System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52840, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52840
- **State**: PUBLISHED
- **Published Date**: December 10, 2024 at 22:04 UTC
- **Last Updated**: December 11, 2024 at 14:45 UTC
- **Reserved Date**: November 15, 2024 at 18:03 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.21 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute arbitrary code in the context of the victim's browser session. By manipulating a DOM element through a crafted URL or user input, the attacker can inject malicious scripts that run when the page is rendered. This type of attack requires user interaction, as the victim would need to access the manipulated URL or input the malicious data themselves.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35584, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35584 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35584
- **State**: PUBLISHED
- **Published Date**: October 15, 2024 at 00:00 UTC
- **Last Updated**: October 16, 2024 at 19:59 UTC
- **Reserved Date**: May 17, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerabilities were discovered in Ajax.php, ForWindow.php, ForExport.php, Modules.php, functions/HackingLogFnc.php in OpenSis Community Edition 9.1 to 8.0, and possibly earlier versions. It is possible for an authenticated user to perform SQL Injection due to the lack to sanitisation. The application takes arbitrary value from "X-Forwarded-For" header and appends it to a SQL INSERT statement directly, leading to SQL Injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://opensis.com)
2. [](http://os4ed.com)
3. [](https://github.com/whwhwh96/CVE-2024-35584) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0295, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0295 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0295
- **State**: PUBLISHED
- **Published Date**: January 16, 2008 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 07:39 UTC
- **Reserved Date**: January 16, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in modules/access/rtsp/real_sdpplin.c in the Xine library, as used in VideoLAN VLC Media Player 0.8.6d and earlier, allows user-assisted remote attackers to cause a denial of service (crash) or execute arbitrary code via long Session Description Protocol (SDP) data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-0105](http://www.vupen.com/english/advisories/2008/0105)
2. [29284](http://secunia.com/advisories/29284)
3. [DSA-1543](http://www.debian.org/security/2008/dsa-1543)
4. [27221](http://www.securityfocus.com/bid/27221)
5. [28383](http://secunia.com/advisories/28383)
6. [](http://aluigi.altervista.org/adv/vlcxhof-adv.txt)
7. [oval:org.mitre.oval:def:14776](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14776)
8. [29766](http://secunia.com/advisories/29766)
9. [GLSA-200803-13](http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5289, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5289 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5289
- **State**: PUBLISHED
- **Published Date**: March 30, 2020 at 21:20 UTC
- **Last Updated**: August 04, 2024 at 08:22 UTC
- **Reserved Date**: January 02, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
In Elide before 4.5.14, it is possible for an adversary to "guess and check" the value of a model field they do not have access to assuming they can read at least one other field in the model. The adversary can construct filter expressions for an inaccessible field to filter a collection. The presence or absence of models in the returned collection can be used to reconstruct the value of the inaccessible field. Resolved in Elide 4.5.14 and greater.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**yahoo - elide**
Affected versions:
- < 4.5.14 (Status: affected)
### References
1. [](https://github.com/yahoo/elide/security/advisories/GHSA-2mxr-89gf-rc4v)
2. [](https://github.com/yahoo/elide/pull/1236)
3. [](https://github.com/yahoo/elide/pull/1236/commits/a985f0f9c448aabe70bc904337096399de4576dc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6650
- **State**: PUBLISHED
- **Published Date**: January 28, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 17:46 UTC
- **Reserved Date**: November 05, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The StoreBuffer::ExemptPopularPages function in store-buffer.cc in Google V8 before 3.22.24.16, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors that trigger incorrect handling of "popular pages."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2014/01/stable-channel-update_27.html)
2. [openSUSE-SU-2014:0243](http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html)
3. [](https://code.google.com/p/v8/source/detail?r=18483)
4. [DSA-2862](http://www.debian.org/security/2014/dsa-2862)
5. [](http://crbug.com/331444) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7363, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7363 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7363
- **State**: PUBLISHED
- **Published Date**: August 23, 2019 at 19:35 UTC
- **Last Updated**: August 04, 2024 at 20:46 UTC
- **Reserved Date**: February 04, 2019 at 00:00 UTC
- **Assigned By**: autodesk
### Vulnerability Description
Use-after-free vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a use-after-free vulnerability, which may result in code execution.
### Affected Products
**n/a - Autodesk Design Review **
Affected versions:
- 2011, 2012, 2013, 2018 (Status: affected)
### References
1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2772, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2772 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2772
- **State**: PUBLISHED
- **Published Date**: May 18, 2024 at 07:38 UTC
- **Last Updated**: August 01, 2024 at 19:25 UTC
- **Reserved Date**: March 21, 2024 at 15:43 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form settings in all versions up to, and including, 5.1.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with access to the Fluent Forms settings, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This can be chained with CVE-2024-2771 for a low-privileged user to inject malicious web scripts.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**techjewel - Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2ccba77c-fb90-4906-b0fe-77607ec5df1f?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3073857)
### Credits
- Tobias Weißhaar |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3730, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3730 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3730
- **State**: PUBLISHED
- **Published Date**: September 20, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 20:13 UTC
- **Reserved Date**: June 19, 2012 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Mail in Apple iOS before 6 does not properly handle reuse of Content-ID header values, which allows remote attackers to spoof attachments via a header value that was also used in a previous e-mail message, as demonstrated by a message from a different sender.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [apple-ios-mail-cve20123730(78717)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78717)
2. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html)
3. [](http://support.apple.com/kb/HT5503)
4. [85626](http://osvdb.org/85626) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2203, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2203 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2203
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14619, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14619
- **State**: PUBLISHED
- **Published Date**: July 15, 2020 at 17:34 UTC
- **Last Updated**: September 27, 2024 at 18:31 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.20 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2020.html)
2. [](https://security.netapp.com/advisory/ntap-20200717-0004/)
3. [USN-4441-1](https://usn.ubuntu.com/4441-1/)
4. [FEDORA-2020-9c27be9396](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/)
5. [FEDORA-2020-d5b2e71a17](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/)
6. [FEDORA-2020-77b95c868f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/)
7. [GLSA-202105-27](https://security.gentoo.org/glsa/202105-27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11072, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11072 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11072
- **State**: PUBLISHED
- **Published Date**: April 10, 2019 at 21:04 UTC
- **Last Updated**: August 04, 2024 at 22:40 UTC
- **Reserved Date**: April 10, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer states "The feature which can be abused to cause the crash is a new feature in lighttpd 1.4.50, and is not enabled by default. It must be explicitly configured in the config file (e.g. lighttpd.conf). Certain input will trigger an abort() in lighttpd when that feature is enabled. lighttpd detects the underflow or realloc() will fail (in both 32-bit and 64-bit executables), also detected in lighttpd. Either triggers an explicit abort() by lighttpd. This is not exploitable beyond triggering the explicit abort() with subsequent application exit.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://redmine.lighttpd.net/issues/2945)
2. [](https://github.com/lighttpd/lighttpd1.4/commit/32120d5b8b3203fc21ccb9eafb0eaf824bb59354)
3. [107907](http://www.securityfocus.com/bid/107907) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53752, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53752 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53752
- **State**: PUBLISHED
- **Published Date**: December 01, 2024 at 21:20 UTC
- **Last Updated**: December 01, 2024 at 23:07 UTC
- **Reserved Date**: November 22, 2024 at 13:52 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Berg Informatik Stripe Donation allows Stored XSS.This issue affects Stripe Donation: from n/a through 1.2.5.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Berg Informatik - Stripe Donation**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/bin-stripe-donation/vulnerability/wordpress-stripe-donation-plugin-1-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15833
- **State**: PUBLISHED
- **Published Date**: August 26, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 10:01 UTC
- **Reserved Date**: August 23, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Vanilla before 2.6.1, the polling functionality allows Insecure Direct Object Reference (IDOR) via the Poll ID, leading to the ability of a single user to select multiple Poll Options (e.g., vote for multiple items).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://twitter.com/viperbluff/status/1033067882941304832)
2. [](https://open.vanillaforums.com/discussion/36559)
3. [](https://hackerone.com/reports/326434)
4. [](https://twitter.com/viperbluff/status/1033640333890834433) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36563, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36563
- **State**: PUBLISHED
- **Published Date**: August 30, 2022 at 20:05 UTC
- **Last Updated**: August 03, 2024 at 10:07 UTC
- **Reserved Date**: July 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Incorrect access control in the install directory (C:\RailsInstaller) of Rubyinstaller2 v3.1.2 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ycdxsb/Vuln/blob/main/Railsinstaller-Vuln/Railsinstaller-Vuln.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24204
- **State**: PUBLISHED
- **Published Date**: April 05, 2021 at 18:27 UTC
- **Last Updated**: August 03, 2024 at 19:21 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
In the Elementor Website Builder WordPress plugin before 3.1.4, the accordion widget (includes/widgets/accordion.php) accepts a ‘title_html_tag’ parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified ‘save_builder’ request containing JavaScript in the ‘title_html_tag’ parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Elementor Website Builder**
Affected versions:
- 3.1.4 (Status: affected)
### References
1. [](https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/)
2. [](https://wpscan.com/vulnerability/772e172f-c8b4-4a6a-9eb9-9663295cfedf)
### Credits
- Ramuel Gall |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1195
- **State**: PUBLISHED
- **Published Date**: April 24, 2013 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 16:22 UTC
- **Reserved Date**: January 11, 2013 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The time-based ACL implementation on Cisco Adaptive Security Appliances (ASA) devices, and in Cisco Firewall Services Module (FWSM), does not properly handle periodic statements for the time-range command, which allows remote attackers to bypass intended access restrictions by sending network traffic during denied time periods, aka Bug IDs CSCuf79091 and CSCug45850.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130422 Time-Range Object Access List Bypass Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1195) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1598, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1598 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1598
- **State**: PUBLISHED
- **Published Date**: April 03, 2006 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 17:19 UTC
- **Reserved Date**: April 03, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AN HTTPD 1.42n, and possibly other versions before 1.42p, allows remote attackers to obtain source code of scripts via crafted requests with (1) dot and (2) space characters in the file extension.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24323](http://www.osvdb.org/24323)
2. [20060403 Secunia Research: AN HTTPD Script Source Disclosure Vulnerability](http://www.securityfocus.com/archive/1/429667/100/0/threaded)
3. [19326](http://secunia.com/advisories/19326)
4. [1015858](http://securitytracker.com/id?1015858)
5. [](http://secunia.com/secunia_research/2006-21/advisory)
6. [anhttpd-script-source-disclosure(25591)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25591)
7. [ADV-2006-1200](http://www.vupen.com/english/advisories/2006/1200)
8. [17350](http://www.securityfocus.com/bid/17350) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54097, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54097 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54097
- **State**: PUBLISHED
- **Published Date**: December 12, 2024 at 11:11 UTC
- **Last Updated**: December 12, 2024 at 15:22 UTC
- **Reserved Date**: November 29, 2024 at 02:34 UTC
- **Assigned By**: huawei
### Vulnerability Description
Security vulnerability in the HiView module
Impact: Successful exploitation of this vulnerability may affect feature implementation and integrity.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-15: Security Weakness
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 4.2.0 (Status: affected)
- 4.0.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
- 2.1.0 (Status: affected)
- 2.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 14.0.0 (Status: affected)
- 13.0.0 (Status: affected)
- 12.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/12/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52723, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52723 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52723
- **State**: PUBLISHED
- **Published Date**: April 29, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 23:11 UTC
- **Reserved Date**: April 29, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In KDE libksieve before 23.03.80, kmanagesieve/session.cpp places a cleartext password in server logs because a username variable is accidentally given a password value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://invent.kde.org/pim/libksieve/-/commit/6b460ba93ac4ac503ba039d0b788ac7595120db1)
2. [](https://invent.kde.org/pim/libksieve/-/tags/v23.03.80)
3. [](https://www.openwall.com/lists/oss-security/2024/04/25/1)
4. [[oss-security] 20240430 Re: libksieve (used by kmail/kontact) sent password as username](http://www.openwall.com/lists/oss-security/2024/04/30/1)
5. [[debian-lts-announce] 20240505 [SECURITY] [DLA 3809-1] libkf5ksieve security update](https://lists.debian.org/debian-lts-announce/2024/05/msg00004.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4260
- **State**: PUBLISHED
- **Published Date**: August 21, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 19:06 UTC
- **Reserved Date**: August 21, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in index.php in Fotopholder 1.8 allows remote attackers to read arbitrary directories or files via a .. (dot dot) in the path parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [fotopholder-index-obtain-information(28399)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28399)
2. [1421](http://securityreason.com/securityalert/1421)
3. [fotopholder-index-file-include(28398)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28398)
4. [28243](http://www.osvdb.org/28243)
5. [20060815 otopholder 1.8 suffers from a local file inclusion,XSS and directory listing vuln](http://archives.neohapsis.com/archives/bugtraq/2006-08/0316.html)
6. [1016702](http://securitytracker.com/id?1016702) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1300, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1300 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1300
- **State**: PUBLISHED
- **Published Date**: March 07, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 12:50 UTC
- **Reserved Date**: March 06, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DOURAN Software Technologies ISPUtil 3.32.84.1, and possibly earlier versions, stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain user and reseller data via a direct request for scripts/activesessions.ini. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33845](http://osvdb.org/33845)
2. [isputil-activesessions-info-disclosure(32800)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32800)
3. [24304](http://secunia.com/advisories/24304) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32710, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32710
- **State**: PUBLISHED
- **Published Date**: June 10, 2025 at 17:02 UTC
- **Last Updated**: June 10, 2025 at 19:02 UTC
- **Reserved Date**: April 09, 2025 at 20:06 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
- CWE-362: Security Weakness
### Affected Products
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Remote Desktop Services Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32710) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1901, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1901 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1901
- **State**: PUBLISHED
- **Published Date**: July 13, 2021 at 05:30 UTC
- **Last Updated**: August 03, 2024 at 16:25 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Possible buffer over-read due to lack of length check while flashing meta images in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
### CVSS Metrics
- **CVSS Base Score**: 4.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Qualcomm, Inc. - Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- APQ8009, APQ8053, AQT1000, MDM9206, QCA6420, QCA6430, QCA9367, QCA9377, Qualcomm215, SD 675, SD205, SD210, SD675, SD678, SD720G, SD730, SD855, SDA429W, SDX50M, SDX55, SDX55M, SM6250, WCD9326, WCD9330, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCN3610, WCN3615, WCN3620, WCN3660B, WCN3680, WCN3680B, WCN3950, WCN3980, WCN3988, WCN3991, WCN3998, WSA8810, WSA8815 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5823, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5823 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5823
- **State**: PUBLISHED
- **Published Date**: January 27, 2017 at 22:01 UTC
- **Last Updated**: August 06, 2024 at 01:15 UTC
- **Reserved Date**: June 23, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The icalproperty_new_clone function in libical 0.47 and 1.0 allows remote attackers to cause a denial of service (use-after-free) via a crafted ics file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20160625 Re: libical 0.47 SEGV on unknown address](http://www.openwall.com/lists/oss-security/2016/06/25/4)
2. [GLSA-201904-02](https://security.gentoo.org/glsa/201904-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6532, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6532 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6532
- **State**: PUBLISHED
- **Published Date**: February 13, 2013 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 21:28 UTC
- **Reserved Date**: February 13, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
(1) Zend_Dom, (2) Zend_Feed, (3) Zend_Soap, and (4) Zend_XmlRpc in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 allow remote attackers to cause a denial of service (CPU consumption) via recursive or circular references in an XML entity definition in an XML DOCTYPE declaration, aka an XML Entity Expansion (XEE) attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2013:115](http://www.mandriva.com/security/advisories?name=MDVSA-2013:115)
2. [](http://framework.zend.com/security/advisory/ZF2012-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7001
- **State**: REJECTED
- **Published Date**: January 17, 2019 at 17:00 UTC
- **Last Updated**: January 17, 2019 at 16:57 UTC
- **Reserved Date**: February 14, 2018 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11588, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11588
- **State**: PUBLISHED
- **Published Date**: August 23, 2019 at 13:49 UTC
- **Last Updated**: September 16, 2024 at 16:57 UTC
- **Reserved Date**: April 29, 2019 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
The ViewSystemInfo class doGarbageCollection method in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allows remote attackers to trigger garbage collection via a Cross-site request forgery (CSRF) vulnerability.
### Affected Products
**Atlassian - Jira**
Affected versions:
- unspecified (Status: affected)
- 8.0.0 (Status: affected)
- unspecified (Status: affected)
- 8.3.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/JRASERVER-69781) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49594, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49594 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49594
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:23 UTC
- **Last Updated**: May 04, 2025 at 08:41 UTC
- **Reserved Date**: February 26, 2025 at 02:21 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix a data-race around sysctl_tcp_mtu_probe_floor.
While reading sysctl_tcp_mtu_probe_floor, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader.
### Affected Products
**Linux - Linux**
Affected versions:
- c04b79b6cfd714144f6a2cf359603d82ee631e62 (Status: affected)
- c04b79b6cfd714144f6a2cf359603d82ee631e62 (Status: affected)
- c04b79b6cfd714144f6a2cf359603d82ee631e62 (Status: affected)
- c04b79b6cfd714144f6a2cf359603d82ee631e62 (Status: affected)
- c04b79b6cfd714144f6a2cf359603d82ee631e62 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.4 (Status: affected)
- 0 (Status: unaffected)
- 5.4.208 (Status: unaffected)
- 5.10.134 (Status: unaffected)
- 5.15.58 (Status: unaffected)
- 5.18.15 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/033963b220633ed1602d458e7e4ac06afa9fefb2)
2. [](https://git.kernel.org/stable/c/d5bece4df6090395f891110ef52a6f82d16685db)
3. [](https://git.kernel.org/stable/c/cc36c37f5fe066c4708e623ead96dc8f57224bf5)
4. [](https://git.kernel.org/stable/c/e2ecbf3f0aa88277d43908c53b99399d55729ff9)
5. [](https://git.kernel.org/stable/c/8e92d4423615a5257d0d871fc067aa561f597deb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2410, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2410 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2410
- **State**: PUBLISHED
- **Published Date**: May 22, 2025 at 17:32 UTC
- **Last Updated**: May 23, 2025 at 03:39 UTC
- **Reserved Date**: March 17, 2025 at 13:06 UTC
- **Assigned By**: ABB
### Vulnerability Description
Port manipulation vulnerabilities in ASPECT provide attackers with the ability to con-trol TCP/IP port access if session administrator credentials become compromised.
This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-99: Security Weakness
### Affected Products
**ABB - ASPECT-Enterprise**
Affected versions:
- 0 (Status: affected)
**ABB - NEXUS Series**
Affected versions:
- 0 (Status: affected)
**ABB - MATRIX Series**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A0021&LanguageCode=en&DocumentPartId=pdf&Action=Launch) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2161, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2161 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2161
- **State**: PUBLISHED
- **Published Date**: September 27, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 18:42 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In libxaac there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112553431
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7570, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7570 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7570
- **State**: PUBLISHED
- **Published Date**: August 13, 2024 at 18:12 UTC
- **Last Updated**: August 16, 2024 at 04:02 UTC
- **Reserved Date**: August 06, 2024 at 19:17 UTC
- **Assigned By**: ivanti
### Vulnerability Description
Improper certificate validation in Ivanti ITSM on-prem and Neurons for ITSM Versions 2023.4 and earlier allows a remote attacker in a MITM position to craft a token that would allow access to ITSM as any user.
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-295: Security Weakness
### Affected Products
**Ivanti - ITSM**
Affected versions:
- 2023.4 (Status: affected)
- 2023.4.0 (Status: unaffected)
### References
1. [](https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-ITSM-CVE-2024-7569-CVE-2024-7570) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56550, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56550
- **State**: PUBLISHED
- **Published Date**: December 27, 2024 at 14:22 UTC
- **Last Updated**: May 04, 2025 at 13:00 UTC
- **Reserved Date**: December 27, 2024 at 14:03 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
s390/stacktrace: Use break instead of return statement
arch_stack_walk_user_common() contains a return statement instead of a
break statement in case store_ip() fails while trying to store a callchain
entry of a user space process.
This may lead to a missing pagefault_enable() call.
If this happens any subsequent page fault of the process won't be resolved
by the page fault handler and this in turn will lead to the process being
killed.
Use a break instead of a return statement to fix this.
### Affected Products
**Linux - Linux**
Affected versions:
- ebd912ff9919a10609511383d94942362234c077 (Status: affected)
- ebd912ff9919a10609511383d94942362234c077 (Status: affected)
- dd69165ac3dc12d8550aeec3fc4439c084ded3d8 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.10 (Status: affected)
- 0 (Status: unaffected)
- 6.12.4 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/20c26357826457dc7c8145297e60ddc012e18914)
2. [](https://git.kernel.org/stable/c/588a9836a4ef7ec3bfcffda526dfa399637e6cfc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7699, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7699 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7699
- **State**: PUBLISHED
- **Published Date**: February 10, 2019 at 22:00 UTC
- **Last Updated**: August 04, 2024 at 20:54 UTC
- **Reserved Date**: February 10, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A heap-based buffer over-read occurs in AP4_BitStream::WriteBytes in Codecs/Ap4BitStream.cpp in Bento4 v1.5.1-627. Remote attackers could leverage this vulnerability to cause an exception via crafted mp4 input, which leads to a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/axiomatic-systems/Bento4/issues/355) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2288, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2288 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2288
- **State**: PUBLISHED
- **Published Date**: June 06, 2024 at 18:24 UTC
- **Last Updated**: August 01, 2024 at 19:11 UTC
- **Reserved Date**: March 07, 2024 at 16:40 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
A Cross-Site Request Forgery (CSRF) vulnerability exists in the profile picture upload functionality of the Lollms application, specifically in the parisneo/lollms-webui repository, affecting versions up to 7.3.0. This vulnerability allows attackers to change a victim's profile picture without their consent, potentially leading to a denial of service by overloading the filesystem with files. Additionally, this flaw can be exploited to perform a stored cross-site scripting (XSS) attack, enabling attackers to execute arbitrary JavaScript in the context of the victim's browser session. The issue is resolved in version 9.3.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**parisneo - parisneo/lollms-webui**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/2a37ae0c-890a-401a-8f3c-a261f3006290)
2. [](https://github.com/parisneo/lollms-webui/commit/ed085e6effab2b1e25ba2b00366a16ff67d8551b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14270, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14270 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14270
- **State**: PUBLISHED
- **Published Date**: July 25, 2019 at 16:28 UTC
- **Last Updated**: August 05, 2024 at 00:12 UTC
- **Reserved Date**: July 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Comodo Antivirus through 12.0.0.6870, Comodo Firewall through 12.0.0.6870, and Comodo Internet Security Premium through 12.0.0.6870, with the Comodo Container feature, are vulnerable to Sandbox Escape.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gaissecurity.com/yazi/discovery-of-sandbox-escape-on-comodo-container-antivirus-amp-firewall) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31894, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31894
- **State**: PUBLISHED
- **Published Date**: May 22, 2024 at 19:17 UTC
- **Last Updated**: August 02, 2024 at 01:59 UTC
- **Reserved Date**: April 07, 2024 at 12:44 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive user information using an expired access token. IBM X-Force ID: 288175.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-324: Security Weakness
### Affected Products
**IBM - App Connect Enterprise**
Affected versions:
- 12.0.1.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7154606)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/288175) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25847
- **State**: PUBLISHED
- **Published Date**: December 29, 2020 at 07:10 UTC
- **Last Updated**: September 16, 2024 at 16:28 UTC
- **Reserved Date**: September 23, 2020 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
This command injection vulnerability allows attackers to execute arbitrary commands in a compromised application. QNAP have already fixed this vulnerability in the following versions of QTS and QuTS hero.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
- CWE-78: OS Command Injection
### Affected Products
**QNAP Systems Inc. - QTS**
Affected versions:
- unspecified (Status: affected)
**QNAP Systems Inc. - QTS**
Affected versions:
- unspecified (Status: affected)
**QNAP Systems Inc. - QTS**
Affected versions:
- 4.3.x (Status: unaffected)
- 4.2.x (Status: unaffected)
**QNAP Systems Inc. - QuTS hero**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.qnap.com/en/security-advisory/qsa-20-20)
### Credits
- CFF of Topsec Alpha Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4397, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4397 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4397
- **State**: PUBLISHED
- **Published Date**: October 17, 2013 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 16:45 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple integer overflows in the th_read function in lib/block.c in libtar before 1.2.20 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) name or (2) link in an archive, which triggers a heap-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[libtar] 20131009 ANNOUNCE: libtar version 1.2.20](https://lists.feep.net:8080/pipermail/libtar/2013-October/000361.html)
2. [RHSA-2013:1418](http://rhn.redhat.com/errata/RHSA-2013-1418.html)
3. [55253](http://secunia.com/advisories/55253)
4. [1029166](http://www.securitytracker.com/id/1029166)
5. [](https://source.android.com/security/bulletin/2018-01-01)
6. [[oss-security] 20131010 Re: Integer overflow in libtar (<= 1.2.19)](http://www.openwall.com/lists/oss-security/2013/10/10/6)
7. [55188](http://secunia.com/advisories/55188)
8. [](http://repo.or.cz/w/libtar.git/commitdiff/45448e8bae671c2f7e80b860ae0fc0cedf2bdc04)
9. [1040106](http://www.securitytracker.com/id/1040106)
10. [DSA-2817](http://www.debian.org/security/2013/dsa-2817)
11. [62922](http://www.securityfocus.com/bid/62922)
12. [[oss-security] 20131010 Integer overflow in libtar (<= 1.2.19)](http://www.openwall.com/lists/oss-security/2013/10/10/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21006
- **State**: PUBLISHED
- **Published Date**: January 13, 2021 at 22:53 UTC
- **Last Updated**: April 23, 2025 at 19:46 UTC
- **Reserved Date**: December 18, 2020 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Photoshop version 22.1 (and earlier) is affected by a heap buffer overflow vulnerability when handling a specially crafted font file. Successful exploitation could lead to arbitrary code execution. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Adobe - Photoshop**
Affected versions:
- 22.1 and earlier (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/photoshop/apsb21-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-21195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-21195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-21195
- **State**: PUBLISHED
- **Published Date**: April 28, 2020 at 15:01 UTC
- **Last Updated**: August 05, 2024 at 12:26 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, D7800 before 1.0.1.34, R6100 before 1.0.1.20, R7500v2 before 1.0.3.24, R7800 before 1.0.2.40, R9000 before 1.0.3.6, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000055162/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2600) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13426, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13426 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13426
- **State**: PUBLISHED
- **Published Date**: June 22, 2020 at 17:09 UTC
- **Last Updated**: August 04, 2024 at 12:18 UTC
- **Reserved Date**: May 23, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Multi-Scheduler plugin 1.0.0 for WordPress has a Cross-Site Request Forgery (CSRF) vulnerability in the forms it presents, allowing the possibility of deleting records (users) when an ID is known.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://twitter.com/UnD3sc0n0c1d0)
2. [](https://wordpress.org/plugins/multi-scheduler/#developers)
3. [](https://infayer.com/archivos/448)
4. [Exploit Database](https://www.exploit-db.com/exploits/48532)
5. [](https://packetstormsecurity.com/files/157867/WordPress-Multi-Scheduler-1.0.0-Cross-Site-Request-Forgery.html)
6. [](https://cxsecurity.com/issue/WLB-2020050235)
7. [](https://0day.today/exploit/34496)
8. [](https://research-labs.net/search/exploits/wordpress-plugin-multi-scheduler-100-cross-site-request-forgery-delete-user) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3840, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3840
- **State**: PUBLISHED
- **Published Date**: August 27, 2008 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 09:53 UTC
- **Reserved Date**: August 27, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Crafty Syntax Live Help (CSLH) 2.14.6 and earlier stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.gulftech.org/?node=research&article_id=00127-08252008)
2. [20080825 Crafty Syntax Live Help <= 2.14.6 SQL Injection](http://www.securityfocus.com/archive/1/495729/100/0/threaded)
3. [crafty-syntax-info-disclosure(44745)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44745)
4. [4192](http://securityreason.com/securityalert/4192) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36099, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36099 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36099
- **State**: PUBLISHED
- **Published Date**: September 08, 2022 at 20:45 UTC
- **Last Updated**: April 22, 2025 at 17:22 UTC
- **Reserved Date**: July 15, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
XWiki Platform Wiki UI Main Wiki is software for managing subwikis on XWiki Platform, a generic wiki platform. Starting with version 5.3-milestone-2 and prior to versions 13.10.6 and 14.4, it's possible to inject arbitrary wiki syntax including Groovy, Python and Velocity script macros via the request (URL parameter) using the `XWikiServerClassSheet` if the user has view access to this sheet and another page that has been saved with programming rights, a standard condition on a public read-only XWiki installation or a private XWiki installation where the user has an account. This allows arbitrary Groovy/Python/Velocity code execution which allows bypassing all rights checks and thus both modification and disclosure of all content stored in the XWiki installation. Also, this could be used to impact the availability of the wiki. This has been patched in versions 13.10.6 and 14.4. As a workaround, edit the affected document `XWiki.XWikiServerClassSheet` or `WikiManager.XWikiServerClassSheet` and manually perform the changes from the patch fixing the issue. On XWiki versions 12.0 and later, it is also possible to import the document `XWiki.XWikiServerClassSheet` from the xwiki-platform-wiki-ui-mainwiki package version 14.4 using the import feature of the administration application as there have been no other changes to this document since XWiki 12.0.
### CVSS Metrics
- **CVSS Base Score**: 9.9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-95: Security Weakness
- CWE-94: Code Injection
### Affected Products
**xwiki - xwiki-platform**
Affected versions:
- >= 5.3-milestone-2, < 13.10.6 (Status: affected)
- >= 14.0, < 14.4 (Status: affected)
### References
1. [](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xr6m-2p4m-jvqf)
2. [](https://github.com/xwiki/xwiki-platform/commit/fc77f9f53bc65a4a9bfae3d5686615309c0c76cc)
3. [](https://jira.xwiki.org/browse/XWIKI-19746) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4102, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4102 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4102
- **State**: PUBLISHED
- **Published Date**: July 31, 2007 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 14:46 UTC
- **Reserved Date**: July 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in search.php for sBlog 0.7.3 Beta allows remote attackers to inject arbitrary HTML and web script via a leading '"/></> sequence in the search string.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2942](http://securityreason.com/securityalert/2942)
2. [sblog-search-xss(35645)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35645)
3. [25098](http://www.securityfocus.com/bid/25098)
4. [20070726 sBlog 0.7.3 Beta XSS Vulnerabilitie](http://www.securityfocus.com/archive/1/474822/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1062, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1062 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1062
- **State**: PUBLISHED
- **Published Date**: March 07, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 16:56 UTC
- **Reserved Date**: March 07, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in lurker.cgi for Lurker 2.0 and earlier allows attackers to read arbitrary files via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/project/shownotes.php?release_id=399034&group_id=8168)
2. [23694](http://www.osvdb.org/23694)
3. [19145](http://secunia.com/advisories/19145)
4. [DSA-999](http://www.debian.org/security/2006/dsa-999)
5. [17003](http://www.securityfocus.com/bid/17003)
6. [ADV-2006-0850](http://www.vupen.com/english/advisories/2006/0850)
7. [[Lurker-users] 20060302 Serious security vulnerabilities found](http://terpstra.ca/lurker/message/20060302.130003.4c5c2680.en.html)
8. [lurker-lurker-information-disclosure(25149)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25149)
9. [19136](http://secunia.com/advisories/19136) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-10045, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-10045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-10045
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 21:08 UTC
- **Reserved Date**: August 16, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear IPQ4019, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 615/16/SD 415, SD 820, and SDX20, buffer overflow vulnerability exist in Sahara boot when program header are parsing.
### Affected Products
**Qualcomm, Inc. - Snapdragon Mobile, Snapdragon Wear**
Affected versions:
- IPQ4019, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 615/16/SD 415, SD 820, SDX20 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-04-01)
2. [103671](http://www.securityfocus.com/bid/103671) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6194, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6194 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6194
- **State**: PUBLISHED
- **Published Date**: April 03, 2017 at 05:44 UTC
- **Last Updated**: August 05, 2024 at 15:25 UTC
- **Reserved Date**: February 22, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The relocs function in libr/bin/p/bin_bflt.c in radare2 1.2.1 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [97299](http://www.securityfocus.com/bid/97299)
2. [](https://github.com/radare/radare2/issues/6829)
3. [](https://github.com/radare/radare2/commit/72794dc3523bbd5bb370de3c5857cb736c387e18) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32873, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32873 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32873
- **State**: REJECTED
- **Last Updated**: May 08, 2023 at 00:00 UTC
- **Reserved Date**: June 09, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11523, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11523 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11523
- **State**: PUBLISHED
- **Published Date**: May 29, 2018 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 08:10 UTC
- **Reserved Date**: May 29, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
upload.php on NUUO NVRmini 2 devices allows Arbitrary File Upload, such as upload of .php files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44794](https://www.exploit-db.com/exploits/44794/)
2. [](https://github.com/unh3x/just4cve/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26768, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26768
- **State**: PUBLISHED
- **Published Date**: January 07, 2021 at 12:43 UTC
- **Last Updated**: August 04, 2024 at 16:03 UTC
- **Reserved Date**: October 07, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Formstone <=1.4.16 is vulnerable to a Reflected Cross-Site Scripting (XSS) vulnerability caused by improper validation of user supplied input in the upload-target.php and upload-chunked.php files. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim's Web browser within the security context of the hosting Web site once the URL is clicked or visited. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials, force malware execution, user redirection and others.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Formstone/Formstone/issues/286) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9234, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9234 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9234
- **State**: PUBLISHED
- **Published Date**: December 03, 2014 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 00:06 UTC
- **Reserved Date**: December 03, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in cgi-bin/sddownload.cgi in D-link IP camera DCS-2103 with firmware 1.0.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20141117 Vulnerabilities in D-Link DCS-2103](http://seclists.org/fulldisclosure/2014/Nov/42)
2. [](http://websecurity.com.ua/7250/)
3. [](http://packetstormsecurity.com/files/129138/D-Link-DCS-2103-Directory-Traversal.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5888, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5888 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5888
- **State**: PUBLISHED
- **Published Date**: November 14, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 20:04 UTC
- **Reserved Date**: November 14, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in viewarticle.asp in Superfreaker Studios UPublisher 1.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [upublisher-viewarticle-sql-injection(30190)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30190)
2. [2765](https://www.exploit-db.com/exploits/2765)
3. [ADV-2006-4463](http://www.vupen.com/english/advisories/2006/4463)
4. [20061112 UPublisher 1.0 (viewarticle.asp) Remote SQL Injection Vulnerability](http://www.securityfocus.com/archive/1/451372/100/0/threaded)
5. [22840](http://secunia.com/advisories/22840) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42528, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42528 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42528
- **State**: PUBLISHED
- **Published Date**: May 02, 2022 at 22:24 UTC
- **Last Updated**: September 17, 2024 at 02:42 UTC
- **Reserved Date**: October 15, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
XMP Toolkit 2021.07 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Adobe - XMP Toolkit**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html)
2. [[debian-lts-announce] 20230925 [SECURITY] [DLA 3585-1] exempi security update](https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37043, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37043
- **State**: PUBLISHED
- **Published Date**: November 22, 2024 at 15:33 UTC
- **Last Updated**: November 22, 2024 at 17:05 UTC
- **Reserved Date**: May 31, 2024 at 08:46 UTC
- **Assigned By**: qnap
### Vulnerability Description
A path traversal vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to read the contents of unexpected files and expose sensitive data.
We have already fixed the vulnerability in the following versions:
QTS 5.2.1.2930 build 20241025 and later
QuTS hero h5.2.1.2929 build 20241025 and later
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**QNAP Systems Inc. - QTS**
Affected versions:
- 5.2.x (Status: affected)
**QNAP Systems Inc. - QuTS hero**
Affected versions:
- h5.2.x (Status: affected)
### References
1. [](https://www.qnap.com/en/security-advisory/qsa-24-43)
### Credits
- Jiaxu Zhao && Bingwei Peng |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2752, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2752 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2752
- **State**: PUBLISHED
- **Published Date**: June 18, 2008 at 19:29 UTC
- **Last Updated**: August 07, 2024 at 09:14 UTC
- **Reserved Date**: June 18, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft Word 2000 9.0.2812 and 2003 11.8106.8172 does not properly handle unordered lists, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .doc file. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [microsoft-word-unorderedlist-code-execution(43155)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43155)
2. [](http://www.nullcode.com.ar/ncs/crash/video2.htm)
3. [](http://www.nullcode.com.ar/ncs/crash/video.htm)
4. [](http://www.securityfocus.com/data/vulnerabilities/exploits/crash-word-2.doc)
5. [](http://www.securityfocus.com/data/vulnerabilities/exploits/crash-word-1.doc)
6. [](http://www.securityfocus.com/data/vulnerabilities/exploits/crash-word-4.doc)
7. [](http://www.securityfocus.com/data/vulnerabilities/exploits/crash-word-3.doc)
8. [29769](http://www.securityfocus.com/bid/29769) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4731, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4731 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4731
- **State**: PUBLISHED
- **Published Date**: September 25, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 00:39 UTC
- **Reserved Date**: May 11, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit in Apple iOS before 10 and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4729.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2016-09-20-3](http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html)
2. [](https://support.apple.com/HT207157)
3. [93053](http://www.securityfocus.com/bid/93053)
4. [1036854](http://www.securitytracker.com/id/1036854)
5. [](https://support.apple.com/HT207143)
6. [APPLE-SA-2016-09-20-2](http://lists.apple.com/archives/security-announce/2016/Sep/msg00007.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0613, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0613 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0613
- **State**: PUBLISHED
- **Published Date**: October 25, 2021 at 13:16 UTC
- **Last Updated**: August 03, 2024 at 15:47 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In asf extractor, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05489178.
### Affected Products
**n/a - MT5522, MT5527, MT5597, MT5598, MT5599, MT6580, MT6735, MT6737, MT6739, MT6750S, MT6753, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797, MT9256, MT9285, MT9286, MT9288, MT9629, MT9631, MT9632, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9670, MT9675, MT9685, MT9686, MT9688, MT9931, MT9950, MT9970, MT9980, MT9981**
Affected versions:
- Android 10.0, 11.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/October-2021) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1651, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1651 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1651
- **State**: PUBLISHED
- **Published Date**: July 03, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 20:07 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 133261.
### Affected Products
**IBM - Rational Quality Manager**
Affected versions:
- 5.0 (Status: affected)
- 5.0.1 (Status: affected)
- 5.0.2 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
- 6.0.5 (Status: affected)
**IBM - Rational Collaborative Lifecycle Management**
Affected versions:
- 5.0 (Status: affected)
- 5.0.1 (Status: affected)
- 5.0.2 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
- 6.0.5 (Status: affected)
### References
1. [ibm-rqm-cve20171651-xss(133261)](https://exchange.xforce.ibmcloud.com/vulnerabilities/133261)
2. [](https://www-prd-trops.events.ibm.com/node/715749) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5773, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5773
- **State**: PUBLISHED
- **Published Date**: August 03, 2020 at 19:55 UTC
- **Last Updated**: August 04, 2024 at 08:39 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: tenable
### Vulnerability Description
Improper Access Control in Teltonika firmware TRB2_R_00.02.04.01 allows a low privileged user to perform unauthorized write operations.
### Affected Products
**n/a - Teltonika Gateway TRB245**
Affected versions:
- TRB2_R_00.02.04.01 firmware (Status: affected)
### References
1. [](https://www.tenable.com/security/research/tra-2020-48) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5097, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5097 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5097
- **State**: PUBLISHED
- **Published Date**: November 14, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 10:40 UTC
- **Reserved Date**: November 14, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in MyFWB 1.0 allows remote attackers to execute arbitrary SQL commands via the page parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-2649](http://www.vupen.com/english/advisories/2008/2649)
2. [31954](http://secunia.com/advisories/31954)
3. [6501](https://www.exploit-db.com/exploits/6501)
4. [20080920 MyFWB 1.0 Remote SQL Injection](http://www.securityfocus.com/archive/1/496553/100/0/threaded)
5. [31269](http://www.securityfocus.com/bid/31269)
6. [4597](http://securityreason.com/securityalert/4597) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24755, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24755 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24755
- **State**: PUBLISHED
- **Published Date**: May 17, 2021 at 21:06 UTC
- **Last Updated**: August 04, 2024 at 15:19 UTC
- **Reserved Date**: August 28, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Ubiquiti UniFi Video v3.10.13, when the executable starts, its first library validation is in the current directory. This allows the impersonation and modification of the library to execute code on the system. This was tested in (Windows 7 x64/Windows 10 x64).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.youtube.com/watch?v=T41h4yeh9dk) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35415, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35415 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35415
- **State**: PUBLISHED
- **Published Date**: December 03, 2021 at 21:07 UTC
- **Last Updated**: August 04, 2024 at 00:40 UTC
- **Reserved Date**: June 23, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross-site scripting (XSS) vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the course "Title" and "Content" fields.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/andrejspuler/writeups/tree/main/chamilo-lms#multiple-stored-cross-site-scripting-vulnerabilities)
2. [](https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-61-2021-05-14-Low-impact-very-low-risk-XSS-in-course-name)
3. [](https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-62-2021-05-14-Low-impact-low-risk-XSS-in-course-description)
4. [](https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-63-2021-05-14-Low-impact-moderate-risk-XSS-in-course-documents)
5. [](https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-64-2021-05-14-Low-impact-low-risk-XSS-in-course-document-title-on-upload)
6. [](https://github.com/chamilo/chamilo-lms/commit/fd54f6194285f949c86060d3b2a7967b43689480)
7. [](https://github.com/chamilo/chamilo-lms/commit/19189a91d1eac9aa204b9439b82e3e73c8ac2e03)
8. [](https://github.com/chamilo/chamilo-lms/commit/cf84be1ca1d9a08ad1341dfbf8df475b13a89072) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9261, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9261 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9261
- **State**: PUBLISHED
- **Published Date**: May 29, 2017 at 03:52 UTC
- **Last Updated**: August 05, 2024 at 17:02 UTC
- **Reserved Date**: May 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In ImageMagick 7.0.5-6 Q16, the ReadMNGImage function in coders/png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [98730](http://www.securityfocus.com/bid/98730)
2. [](https://github.com/ImageMagick/ImageMagick/issues/476) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43132
- **State**: PUBLISHED
- **Published Date**: September 25, 2023 at 00:00 UTC
- **Last Updated**: September 24, 2024 at 16:22 UTC
- **Reserved Date**: September 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
szvone vmqphp <=1.13 is vulnerable to SQL Injection. Unauthorized remote users can use sql injection attacks to obtain the hash of the administrator password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/szvone/vmqphp)
2. [](https://gist.github.com/8FishMan/d42032b1cdcf401a9c27532aa72ccb37)
3. [](https://gist.github.com/8FishMan/a37417d1fd97046fb00eb11a257008a7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3639, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3639 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3639
- **State**: PUBLISHED
- **Published Date**: September 22, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 10:50 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2352-1](http://www.ubuntu.com/usn/USN-2352-1)
2. [openSUSE-SU-2014:1239](http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html)
3. [SUSE-SU-2014:1146](http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html)
4. [61378](http://secunia.com/advisories/61378)
5. [[oss-security] 20140916 CVE-2014-3635 to 3639: security issues in D-Bus < 1.8.8](http://www.openwall.com/lists/oss-security/2014/09/16/9)
6. [1030864](http://www.securitytracker.com/id/1030864)
7. [](https://bugs.freedesktop.org/show_bug.cgi?id=80919)
8. [61431](http://secunia.com/advisories/61431)
9. [](http://advisories.mageia.org/MGASA-2014-0395.html)
10. [DSA-3026](http://www.debian.org/security/2014/dsa-3026)
11. [MDVSA-2015:176](http://www.mandriva.com/security/advisories?name=MDVSA-2015:176) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16331, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16331
- **State**: PUBLISHED
- **Published Date**: January 11, 2023 at 21:40 UTC
- **Last Updated**: April 08, 2025 at 20:32 UTC
- **Reserved Date**: October 31, 2017 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_event_alarm, at 0x9d01ebd4, the value for the `s_tid` key is copied using `strcpy` to the buffer at `$sp+0x2b0`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Insteon - Hub**
Affected versions:
- Not specified (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483](https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6759, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6759 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6759
- **State**: PUBLISHED
- **Published Date**: October 15, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 07:29 UTC
- **Reserved Date**: August 31, 2015 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The shouldTreatAsUniqueOrigin function in platform/weborigin/SecurityOrigin.cpp in Blink, as used in Google Chrome before 46.0.2490.71, does not ensure that the origin of a LocalStorage resource is considered unique, which allows remote attackers to obtain sensitive information via vectors involving a blob: URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html)
2. [77071](http://www.securityfocus.com/bid/77071)
3. [](https://src.chromium.org/viewvc/blink?revision=201022&view=revision)
4. [DSA-3376](http://www.debian.org/security/2015/dsa-3376)
5. [](https://code.google.com/p/chromium/issues/detail?id=514076)
6. [GLSA-201603-09](https://security.gentoo.org/glsa/201603-09)
7. [1033816](http://www.securitytracker.com/id/1033816)
8. [USN-2770-1](http://www.ubuntu.com/usn/USN-2770-1)
9. [RHSA-2015:1912](http://rhn.redhat.com/errata/RHSA-2015-1912.html)
10. [USN-2770-2](http://www.ubuntu.com/usn/USN-2770-2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19113
- **State**: PUBLISHED
- **Published Date**: April 01, 2019 at 20:09 UTC
- **Last Updated**: August 05, 2024 at 11:30 UTC
- **Reserved Date**: November 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Pronestor PNHM (aka Health Monitoring or HealthMonitor) add-in before 8.1.13.0 for Outlook has "BUILTIN\Users:(I)(F)" permissions for the "%PROGRAMFILES(X86)%\proNestor\Outlook add-in for Pronestor\PronestorHealthMonitor.exe" file, which allows local users to gain privileges via a Trojan horse PronestorHealthMonitor.exe file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.pronestor.com)
2. [](https://gist.github.com/povlteksttv/8f990e11576e1e90e8fb61acf8646d28)
3. [](http://packetstormsecurity.com/files/153275/Pronestor-Health-Monitoring-Privilege-Escalation.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9997, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9997
- **State**: PUBLISHED
- **Published Date**: October 29, 2024 at 21:45 UTC
- **Last Updated**: May 14, 2025 at 13:03 UTC
- **Reserved Date**: October 15, 2024 at 13:39 UTC
- **Assigned By**: autodesk
### Vulnerability Description
A maliciously crafted DWG file when parsed in acdb25.dll through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Autodesk - AutoCAD**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - AutoCAD LT**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - AutoCAD Architecture**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - AutoCAD Electrical**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - AutoCAD MAP 3D**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - AutoCAD Mechanical**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - AutoCAD MEP**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - AutoCAD Plant 3D**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - Civil 3D**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - Advance Steel**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - DWG TrueView**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
**Autodesk - RealDWG**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
### References
1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0021) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1604, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1604 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1604
- **State**: PUBLISHED
- **Published Date**: January 28, 2014 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 09:50 UTC
- **Reserved Date**: January 17, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20140114 Fwd: [Python-modules-team] Bug#735263: python-rply: insecure use of /tmp](http://www.openwall.com/lists/oss-security/2014/01/17/8)
2. [rply-cve20141604-insecure-permissions(90593)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90593)
3. [102202](http://www.osvdb.org/102202)
4. [56429](http://secunia.com/advisories/56429)
5. [](https://github.com/alex/rply/commit/fc9bbcd25b0b4f09bbd6339f710ad24c129d5d7c)
6. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735263)
7. [[oss-security] 20140117 Re: Fwd: [Python-modules-team] Bug#735263: python-rply: insecure use of /tmp](http://www.openwall.com/lists/oss-security/2014/01/18/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0523, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0523 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0523
- **State**: PUBLISHED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:41 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ICMP echo (ping) is allowed from arbitrary hosts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.cve.org/CVERecord?id=CVE-1999-0523) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5726, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5726 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5726
- **State**: PUBLISHED
- **Published Date**: October 24, 2023 at 12:47 UTC
- **Last Updated**: September 11, 2024 at 18:53 UTC
- **Reserved Date**: October 23, 2023 at 17:22 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A website could have obscured the full screen notification by using the file open dialog. This could have led to user confusion and possible spoofing attacks.
*Note: This issue only affected macOS operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1846205)
2. [](https://www.mozilla.org/security/advisories/mfsa2023-45/)
3. [](https://www.mozilla.org/security/advisories/mfsa2023-46/)
4. [](https://www.mozilla.org/security/advisories/mfsa2023-47/)
### Credits
- Edgar Chen and Hafiizh |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1209, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1209 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1209
- **State**: PUBLISHED
- **Published Date**: March 15, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:44 UTC
- **Reserved Date**: March 15, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in zml.cgi allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [zml-cgi-directory-traversal(7751)](http://www.iss.net/security_center/static/7751.php)
2. [20011231 [VulnWatch] blackshell2: zml.cgi remote exploit](http://archives.neohapsis.com/archives/vulnwatch/2001-q4/0086.html)
3. [20011231 blackshell2: zml.cgi remote exploit](http://seclists.org/bugtraq/2001/Dec/0306.html)
4. [3759](http://www.securityfocus.com/bid/3759)
5. [](http://www.jero.cc/zml/zml.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4764, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4764
- **State**: PUBLISHED
- **Published Date**: July 16, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 06:25 UTC
- **Reserved Date**: June 24, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015-2624, CVE-2015-2626, CVE-2015-2640, CVE-2015-2654, CVE-2015-2656, CVE-2015-4754, CVE-2015-4775, CVE-2015-4776, CVE-2015-4777, CVE-2015-4778, CVE-2015-4780, CVE-2015-4781, CVE-2015-4782, CVE-2015-4783, CVE-2015-4784, CVE-2015-4785, CVE-2015-4786, CVE-2015-4787, CVE-2015-4789, and CVE-2015-4790.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0646
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 17:50 UTC
- **Last Updated**: August 02, 2024 at 23:32 UTC
- **Reserved Date**: February 16, 2022 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw use after free in the Linux kernel Management Component Transport Protocol (MCTP) subsystem was found in the way user triggers cancel_work_sync after the unregister_netdev during removing device. A local user could use this flaw to crash the system or escalate their privileges on the system. It is actual from Linux Kernel 5.17-rc1 (when mctp-serial.c introduced) till 5.17-rc5.
### Weakness Classification (CWE)
- CWE-459: Security Weakness
### Affected Products
**n/a - Kernel**
Affected versions:
- 5.17-rc5 (Status: affected)
### References
1. [](https://lore.kernel.org/all/20220211011552.1861886-1-jk%40codeconstruct.com.au)
2. [](https://security.netapp.com/advisory/ntap-20220318-0006/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42143, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42143
- **State**: REJECTED
- **Published Date**: July 30, 2024 at 07:46 UTC
- **Last Updated**: August 22, 2024 at 00:01 UTC
- **Reserved Date**: July 29, 2024 at 15:50 UTC
- **Assigned By**: Linux
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1954, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1954 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1954
- **State**: PUBLISHED
- **Published Date**: July 01, 2022 at 17:01 UTC
- **Last Updated**: August 03, 2024 at 00:24 UTC
- **Reserved Date**: May 31, 2022 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
A Regular Expression Denial of Service vulnerability in GitLab CE/EE affecting all versions from 1.0.2 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to make a GitLab instance inaccessible via specially crafted web server response headers
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=1.0.2, <14.10.5 (Status: affected)
- >=15.0, <15.0.4 (Status: affected)
- >=15.1, <15.1.1 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/358160)
2. [](https://hackerone.com/reports/1531958)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1954.json)
### Credits
- Thanks [afewgoats](https://hackerone.com/afewgoats) for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5876
- **State**: PUBLISHED
- **Published Date**: September 18, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 07:06 UTC
- **Reserved Date**: August 06, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
dyld in Dev Tools in Apple iOS before 9 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1033609](http://www.securitytracker.com/id/1033609)
2. [](https://support.apple.com/HT205212)
3. [APPLE-SA-2015-09-30-3](http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html)
4. [76764](http://www.securityfocus.com/bid/76764)
5. [](https://support.apple.com/HT205267)
6. [APPLE-SA-2015-09-21-1](http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html)
7. [](https://support.apple.com/HT205213)
8. [APPLE-SA-2015-09-16-1](http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29436
- **State**: PUBLISHED
- **Published Date**: April 13, 2021 at 17:20 UTC
- **Last Updated**: August 03, 2024 at 22:02 UTC
- **Reserved Date**: March 30, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Anuko Time Tracker is an open source, web-based time tracking application written in PHP. In Time Tracker before version 1.19.27.5431 a Cross site request forgery (CSRF) vulnerability existed. The nature of CSRF is that a logged on user may be tricked by social engineering to click on an attacker-provided form that executes an unintended action such as changing user password. The vulnerability is fixed in Time Tracker version 1.19.27.5431. Upgrade is recommended. If upgrade is not practical, introduce ttMitigateCSRF() function in /WEB-INF/lib/common.php.lib using the latest available code and call it from ttAccessAllowed().
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**anuko - timetracker**
Affected versions:
- < 1.19.27.5431 (Status: affected)
### References
1. [](https://github.com/anuko/timetracker/security/advisories/GHSA-pgpx-rfvj-9g4f)
2. [](https://github.com/anuko/timetracker/commit/e3f8222ee308322942bcebcd86b78ecf19382563)
3. [](https://github.com/anuko/timetracker/commit/e77be7eea69df5d52e19f9f25b5b89a0e66a5b8e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4834, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4834 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4834
- **State**: PUBLISHED
- **Published Date**: October 16, 2023 at 08:40 UTC
- **Last Updated**: September 16, 2024 at 18:17 UTC
- **Reserved Date**: September 08, 2023 at 07:54 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
In Red Lion Europe mbCONNECT24 and mymbCONNECT24 and Helmholz myREX24 and myREX24.virtual up to and including 2.14.2 an improperly implemented access validation allows an authenticated, low privileged attacker to gain read access to limited, non-critical device information in his account he should not have access to.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Red Lion Europe - mbCONNECT24**
Affected versions:
- 0 (Status: affected)
**Red Lion Europe - mymbCONNECT24**
Affected versions:
- 0 (Status: affected)
**Helmholz - myREX24**
Affected versions:
- 0 (Status: affected)
**Helmholz - myREX24.virtual**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert.vde.com/en/advisories/VDE-2023-041)
2. [](https://cert.vde.com/en/advisories/VDE-2023-043) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8685, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8685
- **State**: PUBLISHED
- **Published Date**: February 10, 2025 at 12:46 UTC
- **Last Updated**: February 12, 2025 at 15:44 UTC
- **Reserved Date**: September 11, 2024 at 08:12 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
Path-Traversal vulnerability in Revolution Pi version 2022-07-28-revpi-buster from KUNBUS GmbH. This vulnerability could allow an authenticated attacker to list device directories via the ‘/pictory/php/getFileList.php’ endpoint in the ‘dir’ parameter.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**KUNBUS GmbH - Revolution Pi**
Affected versions:
- 2022-07-28-revpi-buster version (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-kunbus-gmbhs-revolution-pi)
### Credits
- Ehab Hussein |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3407, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3407
- **State**: PUBLISHED
- **Published Date**: September 16, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 03:11 UTC
- **Reserved Date**: September 16, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the MailCheck821Address function in nnotes.dll in the nrouter.exe service in the server in IBM Lotus Domino 8.0.x before 8.0.2 FP5 and 8.5.x before 8.5.1 FP2 allows remote attackers to execute arbitrary code via a long e-mail address in an ORGANIZER:mailto header in an iCalendar calendar-invitation e-mail message, aka SPR NRBY7ZPJ9V.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [lotus-domino-icalendar-bo(61790)](https://exchange.xforce.ibmcloud.com/vulnerabilities/61790)
2. [ADV-2010-2381](http://www.vupen.com/english/advisories/2010/2381)
3. [](http://www-10.lotus.com/ldd/r5fixlist.nsf/8d1c0550e6242b69852570c900549a74/af36678d60bd74288525778400534d7c?OpenDocument)
4. [](http://www.zerodayinitiative.com/advisories/ZDI-10-177/)
5. [43219](http://www.securityfocus.com/bid/43219)
6. [](http://www-10.lotus.com/ldd/r5fixlist.nsf/8d1c0550e6242b69852570c900549a74/52f9218288b51dcb852576c600741f72?OpenDocument)
7. [41433](http://secunia.com/advisories/41433)
8. [](http://labs.mwrinfosecurity.com/files/Advisories/mwri_lotus-domino-ical-stack-overflow_2010-09-14.pdf)
9. [](http://www-10.lotus.com/ldd/r5fixlist.nsf/8d1c0550e6242b69852570c900549a74/613a204806e3f211852576e2006afa3d?OpenDocument)
10. [](http://www-01.ibm.com/support/docview.wss?uid=swg21446515)
11. [1024448](http://securitytracker.com/id?1024448)
12. [15005](http://www.exploit-db.com/exploits/15005)
13. [](http://labs.mwrinfosecurity.com/advisories/lotus_domino_ical_stack_buffer_overflow/)
14. [20100914 ZDI-10-177: IBM Lotus Domino iCalendar MAILTO Stack Overflow Vulnerability](http://www.securityfocus.com/archive/1/513706/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22421
- **State**: PUBLISHED
- **Published Date**: March 05, 2023 at 00:00 UTC
- **Last Updated**: March 07, 2025 at 18:15 UTC
- **Reserved Date**: December 28, 2022 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Out-of-bounds read vulnerability exists in Kostac PLC Programming Software (Former name: Koyo PLC Programming Software) Version 1.6.9.0 and earlier. The insufficient buffer size for the PLC program instructions leads to out-of-bounds read. As a result, opening a specially crafted project file may lead to information disclosure and/or arbitrary code execution.
### Affected Products
**JTEKT ELECTRONICS CORPORATION - Kostac PLC Programming Software (Former name: Koyo PLC Programming Software)**
Affected versions:
- Version 1.6.9.0 and earlier (Status: affected)
### References
1. [](https://www.electronics.jtekt.co.jp/en/topics/202303035258/)
2. [](https://www.electronics.jtekt.co.jp/jp/topics/2023030313639/)
3. [](https://jvn.jp/en/vu/JVNVU94966432/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3969, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3969
- **State**: PUBLISHED
- **Published Date**: November 13, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 13:15 UTC
- **Reserved Date**: November 13, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in OpenKM up to 6.3.11 and classified as problematic. Affected by this issue is the function getFileExtension of the file src/main/java/com/openkm/util/FileUtils.java. The manipulation leads to insecure temporary file. Upgrading to version 6.3.12 is able to address this issue. The name of the patch is c069e4d73ab8864345c25119d8459495f45453e1. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213548.
### CVSS Metrics
- **CVSS Base Score**: 2.6/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-377: Security Weakness
### Affected Products
**unspecified - OpenKM**
Affected versions:
- 6.3.0 (Status: affected)
- 6.3.1 (Status: affected)
- 6.3.2 (Status: affected)
- 6.3.3 (Status: affected)
- 6.3.4 (Status: affected)
- 6.3.5 (Status: affected)
- 6.3.6 (Status: affected)
- 6.3.7 (Status: affected)
- 6.3.8 (Status: affected)
- 6.3.9 (Status: affected)
- 6.3.10 (Status: affected)
- 6.3.11 (Status: affected)
### References
1. [](https://github.com/openkm/document-management-system/pull/332)
2. [](https://github.com/openkm/document-management-system/releases/tag/v6.3.12)
3. [](https://github.com/openkm/document-management-system/commit/c069e4d73ab8864345c25119d8459495f45453e1)
4. [](https://vuldb.com/?id.213548) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6809, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6809 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6809
- **State**: PUBLISHED
- **Published Date**: March 13, 2024 at 15:27 UTC
- **Last Updated**: August 02, 2024 at 08:42 UTC
- **Reserved Date**: December 13, 2023 at 21:38 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Custom fields shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's cf shortcode in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping on user supplied custom post meta values. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**gonahkar - Custom fields shortcode**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/99d3d5aa-dd82-415a-bc40-9d2c677d9248?source=cve)
2. [](https://wordpress.org/plugins/beepress/)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44994, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44994
- **State**: PUBLISHED
- **Published Date**: September 04, 2024 at 19:54 UTC
- **Last Updated**: May 04, 2025 at 09:30 UTC
- **Reserved Date**: August 21, 2024 at 05:34 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
iommu: Restore lost return in iommu_report_device_fault()
When iommu_report_device_fault gets called with a partial fault it is
supposed to collect the fault into the group and then return.
Instead the return was accidently deleted which results in trying to
process the fault and an eventual crash.
Deleting the return was a typo, put it back.
### Affected Products
**Linux - Linux**
Affected versions:
- 3dfa64aecbafc288216b2790438d395add192c30 (Status: affected)
- 3dfa64aecbafc288216b2790438d395add192c30 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.9 (Status: affected)
- 0 (Status: unaffected)
- 6.10.7 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/cc6bc2ab1663ec9353636416af22452b078510e9)
2. [](https://git.kernel.org/stable/c/fca5b78511e98bdff2cdd55c172b23200a7b3404) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1037, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1037 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1037
- **State**: PUBLISHED
- **Published Date**: April 10, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:35 UTC
- **Reserved Date**: April 10, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in AIX 5.3.0, when configured as an NIS client, allows remote attackers to gain root privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [IY68825](http://www-1.ibm.com/support/search.wss?rs=0&q=IY68825&apar=only)
2. [14856](http://secunia.com/advisories/14856)
3. [](http://www.niscc.gov.uk/niscc/docs/br-20050405-00278.html?lang=en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23450, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23450
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 17:03 UTC
- **Last Updated**: February 13, 2025 at 17:39 UTC
- **Reserved Date**: January 16, 2024 at 21:31 UTC
- **Assigned By**: elastic
### Vulnerability Description
A flaw was discovered in Elasticsearch, where processing a document in a deeply nested pipeline on an ingest node could cause the Elasticsearch node to crash.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Elastic - Elasticsearch**
Affected versions:
- 7.0.0 (Status: affected)
- 8.0.0 (Status: affected)
### References
1. [](https://discuss.elastic.co/t/elasticsearch-8-13-0-7-17-19-security-update-esa-2024-06/356314)
2. [](https://www.elastic.co/community/security)
3. [](https://security.netapp.com/advisory/ntap-20240517-0010/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22520, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22520 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22520
- **State**: PUBLISHED
- **Published Date**: September 14, 2022 at 14:05 UTC
- **Last Updated**: September 17, 2024 at 04:14 UTC
- **Reserved Date**: January 03, 2022 at 00:00 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
A remote, unauthenticated attacker can enumerate valid users by sending specific requests to the webservice of MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-204: Improper Input Validation
### Affected Products
**MB connect line - mymbCONNECT24**
Affected versions:
- 2 (Status: affected)
**MB connect line - mbCONNECT24**
Affected versions:
- 2 (Status: affected)
**Helmholz - myREX24**
Affected versions:
- 2 (Status: affected)
**Helmholz - myREX24.virtual**
Affected versions:
- 2 (Status: affected)
### References
1. [](https://cert.vde.com/en/advisories/VDE-2022-039)
2. [](https://cert.vde.com/en/advisories/VDE-2022-011)
### Credits
- SySS GmbH reported this vulnerability to Helmholz. Helmholz reported this vulnerability to MB connect line. CERT@VDE coordinated with Helmholz & MB connect line. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3793, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3793
- **State**: PUBLISHED
- **Published Date**: May 31, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:57 UTC
- **Reserved Date**: May 20, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
VMware Tools in VMware Workstation 10.x before 10.0.2, VMware Player 6.x before 6.0.2, VMware Fusion 6.x before 6.0.3, and VMware ESXi 5.0 through 5.5, when a Windows 8.1 guest OS is used, allows guest OS users to gain guest OS privileges or cause a denial of service (kernel NULL pointer dereference and guest OS crash) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.vmware.com/security/advisories/VMSA-2014-0005.html)
2. [](http://packetstormsecurity.com/files/126869/VMware-Security-Advisory-2014-0005.html)
3. [1030310](http://www.securitytracker.com/id/1030310)
4. [1030311](http://www.securitytracker.com/id/1030311)
5. [20140530 NEW VMSA-2014-0005 - VMware Workstation, Player, Fusion, and ESXi patches address a guest privilege escalation](http://www.securityfocus.com/archive/1/532236/100/0/threaded)
6. [58894](http://secunia.com/advisories/58894) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9553, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9553
- **State**: PUBLISHED
- **Published Date**: January 28, 2017 at 12:38 UTC
- **Last Updated**: August 06, 2024 at 02:50 UTC
- **Reserved Date**: November 22, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Sophos Web Appliance (version 4.2.1.3) is vulnerable to two Remote Command Injection vulnerabilities affecting its web administrative interface. These vulnerabilities occur in the MgrReport.php (/controllers/MgrReport.php) component responsible for blocking and unblocking IP addresses from accessing the device. The device doesn't properly escape the information passed in the variables 'unblockip' and 'blockip' before calling the shell_exec() function which allows for system commands to be injected into the device. The code erroneously suggests that the information handled is protected by utilizing the variable name 'escapedips' - however this was not the case. The Sophos ID is NSWA-1258.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://swa.sophos.com/rn/swa/concepts/ReleaseNotes_4.3.1.html)
2. [95853](http://www.securityfocus.com/bid/95853)
3. [](https://community.sophos.com/products/web-appliance/b/blog/posts/release-of-swa-version-4-3-1)
4. [](http://pastebin.com/DUYuN0U5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8511, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8511 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8511
- **State**: PUBLISHED
- **Published Date**: March 23, 2020 at 15:12 UTC
- **Last Updated**: August 04, 2024 at 10:03 UTC
- **Reserved Date**: January 31, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Artica Pandora FMS through 7.42, Web Admin users can execute arbitrary code by uploading a .php file via the File Repository component, a different issue than CVE-2020-7935 and CVE-2020-8500.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://k4m1ll0.com/cve-2020-8511.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46760, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46760 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46760
- **State**: PUBLISHED
- **Published Date**: November 08, 2023 at 09:30 UTC
- **Last Updated**: September 04, 2024 at 19:31 UTC
- **Reserved Date**: October 26, 2023 at 11:32 UTC
- **Assigned By**: huawei
### Vulnerability Description
Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 4.0.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 13.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2023/11/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-29537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-29537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-29537
- **State**: PUBLISHED
- **Published Date**: January 29, 2021 at 06:33 UTC
- **Last Updated**: August 04, 2024 at 16:55 UTC
- **Reserved Date**: December 03, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Archer before 6.8 P2 (6.8.0.2) is affected by an open redirect vulnerability. A remote privileged attacker may potentially redirect legitimate users to arbitrary web sites and conduct phishing attacks. The attacker could then steal the victims' credentials and silently authenticate them to the Archer application without the victims realizing an attack occurred.
### CVSS Metrics
- **CVSS Base Score**: 4.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:N/C:L/I:L/PR:L/S:U/UI:R`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.rsa.com/en-us/company/vulnerability-response-policy)
2. [](https://community.rsa.com/docs/DOC-115223) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0817
- **State**: PUBLISHED
- **Published Date**: September 17, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:31 UTC
- **Reserved Date**: August 25, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2004:465](http://www.redhat.com/support/errata/RHSA-2004-465.html)
2. [DSA-548](http://www.debian.org/security/2004/dsa-548)
3. [MDKSA-2004:089](http://www.mandriva.com/security/advisories?name=MDKSA-2004:089)
4. [imlib-bmp-bo(17182)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17182)
5. [201611](http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1)
6. [CLA-2004:870](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870)
7. [11084](http://www.securityfocus.com/bid/11084)
8. [oval:org.mitre.oval:def:8843](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843)
9. [GLSA-200409-12](http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2149
- **State**: PUBLISHED
- **Published Date**: April 18, 2023 at 12:31 UTC
- **Last Updated**: February 05, 2025 at 16:32 UTC
- **Reserved Date**: April 18, 2023 at 10:47 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in Campcodes Online Thesis Archiving System 1.0. This vulnerability affects unknown code of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226270 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Campcodes - Online Thesis Archiving System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.226270)
2. [](https://vuldb.com/?ctiid.226270)
3. [](https://github.com/E1CHO/cve_hub/blob/main/Online%20Thesis%20Archiving%20System/Online%20Thesis%20Archiving%20System%20-%20vuln%207.pdf)
### Credits
- SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-44895, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-44895 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-44895
- **State**: PUBLISHED
- **Published Date**: May 21, 2025 at 00:00 UTC
- **Last Updated**: May 21, 2025 at 17:48 UTC
- **Reserved Date**: April 22, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the ipv4Aclkey parameter in the web_acl_ipv4BasedAceAdd function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://lafdrew.github.io/2025/04/18/web-acl-ipv4BasedAceAdd-post-ipv4Acl-StackOverflow/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1136, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1136 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1136
- **State**: PUBLISHED
- **Published Date**: April 10, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 04:33 UTC
- **Reserved Date**: January 16, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Use-after-free vulnerability in CoreAnimation in Apple OS X before 10.10.3 allows remote attackers to execute arbitrary code by leveraging improper use of a mutex.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT204659)
2. [73982](http://www.securityfocus.com/bid/73982)
3. [1032048](http://www.securitytracker.com/id/1032048)
4. [APPLE-SA-2015-04-08-2](http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0174, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0174 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0174
- **State**: PUBLISHED
- **Published Date**: February 06, 2023 at 19:59 UTC
- **Last Updated**: March 25, 2025 at 20:42 UTC
- **Reserved Date**: January 11, 2023 at 03:09 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP VR WordPress plugin before 8.2.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - WP VR**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/6b53d0e6-def9-4907-bd2b-884b2afa52b3)
### Credits
- Lana Codes
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23551, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23551 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23551
- **State**: PUBLISHED
- **Published Date**: January 21, 2025 at 17:21 UTC
- **Last Updated**: January 21, 2025 at 18:43 UTC
- **Reserved Date**: January 16, 2025 at 11:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in P. Razvan SexBundle allows Reflected XSS. This issue affects SexBundle: from n/a through 1.4.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**P. Razvan - SexBundle**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/sexbundle/vulnerability/wordpress-sexbundle-plugin-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.