp%3Butm_medium=RSS)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53617, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53617 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53617 - **State**: PUBLISHED - **Published Date**: December 02, 2024 at 00:00 UTC - **Last Updated**: December 02, 2024 at 19:23 UTC - **Reserved Date**: November 20, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Cross Site Scripting vulnerability in LibrePhotos before commit 32237 allows attackers to takeover any account via uploading an HTML file on behalf of the admin user using IDOR in file upload. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/LibrePhotos/librephotos/pull/1476) 2. [](https://github.com/LibrePhotos/librephotos/commit/32237ddc0b6293a69b983a07b5ad462fcdd6c929) 3. [](https://github.com/ii5mai1/CVE-2024-53617)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28493, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28493 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28493 - **State**: PUBLISHED - **Published Date**: May 08, 2023 at 14:25 UTC - **Last Updated**: January 09, 2025 at 15:24 UTC - **Reserved Date**: March 16, 2023 at 11:18 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth (subscriber+) Reflected Cross-Site Scripting (XSS) vulnerability in Macho Themes NewsMag theme <= 2.4.4 versions. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Macho Themes - NewsMag** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/newsmag/wordpress-newsmag-theme-2-4-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Brandon Roldan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000629 - **State**: PUBLISHED - **Published Date**: December 28, 2018 at 14:00 UTC - **Last Updated**: August 05, 2024 at 12:40 UTC - **Reserved Date**: July 27, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Battelle V2I Hub 2.5.1 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by api/SystemConfigActions.php?action=add and the index.php script. A remote attacker could exploit this vulnerability using the parameterName or _login_username parameter in a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/147306)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40000, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40000 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40000 - **State**: PUBLISHED - **Published Date**: January 07, 2022 at 22:39 UTC - **Last Updated**: August 04, 2024 at 02:20 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) ### References 1. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4224, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4224 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4224 - **State**: PUBLISHED - **Published Date**: July 13, 2016 at 01:00 UTC - **Last Updated**: August 06, 2024 at 00:25 UTC - **Reserved Date**: April 27, 2016 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2016-4223 and CVE-2016-4225. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SU-2016:1826](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html) 2. [GLSA-201607-03](https://security.gentoo.org/glsa/201607-03) 3. [91718](http://www.securityfocus.com/bid/91718) 4. [openSUSE-SU-2016:1802](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html) 5. [](https://helpx.adobe.com/security/products/flash-player/apsb16-25.html) 6. [RHSA-2016:1423](https://access.redhat.com/errata/RHSA-2016:1423) 7. [MS16-093](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093) 8. [](http://www.zerodayinitiative.com/advisories/ZDI-16-428) 9. [1036280](http://www.securitytracker.com/id/1036280)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-0306, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-0306 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-0306 - **State**: PUBLISHED - **Published Date**: January 11, 2021 at 21:46 UTC - **Last Updated**: August 03, 2024 at 15:32 UTC - **Reserved Date**: November 06, 2020 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In addAllPermissions of PermissionManagerService.java, there is a possible permissions bypass when upgrading major Android versions which allows an app to gain the android.permission.ACTIVITY_RECOGNITION permission without user confirmation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11, Android-8.0, Android-8.1, Android-9, Android-10; Android ID: A-154505240. ### Affected Products **n/a - Android** Affected versions: - Android-11 (Status: affected) - Android-8.0 (Status: affected) - Android-8.1 (Status: affected) - Android-9 (Status: affected) - Android-10 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2021-01-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1749, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1749 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1749 - **State**: PUBLISHED - **Published Date**: June 21, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:34 UTC - **Reserved Date**: June 21, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Windows 2000 Terminal Services, when using the disconnect feature of the client, does not properly lock itself if it is left idle until the screen saver activates and the user disconnects, which could allow attackers to gain administrator privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4095](http://www.securityfocus.com/bid/4095) 2. [win2k-terminal-services-unlocked(8199)](https://exchange.xforce.ibmcloud.com/vulnerabilities/8199) 3. [20020211 Terminal doesn't lock after disconnect in Terminal Services](http://www.ntbugtraq.com/default.aspx?pid=36&sid=1&A2=ind0202&L=ntbugtraq&T=0&O=D&F=N&P=5224)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5266, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5266 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5266 - **State**: PUBLISHED - **Published Date**: April 16, 2020 at 21:15 UTC - **Last Updated**: August 04, 2024 at 08:22 UTC - **Reserved Date**: January 02, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In the ps_link module for PrestaShop before version 3.1.0, there is a stored XSS when you create or edit a link list block with the title field. The problem is fixed in 3.1.0 ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **PrestaShop - ps_linklist** Affected versions: - < 3.1.0 (Status: affected) ### References 1. [](https://github.com/PrestaShop/ps_linklist/security/advisories/GHSA-vr7g-vqp5-966j) 2. [](https://github.com/PrestaShop/ps_linklist/commit/b90005c2cfed949ab564228b277a728e0a62a876)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5582, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5582 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5582 - **State**: PUBLISHED - **Published Date**: December 15, 2008 at 17:45 UTC - **Last Updated**: August 07, 2024 at 10:56 UTC - **Reserved Date**: December 15, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in utilities/login.asp in Nukedit 4.9.x, and possibly earlier, allows remote attackers to execute arbitrary SQL commands via the email parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [5192](https://www.exploit-db.com/exploits/5192) 2. [28009](http://www.securityfocus.com/bid/28009) 3. [4732](http://securityreason.com/securityalert/4732)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-24240, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-24240 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-24240 - **State**: PUBLISHED - **Published Date**: August 25, 2020 at 13:45 UTC - **Last Updated**: August 04, 2024 at 15:12 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GNU Bison before 3.7.1 has a use-after-free in _obstack_free in lib/obstack.c (called from gram_lex) when a '\0' byte is encountered. NOTE: there is a risk only if Bison is used with untrusted input, and the observed bug happens to cause unsafe behavior with a specific compiler/architecture. The bug report was intended to show that a crash may occur in Bison itself, not that a crash may occur in code that is generated by Bison. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/akimd/bison/commit/be95a4fe2951374676efc9454ffee8638faaf68d) 2. [](https://lists.gnu.org/r/bug-bison/2020-07/msg00051.html) 3. [](https://github.com/akimd/bison/compare/v3.7...v3.7.1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36527, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36527 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36527 - **State**: PUBLISHED - **Published Date**: November 07, 2023 at 16:04 UTC - **Last Updated**: September 04, 2024 at 19:05 UTC - **Reserved Date**: June 22, 2023 at 14:28 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Formula Elements in a CSV File vulnerability in BestWebSoft Post to CSV by BestWebSoft.This issue affects Post to CSV by BestWebSoft: from n/a through 1.4.0. ### Weakness Classification (CWE) - CWE-1236: Security Weakness ### Affected Products **BestWebSoft - Post to CSV by BestWebSoft** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/post-to-csv/wordpress-post-to-csv-by-bestwebsoft-plugin-1-4-0-csv-injection?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30293, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30293 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30293 - **State**: PUBLISHED - **Published Date**: May 16, 2024 at 08:59 UTC - **Last Updated**: August 02, 2024 at 01:32 UTC - **Reserved Date**: March 26, 2024 at 16:04 UTC - **Assigned By**: adobe ### Vulnerability Description Animate versions 24.0.2, 23.0.5 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Adobe - Animate** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/animate/apsb24-36.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15877, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15877 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15877 - **State**: PUBLISHED - **Published Date**: April 28, 2020 at 19:11 UTC - **Last Updated**: August 05, 2024 at 01:03 UTC - **Reserved Date**: September 03, 2019 at 00:00 UTC - **Assigned By**: freebsd ### Vulnerability Description In FreeBSD 12.1-STABLE before r356606 and 12.1-RELEASE before 12.1-RELEASE-p3, driver specific ioctl command handlers in the ixl network driver failed to check whether the caller has sufficient privileges allowing unprivileged users to trigger updates to the device's non-volatile memory. ### Affected Products **n/a - FreeBSD** Affected versions: - 12.1-STABLE before r356606, 12.1-RELEASE before 12.1-RELEASE-p3 (Status: affected) ### References 1. [](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:06.if_ixl_ioctl.asc)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6481 - **State**: PUBLISHED - **Published Date**: March 05, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 15:33 UTC - **Reserved Date**: March 05, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple Cross-Site Scripting (XSS) issues were discovered in phpipam 1.2. The vulnerabilities exist due to insufficient filtration of user-supplied data passed to several pages (instructions in app/admin/instructions/preview.php; subnetId in app/admin/powerDNS/refresh-ptr-records.php). An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/phpipam/phpipam/issues/992) 2. [96573](http://www.securityfocus.com/bid/96573)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11036, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11036 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11036 - **State**: PUBLISHED - **Published Date**: May 31, 2018 at 12:00 UTC - **Last Updated**: August 05, 2024 at 07:54 UTC - **Reserved Date**: May 13, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Ruckus SmartZone (formerly Virtual SmartCell Gateway or vSCG) 3.5.0, 3.5.1, 3.6.0, and 3.6.1 (Essentials and High Scale) on vSZ, SZ-100, SZ-300, and SCG-200 devices allows remote attackers to obtain sensitive information or modify data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.ruckuswireless.com/security/279/view/txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9721, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9721 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9721 - **State**: PUBLISHED - **Published Date**: June 03, 2015 at 20:00 UTC - **Last Updated**: August 06, 2024 at 13:55 UTC - **Reserved Date**: May 21, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description libzmq before 4.0.6 and 4.1.x before 4.1.1 allows remote attackers to conduct downgrade attacks and bypass ZMTP v3 protocol security mechanisms via a ZMTP v2 or earlier header. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/zeromq/zeromq4-x/commit/b6e3e0f601e2c1ec1f3aac880ed6a3fe63043e51) 2. [DSA-3255](http://www.debian.org/security/2015/dsa-3255) 3. [FEDORA-2015-8635](http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159176.html) 4. [openSUSE-SU-2015:1028](http://lists.opensuse.org/opensuse-updates/2015-06/msg00018.html) 5. [](https://github.com/zeromq/libzmq/issues/1273)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5990, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5990 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5990 - **State**: PUBLISHED - **Published Date**: November 13, 2013 at 15:00 UTC - **Last Updated**: September 16, 2024 at 18:13 UTC - **Reserved Date**: October 03, 2013 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Unspecified vulnerability in JustSystems Ichitaro 2006 through 2011; Ichitaro Government 6, 7, and 2006 through 2010; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen and Gen Trial Edition; Ichitaro Pro; Ichitaro Pro 2 and Pro 2 Trial Edition; Ichitaro Viewer; and Ichitaro Portable with oreplug allows remote attackers to execute arbitrary code via a crafted document. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [JVN#44999463](http://jvn.jp/en/jp/JVN44999463/index.html) 2. [](http://www.justsystems.com/jp/info/js13003.html) 3. [JVNDB-2013-000103](http://jvndb.jvn.jp/jvndb/JVNDB-2013-000103)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37556, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37556 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37556 - **State**: PUBLISHED - **Published Date**: July 21, 2024 at 06:53 UTC - **Last Updated**: August 02, 2024 at 03:57 UTC - **Reserved Date**: June 09, 2024 at 18:17 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SeedProd WordPress Notification Bar allows Stored XSS.This issue affects WordPress Notification Bar: from n/a through 1.3.10. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **SeedProd - WordPress Notification Bar** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wordpress-notification-bar/wordpress-wordpress-notification-bar-plugin-1-3-10-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Sharanabasappa (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-23585, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-23585 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-23585 - **State**: PUBLISHED - **Published Date**: November 23, 2022 at 00:00 UTC - **Last Updated**: April 25, 2025 at 20:43 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A remote attacker can conduct a cross-site request forgery (CSRF) attack on OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028. The vulnerability is due to insufficient CSRF protections for the "mgm_config_file.asp" because of which attacker can create a crafted "csrf form" which sends " malicious xml data" to "/boaform/admin/formMgmConfigUpload". the exploit allows attacker to "gain full privileges" and to "fully compromise of router & network". ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/huzaifahussain98/CVE-2020-23585)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3379, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3379 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3379 - **State**: PUBLISHED - **Published Date**: January 27, 2017 at 22:01 UTC - **Last Updated**: October 08, 2024 at 20:20 UTC - **Reserved Date**: December 06, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). ### Affected Products **Oracle - Advanced Outbound Telephony** Affected versions: - 12.1.1 (Status: affected) - 12.1.2 (Status: affected) - 12.1.3 (Status: affected) - 12.2.3 (Status: affected) - 12.2.4 (Status: affected) - 12.2.5 (Status: affected) - 12.2.6 (Status: affected) ### References 1. [95531](http://www.securityfocus.com/bid/95531) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-2247, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-2247 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-2247 - **State**: PUBLISHED - **Published Date**: July 08, 2008 at 23:00 UTC - **Last Updated**: August 07, 2024 at 08:58 UTC - **Reserved Date**: May 16, 2008 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) for Exchange Server 2003 SP2 allows remote attackers to inject arbitrary web script or HTML via unspecified e-mail fields, a different vulnerability than CVE-2008-2248. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-2021](http://www.vupen.com/english/advisories/2008/2021/references) 2. [exchange-owa-email-fields-xss(43328)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43328) 3. [1020439](http://www.securitytracker.com/id?1020439) 4. [30130](http://www.securityfocus.com/bid/30130) 5. [oval:org.mitre.oval:def:5354](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5354) 6. [MS08-039](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-039) 7. [30964](http://secunia.com/advisories/30964) 8. [TA08-190A](http://www.us-cert.gov/cas/techalerts/TA08-190A.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21513, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21513 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21513 - **State**: PUBLISHED - **Published Date**: March 02, 2021 at 16:00 UTC - **Last Updated**: September 16, 2024 at 20:37 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell EMC OpenManage Server Administrator (OMSA) version 9.5 Microsoft Windows installations with Distributed Web Server (DWS) enabled configuration contains an authentication bypass vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to gain admin access on the affected system. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L` ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **Dell - Dell Open Manage Server Administrator** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.tenable.com/security/research/tra-2021-07) 2. [](https://www.dell.com/support/kbdoc/en-us/000183670/dsa-2021-040-dell-emc-openmanage-server-administrator-omsa-security-update-for-multiple-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4682, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4682 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4682 - **State**: PUBLISHED - **Published Date**: June 25, 2013 at 18:00 UTC - **Last Updated**: September 17, 2024 at 01:11 UTC - **Reserved Date**: June 25, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the Multishop extension before 2.0.39 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [53441](http://secunia.com/advisories/53441) 2. [](http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-009-1/) 3. [60271](http://www.securityfocus.com/bid/60271) 4. [](http://typo3.org/extensions/repository/view/multishop)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8833, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8833 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8833 - **State**: PUBLISHED - **Published Date**: January 30, 2015 at 11:00 UTC - **Last Updated**: August 06, 2024 at 13:26 UTC - **Reserved Date**: November 14, 2014 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description SpotlightIndex in Apple OS X before 10.10.2 does not properly perform deserialization during access to a permission cache, which allows local users to read search results associated with other users' protected files via a Spotlight query. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [macosx-cve20148833-info-disc(100529)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100529) 2. [1031650](http://www.securitytracker.com/id/1031650) 3. [](http://support.apple.com/HT204244) 4. [APPLE-SA-2015-01-27-4](http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16758, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16758 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16758 - **State**: PUBLISHED - **Published Date**: November 21, 2019 at 17:56 UTC - **Last Updated**: August 05, 2024 at 01:24 UTC - **Reserved Date**: September 24, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Lexmark Services Monitor 2.27.4.0.39 (running on TCP port 2070), a remote attacker can use a directory traversal technique using /../../../ or ..%2F..%2F..%2F to obtain local files on the host operating system. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/155365/Lexmark-Services-Monitor-2.27.4.0.39-Directory-Traversal.html) 2. [20191119 CVE-2019-16758 Lexmark Services Monitor 2.27.4.0.39 Directory Traversal](http://seclists.org/fulldisclosure/2019/Nov/17) 3. [](https://www.symantec.com/security-center/vulnerabilities/writeup/110943) 4. [](http://support.lexmark.com/index?page=content&id=TE930&locale=en&userlocale=EN_US)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-33274, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-33274 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-33274 - **State**: PUBLISHED - **Published Date**: January 06, 2023 at 05:02 UTC - **Last Updated**: April 09, 2025 at 19:47 UTC - **Reserved Date**: June 14, 2022 at 10:44 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory corruption in android core due to improper validation of array index while returning feature ids after license authentication. ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - QAM8295P (Status: affected) - QCA6574AU (Status: affected) - QCA6696 (Status: affected) - SA6145P (Status: affected) - SA6150P (Status: affected) - SA6155P (Status: affected) - SA8145P (Status: affected) - SA8150P (Status: affected) - SA8155P (Status: affected) - SA8195P (Status: affected) - SA8295P (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13133 - **State**: PUBLISHED - **Published Date**: January 20, 2021 at 01:46 UTC - **Last Updated**: August 04, 2024 at 12:11 UTC - **Reserved Date**: May 18, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tufin SecureChange prior to R19.3 HF3 and R20-1 HF1 are vulnerable to stored XSS. The successful exploitation requires admin privileges (for storing the XSS payload itself), and can exploit (be triggered by) unauthenticated users. All TOS versions with SecureChange deployments prior to R19.3 HF3 and R20-1 HF1 are affected. Vulnerabilities were fixed in R19.3 HF3 and R20-1 HF1 ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://portal.tufin.com/aspx/SecurityAdvisories) 2. [](https://github.com/Accenture/AARO-Bugs/blob/master/AARO-CVE-List.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5529, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5529 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5529 - **State**: PUBLISHED - **Published Date**: July 12, 2018 at 18:00 UTC - **Last Updated**: September 16, 2024 at 18:55 UTC - **Reserved Date**: January 12, 2018 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description The svpn component of the F5 BIG-IP APM client prior to version 7.1.7 for Linux and Mac OS X runs as a privileged process and can allow an unprivileged user to assume super-user privileges on the local client host. A malicious local unprivileged user may gain knowledge of sensitive information, manipulate certain data, or disrupt service. ### Affected Products **F5 Networks, Inc. - BIG-IP APM client for Linux and Mac OSX** Affected versions: - prior to version 7.1.7 (Status: affected) ### References 1. [104730](http://www.securityfocus.com/bid/104730) 2. [](https://support.f5.com/csp/article/K52171282) 3. [](https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2018-5529.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0138, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0138 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0138 - **State**: PUBLISHED - **Published Date**: May 14, 2025 at 18:10 UTC - **Last Updated**: May 14, 2025 at 19:45 UTC - **Reserved Date**: December 20, 2024 at 23:24 UTC - **Assigned By**: palo_alto ### Vulnerability Description Web sessions in the web interface of Palo Alto Networks Prisma® Cloud Compute Edition do not expire when users are deleted, which makes Prisma Cloud Compute Edition susceptible to unauthorized access. Compute in Prisma Cloud Enterprise Edition is not affected by this issue. ### Weakness Classification (CWE) - CWE-613: Security Weakness ### Affected Products **Palo Alto Networks - Prisma Cloud Compute Edition** Affected versions: - 1 (Status: affected) **Palo Alto Networks - Compute in Prisma Cloud Enterprise Edition** Affected versions: - All (Status: unaffected) ### References 1. [](https://security.paloaltonetworks.com/CVE-2025-0138) ### Credits - Maciej Pypec of ING
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4417, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4417 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4417 - **State**: PUBLISHED - **Published Date**: August 18, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 14:53 UTC - **Reserved Date**: August 18, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 does not properly revoke privileges on methods, which allows remote authenticated users to execute a method after revocation until the routine auth cache is flushed. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-1.ibm.com/support/docview.wss?uid=swg21255607) 2. [20070818 Recent DB2 Vulnerabilities](http://www.attrition.org/pipermail/vim/2007-August/001765.html) 3. [ADV-2007-2912](http://www.vupen.com/english/advisories/2007/2912) 4. [IY88158](http://www-1.ibm.com/support/docview.wss?uid=swg1IY88158) 5. [db2-method-privilege-escalation(36108)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36108) 6. [25339](http://www.securityfocus.com/bid/25339) 7. [](http://www-1.ibm.com/support/docview.wss?uid=swg21255352) 8. [26471](http://secunia.com/advisories/26471) 9. [IY88226](http://www-1.ibm.com/support/docview.wss?uid=swg1IY88226)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51780, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51780 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51780 - **State**: PUBLISHED - **Published Date**: November 09, 2024 at 09:21 UTC - **Last Updated**: November 09, 2024 at 15:20 UTC - **Reserved Date**: November 04, 2024 at 09:57 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael DUMONTET eewee admin custom allows Reflected XSS.This issue affects eewee admin custom: from n/a through 1.8.2.4. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Michael DUMONTET - eewee admin custom** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/eewee-admincustom/wordpress-eewee-admin-custom-plugin-1-8-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5058, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5058 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5058 - **State**: PUBLISHED - **Published Date**: June 21, 2024 at 11:37 UTC - **Last Updated**: August 01, 2024 at 21:03 UTC - **Reserved Date**: May 17, 2024 at 10:11 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPDeveloper Typing Text allows Stored XSS.This issue affects Typing Text: from n/a through 1.2.5. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **WPDeveloper - Typing Text** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/typing-text/wordpress-typing-text-plugin-1-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - vps1- (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1577, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1577 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1577 - **State**: PUBLISHED - **Published Date**: April 02, 2006 at 21:00 UTC - **Last Updated**: August 07, 2024 at 17:19 UTC - **Reserved Date**: April 02, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in view_all_set.php in Mantis 1.0.1, 1.0.0rc5, and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) start_day, (2) start_year, and (3) start_month parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19471](http://secunia.com/advisories/19471) 2. [17326](http://www.securityfocus.com/bid/17326) 3. [24292](http://www.osvdb.org/24292) 4. [21400](http://secunia.com/advisories/21400) 5. [DSA-1133](http://www.debian.org/security/2006/dsa-1133) 6. [ADV-2006-1184](http://www.vupen.com/english/advisories/2006/1184) 7. [mantis-viewallset-script-xss(25579)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25579) 8. [](http://pridels0.blogspot.com/2006/03/mantis-xss-vuln.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32205, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32205 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32205 - **State**: PUBLISHED - **Published Date**: April 10, 2025 at 08:09 UTC - **Last Updated**: April 10, 2025 at 13:05 UTC - **Reserved Date**: April 04, 2025 at 10:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in piotnetdotcom Piotnet Forms. This issue affects Piotnet Forms: from n/a through 1.0.30. ### CVSS Metrics - **CVSS Base Score**: 2.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **piotnetdotcom - Piotnet Forms** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/piotnetforms/vulnerability/wordpress-piotnetforms-plugin-1-0-30-path-traversal-vulnerability?_s_id=cve) ### Credits - Trương Hữu Phúc (truonghuuphuc) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28539, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28539 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28539 - **State**: PUBLISHED - **Published Date**: October 03, 2023 at 05:00 UTC - **Last Updated**: February 27, 2025 at 20:47 UTC - **Reserved Date**: March 17, 2023 at 11:41 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory corruption in WLAN Host when the firmware invokes multiple WMI Service Available command. ### CVSS Metrics - **CVSS Base Score**: 6.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - AR8035 (Status: affected) - AR9380 (Status: affected) - CSR8811 (Status: affected) - CSRB31024 (Status: affected) - FastConnect 6800 (Status: affected) - FastConnect 6900 (Status: affected) - FastConnect 7800 (Status: affected) - Flight RB5 5G Platform (Status: affected) - Immersive Home 214 Platform (Status: affected) - Immersive Home 216 Platform (Status: affected) - Immersive Home 316 Platform (Status: affected) - Immersive Home 318 Platform (Status: affected) - Immersive Home 3210 Platform (Status: affected) - Immersive Home 326 Platform (Status: affected) - IPQ4019 (Status: affected) - IPQ4028 (Status: affected) - IPQ4029 (Status: affected) - IPQ5010 (Status: affected) - IPQ5028 (Status: affected) - IPQ6000 (Status: affected) - IPQ6010 (Status: affected) - IPQ6018 (Status: affected) - IPQ6028 (Status: affected) - IPQ8064 (Status: affected) - IPQ8065 (Status: affected) - IPQ8068 (Status: affected) - IPQ8070A (Status: affected) - IPQ8071A (Status: affected) - IPQ8072A (Status: affected) - IPQ8074A (Status: affected) - IPQ8076 (Status: affected) - IPQ8076A (Status: affected) - IPQ8078 (Status: affected) - IPQ8078A (Status: affected) - IPQ8173 (Status: affected) - IPQ8174 (Status: affected) - IPQ9008 (Status: affected) - IPQ9574 (Status: affected) - QAM8255P (Status: affected) - QAM8295P (Status: affected) - QCA4024 (Status: affected) - QCA6175A (Status: affected) - QCA6310 (Status: affected) - QCA6320 (Status: affected) - QCA6391 (Status: affected) - QCA6421 (Status: affected) - QCA6426 (Status: affected) - QCA6431 (Status: affected) - QCA6436 (Status: affected) - QCA6554A (Status: affected) - QCA6564AU (Status: affected) - QCA6574 (Status: affected) - QCA6574A (Status: affected) - QCA6574AU (Status: affected) - QCA6584AU (Status: affected) - QCA6595 (Status: affected) - QCA6595AU (Status: affected) - QCA6678AQ (Status: affected) - QCA6696 (Status: affected) - QCA6698AQ (Status: affected) - QCA6797AQ (Status: affected) - QCA7500 (Status: affected) - QCA8075 (Status: affected) - QCA8081 (Status: affected) - QCA8082 (Status: affected) - QCA8084 (Status: affected) - QCA8085 (Status: affected) - QCA8337 (Status: affected) - QCA8386 (Status: affected) - QCA9880 (Status: affected) - QCA9886 (Status: affected) - QCA9888 (Status: affected) - QCA9889 (Status: affected) - QCA9898 (Status: affected) - QCA9980 (Status: affected) - QCA9984 (Status: affected) - QCA9985 (Status: affected) - QCA9990 (Status: affected) - QCA9992 (Status: affected) - QCA9994 (Status: affected) - QCC2073 (Status: affected) - QCC2076 (Status: affected) - QCC710 (Status: affected) - QCN5022 (Status: affected) - QCN5024 (Status: affected) - QCN5052 (Status: affected) - QCN5122 (Status: affected) - QCN5124 (Status: affected) - QCN5152 (Status: affected) - QCN5154 (Status: affected) - QCN5164 (Status: affected) - QCN6023 (Status: affected) - QCN6024 (Status: affected) - QCN6112 (Status: affected) - QCN6122 (Status: affected) - QCN6132 (Status: affected) - QCN6224 (Status: affected) - QCN6274 (Status: affected) - QCN9000 (Status: affected) - QCN9011 (Status: affected) - QCN9012 (Status: affected) - QCN9022 (Status: affected) - QCN9024 (Status: affected) - QCN9070 (Status: affected) - QCN9072 (Status: affected) - QCN9074 (Status: affected) - QCN9100 (Status: affected) - QCN9274 (Status: affected) - QCS410 (Status: affected) - QCS610 (Status: affected) - QFW7114 (Status: affected) - QFW7124 (Status: affected) - QRB5165M (Status: affected) - QRB5165N (Status: affected) - Qualcomm Video Collaboration VC1 Platform (Status: affected) - Qualcomm Video Collaboration VC3 Platform (Status: affected) - Robotics RB5 Platform (Status: affected) - SA6145P (Status: affected) - SA6150P (Status: affected) - SA6155P (Status: affected) - SA8145P (Status: affected) - SA8150P (Status: affected) - SA8155P (Status: affected) - SA8195P (Status: affected) - SA8255P (Status: affected) - SA8295P (Status: affected) - SD835 (Status: affected) - SD865 5G (Status: affected) - SDX55 (Status: affected) - SDX65M (Status: affected) - Snapdragon 835 Mobile PC Platform (Status: affected) - Snapdragon 865 5G Mobile Platform (Status: affected) - Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected) - Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected) - Snapdragon Auto 5G Modem-RF (Status: affected) - Snapdragon W5+ Gen 1 Wearable Platform (Status: affected) - Snapdragon X55 5G Modem-RF System (Status: affected) - Snapdragon X65 5G Modem-RF System (Status: affected) - Snapdragon X75 5G Modem-RF System (Status: affected) - Snapdragon XR2 5G Platform (Status: affected) - Snapdragon Auto 4G Modem (Status: affected) - SW5100 (Status: affected) - SW5100P (Status: affected) - SXR2130 (Status: affected) - WCD9335 (Status: affected) - WCD9340 (Status: affected) - WCD9341 (Status: affected) - WCD9380 (Status: affected) - WCD9385 (Status: affected) - WCN3950 (Status: affected) - WCN3980 (Status: affected) - WCN3988 (Status: affected) - WCN3990 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) - WSA8830 (Status: affected) - WSA8835 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7514, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7514 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7514 - **State**: PUBLISHED - **Published Date**: April 17, 2018 at 19:00 UTC - **Last Updated**: September 16, 2024 at 23:35 UTC - **Reserved Date**: February 26, 2018 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **ICS-CERT - Omron CX-One** Affected versions: - The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior. (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2105, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2105 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2105 - **State**: PUBLISHED - **Published Date**: April 26, 2025 at 05:34 UTC - **Last Updated**: April 28, 2025 at 21:56 UTC - **Reserved Date**: March 07, 2025 at 19:42 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Jupiter X Core plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.8.11 via deserialization of untrusted input from the 'file' parameter of the 'raven_download_file' function. This makes it possible for attackers to inject a PHP Object through a PHAR file. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. This vulnerability may be exploited by unauthenticated attackers when a form is present on the site with the file download action, and the ability to upload files is also present. Otherwise, this would be considered exploitable by Contributor-level users and above, because they could create the form needed to successfully exploit this. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **artbees - Jupiter X Core** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3427387e-30d2-40a5-9bfd-d458039d8e2e?source=cve) 2. [](https://wordpress.org/plugins/jupiterx-core/) 3. [](https://plugins.trac.wordpress.org/changeset/3279676/jupiterx-core/trunk/includes/extensions/raven/includes/utils.php) ### Credits - Nguyen Tan Phat
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49081, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49081 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49081 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 01:54 UTC - **Last Updated**: May 04, 2025 at 08:29 UTC - **Reserved Date**: February 26, 2025 at 01:49 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: highmem: fix checks in __kmap_local_sched_{in,out} When CONFIG_DEBUG_KMAP_LOCAL is enabled __kmap_local_sched_{in,out} check that even slots in the tsk->kmap_ctrl.pteval are unmapped. The slots are initialized with 0 value, but the check is done with pte_none. 0 pte however does not necessarily mean that pte_none will return true. e.g. on xtensa it returns false, resulting in the following runtime warnings: WARNING: CPU: 0 PID: 101 at mm/highmem.c:627 __kmap_local_sched_out+0x51/0x108 CPU: 0 PID: 101 Comm: touch Not tainted 5.17.0-rc7-00010-gd3a1cdde80d2-dirty #13 Call Trace: dump_stack+0xc/0x40 __warn+0x8f/0x174 warn_slowpath_fmt+0x48/0xac __kmap_local_sched_out+0x51/0x108 __schedule+0x71a/0x9c4 preempt_schedule_irq+0xa0/0xe0 common_exception_return+0x5c/0x93 do_wp_page+0x30e/0x330 handle_mm_fault+0xa70/0xc3c do_page_fault+0x1d8/0x3c4 common_exception+0x7f/0x7f WARNING: CPU: 0 PID: 101 at mm/highmem.c:664 __kmap_local_sched_in+0x50/0xe0 CPU: 0 PID: 101 Comm: touch Tainted: G W 5.17.0-rc7-00010-gd3a1cdde80d2-dirty #13 Call Trace: dump_stack+0xc/0x40 __warn+0x8f/0x174 warn_slowpath_fmt+0x48/0xac __kmap_local_sched_in+0x50/0xe0 finish_task_switch$isra$0+0x1ce/0x2f8 __schedule+0x86e/0x9c4 preempt_schedule_irq+0xa0/0xe0 common_exception_return+0x5c/0x93 do_wp_page+0x30e/0x330 handle_mm_fault+0xa70/0xc3c do_page_fault+0x1d8/0x3c4 common_exception+0x7f/0x7f Fix it by replacing !pte_none(pteval) with pte_val(pteval) != 0. ### Affected Products **Linux - Linux** Affected versions: - 5fbda3ecd14a5343644979c98d6eb65b7e7de9d8 (Status: affected) - 5fbda3ecd14a5343644979c98d6eb65b7e7de9d8 (Status: affected) - 5fbda3ecd14a5343644979c98d6eb65b7e7de9d8 (Status: affected) - 5fbda3ecd14a5343644979c98d6eb65b7e7de9d8 (Status: affected) **Linux - Linux** Affected versions: - 5.11 (Status: affected) - 0 (Status: unaffected) - 5.15.34 (Status: unaffected) - 5.16.20 (Status: unaffected) - 5.17.3 (Status: unaffected) - 5.18 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/c21d040de6225414547d9bd31cd200f290991c85) 2. [](https://git.kernel.org/stable/c/85550b0f5fa5dd3c30469ea702c44444ef242c83) 3. [](https://git.kernel.org/stable/c/7dd5b3b97716a611fcf67d92fd2370fcb8d50372) 4. [](https://git.kernel.org/stable/c/66f133ceab7456c789f70a242991ed1b27ba1c3d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3147, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3147 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3147 - **State**: PUBLISHED - **Published Date**: July 10, 2013 at 01:00 UTC - **Last Updated**: August 06, 2024 at 16:00 UTC - **Reserved Date**: April 17, 2013 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS13-055](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-055) 2. [oval:org.mitre.oval:def:16966](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16966) 3. [TA13-190A](http://www.us-cert.gov/ncas/alerts/TA13-190A)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2474 - **State**: PUBLISHED - **Published Date**: January 16, 2019 at 19:00 UTC - **Last Updated**: October 02, 2024 at 16:10 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ### Affected Products **Oracle Corporation - Outside In Technology** Affected versions: - 8.5.3 (Status: affected) - 8.5.4 (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html) 2. [106569](http://www.securityfocus.com/bid/106569)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7065, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7065 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7065 - **State**: PUBLISHED - **Published Date**: July 24, 2024 at 09:31 UTC - **Last Updated**: August 01, 2024 at 21:52 UTC - **Reserved Date**: July 24, 2024 at 04:42 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Spina CMS up to 2.18.0. It has been classified as problematic. Affected is an unknown function of the file /admin/pages/. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-272346 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Spina - CMS** Affected versions: - 2.0 (Status: affected) - 2.1 (Status: affected) - 2.2 (Status: affected) - 2.3 (Status: affected) - 2.4 (Status: affected) - 2.5 (Status: affected) - 2.6 (Status: affected) - 2.7 (Status: affected) - 2.8 (Status: affected) - 2.9 (Status: affected) - 2.10 (Status: affected) - 2.11 (Status: affected) - 2.12 (Status: affected) - 2.13 (Status: affected) - 2.14 (Status: affected) - 2.15 (Status: affected) - 2.16 (Status: affected) - 2.17 (Status: affected) - 2.18 (Status: affected) ### References 1. [VDB-272346 | Spina CMS cross-site request forgery](https://vuldb.com/?id.272346) 2. [VDB-272346 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.272346) 3. [Submit #375236 | SpinaCMS Spina CMS v2.18.0 Cross-Site Request Forgery](https://vuldb.com/?submit.375236) 4. [](https://github.com/topsky979/Security-Collections/blob/main/1700810/README.md) ### Credits - xingfudeshi (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-56045, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-56045 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-56045 - **State**: PUBLISHED - **Published Date**: December 31, 2024 at 13:17 UTC - **Last Updated**: December 31, 2024 at 15:25 UTC - **Reserved Date**: December 14, 2024 at 19:42 UTC - **Assigned By**: Patchstack ### Vulnerability Description Path Traversal: '.../...//' vulnerability in VibeThemes WPLMS allows Path Traversal.This issue affects WPLMS: from n/a before 1.9.9.5. ### CVSS Metrics - **CVSS Base Score**: 9.3/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H` ### Weakness Classification (CWE) - CWE-35: Security Weakness ### Affected Products **VibeThemes - WPLMS** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wplms-plugin/vulnerability/wordpress-wplms-plugin-1-9-9-5-unauthenticated-arbitrary-directory-deletion-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14765, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14765 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14765 - **State**: PUBLISHED - **Published Date**: January 21, 2020 at 15:32 UTC - **Last Updated**: August 05, 2024 at 00:26 UTC - **Reserved Date**: August 07, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Incorrect Access Control in AfficheExplorateurParam() in DIMO YellowBox CRM before 6.3.4 allows a standard authenticated user to use administrative controllers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.dimo-crm.fr/blog-crm/) 2. [](https://gist.github.com/sm0k/5de26614282669b0bcfa719b87c17305)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31249, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31249 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31249 - **State**: PUBLISHED - **Published Date**: February 07, 2023 at 00:00 UTC - **Last Updated**: March 25, 2025 at 15:40 UTC - **Reserved Date**: May 20, 2022 at 00:00 UTC - **Assigned By**: suse ### Vulnerability Description A Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in wrangler of SUSE Rancher allows remote attackers to inject commands in the underlying host via crafted commands passed to Wrangler. This issue affects: SUSE Rancher wrangler version 0.7.3 and prior versions; wrangler version 0.8.4 and prior versions; wrangler version 1.0.0 and prior versions. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **SUSE - Rancher** Affected versions: - wrangler (Status: affected) ### References 1. [](https://bugzilla.suse.com/show_bug.cgi?id=1200299)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20109, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20109 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20109 - **State**: PUBLISHED - **Published Date**: September 27, 2023 at 17:23 UTC - **Last Updated**: October 23, 2024 at 18:53 UTC - **Reserved Date**: October 27, 2022 at 18:47 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or cause the device to crash. This vulnerability is due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this vulnerability by either compromising an installed key server or modifying the configuration of a group member to point to a key server that is controlled by the attacker. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details ["#details"] section of this advisory. ### CVSS Metrics - **CVSS Base Score**: 6.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Cisco - IOS** Affected versions: - 12.4(24)T (Status: affected) - 12.4(24)T3 (Status: affected) - 12.4(22)T1 (Status: affected) - 12.4(24)T5 (Status: affected) - 12.4(24)T4 (Status: affected) - 12.4(22)T (Status: affected) - 12.4(24)T8 (Status: affected) - 12.4(24)T2 (Status: affected) - 12.4(22)T5 (Status: affected) - 12.4(22)T4 (Status: affected) - 12.4(24)T1 (Status: affected) - 12.4(24)T7 (Status: affected) - 12.4(22)T3 (Status: affected) - 12.4(24)T6 (Status: affected) - 12.4(22)T2 (Status: affected) - 12.4(24)T4a (Status: affected) - 12.4(24)T4b (Status: affected) - 12.4(24)T3e (Status: affected) - 12.4(24)T4c (Status: affected) - 12.4(24)T4d (Status: affected) - 12.4(24)T4e (Status: affected) - 12.4(24)T3f (Status: affected) - 12.4(24)T4f (Status: affected) - 12.4(24)T4l (Status: affected) - 12.4(24)MD1 (Status: affected) - 12.4(24)MD (Status: affected) - 12.4(24)MD3 (Status: affected) - 12.4(24)MD2 (Status: affected) - 12.4(22)MD1 (Status: affected) - 12.4(22)MD2 (Status: affected) - 12.4(24)MD5 (Status: affected) - 12.4(22)MD (Status: affected) - 12.4(24)MD4 (Status: affected) - 12.4(24)MD6 (Status: affected) - 12.4(24)MD7 (Status: affected) - 12.4(22)XR5 (Status: affected) - 12.4(22)XR4 (Status: affected) - 12.4(22)XR7 (Status: affected) - 12.4(22)XR2 (Status: affected) - 12.4(22)XR6 (Status: affected) - 12.4(22)XR10 (Status: affected) - 12.4(22)XR1 (Status: affected) - 12.4(22)XR9 (Status: affected) - 12.4(22)XR3 (Status: affected) - 12.4(22)XR8 (Status: affected) - 12.4(22)XR11 (Status: affected) - 12.4(22)XR12 (Status: affected) - 12.4(22)MDA3 (Status: affected) - 12.4(24)MDA5 (Status: affected) - 12.4(22)MDA5 (Status: affected) - 12.4(24)MDA3 (Status: affected) - 12.4(22)MDA4 (Status: affected) - 12.4(24)MDA4 (Status: affected) - 12.4(24)MDA1 (Status: affected) - 12.4(22)MDA (Status: affected) - 12.4(22)MDA2 (Status: affected) - 12.4(22)MDA1 (Status: affected) - 12.4(24)MDA2 (Status: affected) - 12.4(22)MDA6 (Status: affected) - 12.4(24)MDA6 (Status: affected) - 12.4(24)MDA7 (Status: affected) - 12.4(24)MDA8 (Status: affected) - 12.4(24)MDA10 (Status: affected) - 12.4(24)MDA9 (Status: affected) - 12.4(24)MDA11 (Status: affected) - 12.4(24)MDA12 (Status: affected) - 12.4(24)MDA13 (Status: affected) - 12.4(24)YG3 (Status: affected) - 12.4(24)YG4 (Status: affected) - 12.4(24)YG1 (Status: affected) - 12.4(24)YG2 (Status: affected) - 12.4(24)YG (Status: affected) - 15.0(1)M1 (Status: affected) - 15.0(1)M5 (Status: affected) - 15.0(1)M4 (Status: affected) - 15.0(1)M3 (Status: affected) - 15.0(1)M2 (Status: affected) - 15.0(1)M6 (Status: affected) - 15.0(1)M (Status: affected) - 15.0(1)M7 (Status: affected) - 15.0(1)M10 (Status: affected) - 15.0(1)M9 (Status: affected) - 15.0(1)M8 (Status: affected) - 15.0(1)XA2 (Status: affected) - 15.0(1)XA4 (Status: affected) - 15.0(1)XA1 (Status: affected) - 15.0(1)XA3 (Status: affected) - 15.0(1)XA (Status: affected) - 15.0(1)XA5 (Status: affected) - 15.1(2)T (Status: affected) - 15.1(1)T4 (Status: affected) - 15.1(3)T2 (Status: affected) - 15.1(1)T1 (Status: affected) - 15.1(2)T0a (Status: affected) - 15.1(3)T3 (Status: affected) - 15.1(1)T3 (Status: affected) - 15.1(2)T3 (Status: affected) - 15.1(2)T4 (Status: affected) - 15.1(1)T2 (Status: affected) - 15.1(3)T (Status: affected) - 15.1(2)T2a (Status: affected) - 15.1(3)T1 (Status: affected) - 15.1(1)T (Status: affected) - 15.1(2)T2 (Status: affected) - 15.1(2)T1 (Status: affected) - 15.1(2)T5 (Status: affected) - 15.1(3)T4 (Status: affected) - 15.1(1)T5 (Status: affected) - 15.1(1)XB (Status: affected) - 15.0(1)S2 (Status: affected) - 15.0(1)S1 (Status: affected) - 15.0(1)S (Status: affected) - 15.0(1)S3a (Status: affected) - 15.0(1)S4 (Status: affected) - 15.0(1)S5 (Status: affected) - 15.0(1)S4a (Status: affected) - 15.0(1)S6 (Status: affected) - 15.2(1)S (Status: affected) - 15.2(2)S (Status: affected) - 15.2(1)S1 (Status: affected) - 15.2(4)S (Status: affected) - 15.2(1)S2 (Status: affected) - 15.2(2)S1 (Status: affected) - 15.2(2)S2 (Status: affected) - 15.2(2)S0a (Status: affected) - 15.2(2)S0c (Status: affected) - 15.2(4)S1 (Status: affected) - 15.2(4)S4 (Status: affected) - 15.2(4)S6 (Status: affected) - 15.2(4)S2 (Status: affected) - 15.2(4)S5 (Status: affected) - 15.2(4)S3 (Status: affected) - 15.2(4)S3a (Status: affected) - 15.2(4)S4a (Status: affected) - 15.2(4)S7 (Status: affected) - 15.3(1)T (Status: affected) - 15.3(2)T (Status: affected) - 15.3(1)T1 (Status: affected) - 15.3(1)T2 (Status: affected) - 15.3(1)T3 (Status: affected) - 15.3(1)T4 (Status: affected) - 15.3(2)T1 (Status: affected) - 15.3(2)T2 (Status: affected) - 15.3(2)T3 (Status: affected) - 15.3(2)T4 (Status: affected) - 15.0(2)EY (Status: affected) - 15.0(2)EY1 (Status: affected) - 15.0(2)EY2 (Status: affected) - 15.0(2)EY3 (Status: affected) - 15.1(2)S (Status: affected) - 15.1(1)S (Status: affected) - 15.1(1)S1 (Status: affected) - 15.1(3)S (Status: affected) - 15.1(1)S2 (Status: affected) - 15.1(2)S1 (Status: affected) - 15.1(2)S2 (Status: affected) - 15.1(3)S1 (Status: affected) - 15.1(3)S0a (Status: affected) - 15.1(3)S2 (Status: affected) - 15.1(3)S4 (Status: affected) - 15.1(3)S3 (Status: affected) - 15.1(3)S5 (Status: affected) - 15.1(3)S6 (Status: affected) - 15.1(3)S5a (Status: affected) - 15.1(4)M3 (Status: affected) - 15.1(4)M (Status: affected) - 15.1(4)M1 (Status: affected) - 15.1(4)M2 (Status: affected) - 15.1(4)M6 (Status: affected) - 15.1(4)M5 (Status: affected) - 15.1(4)M4 (Status: affected) - 15.1(4)M7 (Status: affected) - 15.1(4)M3a (Status: affected) - 15.1(4)M10 (Status: affected) - 15.1(4)M8 (Status: affected) - 15.1(4)M9 (Status: affected) - 15.0(2)SE (Status: affected) - 15.0(2)SE1 (Status: affected) - 15.0(2)SE2 (Status: affected) - 15.0(2)SE3 (Status: affected) - 15.0(2)SE4 (Status: affected) - 15.0(2)SE5 (Status: affected) - 15.0(2)SE6 (Status: affected) - 15.0(2)SE7 (Status: affected) - 15.0(2)SE8 (Status: affected) - 15.0(2)SE9 (Status: affected) - 15.0(2)SE10 (Status: affected) - 15.0(2)SE11 (Status: affected) - 15.0(2)SE10a (Status: affected) - 15.0(2)SE12 (Status: affected) - 15.0(2)SE13 (Status: affected) - 15.1(2)GC (Status: affected) - 15.1(2)GC1 (Status: affected) - 15.1(2)GC2 (Status: affected) - 15.1(4)GC (Status: affected) - 15.1(4)GC1 (Status: affected) - 15.1(4)GC2 (Status: affected) - 15.1(1)SG (Status: affected) - 15.1(2)SG (Status: affected) - 15.1(1)SG1 (Status: affected) - 15.1(1)SG2 (Status: affected) - 15.1(2)SG1 (Status: affected) - 15.1(2)SG2 (Status: affected) - 15.1(2)SG3 (Status: affected) - 15.1(2)SG4 (Status: affected) - 15.1(2)SG5 (Status: affected) - 15.1(2)SG6 (Status: affected) - 15.1(2)SG7 (Status: affected) - 15.1(2)SG8 (Status: affected) - 15.0(1)MR (Status: affected) - 15.0(2)MR (Status: affected) - 15.2(4)M (Status: affected) - 15.2(4)M1 (Status: affected) - 15.2(4)M2 (Status: affected) - 15.2(4)M4 (Status: affected) - 15.2(4)M3 (Status: affected) - 15.2(4)M5 (Status: affected) - 15.2(4)M8 (Status: affected) - 15.2(4)M10 (Status: affected) - 15.2(4)M7 (Status: affected) - 15.2(4)M6 (Status: affected) - 15.2(4)M9 (Status: affected) - 15.2(4)M6a (Status: affected) - 15.2(4)M11 (Status: affected) - 12.4(24)MDB (Status: affected) - 12.4(24)MDB1 (Status: affected) - 12.4(24)MDB3 (Status: affected) - 12.4(24)MDB4 (Status: affected) - 12.4(24)MDB5 (Status: affected) - 12.4(24)MDB6 (Status: affected) - 12.4(24)MDB7 (Status: affected) - 12.4(24)MDB5a (Status: affected) - 12.4(24)MDB8 (Status: affected) - 12.4(24)MDB9 (Status: affected) - 12.4(24)MDB10 (Status: affected) - 12.4(24)MDB11 (Status: affected) - 12.4(24)MDB12 (Status: affected) - 12.4(24)MDB13 (Status: affected) - 12.4(24)MDB14 (Status: affected) - 12.4(24)MDB15 (Status: affected) - 12.4(24)MDB16 (Status: affected) - 12.4(24)MDB17 (Status: affected) - 12.4(24)MDB18 (Status: affected) - 12.4(24)MDB19 (Status: affected) - 15.0(2)EX (Status: affected) - 15.0(2)EX1 (Status: affected) - 15.0(2)EX2 (Status: affected) - 15.0(2)EX3 (Status: affected) - 15.0(2)EX4 (Status: affected) - 15.0(2)EX5 (Status: affected) - 15.0(2)EX8 (Status: affected) - 15.0(2a)EX5 (Status: affected) - 15.0(2)EX10 (Status: affected) - 15.0(2)EX11 (Status: affected) - 15.0(2)EX13 (Status: affected) - 15.0(2)EX12 (Status: affected) - 15.2(1)GC (Status: affected) - 15.2(1)GC1 (Status: affected) - 15.2(1)GC2 (Status: affected) - 15.2(2)GC (Status: affected) - 15.2(3)GC (Status: affected) - 15.2(3)GC1 (Status: affected) - 15.2(4)GC (Status: affected) - 15.2(4)GC1 (Status: affected) - 15.2(4)GC2 (Status: affected) - 15.2(4)GC3 (Status: affected) - 15.1(1)SY (Status: affected) - 15.1(1)SY1 (Status: affected) - 15.1(2)SY (Status: affected) - 15.1(2)SY1 (Status: affected) - 15.1(2)SY2 (Status: affected) - 15.1(1)SY2 (Status: affected) - 15.1(1)SY3 (Status: affected) - 15.1(2)SY3 (Status: affected) - 15.1(1)SY4 (Status: affected) - 15.1(2)SY4 (Status: affected) - 15.1(1)SY5 (Status: affected) - 15.1(2)SY5 (Status: affected) - 15.1(2)SY4a (Status: affected) - 15.1(1)SY6 (Status: affected) - 15.1(2)SY6 (Status: affected) - 15.1(2)SY7 (Status: affected) - 15.1(2)SY8 (Status: affected) - 15.1(2)SY9 (Status: affected) - 15.1(2)SY10 (Status: affected) - 15.1(2)SY11 (Status: affected) - 15.1(2)SY12 (Status: affected) - 15.1(2)SY13 (Status: affected) - 15.1(2)SY14 (Status: affected) - 15.1(2)SY15 (Status: affected) - 15.1(2)SY16 (Status: affected) - 15.3(1)S (Status: affected) - 15.3(2)S (Status: affected) - 15.3(3)S (Status: affected) - 15.3(1)S2 (Status: affected) - 15.3(1)S1 (Status: affected) - 15.3(2)S2 (Status: affected) - 15.3(2)S1 (Status: affected) - 15.3(3)S1 (Status: affected) - 15.3(3)S2 (Status: affected) - 15.3(3)S3 (Status: affected) - 15.3(3)S6 (Status: affected) - 15.3(3)S4 (Status: affected) - 15.3(3)S1a (Status: affected) - 15.3(3)S5 (Status: affected) - 15.3(3)S7 (Status: affected) - 15.3(3)S8 (Status: affected) - 15.3(3)S9 (Status: affected) - 15.3(3)S10 (Status: affected) - 15.3(3)S8a (Status: affected) - 15.4(1)T (Status: affected) - 15.4(2)T (Status: affected) - 15.4(1)T2 (Status: affected) - 15.4(1)T1 (Status: affected) - 15.4(1)T3 (Status: affected) - 15.4(2)T1 (Status: affected) - 15.4(2)T3 (Status: affected) - 15.4(2)T2 (Status: affected) - 15.4(1)T4 (Status: affected) - 15.4(2)T4 (Status: affected) - 15.0(2)EA (Status: affected) - 15.0(2)EA1 (Status: affected) - 15.2(1)E (Status: affected) - 15.2(2)E (Status: affected) - 15.2(1)E1 (Status: affected) - 15.2(3)E (Status: affected) - 15.2(1)E2 (Status: affected) - 15.2(1)E3 (Status: affected) - 15.2(2)E1 (Status: affected) - 15.2(4)E (Status: affected) - 15.2(3)E1 (Status: affected) - 15.2(2)E2 (Status: affected) - 15.2(2a)E1 (Status: affected) - 15.2(2)E3 (Status: affected) - 15.2(2a)E2 (Status: affected) - 15.2(3)E2 (Status: affected) - 15.2(3a)E (Status: affected) - 15.2(3)E3 (Status: affected) - 15.2(4)E1 (Status: affected) - 15.2(2)E4 (Status: affected) - 15.2(2)E5 (Status: affected) - 15.2(4)E2 (Status: affected) - 15.2(3)E4 (Status: affected) - 15.2(5)E (Status: affected) - 15.2(4)E3 (Status: affected) - 15.2(2)E6 (Status: affected) - 15.2(5a)E (Status: affected) - 15.2(5)E1 (Status: affected) - 15.2(5b)E (Status: affected) - 15.2(2)E5a (Status: affected) - 15.2(5c)E (Status: affected) - 15.2(3)E5 (Status: affected) - 15.2(2)E5b (Status: affected) - 15.2(5a)E1 (Status: affected) - 15.2(4)E4 (Status: affected) - 15.2(2)E7 (Status: affected) - 15.2(5)E2 (Status: affected) - 15.2(6)E (Status: affected) - 15.2(5)E2b (Status: affected) - 15.2(4)E5 (Status: affected) - 15.2(5)E2c (Status: affected) - 15.2(2)E8 (Status: affected) - 15.2(6)E0a (Status: affected) - 15.2(6)E1 (Status: affected) - 15.2(2)E7b (Status: affected) - 15.2(4)E5a (Status: affected) - 15.2(6)E0c (Status: affected) - 15.2(4)E6 (Status: affected) - 15.2(6)E2 (Status: affected) - 15.2(2)E9 (Status: affected) - 15.2(4)E7 (Status: affected) - 15.2(7)E (Status: affected) - 15.2(2)E10 (Status: affected) - 15.2(4)E8 (Status: affected) - 15.2(6)E2a (Status: affected) - 15.2(6)E2b (Status: affected) - 15.2(7)E1 (Status: affected) - 15.2(7)E0a (Status: affected) - 15.2(7)E0b (Status: affected) - 15.2(7)E0s (Status: affected) - 15.2(6)E3 (Status: affected) - 15.2(4)E9 (Status: affected) - 15.2(7)E2 (Status: affected) - 15.2(7a)E0b (Status: affected) - 15.2(4)E10 (Status: affected) - 15.2(7)E3 (Status: affected) - 15.2(7)E1a (Status: affected) - 15.2(7b)E0b (Status: affected) - 15.2(7)E2a (Status: affected) - 15.2(4)E10a (Status: affected) - 15.2(7)E4 (Status: affected) - 15.2(7)E3k (Status: affected) - 15.2(8)E (Status: affected) - 15.2(8)E1 (Status: affected) - 15.2(7)E5 (Status: affected) - 15.2(7)E6 (Status: affected) - 15.2(8)E2 (Status: affected) - 15.2(4)E10d (Status: affected) - 15.2(7)E7 (Status: affected) - 15.2(8)E3 (Status: affected) - 15.2(7)E8 (Status: affected) - 15.2(8)E4 (Status: affected) - 15.1(3)MRA (Status: affected) - 15.1(3)MRA1 (Status: affected) - 15.1(3)MRA2 (Status: affected) - 15.1(3)MRA3 (Status: affected) - 15.1(3)MRA4 (Status: affected) - 15.1(3)SVB1 (Status: affected) - 15.1(3)SVB2 (Status: affected) - 15.4(1)S (Status: affected) - 15.4(2)S (Status: affected) - 15.4(3)S (Status: affected) - 15.4(1)S1 (Status: affected) - 15.4(1)S2 (Status: affected) - 15.4(2)S1 (Status: affected) - 15.4(1)S3 (Status: affected) - 15.4(3)S1 (Status: affected) - 15.4(2)S2 (Status: affected) - 15.4(3)S2 (Status: affected) - 15.4(3)S3 (Status: affected) - 15.4(1)S4 (Status: affected) - 15.4(2)S3 (Status: affected) - 15.4(2)S4 (Status: affected) - 15.4(3)S4 (Status: affected) - 15.4(3)S5 (Status: affected) - 15.4(3)S6 (Status: affected) - 15.4(3)S7 (Status: affected) - 15.4(3)S6a (Status: affected) - 15.4(3)S8 (Status: affected) - 15.4(3)S9 (Status: affected) - 15.4(3)S10 (Status: affected) - 15.3(3)M (Status: affected) - 15.3(3)M1 (Status: affected) - 15.3(3)M2 (Status: affected) - 15.3(3)M3 (Status: affected) - 15.3(3)M5 (Status: affected) - 15.3(3)M4 (Status: affected) - 15.3(3)M6 (Status: affected) - 15.3(3)M7 (Status: affected) - 15.3(3)M8 (Status: affected) - 15.3(3)M9 (Status: affected) - 15.3(3)M10 (Status: affected) - 15.3(3)M8a (Status: affected) - 15.0(2)EZ (Status: affected) - 15.1(3)SVD (Status: affected) - 15.1(3)SVD1 (Status: affected) - 15.1(3)SVD2 (Status: affected) - 15.2(1)EY (Status: affected) - 15.0(2)EJ (Status: affected) - 15.0(2)EJ1 (Status: affected) - 15.2(1)SY (Status: affected) - 15.2(1)SY1 (Status: affected) - 15.2(1)SY0a (Status: affected) - 15.2(1)SY2 (Status: affected) - 15.2(2)SY (Status: affected) - 15.2(1)SY1a (Status: affected) - 15.2(2)SY1 (Status: affected) - 15.2(2)SY2 (Status: affected) - 15.2(1)SY3 (Status: affected) - 15.2(1)SY4 (Status: affected) - 15.2(2)SY3 (Status: affected) - 15.2(1)SY5 (Status: affected) - 15.2(1)SY6 (Status: affected) - 15.2(1)SY7 (Status: affected) - 15.2(1)SY8 (Status: affected) - 15.2(5)EX (Status: affected) - 15.1(3)SVF (Status: affected) - 15.1(3)SVF1 (Status: affected) - 15.1(3)SVE (Status: affected) - 15.4(3)M (Status: affected) - 15.4(3)M1 (Status: affected) - 15.4(3)M2 (Status: affected) - 15.4(3)M3 (Status: affected) - 15.4(3)M4 (Status: affected) - 15.4(3)M5 (Status: affected) - 15.4(3)M6 (Status: affected) - 15.4(3)M7 (Status: affected) - 15.4(3)M6a (Status: affected) - 15.4(3)M8 (Status: affected) - 15.4(3)M9 (Status: affected) - 15.4(3)M10 (Status: affected) - 15.0(2)EK (Status: affected) - 15.0(2)EK1 (Status: affected) - 15.4(1)CG (Status: affected) - 15.4(1)CG1 (Status: affected) - 15.4(2)CG (Status: affected) - 15.5(1)S (Status: affected) - 15.5(2)S (Status: affected) - 15.5(1)S1 (Status: affected) - 15.5(3)S (Status: affected) - 15.5(1)S2 (Status: affected) - 15.5(1)S3 (Status: affected) - 15.5(2)S1 (Status: affected) - 15.5(2)S2 (Status: affected) - 15.5(3)S1 (Status: affected) - 15.5(3)S1a (Status: affected) - 15.5(2)S3 (Status: affected) - 15.5(3)S2 (Status: affected) - 15.5(3)S0a (Status: affected) - 15.5(3)S3 (Status: affected) - 15.5(1)S4 (Status: affected) - 15.5(2)S4 (Status: affected) - 15.5(3)S4 (Status: affected) - 15.5(3)S5 (Status: affected) - 15.5(3)S6 (Status: affected) - 15.5(3)S6a (Status: affected) - 15.5(3)S7 (Status: affected) - 15.5(3)S6b (Status: affected) - 15.5(3)S8 (Status: affected) - 15.5(3)S9 (Status: affected) - 15.5(3)S10 (Status: affected) - 15.5(3)S9a (Status: affected) - 15.1(3)SVG (Status: affected) - 15.2(2)EB (Status: affected) - 15.2(2)EB1 (Status: affected) - 15.2(2)EB2 (Status: affected) - 15.2(6)EB (Status: affected) - 15.5(1)T (Status: affected) - 15.5(1)T1 (Status: affected) - 15.5(2)T (Status: affected) - 15.5(1)T2 (Status: affected) - 15.5(1)T3 (Status: affected) - 15.5(2)T1 (Status: affected) - 15.5(2)T2 (Status: affected) - 15.5(2)T3 (Status: affected) - 15.5(2)T4 (Status: affected) - 15.5(1)T4 (Status: affected) - 15.2(2)EA (Status: affected) - 15.2(2)EA1 (Status: affected) - 15.2(2)EA2 (Status: affected) - 15.2(3)EA (Status: affected) - 15.2(4)EA (Status: affected) - 15.2(4)EA1 (Status: affected) - 15.2(2)EA3 (Status: affected) - 15.2(4)EA3 (Status: affected) - 15.2(5)EA (Status: affected) - 15.2(4)EA4 (Status: affected) - 15.2(4)EA5 (Status: affected) - 15.2(4)EA6 (Status: affected) - 15.2(4)EA7 (Status: affected) - 15.2(4)EA8 (Status: affected) - 15.2(4)EA9 (Status: affected) - 15.2(4)EA9a (Status: affected) - 15.5(3)M (Status: affected) - 15.5(3)M1 (Status: affected) - 15.5(3)M0a (Status: affected) - 15.5(3)M2 (Status: affected) - 15.5(3)M3 (Status: affected) - 15.5(3)M4 (Status: affected) - 15.5(3)M4a (Status: affected) - 15.5(3)M5 (Status: affected) - 15.5(3)M6 (Status: affected) - 15.5(3)M7 (Status: affected) - 15.5(3)M6a (Status: affected) - 15.5(3)M8 (Status: affected) - 15.5(3)M9 (Status: affected) - 15.5(3)M10 (Status: affected) - 15.5(3)SN (Status: affected) - 15.6(1)S (Status: affected) - 15.6(2)S (Status: affected) - 15.6(2)S1 (Status: affected) - 15.6(1)S1 (Status: affected) - 15.6(1)S2 (Status: affected) - 15.6(2)S2 (Status: affected) - 15.6(1)S3 (Status: affected) - 15.6(2)S3 (Status: affected) - 15.6(1)S4 (Status: affected) - 15.6(2)S4 (Status: affected) - 15.6(1)T (Status: affected) - 15.6(2)T (Status: affected) - 15.6(1)T0a (Status: affected) - 15.6(1)T1 (Status: affected) - 15.6(2)T1 (Status: affected) - 15.6(1)T2 (Status: affected) - 15.6(2)T2 (Status: affected) - 15.6(1)T3 (Status: affected) - 15.6(2)T3 (Status: affected) - 15.3(1)SY (Status: affected) - 15.3(1)SY1 (Status: affected) - 15.3(1)SY2 (Status: affected) - 15.6(2)SP (Status: affected) - 15.6(2)SP1 (Status: affected) - 15.6(2)SP2 (Status: affected) - 15.6(2)SP3 (Status: affected) - 15.6(2)SP4 (Status: affected) - 15.6(2)SP5 (Status: affected) - 15.6(2)SP6 (Status: affected) - 15.6(2)SP7 (Status: affected) - 15.6(2)SP8 (Status: affected) - 15.6(2)SP9 (Status: affected) - 15.6(2)SP10 (Status: affected) - 15.6(2)SN (Status: affected) - 15.6(3)M (Status: affected) - 15.6(3)M1 (Status: affected) - 15.6(3)M0a (Status: affected) - 15.6(3)M1b (Status: affected) - 15.6(3)M2 (Status: affected) - 15.6(3)M2a (Status: affected) - 15.6(3)M3 (Status: affected) - 15.6(3)M3a (Status: affected) - 15.6(3)M4 (Status: affected) - 15.6(3)M5 (Status: affected) - 15.6(3)M6 (Status: affected) - 15.6(3)M7 (Status: affected) - 15.6(3)M6a (Status: affected) - 15.6(3)M6b (Status: affected) - 15.6(3)M8 (Status: affected) - 15.6(3)M9 (Status: affected) - 15.1(3)SVJ2 (Status: affected) - 15.2(4)EC1 (Status: affected) - 15.2(4)EC2 (Status: affected) - 15.4(1)SY (Status: affected) - 15.4(1)SY1 (Status: affected) - 15.4(1)SY2 (Status: affected) - 15.4(1)SY3 (Status: affected) - 15.4(1)SY4 (Status: affected) - 15.5(1)SY (Status: affected) - 15.5(1)SY1 (Status: affected) - 15.5(1)SY2 (Status: affected) - 15.5(1)SY3 (Status: affected) - 15.5(1)SY4 (Status: affected) - 15.5(1)SY5 (Status: affected) - 15.5(1)SY6 (Status: affected) - 15.5(1)SY7 (Status: affected) - 15.5(1)SY8 (Status: affected) - 15.5(1)SY9 (Status: affected) - 15.5(1)SY10 (Status: affected) - 15.5(1)SY11 (Status: affected) - 15.7(3)M (Status: affected) - 15.7(3)M1 (Status: affected) - 15.7(3)M0a (Status: affected) - 15.7(3)M3 (Status: affected) - 15.7(3)M2 (Status: affected) - 15.7(3)M4 (Status: affected) - 15.7(3)M5 (Status: affected) - 15.7(3)M4a (Status: affected) - 15.7(3)M4b (Status: affected) - 15.7(3)M6 (Status: affected) - 15.7(3)M7 (Status: affected) - 15.7(3)M8 (Status: affected) - 15.7(3)M9 (Status: affected) - 15.8(3)M (Status: affected) - 15.8(3)M1 (Status: affected) - 15.8(3)M0a (Status: affected) - 15.8(3)M0b (Status: affected) - 15.8(3)M2 (Status: affected) - 15.8(3)M1a (Status: affected) - 15.8(3)M3 (Status: affected) - 15.8(3)M2a (Status: affected) - 15.8(3)M4 (Status: affected) - 15.8(3)M3a (Status: affected) - 15.8(3)M3b (Status: affected) - 15.8(3)M5 (Status: affected) - 15.8(3)M6 (Status: affected) - 15.8(3)M7 (Status: affected) - 15.8(3)M8 (Status: affected) - 15.8(3)M9 (Status: affected) - 15.8(3)M10 (Status: affected) - 15.9(3)M (Status: affected) - 15.9(3)M1 (Status: affected) - 15.9(3)M0a (Status: affected) - 15.9(3)M2 (Status: affected) - 15.9(3)M3 (Status: affected) - 15.9(3)M2a (Status: affected) - 15.9(3)M3a (Status: affected) - 15.9(3)M4 (Status: affected) - 15.9(3)M3b (Status: affected) - 15.9(3)M5 (Status: affected) - 15.9(3)M4a (Status: affected) - 15.9(3)M6 (Status: affected) - 15.9(3)M7 (Status: affected) - 15.9(3)M6a (Status: affected) - 15.9(3)M6b (Status: affected) - 15.9(3)M7a (Status: affected) **Cisco - Cisco IOS XE Software** Affected versions: - 3.7.0S (Status: affected) - 3.7.1S (Status: affected) - 3.7.2S (Status: affected) - 3.7.3S (Status: affected) - 3.7.4S (Status: affected) - 3.7.5S (Status: affected) - 3.7.6S (Status: affected) - 3.7.7S (Status: affected) - 3.7.4aS (Status: affected) - 3.7.2tS (Status: affected) - 3.7.0bS (Status: affected) - 3.7.1aS (Status: affected) - 3.3.0SG (Status: affected) - 3.3.2SG (Status: affected) - 3.3.1SG (Status: affected) - 3.8.0S (Status: affected) - 3.8.1S (Status: affected) - 3.8.2S (Status: affected) - 3.9.1S (Status: affected) - 3.9.0S (Status: affected) - 3.9.2S (Status: affected) - 3.9.1aS (Status: affected) - 3.9.0aS (Status: affected) - 3.4.0SG (Status: affected) - 3.4.2SG (Status: affected) - 3.4.1SG (Status: affected) - 3.4.3SG (Status: affected) - 3.4.4SG (Status: affected) - 3.4.5SG (Status: affected) - 3.4.6SG (Status: affected) - 3.4.7SG (Status: affected) - 3.4.8SG (Status: affected) - 3.5.0E (Status: affected) - 3.5.1E (Status: affected) - 3.5.2E (Status: affected) - 3.5.3E (Status: affected) - 3.10.0S (Status: affected) - 3.10.1S (Status: affected) - 3.10.2S (Status: affected) - 3.10.3S (Status: affected) - 3.10.4S (Status: affected) - 3.10.5S (Status: affected) - 3.10.6S (Status: affected) - 3.10.2tS (Status: affected) - 3.10.7S (Status: affected) - 3.10.1xbS (Status: affected) - 3.10.8S (Status: affected) - 3.10.8aS (Status: affected) - 3.10.9S (Status: affected) - 3.10.10S (Status: affected) - 3.11.1S (Status: affected) - 3.11.2S (Status: affected) - 3.11.0S (Status: affected) - 3.11.3S (Status: affected) - 3.11.4S (Status: affected) - 3.12.0S (Status: affected) - 3.12.1S (Status: affected) - 3.12.2S (Status: affected) - 3.12.3S (Status: affected) - 3.12.0aS (Status: affected) - 3.12.4S (Status: affected) - 3.13.0S (Status: affected) - 3.13.1S (Status: affected) - 3.13.2S (Status: affected) - 3.13.3S (Status: affected) - 3.13.4S (Status: affected) - 3.13.5S (Status: affected) - 3.13.2aS (Status: affected) - 3.13.0aS (Status: affected) - 3.13.5aS (Status: affected) - 3.13.6S (Status: affected) - 3.13.7S (Status: affected) - 3.13.6aS (Status: affected) - 3.13.7aS (Status: affected) - 3.13.8S (Status: affected) - 3.13.9S (Status: affected) - 3.13.10S (Status: affected) - 3.6.0E (Status: affected) - 3.6.1E (Status: affected) - 3.6.2aE (Status: affected) - 3.6.2E (Status: affected) - 3.6.3E (Status: affected) - 3.6.4E (Status: affected) - 3.6.5E (Status: affected) - 3.6.6E (Status: affected) - 3.6.5aE (Status: affected) - 3.6.5bE (Status: affected) - 3.6.7E (Status: affected) - 3.6.8E (Status: affected) - 3.6.7bE (Status: affected) - 3.6.9E (Status: affected) - 3.6.10E (Status: affected) - 3.14.0S (Status: affected) - 3.14.1S (Status: affected) - 3.14.2S (Status: affected) - 3.14.3S (Status: affected) - 3.14.4S (Status: affected) - 3.15.0S (Status: affected) - 3.15.1S (Status: affected) - 3.15.2S (Status: affected) - 3.15.1cS (Status: affected) - 3.15.3S (Status: affected) - 3.15.4S (Status: affected) - 3.16.0S (Status: affected) - 3.16.1S (Status: affected) - 3.16.1aS (Status: affected) - 3.16.2S (Status: affected) - 3.16.2aS (Status: affected) - 3.16.0cS (Status: affected) - 3.16.3S (Status: affected) - 3.16.2bS (Status: affected) - 3.16.3aS (Status: affected) - 3.16.4S (Status: affected) - 3.16.4aS (Status: affected) - 3.16.4bS (Status: affected) - 3.16.5S (Status: affected) - 3.16.4dS (Status: affected) - 3.16.6S (Status: affected) - 3.16.7S (Status: affected) - 3.16.6bS (Status: affected) - 3.16.7aS (Status: affected) - 3.16.7bS (Status: affected) - 3.16.8S (Status: affected) - 3.16.9S (Status: affected) - 3.16.10S (Status: affected) - 3.17.0S (Status: affected) - 3.17.1S (Status: affected) - 3.17.2S (Status: affected) - 3.17.1aS (Status: affected) - 3.17.3S (Status: affected) - 3.17.4S (Status: affected) - 16.1.1 (Status: affected) - 16.1.2 (Status: affected) - 16.1.3 (Status: affected) - 16.2.1 (Status: affected) - 16.2.2 (Status: affected) - 3.8.0E (Status: affected) - 3.8.1E (Status: affected) - 3.8.2E (Status: affected) - 3.8.3E (Status: affected) - 3.8.4E (Status: affected) - 3.8.5E (Status: affected) - 3.8.5aE (Status: affected) - 3.8.6E (Status: affected) - 3.8.7E (Status: affected) - 3.8.8E (Status: affected) - 3.8.9E (Status: affected) - 3.8.10E (Status: affected) - 16.3.1 (Status: affected) - 16.3.2 (Status: affected) - 16.3.3 (Status: affected) - 16.3.1a (Status: affected) - 16.3.4 (Status: affected) - 16.3.5 (Status: affected) - 16.3.5b (Status: affected) - 16.3.6 (Status: affected) - 16.3.7 (Status: affected) - 16.3.8 (Status: affected) - 16.3.9 (Status: affected) - 16.3.10 (Status: affected) - 16.3.11 (Status: affected) - 16.4.1 (Status: affected) - 16.4.2 (Status: affected) - 16.4.3 (Status: affected) - 16.5.1 (Status: affected) - 16.5.1a (Status: affected) - 16.5.1b (Status: affected) - 16.5.2 (Status: affected) - 16.5.3 (Status: affected) - 3.18.0aS (Status: affected) - 3.18.0S (Status: affected) - 3.18.1S (Status: affected) - 3.18.2S (Status: affected) - 3.18.3S (Status: affected) - 3.18.4S (Status: affected) - 3.18.0SP (Status: affected) - 3.18.1SP (Status: affected) - 3.18.1aSP (Status: affected) - 3.18.1bSP (Status: affected) - 3.18.1cSP (Status: affected) - 3.18.2SP (Status: affected) - 3.18.2aSP (Status: affected) - 3.18.3SP (Status: affected) - 3.18.4SP (Status: affected) - 3.18.3aSP (Status: affected) - 3.18.3bSP (Status: affected) - 3.18.5SP (Status: affected) - 3.18.6SP (Status: affected) - 3.18.7SP (Status: affected) - 3.18.8aSP (Status: affected) - 3.18.9SP (Status: affected) - 3.9.0E (Status: affected) - 3.9.1E (Status: affected) - 3.9.2E (Status: affected) - 16.6.1 (Status: affected) - 16.6.2 (Status: affected) - 16.6.3 (Status: affected) - 16.6.4 (Status: affected) - 16.6.5 (Status: affected) - 16.6.4a (Status: affected) - 16.6.5a (Status: affected) - 16.6.6 (Status: affected) - 16.6.7 (Status: affected) - 16.6.8 (Status: affected) - 16.6.9 (Status: affected) - 16.6.10 (Status: affected) - 16.7.1 (Status: affected) - 16.7.1a (Status: affected) - 16.7.1b (Status: affected) - 16.7.2 (Status: affected) - 16.7.3 (Status: affected) - 16.7.4 (Status: affected) - 16.8.1 (Status: affected) - 16.8.1a (Status: affected) - 16.8.1b (Status: affected) - 16.8.1s (Status: affected) - 16.8.1c (Status: affected) - 16.8.1d (Status: affected) - 16.8.2 (Status: affected) - 16.8.1e (Status: affected) - 16.8.3 (Status: affected) - 16.9.1 (Status: affected) - 16.9.2 (Status: affected) - 16.9.1a (Status: affected) - 16.9.1b (Status: affected) - 16.9.1s (Status: affected) - 16.9.3 (Status: affected) - 16.9.4 (Status: affected) - 16.9.3a (Status: affected) - 16.9.5 (Status: affected) - 16.9.5f (Status: affected) - 16.9.6 (Status: affected) - 16.9.7 (Status: affected) - 16.9.8 (Status: affected) - 16.10.1 (Status: affected) - 16.10.1a (Status: affected) - 16.10.1b (Status: affected) - 16.10.1s (Status: affected) - 16.10.1c (Status: affected) - 16.10.1e (Status: affected) - 16.10.1d (Status: affected) - 16.10.2 (Status: affected) - 16.10.1f (Status: affected) - 16.10.1g (Status: affected) - 16.10.3 (Status: affected) - 3.10.0E (Status: affected) - 3.10.1E (Status: affected) - 3.10.0cE (Status: affected) - 3.10.2E (Status: affected) - 3.10.3E (Status: affected) - 16.11.1 (Status: affected) - 16.11.1a (Status: affected) - 16.11.1b (Status: affected) - 16.11.2 (Status: affected) - 16.11.1s (Status: affected) - 16.12.1 (Status: affected) - 16.12.1s (Status: affected) - 16.12.1a (Status: affected) - 16.12.1c (Status: affected) - 16.12.1w (Status: affected) - 16.12.2 (Status: affected) - 16.12.1y (Status: affected) - 16.12.2a (Status: affected) - 16.12.3 (Status: affected) - 16.12.8 (Status: affected) - 16.12.2s (Status: affected) - 16.12.1x (Status: affected) - 16.12.1t (Status: affected) - 16.12.4 (Status: affected) - 16.12.3s (Status: affected) - 16.12.3a (Status: affected) - 16.12.4a (Status: affected) - 16.12.5 (Status: affected) - 16.12.6 (Status: affected) - 16.12.1z1 (Status: affected) - 16.12.5a (Status: affected) - 16.12.5b (Status: affected) - 16.12.1z2 (Status: affected) - 16.12.6a (Status: affected) - 16.12.7 (Status: affected) - 16.12.9 (Status: affected) - 3.11.0E (Status: affected) - 3.11.1E (Status: affected) - 3.11.2E (Status: affected) - 3.11.3E (Status: affected) - 3.11.1aE (Status: affected) - 3.11.4E (Status: affected) - 3.11.3aE (Status: affected) - 3.11.5E (Status: affected) - 3.11.6E (Status: affected) - 3.11.7E (Status: affected) - 3.11.8E (Status: affected) - 17.1.1 (Status: affected) - 17.1.1a (Status: affected) - 17.1.1s (Status: affected) - 17.1.1t (Status: affected) - 17.1.3 (Status: affected) - 17.2.1 (Status: affected) - 17.2.1r (Status: affected) - 17.2.1a (Status: affected) - 17.2.1v (Status: affected) - 17.2.2 (Status: affected) - 17.2.3 (Status: affected) - 17.3.1 (Status: affected) - 17.3.2 (Status: affected) - 17.3.3 (Status: affected) - 17.3.1a (Status: affected) - 17.3.1w (Status: affected) - 17.3.2a (Status: affected) - 17.3.1x (Status: affected) - 17.3.1z (Status: affected) - 17.3.4 (Status: affected) - 17.3.5 (Status: affected) - 17.3.4a (Status: affected) - 17.3.6 (Status: affected) - 17.3.4b (Status: affected) - 17.3.4c (Status: affected) - 17.3.5a (Status: affected) - 17.3.5b (Status: affected) - 17.3.7 (Status: affected) - 17.4.1 (Status: affected) - 17.4.2 (Status: affected) - 17.4.1a (Status: affected) - 17.4.1b (Status: affected) - 17.4.2a (Status: affected) - 17.5.1 (Status: affected) - 17.5.1a (Status: affected) - 17.5.1c (Status: affected) - 17.6.1 (Status: affected) - 17.6.2 (Status: affected) - 17.6.1w (Status: affected) - 17.6.1a (Status: affected) - 17.6.1x (Status: affected) - 17.6.3 (Status: affected) - 17.6.1y (Status: affected) - 17.6.1z (Status: affected) - 17.6.3a (Status: affected) - 17.6.4 (Status: affected) - 17.6.1z1 (Status: affected) - 17.6.5 (Status: affected) - 17.6.5a (Status: affected) - 17.7.1 (Status: affected) - 17.7.1a (Status: affected) - 17.7.1b (Status: affected) - 17.7.2 (Status: affected) - 17.10.1 (Status: affected) - 17.10.1a (Status: affected) - 17.10.1b (Status: affected) - 17.8.1 (Status: affected) - 17.8.1a (Status: affected) - 17.9.1 (Status: affected) - 17.9.1w (Status: affected) - 17.9.2 (Status: affected) - 17.9.1a (Status: affected) - 17.9.1x (Status: affected) - 17.9.1y (Status: affected) - 17.9.3 (Status: affected) - 17.9.2a (Status: affected) - 17.9.1x1 (Status: affected) - 17.9.3a (Status: affected) - 17.9.1y1 (Status: affected) - 17.11.1 (Status: affected) - 17.11.1a (Status: affected) - 17.11.99SW (Status: affected) ### References 1. [cisco-sa-getvpn-rce-g8qR68sx](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-getvpn-rce-g8qR68sx)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8866, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8866 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8866 - **State**: PUBLISHED - **Published Date**: December 11, 2017 at 21:00 UTC - **Last Updated**: August 05, 2024 at 16:48 UTC - **Reserved Date**: May 09, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Elemental Path's CogniToys Dino smart toys through firmware version 0.0.794 share a fixed small pool of hardcoded keys, allowing a remote attacker to use a different Dino device to decrypt VoIP traffic between a child's Dino and remote server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://dl.acm.org/citation.cfm?id=3139947)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26975, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26975 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26975 - **State**: PUBLISHED - **Published Date**: June 01, 2022 at 11:34 UTC - **Last Updated**: August 03, 2024 at 05:18 UTC - **Reserved Date**: March 12, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Barco Control Room Management Suite web application, which is part of TransForm N before 3.14, is exposing log files without authentication. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.barco.com/en/support/transform-n-management-server) 2. [](https://www.barco.com/en/support/knowledge-base/KB12677)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-44349, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-44349 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-44349 - **State**: PUBLISHED - **Published Date**: September 01, 2023 at 00:00 UTC - **Last Updated**: October 29, 2024 at 13:18 UTC - **Reserved Date**: October 30, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description NAVBLUE S.A.S N-Ops & Crew 22.5-rc.50 is vulnerable to Cross Site Scripting (XSS). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.navblue.aero/product/n-crew-planning/) 2. [](https://github.com/MVRC-ITSEC/CVEs/blob/main/CVE-2022-44349)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25939, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25939 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25939 - **State**: PUBLISHED - **Published Date**: March 03, 2025 at 00:00 UTC - **Last Updated**: March 04, 2025 at 16:47 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Reprise License Manager 14.2 is vulnerable to reflected cross-site scripting in /goform/activate_process via the akey parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/SamR2406/CVE-IDs/blob/main/Reprise%20License%20Manager%2014.2%20-%20Reflected%20Cross-Site%20Scripting%20%28CVE-2025-25939%29)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17936, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17936 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17936 - **State**: PUBLISHED - **Published Date**: December 28, 2017 at 06:00 UTC - **Last Updated**: September 17, 2024 at 03:13 UTC - **Reserved Date**: December 28, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Vanguard Marketplace Digital Products PHP has CSRF via /search. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/d4wner/Vulnerabilities-Report/blob/master/Vanguard.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1522, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1522 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1522 - **State**: PUBLISHED - **Published Date**: May 26, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:51 UTC - **Reserved Date**: May 12, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The imap4d server for GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows authenticated remote users to cause a denial of service (CPU consumption) via a large range value in the FETCH command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050525 GNU Mailutils 0.6 imap4d FETCH Commad Resource Consumption DoS Vulnerability](http://www.idefense.com/application/poi/display?id=247&type=vulnerabilities) 2. [1014052](http://securitytracker.com/id?1014052) 3. [15442](http://secunia.com/advisories/15442) 4. [13765](http://www.securityfocus.com/bid/13765) 5. [DSA-732](http://www.debian.org/security/2005/dsa-732)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23145, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23145 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23145 - **State**: PUBLISHED - **Published Date**: June 25, 2024 at 02:27 UTC - **Last Updated**: January 28, 2025 at 17:10 UTC - **Reserved Date**: January 11, 2024 at 21:51 UTC - **Assigned By**: autodesk ### Vulnerability Description A maliciously crafted PRT file, when parsed in opennurbs.dll through Autodesk applications, can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash,read sensitive data, or execute arbitrary code in the context of the current process. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Autodesk - AutoCAD** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - AutoCAD Architecture** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - AutoCAD Electrical** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - AutoCAD Mechanical** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - AutoCAD MEP** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - AutoCAD Plant 3D** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - Civil 3D** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - Advance Steel** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) **Autodesk - AutoCAD MAP 3D** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) ### References 1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3112, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3112 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3112 - **State**: PUBLISHED - **Published Date**: August 24, 2010 at 19:00 UTC - **Last Updated**: August 07, 2024 at 02:55 UTC - **Reserved Date**: August 24, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Google Chrome before 5.0.375.127 does not properly implement file dialogs, which allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://googlechromereleases.blogspot.com/2010/08/stable-channel-update_19.html) 2. [](http://code.google.com/p/chromium/issues/detail?id=45400) 3. [oval:org.mitre.oval:def:11275](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11275)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21178, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21178 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21178 - **State**: PUBLISHED - **Published Date**: July 16, 2024 at 22:40 UTC - **Last Updated**: March 14, 2025 at 16:11 UTC - **Reserved Date**: December 07, 2023 at 22:28 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.59, 8.60 and 8.61. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **Oracle Corporation - PeopleSoft Enterprise PT PeopleTools** Affected versions: - 8.59 (Status: affected) - 8.60 (Status: affected) - 8.61 (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujul2024.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-24680, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-24680 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-24680 - **State**: PUBLISHED - **Published Date**: February 06, 2024 at 00:00 UTC - **Last Updated**: May 15, 2025 at 19:45 UTC - **Reserved Date**: January 26, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://groups.google.com/forum/#%21forum/django-announce) 2. [](https://docs.djangoproject.com/en/5.0/releases/security/) 3. [](https://www.djangoproject.com/weblog/2024/feb/06/security-releases/) 4. [FEDORA-2024-5c7fb64c74](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/) 5. [FEDORA-2024-2ec03ca8cb](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/) 6. [FEDORA-2024-84fbbbb914](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8079, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8079 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8079 - **State**: PUBLISHED - **Published Date**: October 24, 2019 at 17:22 UTC - **Last Updated**: August 04, 2024 at 21:10 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a stored cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure. ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 6.4, 6.3, 6.2, 6.1, and 6.0 versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb19-48.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24948, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24948 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24948 - **State**: PUBLISHED - **Published Date**: February 25, 2022 at 08:30 UTC - **Last Updated**: August 03, 2024 at 04:29 UTC - **Reserved Date**: February 10, 2022 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description A carefully crafted user preferences for submission could trigger an XSS vulnerability on Apache JSPWiki, related to the user preferences screen, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.2 or later. ### Affected Products **Apache Software Foundation - Apache JSPWiki** Affected versions: - Apache JSPWiki up to 2.11.1 (Status: affected) ### References 1. [](https://lists.apache.org/thread/86p0yzopc4mw2h5bkwpt927b2c8tfq3b) 2. [[oss-security] 20220225 [CVE-2022-24948] Apache JSPWiki Cross-site scripting vulnerability on User Preferences screen](http://www.openwall.com/lists/oss-security/2022/02/25/2) ### Credits - This issue was discovered by Paulos Yibelo, from Octagon Networks.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19406, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19406 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19406 - **State**: PUBLISHED - **Published Date**: November 21, 2018 at 00:00 UTC - **Last Updated**: August 05, 2024 at 11:37 UTC - **Reserved Date**: November 20, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://lkml.org/lkml/2018/11/20/411) 2. [105988](http://www.securityfocus.com/bid/105988)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-1311, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-1311 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-1311 - **State**: PUBLISHED - **Published Date**: April 02, 2014 at 15:00 UTC - **Last Updated**: August 06, 2024 at 09:34 UTC - **Reserved Date**: January 08, 2014 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-04-01-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2014-04-22-2](http://archives.neohapsis.com/archives/bugtraq/2014-04/0136.html) 2. [](https://support.apple.com/kb/HT6537) 3. [APPLE-SA-2014-04-22-3](http://archives.neohapsis.com/archives/bugtraq/2014-04/0135.html) 4. [APPLE-SA-2014-04-01-1](http://archives.neohapsis.com/archives/bugtraq/2014-04/0009.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14619, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14619 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14619 - **State**: PUBLISHED - **Published Date**: September 20, 2017 at 21:00 UTC - **Last Updated**: August 05, 2024 at 19:34 UTC - **Reserved Date**: September 20, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in phpMyFAQ through 2.9.8 allows remote attackers to inject arbitrary web script or HTML via the "Title of your FAQ" field in the Configuration Module. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [42987](https://www.exploit-db.com/exploits/42987/) 2. [](https://github.com/thorsten/phpMyFAQ/commit/30b0025e19bd95ba28f4eff4d259671e7bb6bb86) 3. [](http://www.phpmyfaq.de/security/advisory-2017-10-19) 4. [](https://packetstormsecurity.com/files/144603/phpMyFAQ-2.9.8-Cross-Site-Scripting.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5233, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5233 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5233 - **State**: PUBLISHED - **Published Date**: September 28, 2023 at 04:31 UTC - **Last Updated**: February 05, 2025 at 19:17 UTC - **Reserved Date**: September 27, 2023 at 15:50 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Font Awesome Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'fawesome' shortcode in versions up to, and including, 5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **mcostales84 - Font Awesome Integration** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a2791f48-895f-4099-87ec-41aaac2494a2?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/font-awesome-integration/tags/5.0/font-awesome-integration.php#L48) ### Credits - Lana Codes
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26616, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26616 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26616 - **State**: PUBLISHED - **Published Date**: February 18, 2025 at 20:30 UTC - **Last Updated**: February 19, 2025 at 15:36 UTC - **Reserved Date**: February 12, 2025 at 14:51 UTC - **Assigned By**: GitHub_M ### Vulnerability Description WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Path Traversal vulnerability was discovered in the WeGIA application, `exportar_dump.php` endpoint. This vulnerability could allow an attacker to gain unauthorized access to sensitive information stored in `config.php`. `config.php` contains information that could allow direct access to the database. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability. ### Weakness Classification (CWE) - CWE-22: Path Traversal - CWE-284: Security Weakness ### Affected Products **LabRedesCefetRJ - WeGIA** Affected versions: - < 3.2.14 (Status: affected) ### References 1. [https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xxqg-p22h-3f32](https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xxqg-p22h-3f32)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0036, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0036 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0036 - **State**: PUBLISHED - **Published Date**: September 29, 1999 at 04:00 UTC - **Last Updated**: October 29, 2024 at 14:07 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [990](http://www.osvdb.org/990) 2. [H-106](http://www.ciac.org/ciac/bulletins/h-106.shtml) 3. [19970508-02-PX](ftp://patches.sgi.com/support/free/security/advisories/19970508-02-PX) 4. [sgi-lockout(557)](https://exchange.xforce.ibmcloud.com/vulnerabilities/557)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4271, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4271 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4271 - **State**: PUBLISHED - **Published Date**: July 15, 2015 at 18:00 UTC - **Last Updated**: August 06, 2024 at 06:11 UTC - **Reserved Date**: June 04, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco TelePresence TC before 7.3.4 on Integrator C devices allows remote attackers to bypass authentication via vectors involving multiple request parameters, aka Bug ID CSCuv00604. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1032931](http://www.securitytracker.com/id/1032931) 2. [20150714 Cisco TelePresence Integrator C Series Multiple Request Parameter Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=39880)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0353, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0353 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0353 - **State**: PUBLISHED - **Published Date**: October 24, 2023 at 20:39 UTC - **Last Updated**: September 11, 2024 at 18:48 UTC - **Reserved Date**: January 24, 2022 at 20:51 UTC - **Assigned By**: lenovo ### Vulnerability Description A denial of service vulnerability was reported in the Lenovo HardwareScanPlugin versions prior to 1.3.1.2 and  Lenovo Diagnostics versions prior to 4.45 that could allow a local user with administrative access to trigger a system crash. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **Lenovo - HardwareScanPlugin ** Affected versions: - (Status: affected) **Lenovo - Diagnostics** Affected versions: - (Status: affected) ### References 1. [](https://support.lenovo.com/us/en/product_security/LEN-94532) 2. [](https://support.lenovo.com/us/en/product_security/LEN-102365) ### Credits - Lenovo thanks Gergo Pap at Quadron Research Lab for reporting this issue.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1589, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1589 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1589 - **State**: PUBLISHED - **Published Date**: February 23, 2015 at 17:00 UTC - **Last Updated**: August 06, 2024 at 04:47 UTC - **Reserved Date**: February 12, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in arCHMage 0.2.4 allows remote attackers to write to arbitrary files via a .. (dot dot) in a CHM file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776164) 2. [[oss-security] 20150212 CVE request: archmage directory traversal](http://www.openwall.com/lists/oss-security/2015/02/12/9) 3. [archmage-cve20151589-dir-trav(100879)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100879) 4. [[oss-security] 20150212 Re: CVE request: archmage directory traversal](http://www.openwall.com/lists/oss-security/2015/02/12/16)