System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41915, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41915 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41915
- **State**: PUBLISHED
- **Published Date**: July 30, 2024 at 17:07 UTC
- **Last Updated**: August 02, 2024 at 04:46 UTC
- **Reserved Date**: July 23, 2024 at 15:57 UTC
- **Assigned By**: hpe
### Vulnerability Description
A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit this vulnerability to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Hewlett Packard Enterprise (HPE) - ClearPass Policy Manager (CPPM)**
Affected versions:
- ClearPass Policy Manager 6.12.1 and below (Status: affected)
- ClearPass Policy Manager 6.11.8 and below (Status: affected)
### References
1. [](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04675en_us&docLocale=en_US)
### Credits
- security team at Cabridge University [CN2][GN3] |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1343, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1343
- **State**: PUBLISHED
- **Published Date**: April 09, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 01:21 UTC
- **Reserved Date**: April 09, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in photo.php in SiteX 0.7.4 beta allows remote attackers to execute arbitrary SQL commands via the albumid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [11881](http://www.exploit-db.com/exploits/11881)
2. [sitexcms-photo-sql-injection(57173)](https://exchange.xforce.ibmcloud.com/vulnerabilities/57173)
3. [38976](http://www.securityfocus.com/bid/38976) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42959, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42959 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42959
- **State**: PUBLISHED
- **Published Date**: July 29, 2024 at 20:21 UTC
- **Last Updated**: August 02, 2024 at 19:37 UTC
- **Reserved Date**: September 14, 2023 at 19:05 UTC
- **Assigned By**: apple
### Vulnerability Description
A race condition was addressed with improved state handling. This issue is fixed in macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213940) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23329, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23329 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23329
- **State**: PUBLISHED
- **Published Date**: January 19, 2024 at 19:49 UTC
- **Last Updated**: November 13, 2024 at 17:15 UTC
- **Reserved Date**: January 15, 2024 at 15:19 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
changedetection.io is an open source tool designed to monitor websites for content changes. In affected versions the API endpoint `/api/v1/watch/<uuid>/history` can be accessed by any unauthorized user. As a result any unauthorized user can check one's watch history. However, because unauthorized party first needs to know a watch UUID, and the watch history endpoint itself returns only paths to the snapshot on the server, an impact on users' data privacy is minimal. This issue has been addressed in version 0.45.13. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**dgtlmoon - changedetection.io**
Affected versions:
- >= 0.39.14, < 0.45.13 (Status: affected)
### References
1. [https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-hcvp-2cc7-jrwr](https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-hcvp-2cc7-jrwr)
2. [https://github.com/dgtlmoon/changedetection.io/commit/402f1e47e78ecd155b1e90f30cce424ff7763e0f](https://github.com/dgtlmoon/changedetection.io/commit/402f1e47e78ecd155b1e90f30cce424ff7763e0f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4223, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4223 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4223
- **State**: PUBLISHED
- **Published Date**: November 01, 2011 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 00:01 UTC
- **Reserved Date**: November 01, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Investintech.com Absolute PDF Server allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [absolute-pdf-code-execution(71094)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71094)
2. [VU#275036](http://www.kb.cert.org/vuls/id/275036) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9518, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9518 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9518
- **State**: PUBLISHED
- **Published Date**: June 08, 2017 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 04:04 UTC
- **Reserved Date**: June 08, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
atmail before 7.8.0.2 has CSRF, allowing an attacker to change the SMTP hostname and hijack all emails.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://help.atmail.com/hc/en-us/articles/115007169147-Minor-Update-7-8-0-2-ActiveSync-2-3-6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3140, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3140
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: May 02, 2014 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16448, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16448
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: November 01, 2017 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-7062, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-7062 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-7062
- **State**: PUBLISHED
- **Published Date**: July 10, 2024 at 02:02 UTC
- **Last Updated**: August 02, 2024 at 08:50 UTC
- **Reserved Date**: December 21, 2023 at 17:26 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Advanced File Manager Shortcodes plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4. This makes it possible for attackers with contributor access or higher to read the contents of arbitrary files on the server, which can contain sensitive information.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Advanced File Manager - Advanced File Manager Shortcodes**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/8bf009f5-cf9e-4d38-9679-d3abb5817d30?source=cve)
2. [](https://advancedfilemanager.com/product/file-manager-advanced-shortcode-wordpress/)
### Credits
- Colin Xu |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24447, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24447
- **State**: PUBLISHED
- **Published Date**: April 08, 2025 at 20:02 UTC
- **Last Updated**: April 22, 2025 at 21:49 UTC
- **Reserved Date**: January 21, 2025 at 17:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user resulting in a High impact to Confidentiality and Integrity. Exploitation of this issue does not require user interaction.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Adobe - ColdFusion**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6020
- **State**: PUBLISHED
- **Published Date**: December 31, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 07:06 UTC
- **Reserved Date**: August 14, 2015 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
ZyXEL PMG5318-B20A devices with firmware 1.00AANC0b5 allow remote authenticated users to obtain administrative privileges by leveraging access to the user account.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1034553](http://www.securitytracker.com/id/1034553)
2. [](https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R)
3. [VU#870744](https://www.kb.cert.org/vuls/id/870744) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2102, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2102 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2102
- **State**: PUBLISHED
- **Published Date**: June 24, 2022 at 15:00 UTC
- **Last Updated**: April 16, 2025 at 16:16 UTC
- **Reserved Date**: June 16, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Controls limiting uploads to certain file extensions may be bypassed. This could allow an attacker to intercept the initial file upload page response and modify the associated code. This modified code can be forwarded and used by a script loaded later in the sequence, allowing for arbitrary file upload into a location where PHP scripts may be executed.
### CVSS Metrics
- **CVSS Base Score**: 9.4/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H`
### Weakness Classification (CWE)
- CWE-841: Security Weakness
### Affected Products
**Secheron - SEPCOS Control and Protection Relay firmware package**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-03)
### Credits
- Anthony Candarini of AECOM, Clark Bradley of Elliott Davis, Mike Curnow of AECOM, and Balakrishna Subramoney of SAM Analytic Solutions reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9380, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9380 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9380
- **State**: PUBLISHED
- **Published Date**: January 23, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 02:50 UTC
- **Reserved Date**: November 17, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The pygrub boot loader emulator in Xen, when nul-delimited output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via NUL bytes in the bootloader configuration file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://xenbits.xen.org/xsa/xsa198.patch)
2. [94473](http://www.securityfocus.com/bid/94473)
3. [GLSA-201612-56](https://security.gentoo.org/glsa/201612-56)
4. [](http://xenbits.xen.org/xsa/advisory-198.html)
5. [1037347](http://www.securitytracker.com/id/1037347)
6. [](https://support.citrix.com/article/CTX218775) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30494, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30494 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30494
- **State**: PUBLISHED
- **Published Date**: April 14, 2021 at 14:50 UTC
- **Last Updated**: August 03, 2024 at 22:32 UTC
- **Reserved Date**: April 11, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the Razer Chroma SDK subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other words, an attacker can create a file in an unintended directory (with some limitations).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://versprite.com/security-resources/)
2. [](https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/)
3. [](https://versprite.com/advisories/razer-synapse-3-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14475, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14475
- **State**: PUBLISHED
- **Published Date**: May 09, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 23:56 UTC
- **Reserved Date**: September 13, 2017 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
In the MMM::Agent::Helpers::Network::add_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Linux), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability.
### Affected Products
**Talos - MySql MMM**
Affected versions:
- MMM 2.2.1 (Status: affected)
### References
1. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0501) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1570, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1570 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1570
- **State**: PUBLISHED
- **Published Date**: July 14, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 22:20 UTC
- **Reserved Date**: July 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Windows XP with fast user switching and account lockout enabled allows local users to deny user account access by setting the fast user switch to the same user (self) multiple times, which causes other accounts to be locked out.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3717](http://www.securityfocus.com/bid/3717)
2. [winxp-fastswitch-account-lockout(7731)](http://www.iss.net/security_center/static/7731.php)
3. [20011220 Windows XP security concerns](http://archives.neohapsis.com/archives/bugtraq/2001-12/0213.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41676, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41676
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 18:05 UTC
- **Last Updated**: August 30, 2024 at 18:13 UTC
- **Reserved Date**: August 30, 2023 at 13:42 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An exposure of sensitive information to an unauthorized actor [CWE-200] in FortiSIEM version 7.0.0 and before 6.7.5 may allow an attacker with access to windows agent logs to obtain the windows agent password via searching through the logs.
### CVSS Metrics
- **CVSS Base Score**: 4.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:X/RC:C`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Fortinet - FortiSIEM**
Affected versions:
- 7.0.0 (Status: affected)
- 6.7.0 (Status: affected)
### References
1. [https://fortiguard.com/psirt/FG-IR-23-290](https://fortiguard.com/psirt/FG-IR-23-290) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2861, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2861 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2861
- **State**: PUBLISHED
- **Published Date**: September 08, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 23:32 UTC
- **Reserved Date**: September 08, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in N-Stealth Commercial Edition before 5.8.0.38 and Free Edition before 5.8.1.03 allows remote attackers to inject arbitrary web script or HTML via the Server field in an HTTP response header, which is directly injected into an HTML report.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14717](http://www.securityfocus.com/bid/14717)
2. [20050901 CYBSEC - Multiple Vendor Web Vulnerability Scanner Arbitrary Script Injection Vulnerability](http://seclists.org/lists/vulnwatch/2005/Jul-Sep/0032.html)
3. [](http://www.cybsec.com/vuln/010905-multiple_webscanner_script_injection.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37351, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37351 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37351
- **State**: PUBLISHED
- **Published Date**: August 13, 2021 at 11:29 UTC
- **Last Updated**: August 04, 2024 at 01:16 UTC
- **Reserved Date**: July 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Nagios XI before version 5.8.5 is vulnerable to insecure permissions and allows unauthenticated users to access guarded pages through a crafted HTTP request to the server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nagios.com/downloads/nagios-xi/change-log/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4685, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4685
- **State**: PUBLISHED
- **Published Date**: July 24, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 11:27 UTC
- **Reserved Date**: June 28, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows local users to gain privileges by leveraging weak system-object access control.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23382, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23382 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23382
- **State**: PUBLISHED
- **Published Date**: March 19, 2025 at 15:20 UTC
- **Last Updated**: March 19, 2025 at 20:17 UTC
- **Reserved Date**: January 15, 2025 at 06:04 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.26, contain(s) an Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.c
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-497: Security Weakness
### Affected Products
**Dell - Secure Connect Gateway (SCG) 5.0 Appliance - SRS**
Affected versions:
- 5.26.00.20 (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-uk/000291028/dell-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49246, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49246 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49246
- **State**: PUBLISHED
- **Published Date**: December 06, 2023 at 09:01 UTC
- **Last Updated**: May 28, 2025 at 15:46 UTC
- **Reserved Date**: November 24, 2023 at 07:33 UTC
- **Assigned By**: huawei
### Vulnerability Description
Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 4.0.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
- 2.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 13.0.0 (Status: affected)
- 12.0.0 (Status: affected)
- 11.0.1 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2023/12/)
2. [](https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28836, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28836
- **State**: PUBLISHED
- **Published Date**: April 03, 2024 at 00:00 UTC
- **Last Updated**: November 18, 2024 at 21:32 UTC
- **Reserved Date**: March 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Mbed TLS 3.5.x before 3.6.0. When negotiating the TLS version on the server side, it can fall back to the TLS 1.2 implementation of the protocol if it is disabled. If the TLS 1.2 implementation was disabled at build time, a TLS 1.2 client could put a TLS 1.3-only server into an infinite loop processing a TLS 1.2 ClientHello, resulting in a denial of service. If the TLS 1.2 implementation was disabled at runtime, a TLS 1.2 client can successfully establish a TLS 1.2 connection with the server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/)
2. [](https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1010235, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1010235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1010235
- **State**: PUBLISHED
- **Published Date**: July 22, 2019 at 14:52 UTC
- **Last Updated**: August 05, 2024 at 03:07 UTC
- **Reserved Date**: March 20, 2019 at 00:00 UTC
- **Assigned By**: dwf
### Vulnerability Description
Frog CMS 1.1 is affected by: Cross Site Scripting (XSS). The impact is: Cookie stealing, Alert pop-up on page, Redirecting to another phishing site, Executing browser exploits. The component is: Snippets.
### Affected Products
**Frog CMS - Frog CMS**
Affected versions:
- 1.1 (Status: affected)
### References
1. [](https://somerandomshitwbu.blogspot.com/2019/01/stored-xss-in-frog-cms-open-source.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2157
- **State**: PUBLISHED
- **Published Date**: April 22, 2021 at 21:53 UTC
- **Last Updated**: September 26, 2024 at 15:34 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: TopLink Integration). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Oracle Corporation - TopLink**
Affected versions:
- 10.3.6.0.0 (Status: affected)
- 12.1.3.0.0 (Status: affected)
- 12.2.1.3.0 (Status: affected)
- 12.2.1.4.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3115, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3115
- **State**: PUBLISHED
- **Published Date**: August 11, 2017 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 02:01 UTC
- **Reserved Date**: December 02, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an information disclosure vulnerability when handling links in a PDF document.
### Affected Products
**Adobe Systems Incorporated - Acrobat Reader**
Affected versions:
- 2017.009.20058 and earlier (Status: affected)
- 2017.008.30051 and earlier (Status: affected)
- 2015.006.30306 and earlier (Status: affected)
- 11.0.20 and earlier (Status: affected)
### References
1. [100187](http://www.securityfocus.com/bid/100187)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb17-24.html)
3. [1039098](http://www.securitytracker.com/id/1039098) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7037, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7037 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7037
- **State**: PUBLISHED
- **Published Date**: April 28, 2021 at 21:30 UTC
- **Last Updated**: September 16, 2024 at 22:36 UTC
- **Reserved Date**: January 14, 2020 at 00:00 UTC
- **Assigned By**: avaya
### Vulnerability Description
An XML External Entities (XXE) vulnerability in Media Server component of Avaya Equinox Conferencing could allow an authenticated, remote attacker to gain read access to information that is stored on an affected system or even potentially lead to a denial of service. The affected versions of Avaya Equinox Conferencing includes all 9.x versions before 9.1.11. Equinox Conferencing is now offered as Avaya Meetings Server.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H`
### Weakness Classification (CWE)
- CWE-611: Security Weakness
### Affected Products
**Avaya - Avaya Meetings Server**
Affected versions:
- 9.x (Status: affected)
### References
1. [](https://support.avaya.com/css/P8/documents/101075574) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0809, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0809 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0809
- **State**: PUBLISHED
- **Published Date**: February 21, 2006 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 16:48 UTC
- **Reserved Date**: February 21, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Skate Board 0.9 allow remote attackers to execute arbitrary SQL commands via the (1) usern parameter in (a) sendpass.php, and the (2) usern and (3) passwd parameters and (4) sf_cookie cookie in (b) login.php and (c) logged.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16936](http://www.securityfocus.com/bid/16936)
2. [23302](http://www.osvdb.org/23302)
3. [23303](http://www.osvdb.org/23303)
4. [](http://evuln.com/vulns/84/summary.html)
5. [skateboard-authentication-bypass(24779)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24779)
6. [20060303 [eVuln] Skate Board Multimple Vulnerabilities](http://www.securityfocus.com/archive/1/426658/30/0/threaded)
7. [skateboard-sendpass-sql-injection(24778)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24778)
8. [540](http://securityreason.com/securityalert/540)
9. [18978](http://secunia.com/advisories/18978)
10. [23301](http://www.osvdb.org/23301) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1937, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1937 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1937
- **State**: PUBLISHED
- **Published Date**: August 21, 2019 at 18:25 UTC
- **Last Updated**: September 16, 2024 at 22:52 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to use the acquired session token to gain full administrator access to the affected device.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Cisco - Cisco Unified Computing System Director**
Affected versions:
- unspecified (Status: affected)
### References
1. [20190821 Cisco Integrated Management Controller Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Authentication Bypass Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-authby)
2. [20190828 Multiple vulns in Cisco UCS Director: from unauth remote access to code execution as root](https://seclists.org/bugtraq/2019/Aug/49)
3. [](http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html)
4. [20190830 Multiple vulns in Cisco UCS Director: from unauth remote access to code execution as root](http://seclists.org/fulldisclosure/2019/Aug/36)
5. [](http://packetstormsecurity.com/files/154308/Cisco-UCS-Director-Unauthenticated-Remote-Code-Execution.html)
6. [](http://packetstormsecurity.com/files/173531/Cisco-UCS-IMC-Supervisor-2.2.0.0-Authentication-Bypass.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5969, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5969
- **State**: PUBLISHED
- **Published Date**: December 10, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 15:47 UTC
- **Reserved Date**: November 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28343](http://secunia.com/advisories/28343)
2. [GLSA-200804-04](http://security.gentoo.org/glsa/glsa-200804-04.xml)
3. [29706](http://secunia.com/advisories/29706)
4. [](http://bugs.mysql.com/32111)
5. [oval:org.mitre.oval:def:10509](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10509)
6. [31681](http://www.securityfocus.com/bid/31681)
7. [](http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-51.html)
8. [DSA-1451](http://www.debian.org/security/2008/dsa-1451)
9. [](http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html)
10. [1019060](http://www.securitytracker.com/id?1019060)
11. [ADV-2007-4142](http://www.vupen.com/english/advisories/2007/4142)
12. [USN-559-1](https://usn.ubuntu.com/559-1/)
13. [20080117 rPSA-2008-0018-1 mysql mysql-bench mysql-server](http://www.securityfocus.com/archive/1/486477/100/0/threaded)
14. [ADV-2008-1000](http://www.vupen.com/english/advisories/2008/1000/references)
15. [SSA:2007-348-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959)
16. [ADV-2008-0560](http://www.vupen.com/english/advisories/2008/0560/references)
17. [26765](http://www.securityfocus.com/bid/26765)
18. [FEDORA-2007-4465](https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html)
19. [28040](http://secunia.com/advisories/28040)
20. [RHSA-2007:1157](http://www.redhat.com/support/errata/RHSA-2007-1157.html)
21. [28099](http://secunia.com/advisories/28099)
22. [28559](http://secunia.com/advisories/28559)
23. [32222](http://secunia.com/advisories/32222)
24. [27981](http://secunia.com/advisories/27981)
25. [ADV-2007-4198](http://www.vupen.com/english/advisories/2007/4198)
26. [FEDORA-2007-4471](https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html)
27. [](http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html)
28. [[Announcements] 20071206 MySQL 5.0.51 has been released](http://lists.mysql.com/announce/495)
29. [RHSA-2007:1155](http://www.redhat.com/support/errata/RHSA-2007-1155.html)
30. [28108](http://secunia.com/advisories/28108)
31. [28025](http://secunia.com/advisories/28025)
32. [ADV-2008-2780](http://www.vupen.com/english/advisories/2008/2780)
33. [](http://forums.mysql.com/read.php?3%2C186931%2C186931)
34. [28838](http://secunia.com/advisories/28838)
35. [28128](http://secunia.com/advisories/28128)
36. [MDKSA-2007:243](http://www.mandriva.com/security/advisories?name=MDKSA-2007:243)
37. [28063](http://secunia.com/advisories/28063)
38. [SUSE-SR:2008:003](http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html)
39. [APPLE-SA-2008-10-09](http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html)
40. [](http://support.apple.com/kb/HT3216)
41. [](https://issues.rpath.com/browse/RPL-1999) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4857, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4857 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4857
- **State**: REJECTED
- **Published Date**: April 17, 2019 at 13:34 UTC
- **Last Updated**: April 17, 2019 at 13:34 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4048, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4048 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4048
- **State**: PUBLISHED
- **Published Date**: December 15, 2016 at 06:31 UTC
- **Last Updated**: August 06, 2024 at 00:17 UTC
- **Reserved Date**: April 20, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Open-Xchange OX App Suite before 7.8.1-rev11. Custom messages can be shown at the login screen to notify external users about issues with sharing links. This mechanism can be abused to inject arbitrary text messages. Users may get tricked to follow instructions injected by third parties as part of social engineering attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036157](http://www.securitytracker.com/id/1036157)
2. [20160622 Open-Xchange Security Advisory 2016-06-22](http://www.securityfocus.com/archive/1/538732/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29847
- **State**: PUBLISHED
- **Published Date**: April 14, 2023 at 00:00 UTC
- **Last Updated**: February 06, 2025 at 20:39 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AeroCMS v0.0.1 was discovered to contain multiple stored cross-site scripting (XSS) vulnerabilities via the comment_author and comment_content parameters at /post.php. These vulnerabilities allow attackers to execute arbitrary web scripts or HTML via a crafted payload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/MegaTKC/AeroCMS/issues/11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1128, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1128
- **State**: PUBLISHED
- **Published Date**: February 08, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 13:25 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Rational DOORS Next Generation 4.0, 5.0, and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
### Affected Products
**IBM Corporation - Rational DOORS Next Generation**
Affected versions:
- 4.0.1 (Status: affected)
- 4.0.5 (Status: affected)
- 5.0.2 (Status: affected)
- 4.0.2 (Status: affected)
- 4.0.3 (Status: affected)
- 4.0.4 (Status: affected)
- 4.0.6 (Status: affected)
- 4.0.7 (Status: affected)
- 5.0 (Status: affected)
- 5.0.1 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
### References
1. [96017](http://www.securityfocus.com/bid/96017)
2. [](http://www.ibm.com/support/docview.wss?uid=swg21996645) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-48237, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-48237 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48237
- **State**: PUBLISHED
- **Published Date**: October 25, 2024 at 00:00 UTC
- **Last Updated**: October 31, 2024 at 17:50 UTC
- **Reserved Date**: October 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WTCMS 1.0 is vulnerable to Incorrect Access Control in \Common\Controller\HomebaseController.class.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/taosir/wtcms/issues/15) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1525
- **State**: PUBLISHED
- **Published Date**: March 18, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:26 UTC
- **Reserved Date**: February 23, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in ASTAware SearchDisk engine for Sun ONE Starter Kit 2.0 allows remote attackers to read arbitrary files via a .. (dot dot) attack on port (1) 6015 or (2) 6016, or (3) an absolute pathname to port 6017.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020929 [LoWNOISE] "Get Knowledge" SunONE Starter Kit - Sun Microsystems/Astaware](http://online.securityfocus.com/archive/1/293545)
2. [5828](http://www.securityfocus.com/bid/5828)
3. [sunone-starterkit-search-traversal(10225)](http://www.iss.net/security_center/static/10225.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0016, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0016 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0016
- **State**: PUBLISHED
- **Published Date**: September 24, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 07:32 UTC
- **Reserved Date**: December 13, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSA:2008-269-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232)
2. [DSA-1697](http://www.debian.org/security/2009/dsa-1697)
3. [1020913](http://www.securitytracker.com/id?1020913)
4. [FEDORA-2008-8401](https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html)
5. [USN-645-1](http://www.ubuntu.com/usn/usn-645-1)
6. [MDVSA-2008:206](http://www.mandriva.com/security/advisories?name=MDVSA-2008:206)
7. [32144](http://secunia.com/advisories/32144)
8. [32010](http://secunia.com/advisories/32010)
9. [ADV-2009-0977](http://www.vupen.com/english/advisories/2009/0977)
10. [USN-645-2](http://www.ubuntu.com/usn/usn-645-2)
11. [31985](http://secunia.com/advisories/31985)
12. [SUSE-SA:2008:050](http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html)
13. [](https://bugzilla.mozilla.org/show_bug.cgi?id=443288)
14. [31984](http://secunia.com/advisories/31984)
15. [32185](http://secunia.com/advisories/32185)
16. [32196](http://secunia.com/advisories/32196)
17. [DSA-1669](http://www.debian.org/security/2008/dsa-1669)
18. [](https://bugzilla.mozilla.org/show_bug.cgi?id=451617)
19. [31397](http://www.securityfocus.com/bid/31397)
20. [32042](http://secunia.com/advisories/32042)
21. [33433](http://secunia.com/advisories/33433)
22. [ADV-2008-2661](http://www.vupen.com/english/advisories/2008/2661)
23. [SSA:2008-269-02](http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422)
24. [256408](http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1)
25. [32092](http://secunia.com/advisories/32092)
26. [MDVSA-2008:205](http://www.mandriva.com/security/advisories?name=MDVSA-2008:205)
27. [DSA-1696](http://www.debian.org/security/2009/dsa-1696)
28. [](http://download.novell.com/Download?buildid=WZXONb-tqBw~)
29. [FEDORA-2008-8429](https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html)
30. [RHSA-2008:0882](http://www.redhat.com/support/errata/RHSA-2008-0882.html)
31. [32845](http://secunia.com/advisories/32845)
32. [DSA-1649](http://www.debian.org/security/2008/dsa-1649)
33. [oval:org.mitre.oval:def:11579](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11579)
34. [32012](http://secunia.com/advisories/32012)
35. [33434](http://secunia.com/advisories/33434)
36. [SSA:2008-270-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123)
37. [32044](http://secunia.com/advisories/32044)
38. [](http://www.mozilla.org/security/announce/2008/mfsa2008-37.html)
39. [RHSA-2008:0908](http://www.redhat.com/support/errata/RHSA-2008-0908.html)
40. [34501](http://secunia.com/advisories/34501)
41. [32082](http://secunia.com/advisories/32082) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2834, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2834 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2834
- **State**: PUBLISHED
- **Published Date**: June 06, 2006 at 20:03 UTC
- **Last Updated**: August 07, 2024 at 18:06 UTC
- **Reserved Date**: June 05, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in includes/common.php in gnopaste 0.5.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [gnopaste-common-file-include(26744)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26744)
2. [](http://sourceforge.net/project/shownotes.php?release_id=421183&group_id=166450)
3. [1851](https://www.exploit-db.com/exploits/1851)
4. [ADV-2006-2078](http://www.vupen.com/english/advisories/2006/2078)
5. [1016189](http://securitytracker.com/id?1016189)
6. [](http://sourceforge.net/forum/forum.php?forum_id=576672)
7. [18180](http://www.securityfocus.com/bid/18180) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35707, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35707 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35707
- **State**: PUBLISHED
- **Published Date**: June 08, 2024 at 14:05 UTC
- **Last Updated**: August 02, 2024 at 03:14 UTC
- **Reserved Date**: May 17, 2024 at 10:09 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Team Heateor Heateor Social Login allows Stored XSS.This issue affects Heateor Social Login: from n/a through 1.1.32.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Team Heateor - Heateor Social Login**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/heateor-social-login/wordpress-heateor-social-login-wordpress-plugin-1-1-32-cross-site-scripting-xss-vulnerability-2?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45594, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45594 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45594
- **State**: PUBLISHED
- **Published Date**: December 26, 2021 at 00:41 UTC
- **Last Updated**: August 04, 2024 at 04:47 UTC
- **Reserved Date**: December 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBS50Y before 2.7.3.22, RBR20 before 2.7.3.22, RBR40 before 2.7.3.22, RBR50 before 2.7.3.22, RBS20 before 2.7.3.22, RBS40 before 2.7.3.22, RBS50 before 2.7.3.22, RBK20 before 2.7.3.22, RBK40 before 2.7.3.22, and RBK50 before 2.7.3.22.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000064475/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0183) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22850, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22850 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22850
- **State**: PUBLISHED
- **Published Date**: January 19, 2021 at 10:05 UTC
- **Last Updated**: September 17, 2024 at 01:16 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
HGiga EIP product lacks ineffective access control in certain pages that allow attackers to access database or perform privileged functions.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-732: Security Weakness
### Affected Products
**HGiga - OAKSv20 OAKlouds-document_v3**
Affected versions:
- 2.0 (Status: affected)
**HGiga - OAKSv30 OAKlouds-document_v3**
Affected versions:
- 3.0 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-4326-3d9d2-1.html)
2. [](https://www.chtsecurity.com/news/eb024200-7cf9-4c58-a063-c451dbc9daef) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13267, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13267
- **State**: REJECTED
- **Published Date**: January 07, 2019 at 18:00 UTC
- **Last Updated**: January 07, 2019 at 17:57 UTC
- **Reserved Date**: July 05, 2018 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7778, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7778 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7778
- **State**: PUBLISHED
- **Published Date**: July 03, 2018 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 01:07 UTC
- **Reserved Date**: March 08, 2018 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
In Schneider Electric Evlink Charging Station versions prior to v3.2.0-12_v1, the Web Interface has an issue that may allow a remote attacker to gain administrative privileges without properly authenticating remote users.
### Affected Products
**Schneider Electric SE - Evlink Charging Station**
Affected versions:
- Web Interface, all versions prior to v3.2.0-12_v1 (Status: affected)
### References
1. [](https://www.schneider-electric.com/en/download/document/SEVD-2018-109-01/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6646
- **State**: PUBLISHED
- **Published Date**: January 04, 2008 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 16:11 UTC
- **Reserved Date**: January 03, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in LiveCart 1.0.1, and possibly other versions before 1.1.0, allow remote attackers to inject arbitrary web script or HTML via (1) the return parameter to user/remindPassword, (2) the q parameter to the category script, (3) the return parameter to the order script, or (4) the email parameter to user/remindComplete.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27087](http://www.securityfocus.com/bid/27087)
2. [3512](http://securityreason.com/securityalert/3512)
3. [39756](http://osvdb.org/39756)
4. [20080201 LiveCart XSS vulnerability fixed since version 1.1.0](http://archives.neohapsis.com/archives/bugtraq/2008-02/0003.html)
5. [39758](http://osvdb.org/39758)
6. [20071230 LiveCart Multiple Cross-Site Scripting Vulnerabilities](http://www.securityfocus.com/archive/1/485654/100/0/threaded)
7. [livecart-multiple-xss(39305)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39305)
8. [39757](http://osvdb.org/39757)
9. [](http://livecart.com/news/Major-update-LiveCart-1-1-0.8)
10. [28017](http://secunia.com/advisories/28017)
11. [](http://www.hackerscenter.com/archive/view.asp?id=28144)
12. [1019151](http://www.securitytracker.com/id?1019151) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34815, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34815 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34815
- **State**: PUBLISHED
- **Published Date**: June 11, 2024 at 16:18 UTC
- **Last Updated**: August 02, 2024 at 02:59 UTC
- **Reserved Date**: May 09, 2024 at 12:14 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Codection Import and export users and customers.This issue affects Import and export users and customers: from n/a through 1.26.5.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Codection - Import and export users and customers**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/import-users-from-csv-with-meta/wordpress-import-and-export-users-and-customers-plugin-1-26-5-broken-access-control-vulnerability?_s_id=cve)
### Credits
- emad (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2369, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2369 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2369
- **State**: PUBLISHED
- **Published Date**: March 17, 2025 at 08:31 UTC
- **Last Updated**: March 17, 2025 at 16:22 UTC
- **Reserved Date**: March 16, 2025 at 12:52 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in TOTOLINK EX1800T up to 9.1.0cu.2112_B20220316. It has been classified as critical. Affected is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument admpass leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
- CWE-119: Security Weakness
### Affected Products
**TOTOLINK - EX1800T**
Affected versions:
- 9.1.0cu.2112_B20220316 (Status: affected)
### References
1. [VDB-299868 | TOTOLINK EX1800T cstecgi.cgi setPasswordCfg stack-based overflow](https://vuldb.com/?id.299868)
2. [VDB-299868 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.299868)
3. [Submit #515328 | Totolink EX1800T V9.1.0cu.2112_B20220316 Stack-based Buffer Overflow](https://vuldb.com/?submit.515328)
4. [](https://github.com/kn0sky/cve/blob/main/TOTOLINK%20EX1800T/Stack-based%20Buffer%20Overflow%2002%20setPasswordCfg-_admpass.md)
5. [](https://www.totolink.net/)
### Credits
- selph (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2618, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2618 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2618
- **State**: PUBLISHED
- **Published Date**: April 23, 2019 at 18:16 UTC
- **Last Updated**: October 02, 2024 at 15:46 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data as well as unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N).
### Affected Products
**Oracle Corporation - WebLogic Server**
Affected versions:
- 10.3.6.0.0 (Status: affected)
- 12.1.3.0.0 (Status: affected)
- 12.2.1.3.0 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3726, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3726 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3726
- **State**: PUBLISHED
- **Published Date**: July 19, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 18:39 UTC
- **Reserved Date**: July 19, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in FileCOPA FTP Server before 1.01 released on 18th July 2006, allows remote authenticated attackers to execute arbitrary code via a long argument to the LIST command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [filecopa-list-bo(27817)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27817)
2. [21108](http://secunia.com/advisories/21108)
3. [27389](http://www.osvdb.org/27389)
4. [](http://www.appsec.ch/docs/2006-07-19-fileCopa.txt)
5. [ADV-2006-2870](http://www.vupen.com/english/advisories/2006/2870)
6. [19065](http://www.securityfocus.com/bid/19065) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7209, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7209 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7209
- **State**: PUBLISHED
- **Published Date**: July 30, 2024 at 17:01 UTC
- **Last Updated**: February 13, 2025 at 17:58 UTC
- **Reserved Date**: July 29, 2024 at 13:05 UTC
- **Assigned By**: certcc
### Vulnerability Description
A vulnerability exists in the use of shared SPF records in multi-tenant hosting providers, allowing attackers to use network authorization to be abused to spoof the email identify of the sender.
### Affected Products
**NetWin - NetWin**
Affected versions:
- Current (Status: affected)
**Bird - Fastmail**
Affected versions:
- Current (Status: affected)
### References
1. [](https://kb.cert.org/vuls/id/244112)
2. [](https://www.kb.cert.org/vuls/id/244112) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11362
- **State**: REJECTED
- **Published Date**: December 20, 2021 at 22:45 UTC
- **Last Updated**: December 20, 2021 at 22:45 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32069
- **State**: PUBLISHED
- **Published Date**: April 11, 2025 at 16:20 UTC
- **Last Updated**: April 11, 2025 at 19:16 UTC
- **Reserved Date**: April 03, 2025 at 21:56 UTC
- **Assigned By**: wikimedia-foundation
### Vulnerability Description
Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - Wikibase Media Info Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Wikibase Media Info Extension: from 1.39 through 1.43.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**The Wikimedia Foundation - Mediawiki - Wikibase Media Info Extension**
Affected versions:
- 1.39 (Status: affected)
### References
1. [](https://phabricator.wikimedia.org/T387691)
2. [](https://gerrit.wikimedia.org/r/q/Ie969a8cfeab0d4457417773fa884e271968e5657)
### Credits
- Dylsss
- matthiasmullie |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28755, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28755 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28755
- **State**: PUBLISHED
- **Published Date**: March 31, 2023 at 00:00 UTC
- **Last Updated**: February 14, 2025 at 19:39 UTC
- **Reserved Date**: March 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ruby-lang.org/en/news/2022/12/25/ruby-3-2-0-released/)
2. [](https://www.ruby-lang.org/en/downloads/releases/)
3. [](https://github.com/ruby/uri/releases/)
4. [](https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/)
5. [FEDORA-2023-6b924d3b75](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFZANOQA4RYX7XCB42OO3P24DQKWHEKA/)
6. [FEDORA-2023-a7be7ea1aa](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMIOPLBAAM3FEQNAXA2L7BDKOGSVUT5Z/)
7. [FEDORA-2023-f58d72c700](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G76GZG3RAGYF4P75YY7J7TGYAU7Z5E2T/)
8. [[debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update](https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html)
9. [](https://security.netapp.com/advisory/ntap-20230526-0003/)
10. [GLSA-202401-27](https://security.gentoo.org/glsa/202401-27)
11. [FEDORA-2024-31cac8b8ec](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QA6XUKUY7B5OLNQBLHOT43UW7C5NIOQQ/)
12. [FEDORA-2024-48bdd3abbf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27LUWREIFTP3MQAW7QE4PJM4DPAQJWXF/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31025, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31025 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31025
- **State**: PUBLISHED
- **Published Date**: June 03, 2022 at 14:35 UTC
- **Last Updated**: April 23, 2025 at 18:19 UTC
- **Reserved Date**: May 18, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Discourse is an open source platform for community discussion. Prior to version 2.8.4 on the `stable` branch and 2.9.0beta5 on the `beta` and `tests-passed` branches, inviting users on sites that use single sign-on could bypass the `must_approve_users` check and invites by staff are always approved automatically. The issue is patched in Discourse version 2.8.4 on the `stable` branch and version `2.9.0.beta5` on the `beta` and `tests-passed` branches. As a workaround, disable invites or increase `min_trust_level_to_allow_invite` to reduce the attack surface to more trusted users.
### CVSS Metrics
- **CVSS Base Score**: 2.6/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**discourse - discourse**
Affected versions:
- < 2.8.4 (Status: affected)
- >= 2.9.0.beta1, <= 2.9.0.beta4 (Status: affected)
### References
1. [](https://github.com/discourse/discourse/security/advisories/GHSA-x7jh-mx5q-6f9q)
2. [](https://github.com/discourse/discourse/pull/16974)
3. [](https://github.com/discourse/discourse/pull/16984)
4. [](https://github.com/discourse/discourse/commit/0fa0094531efc82d9371f90a02aa804b176d59cf)
5. [](https://github.com/discourse/discourse/commit/7c4e2d33fa4b922354c177ffc880a2f2701a91f9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37791, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37791
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 13:07 UTC
- **Last Updated**: May 26, 2025 at 05:20 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ethtool: cmis_cdb: use correct rpl size in ethtool_cmis_module_poll()
rpl is passed as a pointer to ethtool_cmis_module_poll(), so the correct
size of rpl is sizeof(*rpl) which should be just 1 byte. Using the
pointer size instead can cause stack corruption:
Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: ethtool_cmis_wait_for_cond+0xf4/0x100
CPU: 72 UID: 0 PID: 4440 Comm: kworker/72:2 Kdump: loaded Tainted: G OE 6.11.0 #24
Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: Dell Inc. PowerEdge R760/04GWWM, BIOS 1.6.6 09/20/2023
Workqueue: events module_flash_fw_work
Call Trace:
<TASK>
panic+0x339/0x360
? ethtool_cmis_wait_for_cond+0xf4/0x100
? __pfx_status_success+0x10/0x10
? __pfx_status_fail+0x10/0x10
__stack_chk_fail+0x10/0x10
ethtool_cmis_wait_for_cond+0xf4/0x100
ethtool_cmis_cdb_execute_cmd+0x1fc/0x330
? __pfx_status_fail+0x10/0x10
cmis_cdb_module_features_get+0x6d/0xd0
ethtool_cmis_cdb_init+0x8a/0xd0
ethtool_cmis_fw_update+0x46/0x1d0
module_flash_fw_work+0x17/0xa0
process_one_work+0x179/0x390
worker_thread+0x239/0x340
? __pfx_worker_thread+0x10/0x10
kthread+0xcc/0x100
? __pfx_kthread+0x10/0x10
ret_from_fork+0x2d/0x50
? __pfx_kthread+0x10/0x10
ret_from_fork_asm+0x1a/0x30
</TASK>
### Affected Products
**Linux - Linux**
Affected versions:
- a39c84d796254e6b1662ca0c46dbc313379e9291 (Status: affected)
- a39c84d796254e6b1662ca0c46dbc313379e9291 (Status: affected)
- a39c84d796254e6b1662ca0c46dbc313379e9291 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.11 (Status: affected)
- 0 (Status: unaffected)
- 6.12.25 (Status: unaffected)
- 6.14.4 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/61765e1b417a23371c3735e3cddf4ad9354ed2e9)
2. [](https://git.kernel.org/stable/c/7eb0a0072f966bb0b01d8b7d529d9743a7187bd1)
3. [](https://git.kernel.org/stable/c/f3fdd4fba16c74697d8bc730b82fb7c1eff7fab3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56229
- **State**: PUBLISHED
- **Published Date**: December 31, 2024 at 10:06 UTC
- **Last Updated**: December 31, 2024 at 16:21 UTC
- **Reserved Date**: December 18, 2024 at 19:04 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Searchiq SearchIQ.This issue affects SearchIQ: from n/a through 4.6.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Searchiq - SearchIQ**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/searchiq/vulnerability/wordpress-searchiq-plugin-4-6-cross-site-requst-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2080, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2080 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2080
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37859
- **State**: PUBLISHED
- **Published Date**: August 09, 2023 at 06:36 UTC
- **Last Updated**: August 02, 2024 at 17:23 UTC
- **Reserved Date**: July 10, 2023 at 07:53 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 the SNMP daemon is running with root privileges allowing a remote attacker with knowledge of the SNMPv2 r/w community string to execute system commands as root.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**PHOENIX CONTACT - WP 6070-WVPS**
Affected versions:
- 0 (Status: affected)
**PHOENIX CONTACT - WP 6101-WXPS**
Affected versions:
- 0 (Status: affected)
**PHOENIX CONTACT - WP 6121-WXPS**
Affected versions:
- 0 (Status: affected)
**PHOENIX CONTACT - WP 6156-WHPS**
Affected versions:
- 0 (Status: affected)
**PHOENIX CONTACT - WP 6185-WHPS**
Affected versions:
- 0 (Status: affected)
**PHOENIX CONTACT - WP 6215-WHPS**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert.vde.com/en/advisories/VDE-2023-018/)
### Credits
- Gabriele Quagliarella from Nozomi Networks Labs |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29724, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29724 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29724
- **State**: PUBLISHED
- **Published Date**: August 29, 2024 at 09:45 UTC
- **Last Updated**: August 29, 2024 at 13:04 UTC
- **Reserved Date**: March 19, 2024 at 07:42 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/ax/registerSp/, parameter idDesafio.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SportsNET - SportsNET**
Affected versions:
- 4.0.1 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet)
### Credits
- https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-sportsnet |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54214
- **State**: PUBLISHED
- **Published Date**: December 06, 2024 at 13:07 UTC
- **Last Updated**: December 20, 2024 at 12:21 UTC
- **Reserved Date**: December 02, 2024 at 12:03 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in Roninwp Revy allows Upload a Web Shell to a Web Server.This issue affects Revy: from n/a through 1.18.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Roninwp - Revy**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/revy/vulnerability/wordpress-revy-plugin-1-18-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- Dave Jong (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16534, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16534
- **State**: PUBLISHED
- **Published Date**: September 20, 2019 at 15:23 UTC
- **Last Updated**: August 05, 2024 at 01:17 UTC
- **Reserved Date**: September 19, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
On DrayTek Vigor2925 devices with firmware 3.8.4.3, XSS exists via a crafted WAN name on the General Setup screen. NOTE: this is an end-of-life product.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.facebook.com/Huang.YuHsiang.Phone/posts/1815316691945755)
2. [](https://www.draytek.com/about/security-advisory/urgent-security-updates-to-draytek-routers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1183, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1183
- **State**: PUBLISHED
- **Published Date**: February 28, 2007 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 12:50 UTC
- **Reserved Date**: February 28, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WebAPP before 0.9.9.5 allows remote authenticated users to spoof another user's Real Name via whitespace, which has unknown impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=250)
2. [ADV-2007-0604](http://www.vupen.com/english/advisories/2007/0604)
3. [33293](http://osvdb.org/33293)
4. [24080](http://secunia.com/advisories/24080)
5. [22563](http://www.securityfocus.com/bid/22563) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4276, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4276 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4276
- **State**: PUBLISHED
- **Published Date**: August 13, 2012 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 18:54 UTC
- **Reserved Date**: August 13, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows attackers to cause a denial of service via unknown attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [49144](http://secunia.com/advisories/49144)
2. [](http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5745, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5745 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5745
- **State**: PUBLISHED
- **Published Date**: October 09, 2019 at 14:17 UTC
- **Last Updated**: September 16, 2024 at 23:51 UTC
- **Reserved Date**: January 17, 2018 at 00:00 UTC
- **Assigned By**: isc
### Vulnerability Description
"managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor's keys are replaced with keys which use an unsupported algorithm. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745.
### Affected Products
**ISC - BIND 9**
Affected versions:
- BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745. (Status: affected)
### References
1. [](https://kb.isc.org/docs/cve-2018-5745)
2. [RHSA-2019:3552](https://access.redhat.com/errata/RHSA-2019:3552) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0354, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0354
- **State**: PUBLISHED
- **Published Date**: January 15, 2025 at 07:21 UTC
- **Last Updated**: April 03, 2025 at 15:38 UTC
- **Reserved Date**: January 09, 2025 at 06:20 UTC
- **Assigned By**: NEC
### Vulnerability Description
Cross-site scripting vulnerability in NEC Corporation Aterm WG2600HS Ver.1.7.2 and earlier, WG2600HP4 Ver.1.4.2 and earlier, WG2600HM4 Ver.1.4.2 and earlier, WG2600HS2 Ver.1.3.2 and earlier, WX3000HP Ver.2.4.2 and earlier and WX4200D5 Ver.1.2.4 and earlier allows a attacker to inject an arbitrary script via the network.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NEC Corporation - WG2600HS**
Affected versions:
- Ver.1.7.2 and earlier (Status: affected)
**NEC Corporation - WG2600HP4**
Affected versions:
- Ver.1.4.2 and earlier (Status: affected)
**NEC Corporation - WG2600HM4**
Affected versions:
- Ver.1.4.2 and earlier (Status: affected)
**NEC Corporation - WG2600HS2**
Affected versions:
- Ver.1.3.2 and earlier (Status: affected)
**NEC Corporation - WX3000HP**
Affected versions:
- Ver.2.4.2 and earlier (Status: affected)
**NEC Corporation - WX4200D5**
Affected versions:
- Ver.1.2.4 and earlier (Status: affected)
### References
1. [](https://jpn.nec.com/security-info/secinfo/nv25-003_en.html)
### Credits
- Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24087, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24087 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24087
- **State**: PUBLISHED
- **Published Date**: February 25, 2021 at 23:01 UTC
- **Last Updated**: August 03, 2024 at 19:21 UTC
- **Reserved Date**: January 13, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Azure IoT CLI extension Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - azure-iot-cli-extension**
Affected versions:
- 0.10.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24087) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1316, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1316 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1316
- **State**: PUBLISHED
- **Published Date**: May 15, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 14:57 UTC
- **Reserved Date**: January 12, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Publisher 2003 SP3 does not properly validate the size of an unspecified array, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Negative Value Allocation Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA13-134A](http://www.us-cert.gov/ncas/alerts/TA13-134A)
2. [MS13-042](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-042)
3. [oval:org.mitre.oval:def:16584](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16584) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0625, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0625 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0625
- **State**: PUBLISHED
- **Published Date**: March 06, 2019 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 17:51 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0595, CVE-2019-0596, CVE-2019-0597, CVE-2019-0598, CVE-2019-0599.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 10 Version 1703 for 32-bit Systems (Status: affected)
- 10 Version 1703 for x64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected)
- 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected)
- 2012 (Status: affected)
- 2012 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- version 1709 (Core Installation) (Status: affected)
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2008 for Itanium-Based Systems Service Pack 2 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0625)
2. [106926](http://www.securityfocus.com/bid/106926) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5234, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5234 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5234
- **State**: PUBLISHED
- **Published Date**: May 23, 2024 at 04:31 UTC
- **Last Updated**: August 01, 2024 at 21:03 UTC
- **Reserved Date**: May 22, 2024 at 20:31 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /view/teacher_salary_history1.php. The manipulation of the argument index leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265985 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Campcodes - Complete Web-Based School Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-265985 | Campcodes Complete Web-Based School Management System teacher_salary_history1.php sql injection](https://vuldb.com/?id.265985)
2. [VDB-265985 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.265985)
3. [Submit #339810 | Campcodes Complete Web-Based School Management System ≤1.0 SQL Injection](https://vuldb.com/?submit.339810)
4. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2024.pdf)
### Credits
- SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31124, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31124 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31124
- **State**: PUBLISHED
- **Published Date**: May 25, 2023 at 21:09 UTC
- **Last Updated**: February 13, 2025 at 16:49 UTC
- **Reserved Date**: April 24, 2023 at 21:44 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG. This issue was patched in version 1.19.1.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-330: Security Weakness
### Affected Products
**c-ares - c-ares**
Affected versions:
- < 1.19.1 (Status: affected)
### References
1. [https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4](https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4)
2. [https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1](https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/)
5. [](https://security.gentoo.org/glsa/202310-09) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-23643, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-23643 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23643
- **State**: PUBLISHED
- **Published Date**: January 11, 2021 at 13:15 UTC
- **Last Updated**: August 04, 2024 at 14:58 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
XSS exists in JIZHICMS 1.7.1 via index.php/Wechat/checkWeixin?signature=1&echostr={XSS] to Home/c/WechatController.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Cherry-toto/jizhicms/issues/29) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2181, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2181 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2181
- **State**: PUBLISHED
- **Published Date**: May 13, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 08:49 UTC
- **Reserved Date**: May 13, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in search.php in cpLinks 1.03 allow remote attackers to inject arbitrary web script or HTML via the (1) search_text and (2) search_category parameters. NOTE: the XSS reportedly occurs in a forced SQL error message. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5538](https://www.exploit-db.com/exploits/5538)
2. [30024](http://secunia.com/advisories/30024)
3. [29035](http://www.securityfocus.com/bid/29035)
4. [cplinks-search-xss(42171)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42171)
5. [ADV-2008-1431](http://www.vupen.com/english/advisories/2008/1431/references) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37958, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37958 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37958
- **State**: PUBLISHED
- **Published Date**: September 13, 2022 at 18:42 UTC
- **Last Updated**: March 11, 2025 at 16:10 UTC
- **Reserved Date**: August 08, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37958) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2665, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2665 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2665
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 16:34 UTC
- **Last Updated**: September 30, 2024 at 15:57 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle iSupport product of Oracle E-Business Suite (component: Others). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle iSupport. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iSupport, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iSupport accessible data as well as unauthorized update, insert or delete access to some of Oracle iSupport accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### Affected Products
**Oracle Corporation - iSupport**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
- 12.2.3-12.2.9 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6747, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6747
- **State**: PUBLISHED
- **Published Date**: August 07, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 15:41 UTC
- **Reserved Date**: March 09, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the authentication module of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to bypass local authentication. The vulnerability is due to improper handling of authentication requests and policy assignment for externally authenticated users. An attacker could exploit this vulnerability by authenticating with a valid external user account that matches an internal username and incorrectly receiving the authorization policy of the internal account. An exploit could allow the attacker to have Super Admin privileges for the ISE Admin portal. This vulnerability does not affect endpoints authenticating to the ISE. The vulnerability affects Cisco ISE, Cisco ISE Express, and Cisco ISE Virtual Appliance running Release 1.3, 1.4, 2.0.0, 2.0.1, or 2.1.0. Release 2.2.x is not affected. Cisco Bug IDs: CSCvb10995.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**n/a - Cisco Identity Services Engine**
Affected versions:
- Cisco Identity Services Engine (Status: affected)
### References
1. [1039054](http://www.securitytracker.com/id/1039054)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-ise) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2719, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2719
- **State**: PUBLISHED
- **Published Date**: August 10, 2009 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 05:59 UTC
- **Reserved Date**: August 10, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [37460](http://secunia.com/advisories/37460)
2. [GLSA-200911-02](http://security.gentoo.org/glsa/glsa-200911-02.xml)
3. [](http://www.vmware.com/security/advisories/VMSA-2009-0016.html)
4. [](http://java.sun.com/javase/6/webnotes/6u15.html)
5. [20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components](http://www.securityfocus.com/archive/1/507985/100/0/threaded)
6. [37386](http://secunia.com/advisories/37386)
7. [ADV-2009-3316](http://www.vupen.com/english/advisories/2009/3316) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20854, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20854 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20854
- **State**: PUBLISHED
- **Published Date**: July 26, 2019 at 04:39 UTC
- **Last Updated**: August 05, 2024 at 12:12 UTC
- **Reserved Date**: July 26, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Linux kernel before 4.20. drivers/phy/mscc/phy-ocelot-serdes.c has an off-by-one error with a resultant ctrl->phys out-of-bounds read.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/torvalds/linux/commit/6acb47d1a318e5b3b7115354ebc4ea060c59d3a1)
2. [](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6acb47d1a318e5b3b7115354ebc4ea060c59d3a1)
3. [](https://security.netapp.com/advisory/ntap-20190905-0002/)
4. [](https://support.f5.com/csp/article/K32450233)
5. [](https://support.f5.com/csp/article/K32450233?utm_source=f5support&%3Butm_medium=RSS) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3627, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3627 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3627
- **State**: PUBLISHED
- **Published Date**: May 17, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 00:03 UTC
- **Reserved Date**: March 21, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20160503 CVE-2016-3627 CVE-2016-3705: libxml2: stack overflow in xml validator (parser)](http://seclists.org/fulldisclosure/2016/May/10)
2. [](http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html)
3. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239)
4. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10170)
5. [openSUSE-SU-2016:1446](http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html)
6. [openSUSE-SU-2016:1298](http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html)
7. [RHSA-2016:1292](https://access.redhat.com/errata/RHSA-2016:1292)
8. [[oss-security] 20160321 CVE request: Stack exhaustion in libxml2 parsing xml files in recover mode](http://www.openwall.com/lists/oss-security/2016/03/21/2)
9. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html)
10. [DSA-3593](https://www.debian.org/security/2016/dsa-3593)
11. [1035335](http://www.securitytracker.com/id/1035335)
12. [USN-2994-1](http://www.ubuntu.com/usn/USN-2994-1)
13. [](http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html)
14. [84992](http://www.securityfocus.com/bid/84992)
15. [](https://www.tenable.com/security/tns-2016-18)
16. [RHSA-2016:2957](http://rhn.redhat.com/errata/RHSA-2016-2957.html)
17. [GLSA-201701-37](https://security.gentoo.org/glsa/201701-37)
18. [[oss-security] 20160321 Re: CVE request: Stack exhaustion in libxml2 parsing xml files in recover mode](http://www.openwall.com/lists/oss-security/2016/03/21/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47403, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47403
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 15:03 UTC
- **Last Updated**: May 04, 2025 at 07:10 UTC
- **Reserved Date**: May 21, 2024 at 14:58 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ipack: ipoctal: fix module reference leak
A reference to the carrier module was taken on every open but was only
released once when the final reference to the tty struct was dropped.
Fix this by taking the module reference and initialising the tty driver
data when installing the tty.
### Affected Products
**Linux - Linux**
Affected versions:
- 82a82340bab6c251e0705339f60763718eaa2a22 (Status: affected)
- 82a82340bab6c251e0705339f60763718eaa2a22 (Status: affected)
- 82a82340bab6c251e0705339f60763718eaa2a22 (Status: affected)
- 82a82340bab6c251e0705339f60763718eaa2a22 (Status: affected)
- 82a82340bab6c251e0705339f60763718eaa2a22 (Status: affected)
- 82a82340bab6c251e0705339f60763718eaa2a22 (Status: affected)
- 82a82340bab6c251e0705339f60763718eaa2a22 (Status: affected)
- 82a82340bab6c251e0705339f60763718eaa2a22 (Status: affected)
**Linux - Linux**
Affected versions:
- 3.18 (Status: affected)
- 0 (Status: unaffected)
- 4.4.286 (Status: unaffected)
- 4.9.285 (Status: unaffected)
- 4.14.249 (Status: unaffected)
- 4.19.209 (Status: unaffected)
- 5.4.151 (Status: unaffected)
- 5.10.71 (Status: unaffected)
- 5.14.10 (Status: unaffected)
- 5.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/31398849b84ebae0d43a1cf379cb9895597f221a)
2. [](https://git.kernel.org/stable/c/c0adb5a947dec6cff7050ec56d78ecd3916f9ce6)
3. [](https://git.kernel.org/stable/c/dde4c1429b97383689f755ce92b4ed1e84a9c92b)
4. [](https://git.kernel.org/stable/c/9c5b77a7ffc983b2429ce158b50497c5d3c86a69)
5. [](https://git.kernel.org/stable/c/3253c87e1e5bc0107aab773af2f135ebccf38666)
6. [](https://git.kernel.org/stable/c/7cea848678470daadbfdaa6a112b823c290f900c)
7. [](https://git.kernel.org/stable/c/811178f296b16af30264def74c8d2179a72d5562)
8. [](https://git.kernel.org/stable/c/bb8a4fcb2136508224c596a7e665bdba1d7c3c27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28654, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28654
- **State**: PUBLISHED
- **Published Date**: June 04, 2024 at 21:54 UTC
- **Last Updated**: October 27, 2024 at 17:48 UTC
- **Reserved Date**: April 05, 2022 at 02:16 UTC
- **Assigned By**: canonical
### Vulnerability Description
is_closing_session() allows users to fill up apport.log
### Affected Products
**Canonical Ltd. - Apport**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://ubuntu.com/security/notices/USN-5427-1)
2. [](https://www.cve.org/CVERecord?id=CVE-2022-28654)
### Credits
- Gerrit Venema |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0658, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0658 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0658
- **State**: PUBLISHED
- **Published Date**: February 11, 2020 at 21:22 UTC
- **Last Updated**: August 04, 2024 at 06:11 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists in the Windows Common Log File System (CLFS) driver when it fails to properly handle objects in memory, aka 'Windows Common Log File System Driver Information Disclosure Vulnerability'.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 for Itanium-Based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected)
- 2012 (Status: affected)
- 2012 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0658) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5644, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5644 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5644
- **State**: PUBLISHED
- **Published Date**: December 17, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 11:04 UTC
- **Reserved Date**: December 17, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the file backend module in TYPO3 4.2.2 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-3144](http://www.vupen.com/english/advisories/2008/3144)
2. [](http://typo3.org/teams/security/security-bulletins/typo3-20081113-1/)
3. [typo3-file-backend-xss(46585)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46585)
4. [32689](http://secunia.com/advisories/32689)
5. [32284](http://www.securityfocus.com/bid/32284) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24186, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24186 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24186
- **State**: PUBLISHED
- **Published Date**: August 24, 2020 at 13:02 UTC
- **Last Updated**: August 04, 2024 at 15:05 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.wordfence.com/blog/2020/07/critical-arbitrary-file-upload-vulnerability-patched-in-wpdiscuz-plugin/)
2. [](http://packetstormsecurity.com/files/162983/WordPress-wpDiscuz-7.0.4-Shell-Upload.html)
3. [](http://packetstormsecurity.com/files/163012/WordPress-wpDiscuz-7.0.4-Remote-Code-Execution.html)
4. [](http://packetstormsecurity.com/files/163302/WordPress-wpDiscuz-7.0.4-Shell-Upload.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1217, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1217
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: June 08, 2005 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30155, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30155 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30155
- **State**: PUBLISHED
- **Published Date**: March 26, 2025 at 07:59 UTC
- **Last Updated**: March 26, 2025 at 14:29 UTC
- **Reserved Date**: March 22, 2024 at 23:57 UTC
- **Assigned By**: HCL
### Vulnerability Description
HCL SX does not set the secure attribute on authorization tokens or session cookies. Attackers may potentially be able to obtain access to the cookie values via a Cross-Site-Forgery-Request (CSRF).
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-1275: Security Weakness
### Affected Products
**HCL Software - HCL SX**
Affected versions:
- 21 (Status: affected)
### References
1. [](https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120110) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29625, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29625 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29625
- **State**: PUBLISHED
- **Published Date**: April 18, 2025 at 00:00 UTC
- **Last Updated**: April 18, 2025 at 14:46 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A buffer overflow vulnerability in Astrolog v7.70 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via an overly long environment variable passed to FileOpen function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/CruiserOne/Astrolog/issues/25)
2. [](https://blog.reodus.com/posts/cve-2025-29625/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33119, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33119 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33119
- **State**: PUBLISHED
- **Published Date**: May 06, 2024 at 14:32 UTC
- **Last Updated**: August 02, 2024 at 15:39 UTC
- **Reserved Date**: May 17, 2023 at 09:28 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption while loading a VM from a signed VM image that is not coherent in the processor cache.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-367: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AQT1000 (Status: affected)
- AR8035 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QAMSRV1H (Status: affected)
- QAMSRV1M (Status: affected)
- QCA6174A (Status: affected)
- QCA6310 (Status: affected)
- QCA6320 (Status: affected)
- QCA6335 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6430 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6678AQ (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCA9377 (Status: affected)
- QCC710 (Status: affected)
- QCM5430 (Status: affected)
- QCM6490 (Status: affected)
- QCM8550 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QCS5430 (Status: affected)
- QCS6490 (Status: affected)
- QCS8550 (Status: affected)
- QDU1000 (Status: affected)
- QDU1010 (Status: affected)
- QDU1110 (Status: affected)
- QDU1210 (Status: affected)
- QDX1010 (Status: affected)
- QDX1011 (Status: affected)
- QEP8111 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- QRU1032 (Status: affected)
- QRU1052 (Status: affected)
- QRU1062 (Status: affected)
- QSM8350 (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- Robotics RB3 Platform (Status: affected)
- SA6145P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA7255P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SA8540P (Status: affected)
- SA8620P (Status: affected)
- SA8650P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SC8380XP (Status: affected)
- SD 675 (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD 8CX (Status: affected)
- SD670 (Status: affected)
- SD675 (Status: affected)
- SD835 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SDX55 (Status: affected)
- SDX57M (Status: affected)
- SG8275P (Status: affected)
- SM7250P (Status: affected)
- SM8550P (Status: affected)
- Snapdragon 670 Mobile Platform (Status: affected)
- Snapdragon 675 Mobile Platform (Status: affected)
- Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected)
- Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected)
- Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected)
- Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 3 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 2 Mobile Platform (Status: affected)
- Snapdragon 835 Mobile PC Platform (Status: affected)
- Snapdragon 845 Mobile Platform (Status: affected)
- Snapdragon 850 Mobile Compute Platform (Status: affected)
- Snapdragon 855 Mobile Platform (Status: affected)
- Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite" (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180X-AA, AB) (Status: affected)
- Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro" (Status: affected)
- Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB) (Status: affected)
- Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB) (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected)
- Snapdragon X24 LTE Modem (Status: affected)
- Snapdragon X35 5G Modem-RF System (Status: affected)
- Snapdragon X50 5G Modem-RF System (Status: affected)
- Snapdragon X55 5G Modem-RF System (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon X72 5G Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- SRV1H (Status: affected)
- SRV1M (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SXR1230P (Status: affected)
- SXR2130 (Status: affected)
- SXR2230P (Status: affected)
- SXR2250P (Status: affected)
- Vision Intelligence 300 Platform (Status: affected)
- Vision Intelligence 400 Platform (Status: affected)
- WCD9326 (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3990 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16435, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16435
- **State**: PUBLISHED
- **Published Date**: September 04, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 10:24 UTC
- **Reserved Date**: September 03, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3770-2](https://usn.ubuntu.com/3770-2/)
2. [USN-3770-1](https://usn.ubuntu.com/3770-1/)
3. [RHSA-2018:3004](https://access.redhat.com/errata/RHSA-2018:3004)
4. [[debian-lts-announce] 20180906 [SECURITY] [DLA 1496-1] lcms2 security update](https://lists.debian.org/debian-lts-announce/2018/09/msg00005.html)
5. [](https://github.com/mm2/Little-CMS/issues/171)
6. [DSA-4284](https://www.debian.org/security/2018/dsa-4284)
7. [](https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8)
8. [GLSA-202105-18](https://security.gentoo.org/glsa/202105-18) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35965, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35965
- **State**: PUBLISHED
- **Published Date**: September 16, 2022 at 20:25 UTC
- **Last Updated**: April 23, 2025 at 17:03 UTC
- **Reserved Date**: July 15, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an open source platform for machine learning. If `LowerBound` or `UpperBound` is given an empty`sorted_inputs` input, it results in a `nullptr` dereference, leading to a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit bce3717eaef4f769019fd18e990464ca4a2efeea. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- < 2.7.2 (Status: affected)
- >= 2.8.0, < 2.8.1 (Status: affected)
- >= 2.9.0, < 2.9.1 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qxpx-j395-pw36)
2. [](https://github.com/tensorflow/tensorflow/commit/bce3717eaef4f769019fd18e990464ca4a2efeea) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1082, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1082 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1082
- **State**: PUBLISHED
- **Published Date**: September 12, 2018 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 00:02 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: freebsd
### Vulnerability Description
In FreeBSD 11.x before 11.1-RELEASE and 10.x before 10.4-RELEASE, the qsort algorithm has a deterministic recursion pattern. Feeding a pathological input to the algorithm can lead to excessive stack usage and potential overflow. Applications that use qsort to handle large data set may crash if the input follows the pathological pattern.
### Affected Products
**FreeBSD - FreeBSD**
Affected versions:
- 11.x before 11.1-RELEASE, 10.x before 10.4-RELEASE (Status: affected)
### References
1. [](https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6174, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6174 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6174
- **State**: PUBLISHED
- **Published Date**: November 30, 2006 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 20:19 UTC
- **Reserved Date**: November 30, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in tDiary before 2.0.3 and 2.1.x before 2.1.4.20061126 allows remote attackers to inject arbitrary web script or HTML via the conf parameter in (1) tdiary.rb and (2) skel/conf.rhtml.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.tdiary.org/download/tdiary.20061126.patch)
2. [](http://www.tdiary.org/20061126.html)
3. [](http://sourceforge.net/forum/forum.php?forum_id=638868)
4. [30701](http://www.osvdb.org/30701)
5. [23092](http://secunia.com/advisories/23092)
6. [JVN#47223461](http://jvn.jp/jp/JVN%2347223461/index.html)
7. [ADV-2006-4722](http://www.vupen.com/english/advisories/2006/4722)
8. [21321](http://www.securityfocus.com/bid/21321)
9. [31993](http://www.osvdb.org/31993) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50437, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50437
- **State**: PUBLISHED
- **Published Date**: February 28, 2024 at 00:00 UTC
- **Last Updated**: August 13, 2024 at 19:34 UTC
- **Reserved Date**: December 09, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Couchbase Server before 7.2.x before 7.2.4. otpCookie is shown with full admin on pools/default/serverGroups and engageCluster2.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://forums.couchbase.com/tags/security)
2. [](https://docs.couchbase.com/server/current/release-notes/relnotes.html)
3. [](https://www.couchbase.com/alerts/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6579
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 04, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3014, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3014 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3014
- **State**: PUBLISHED
- **Published Date**: July 15, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 13:57 UTC
- **Reserved Date**: June 04, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in activeWeb contentserver before 5.6.2964 allow remote attackers to inject arbitrary web script or HTML via the msg parameter to (1) errors/rights.asp or (2) errors/transaction.asp, or (3) the name of a MIME type (mimetype).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24896](http://www.securityfocus.com/bid/24896)
2. [36259](http://www.osvdb.org/36259)
3. [20070713 ActiveWeb Contentserver CMS Multiple Cross Site Scriptings](http://www.securityfocus.com/archive/1/473631/100/0/threaded)
4. [36261](http://www.osvdb.org/36261)
5. [24895](http://www.securityfocus.com/bid/24895)
6. [activeweb-contentserver-msg-xss(35389)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35389)
7. [36260](http://www.osvdb.org/36260)
8. [](http://www.redteam-pentesting.de/advisories/rt-sa-2007-005.php)
9. [26063](http://secunia.com/advisories/26063) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3419, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3419 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3419
- **State**: PUBLISHED
- **Published Date**: August 27, 2012 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 20:05 UTC
- **Reserved Date**: June 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Performance Co-Pilot (PCP) before 3.6.5 exports some of the /proc file system, which allows attackers to obtain sensitive information such as proc/pid/maps and command line arguments.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=blob%3Bf=CHANGELOG%3Bh=16c9cbb2f61d909487ea1c3171f4ab33e5648ac5%3Bhb=fe51067ae869a4d59f350ac319b09edcb77ac8e6)
2. [openSUSE-SU-2012:1079](https://hermes.opensuse.org/messages/15540133)
3. [openSUSE-SU-2012:1081](https://hermes.opensuse.org/messages/15540172)
4. [[oss-security] 20120816 pcp: Multiple security flaws](http://www.openwall.com/lists/oss-security/2012/08/16/1)
5. [FEDORA-2012-12076](http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085333.html)
6. [openSUSE-SU-2012:1036](https://hermes.opensuse.org/messages/15471040)
7. [FEDORA-2012-12024](http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085324.html)
8. [SUSE-SU-2013:0190](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html)
9. [](https://bugzilla.redhat.com/show_bug.cgi?id=841702)
10. [DSA-2533](http://www.debian.org/security/2012/dsa-2533) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0908, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0908 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0908
- **State**: PUBLISHED
- **Published Date**: June 04, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 22:38 UTC
- **Reserved Date**: December 17, 2015 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
EMC Isilon OneFS 7.1.x before 7.1.1.9 and 7.2.x before 7.2.1.2 allows local users to obtain root shell access by leveraging administrative privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20160602 ESA-2016-060: EMC Isilon OneFS Privilege Escalation Vulnerability](http://seclists.org/bugtraq/2016/Jun/13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1836, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1836
- **State**: PUBLISHED
- **Published Date**: June 12, 2009 at 21:07 UTC
- **Last Updated**: August 07, 2024 at 05:27 UTC
- **Reserved Date**: May 29, 2009 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2009-1572](http://www.vupen.com/english/advisories/2009/1572)
2. [SSA:2009-178-01](http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.454275)
3. [DSA-1830](http://www.debian.org/security/2009/dsa-1830)
4. [35536](http://secunia.com/advisories/35536)
5. [35602](http://secunia.com/advisories/35602)
6. [oval:org.mitre.oval:def:11764](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11764)
7. [FEDORA-2009-7614](https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00504.html)
8. [35326](http://www.securityfocus.com/bid/35326)
9. [](http://www.mozilla.org/security/announce/2009/mfsa2009-27.html)
10. [35440](http://secunia.com/advisories/35440)
11. [FEDORA-2009-6411](https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html)
12. [USN-782-1](http://www.ubuntu.com/usn/usn-782-1)
13. [35431](http://secunia.com/advisories/35431)
14. [FEDORA-2009-7567](https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00444.html)
15. [35331](http://secunia.com/advisories/35331)
16. [35468](http://secunia.com/advisories/35468)
17. [](http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf)
18. [35439](http://secunia.com/advisories/35439)
19. [35882](http://secunia.com/advisories/35882)
20. [FEDORA-2009-6366](https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html)
21. [MDVSA-2009:141](http://www.mandriva.com/security/advisories?name=MDVSA-2009:141)
22. [35415](http://secunia.com/advisories/35415)
23. [RHSA-2009:1095](https://rhn.redhat.com/errata/RHSA-2009-1095.html)
24. [35380](http://www.securityfocus.com/bid/35380)
25. [SSA:2009-167-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468)
26. [35561](http://secunia.com/advisories/35561)
27. [](https://bugzilla.redhat.com/show_bug.cgi?id=503578)
28. [55160](http://osvdb.org/55160)
29. [SSA:2009-176-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.425408)
30. [DSA-1820](http://www.debian.org/security/2009/dsa-1820)
31. [RHSA-2009:1126](http://www.redhat.com/support/errata/RHSA-2009-1126.html)
32. [264308](http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1)
33. [1022396](http://www.securitytracker.com/id?1022396)
34. [](http://research.microsoft.com/apps/pubs/default.aspx?id=79323)
35. [](https://bugzilla.mozilla.org/show_bug.cgi?id=479880) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5868, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5868 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5868
- **State**: PUBLISHED
- **Published Date**: May 25, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 15:11 UTC
- **Reserved Date**: February 02, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CRLF injection vulnerability in the web interface in OpenVPN Access Server 2.1.4 allows remote attackers to inject arbitrary HTTP headers and consequently conduct session fixation attacks and possibly HTTP response splitting attacks via "%0A" characters in the PATH_INFO to __session_start__/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sysdream.com/news/lab/2017-05-05-cve-2017-5868-openvpn-access-server-crlf-injection-with-session-fixation/)
2. [1038547](http://www.securitytracker.com/id/1038547)
3. [[oss-security] 20170523 [CVE-2017-5868] OpenVPN Access Server : CRLF injection with Session fixation](http://www.openwall.com/lists/oss-security/2017/05/23/13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4956, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4956
- **State**: PUBLISHED
- **Published Date**: November 05, 2008 at 14:51 UTC
- **Last Updated**: September 17, 2024 at 03:18 UTC
- **Reserved Date**: November 05, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
fwb_install in fwbuilder 2.1.19 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/ssh-agent.##### temporary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugs.debian.org/496406)
2. [[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire](http://www.openwall.com/lists/oss-security/2008/10/30/2)
3. [](https://bugs.gentoo.org/show_bug.cgi?id=235770)
4. [](https://bugs.gentoo.org/show_bug.cgi?id=235809)
5. [](http://dev.gentoo.org/~rbu/security/debiantemp/fwbuilder) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14530, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14530 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14530
- **State**: PUBLISHED
- **Published Date**: July 15, 2020 at 17:34 UTC
- **Last Updated**: September 27, 2024 at 18:44 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Security Service product of Oracle Fusion Middleware (component: None). The supported version that is affected is 11.1.1.9.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Security Service. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Security Service accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Oracle Corporation - Security Service**
Affected versions:
- 11.1.1.9.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34677
- **State**: PUBLISHED
- **Published Date**: December 30, 2022 at 00:00 UTC
- **Last Updated**: April 11, 2025 at 16:01 UTC
- **Reserved Date**: June 27, 2022 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause an integer to be truncated, which may lead to denial of service or data tampering.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**NVIDIA - vGPU software (guest driver) - Linux, vGPU software (Virtual GPU Manager), NVIDIA Cloud Gaming (guest driver), NVIDIA Cloud Gaming (Virtual GPU Manager)**
Affected versions:
- All versions prior to and including 14.2, 13.4, and 11.9, and all versions prior to the November 2022 release (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5415)
2. [[debian-lts-announce] 20230511 [SECURITY] [DLA 3418-1] nvidia-graphics-drivers-legacy-390xx security update](https://lists.debian.org/debian-lts-announce/2023/05/msg00010.html)
3. [GLSA-202310-02](https://security.gentoo.org/glsa/202310-02) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.