System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36956, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36956
- **State**: PUBLISHED
- **Published Date**: September 15, 2021 at 11:23 UTC
- **Last Updated**: August 04, 2024 at 01:09 UTC
- **Reserved Date**: July 19, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Azure Sphere Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Azure Sphere**
Affected versions:
- 20.00 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36956) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29231, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29231 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29231
- **State**: PUBLISHED
- **Published Date**: March 28, 2024 at 06:23 UTC
- **Last Updated**: March 25, 2025 at 14:44 UTC
- **Reserved Date**: March 19, 2024 at 06:14 UTC
- **Assigned By**: synology
### Vulnerability Description
Improper validation of array index vulnerability in UserPrivilege.Enum webapi component in Synology Surveillance Station before 9.2.0-9289 and 9.2.0-11289 allows remote authenticated users to bypass security constraints via unspecified vectors.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L`
### Weakness Classification (CWE)
- CWE-129: Security Weakness
### Affected Products
**Synology - Surveillance Station**
Affected versions:
- * (Status: affected)
- * (Status: affected)
### References
1. [Synology-SA-24:04 Surveillance Station](https://www.synology.com/en-global/security/advisory/Synology_SA_24_04)
### Credits
- TEAM.ENVY (https://team-envy.gitbook.io/team.envy/about-us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48841, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48841
- **State**: PUBLISHED
- **Published Date**: December 07, 2023 at 00:00 UTC
- **Last Updated**: October 09, 2024 at 15:05 UTC
- **Reserved Date**: November 20, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Appointment Scheduler 3.0 is vulnerable to CSV Injection via a Language > Labels > Export action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.phpjabbers.com/appointment-scheduler/)
2. [](http://packetstormsecurity.com/files/176058) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16021, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16021
- **State**: PUBLISHED
- **Published Date**: September 23, 2020 at 00:26 UTC
- **Last Updated**: November 13, 2024 at 18:04 UTC
- **Reserved Date**: September 06, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the implementation of Border Gateway Protocol (BGP) Ethernet VPN (EVPN) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerabilities are due to incorrect processing of BGP update messages that contain crafted EVPN attributes. An attacker could exploit these vulnerabilities by sending BGP EVPN update messages with malformed attributes to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit these vulnerabilities, the malicious BGP update message would need to come from a configured, valid BGP peer, or would need to be injected by the attacker into the victim's BGP network on an existing, valid TCP connection to a BGP peer.
### Weakness Classification (CWE)
- CWE-399: Security Weakness
### Affected Products
**Cisco - Cisco IOS XR Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20200122 Cisco IOS XR Software BGP EVPN Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-evpn) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1496, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1496 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1496
- **State**: PUBLISHED
- **Published Date**: March 16, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 12:59 UTC
- **Reserved Date**: March 16, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
nfnetlink_log in netfilter in the Linux kernel before 2.6.20.3 allows attackers to cause a denial of service (crash) via unspecified vectors involving the (1) nfulnl_recv_config function, (2) using "multiple packets per netlink message", and (3) bridged packets, which trigger a NULL pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2007:0347](http://www.redhat.com/support/errata/RHSA-2007-0347.html)
2. [USN-464-1](http://www.ubuntu.com/usn/usn-464-1)
3. [SUSE-SA:2007:043](http://www.novell.com/linux/security/advisories/2007_43_kernel.html)
4. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.3)
5. [MDKSA-2007:171](http://www.mandriva.com/security/advisories?name=MDKSA-2007:171)
6. [ADV-2007-0944](http://www.vupen.com/english/advisories/2007/0944)
7. [oval:org.mitre.oval:def:9831](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9831)
8. [DSA-1289](http://www.debian.org/security/2007/dsa-1289)
9. [25288](http://secunia.com/advisories/25288)
10. [26620](http://secunia.com/advisories/26620)
11. [25228](http://secunia.com/advisories/25228)
12. [25961](http://secunia.com/advisories/25961)
13. [24492](http://secunia.com/advisories/24492)
14. [22946](http://www.securityfocus.com/bid/22946)
15. [25392](http://secunia.com/advisories/25392) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-48789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-48789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48789
- **State**: REJECTED
- **Last Updated**: May 27, 2025 at 02:55 UTC
- **Reserved Date**: May 26, 2025 at 07:43 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43856, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43856 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43856
- **State**: PUBLISHED
- **Published Date**: December 27, 2021 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 04:10 UTC
- **Reserved Date**: November 16, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Wiki.js is a wiki app built on Node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through non-image file uploads for file types that can be viewed directly inline in the browser. By creating a malicious file which can execute inline JS when viewed in the browser (e.g. XML files), a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the attacker to execute malicious JavaScript when the file is viewed directly by other users. The file must be opened directly by the user and will not trigger directly in a normal Wiki.js page. A patch in version 2.5.264 fixes this vulnerability by adding an optional (enabled by default) force download flag to all non-image file types, preventing the file from being viewed inline in the browser. As a workaround, disable file upload for all non-trusted users. --- Thanks to @Haxatron for reporting this vulnerability. Initially reported via https://huntr.dev/bounties/266bff09-00d9-43ca-a4bb-bb540642811f/
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Requarks - wiki**
Affected versions:
- < 2.5.264 (Status: affected)
### References
1. [](https://github.com/Requarks/wiki/security/advisories/GHSA-rhpf-929m-7fm2)
2. [](https://github.com/Requarks/wiki/commit/79bdd4409316adf649806de3e22352297f85cee0)
3. [](https://github.com/Requarks/wiki/releases/tag/2.5.264) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1603, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1603 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1603
- **State**: PUBLISHED
- **Published Date**: January 28, 2020 at 21:28 UTC
- **Last Updated**: August 06, 2024 at 15:04 UTC
- **Reserved Date**: February 04, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An Authentication vulnerability exists in D-LINK WCS-1100 1.02, TESCO DCS-2121 1.05_TESCO, TESCO DCS-2102 1.05_TESCO, DCS-7510 1.00, DCS-7410 1.00, DCS-6410 1.00, DCS-5635 1.01, DCS-5605 1.01, DCS-5230L 1.02, DCS-5230 1.02, DCS-3430 1.02, DCS-3411 1.02, DCS-3410 1.02, DCS-2121 1.06_FR, DCS-2121 1.06, DCS-2121 1.05_RU, DCS-2102 1.06_FR, DCS-2102 1.06, DCS-2102 1.05_RU, DCS-1130L 1.04, DCS-1130 1.04_US, DCS-1130 1.03, DCS-1100L 1.04, DCS-1100 1.04_US, and DCS-1100 1.03 due to hard-coded credentials that serve as a backdoor, which allows remote attackers to access the RTSP video stream.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.securityfocus.com/bid/59571)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/83940)
3. [](https://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities)
4. [](https://vuldb.com/?id.8575)
5. [](https://packetstormsecurity.com/files/cve/CVE-2013-1603) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0330, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0330 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0330
- **State**: PUBLISHED
- **Published Date**: July 10, 2019 at 19:12 UTC
- **Last Updated**: August 04, 2024 at 17:44 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
The OS Command Plugin in the transaction GPA_ADMIN and the OSCommand Console of SAP Diagnostic Agent (LM-Service), version 7.2, allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
### Affected Products
**SAP SE - SAP Diagnostic Agent (LM-Service)**
Affected versions:
- < 7.20 (Status: affected)
### References
1. [109068](http://www.securityfocus.com/bid/109068)
2. [](https://launchpad.support.sap.com/#/notes/2808158)
3. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523994575) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24592, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24592 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24592
- **State**: PUBLISHED
- **Published Date**: August 30, 2021 at 14:11 UTC
- **Last Updated**: August 03, 2024 at 19:35 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Sitewide Notice WP WordPress plugin before 2.3 does not sanitise some of its settings before outputting them in frontend pages, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Sitewide Notice WP**
Affected versions:
- 2.3 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/9579ff13-9597-4a77-8cb9-997e35265d22)
### Credits
- Asif Nawaz Minhas |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5721, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5721 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5721
- **State**: PUBLISHED
- **Published Date**: November 22, 2024 at 20:05 UTC
- **Last Updated**: November 26, 2024 at 15:57 UTC
- **Reserved Date**: June 06, 2024 at 23:09 UTC
- **Assigned By**: zdi
### Vulnerability Description
Logsign Unified SecOps Platform Missing Authentication Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the implementation of the cluster HTTP API, which listens on TCP port 1924 when enabled. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24169.
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**Logsign - Unified SecOps Platform**
Affected versions:
- 6.4.6 (Status: affected)
### References
1. [ZDI-24-615](https://www.zerodayinitiative.com/advisories/ZDI-24-615/)
2. [vendor-provided URL](https://support.logsign.net/hc/en-us/articles/19316621924754-03-06-2024-Version-6-4-8-Release-Notes) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30541, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30541 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30541
- **State**: PUBLISHED
- **Published Date**: March 24, 2025 at 13:46 UTC
- **Last Updated**: March 24, 2025 at 15:05 UTC
- **Reserved Date**: March 24, 2025 at 12:59 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in OTWthemes Info Boxes Shortcode and Widget allows Cross Site Request Forgery. This issue affects Info Boxes Shortcode and Widget: from n/a through 1.15.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**OTWthemes - Info Boxes Shortcode and Widget**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/info-boxes-shortcode-and-widget/vulnerability/wordpress-info-boxes-shortcode-and-widgets-plugin-1-15-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Nabil Irawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6353, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6353 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6353
- **State**: PUBLISHED
- **Published Date**: December 20, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 16:02 UTC
- **Reserved Date**: December 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in exif.cpp in exiv2 library allows context-dependent attackers to execute arbitrary code via a crafted EXIF file that triggers a heap-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2008:006](http://www.mandriva.com/security/advisories?name=MDVSA-2008:006)
2. [28412](http://secunia.com/advisories/28412)
3. [28610](http://secunia.com/advisories/28610)
4. [USN-655-1](http://www.ubuntu.com/usn/usn-655-1)
5. [ADV-2007-4252](http://www.vupen.com/english/advisories/2007/4252)
6. [FEDORA-2007-4591](https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00652.html)
7. [28267](http://secunia.com/advisories/28267)
8. [](http://bugs.gentoo.org/show_bug.cgi?id=202351)
9. [28132](http://secunia.com/advisories/28132)
10. [GLSA-200712-16](http://security.gentoo.org/glsa/glsa-200712-16.xml)
11. [26918](http://www.securityfocus.com/bid/26918)
12. [28178](http://secunia.com/advisories/28178)
13. [DSA-1474](http://www.debian.org/security/2008/dsa-1474)
14. [exiv2-setdataarea-bo(39118)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39118)
15. [32273](http://secunia.com/advisories/32273)
16. [](https://bugzilla.redhat.com/show_bug.cgi?id=425921)
17. [FEDORA-2007-4551](https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00674.html)
18. [SUSE-SR:2008:001](http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3233, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3233 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3233
- **State**: PUBLISHED
- **Published Date**: June 27, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 18:23 UTC
- **Reserved Date**: June 26, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in openwebmail-read.pl in Open WebMail (OWM) 2.52, and other versions released before 06/18/2006, allows remote attackers to inject arbitrary web script or HTML via the from field. NOTE: some third party sources have mentioned the "to" and "from" fields, although CVE analysis shows that these are associated with the previous version, a different executable, and a different CVE.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openwebmail-read-xss(27309)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27309)
2. [](http://openwebmail.acatysmoof.com/dev/svn/index.pl/openwebmail/diff/trunk/src/cgi-bin/openwebmail/openwebmail-read.pl?rev1=236%3Brev2=237)
3. [20714](http://secunia.com/advisories/20714)
4. [ADV-2006-2485](http://www.vupen.com/english/advisories/2006/2485)
5. [](http://openwebmail.org/openwebmail/doc/changes.txt)
6. [20060626 Openwebmail: 2 XSS vulns not one, and some version hints](http://www.attrition.org/pipermail/vim/2006-June/000902.html)
7. [18598](http://www.securityfocus.com/bid/18598) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11677
- **State**: PUBLISHED
- **Published Date**: April 29, 2020 at 13:54 UTC
- **Last Updated**: August 04, 2024 at 11:35 UTC
- **Reserved Date**: April 10, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cerner medico 26.00 has a Local Buffer Overflow (issue 3 of 3).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.x41-dsec.de/lab/advisories/x41-2019-008-medico/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49830
- **State**: PUBLISHED
- **Published Date**: May 06, 2025 at 08:32 UTC
- **Last Updated**: May 07, 2025 at 03:55 UTC
- **Reserved Date**: October 20, 2024 at 17:18 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption while processing an IOCTL call to set mixer controls.
### CVSS Metrics
- **CVSS Base Score**: 6.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- QCA6574AU (Status: affected)
- QCA6595AU (Status: affected)
- QCA6678AQ (Status: affected)
- QCA6688AQ (Status: affected)
- QCA6698AQ (Status: affected)
- QCA9367 (Status: affected)
- QCA9377 (Status: affected)
- SDM429W (Status: affected)
- Snapdragon 429 Mobile Platform (Status: affected)
- Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected)
- WCN3620 (Status: affected)
- WCN3660B (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28240, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28240 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28240
- **State**: PUBLISHED
- **Published Date**: April 11, 2023 at 19:13 UTC
- **Last Updated**: January 23, 2025 at 01:05 UTC
- **Reserved Date**: March 13, 2023 at 22:18 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Network Load Balancing Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Network Load Balancing Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28240) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12860, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12860 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12860
- **State**: PUBLISHED
- **Published Date**: October 12, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 08:45 UTC
- **Reserved Date**: June 25, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier versions (Status: affected)
### References
1. [1041809](http://www.securitytracker.com/id/1041809)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb18-30.html)
3. [105432](http://www.securityfocus.com/bid/105432)
4. [](https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31530, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31530 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31530
- **State**: PUBLISHED
- **Published Date**: July 11, 2022 at 00:56 UTC
- **Last Updated**: August 03, 2024 at 07:19 UTC
- **Reserved Date**: May 23, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The csm-aut/csm repository through 3.5 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/github/securitylab/issues/669#issuecomment-1117265726) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2595, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2595 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2595
- **State**: PUBLISHED
- **Published Date**: January 18, 2018 at 02:00 UTC
- **Last Updated**: October 03, 2024 at 20:43 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Hyperion BI+ component of Oracle Hyperion (subcomponent: Foundation UI & Servlets). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Hyperion BI+ accessible data as well as unauthorized read access to a subset of Hyperion BI+ accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Hyperion BI+. CVSS 3.0 Base Score 4.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L).
### Affected Products
**Oracle Corporation - Hyperion BI+**
Affected versions:
- 11.1.2.4 (Status: affected)
### References
1. [102643](http://www.securityfocus.com/bid/102643)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html)
3. [1040206](http://www.securitytracker.com/id/1040206) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10965, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10965
- **State**: PUBLISHED
- **Published Date**: March 25, 2020 at 22:53 UTC
- **Last Updated**: August 04, 2024 at 11:21 UTC
- **Reserved Date**: March 25, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Teradici PCoIP Management Console 20.01.0 and 19.11.1 is vulnerable to unauthenticated password resets via login/resetadminpassword of the default admin account. This vulnerability only exists when the default admin account is not disabled. It is fixed in 20.01.1 and 19.11.2.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://help.teradici.com/s/article/3729)
2. [](https://healdb.tech/blog.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1030, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1030 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1030
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:12 UTC
- **Reserved Date**: August 27, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Race condition in Performance Pack in BEA WebLogic Server and Express 5.1.x, 6.0.x, 6.1.x and 7.0 allows remote attackers to cause a denial of service (crash) via a flood of data and connections.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020708 [VulnWatch] KPMG-2002029: Bea Weblogic Performance Pack Denial of Service](http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0008.html)
2. [5159](http://www.securityfocus.com/bid/5159)
3. [weblogic-race-condition-dos(9486)](http://www.iss.net/security_center/static/9486.php)
4. [20020708 KPMG-2002029: Bea Weblogic Performance Pack Denial of Service](http://online.securityfocus.com/archive/1/281046)
5. [](http://dev2dev.bea.com/resourcelibrary/advisoriesdetail.jsp?highlight=advisoriesnotifications&path=components%2Fdev2dev%2Fresourcelibrary%2Fadvisoriesnotifications%2Fadvisory_BEA02-19.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0503, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0503 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0503
- **State**: PUBLISHED
- **Published Date**: January 31, 2008 at 19:30 UTC
- **Last Updated**: August 07, 2024 at 07:46 UTC
- **Reserved Date**: January 31, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Eval injection vulnerability in admin/op/disp.php in Netwerk Smart Publisher 1.0.1 allows remote attackers to execute arbitrary PHP code via the filedata parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27488](http://www.securityfocus.com/bid/27488)
2. [28685](http://secunia.com/advisories/28685)
3. [5003](https://www.exploit-db.com/exploits/5003)
4. [ADV-2008-0352](http://www.vupen.com/english/advisories/2008/0352) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40779, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40779 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40779
- **State**: PUBLISHED
- **Published Date**: March 16, 2022 at 14:02 UTC
- **Last Updated**: April 23, 2025 at 18:53 UTC
- **Reserved Date**: September 08, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Media Encoder version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-788: OS Command Injection
### Affected Products
**Adobe - Media Encoder**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000150, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000150 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000150
- **State**: PUBLISHED
- **Published Date**: April 05, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 18:34 UTC
- **Reserved Date**: April 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An exposure of sensitive information vulnerability exists in Jenkins Reverse Proxy Auth Plugin 1.5 and older in ReverseProxySecurityRealm#authContext that allows attackers with local file system access to obtain a list of authorities for logged in users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2018-03-26/#SECURITY-736) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35212, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35212 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35212
- **State**: PUBLISHED
- **Published Date**: June 11, 2024 at 11:15 UTC
- **Last Updated**: February 11, 2025 at 10:28 UTC
- **Reserved Date**: May 13, 2024 at 17:54 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected application lacks input validation due to which an attacker can gain access to the Database entries.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Siemens - SINEC Traffic Analyzer**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-196737.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45081, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45081
- **State**: PUBLISHED
- **Published Date**: February 20, 2022 at 17:52 UTC
- **Last Updated**: August 04, 2024 at 04:32 UTC
- **Reserved Date**: December 16, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Cobbler through 3.3.1. Routines in several files use the HTTP protocol instead of the more secure HTTPS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cobbler/cobbler/releases)
2. [[oss-security] 20220218 Multiple vulnerabilities affecting cobbler](http://www.openwall.com/lists/oss-security/2022/02/18/3)
3. [](https://bugzilla.suse.com/show_bug.cgi?id=1193683) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13772, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13772 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13772
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:14 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for TheFlashToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/TheFlashToken) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24539, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24539 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24539
- **State**: REJECTED
- **Last Updated**: March 22, 2023 at 00:00 UTC
- **Reserved Date**: August 19, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34263, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34263 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34263
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 01:56 UTC
- **Last Updated**: August 02, 2024 at 16:01 UTC
- **Reserved Date**: May 31, 2023 at 19:51 UTC
- **Assigned By**: zdi
### Vulnerability Description
Fatek Automation FvDesigner FPJ File Parsing Uninitialized Pointer Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fatek Automation FvDesigner. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of FPJ files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18162.
### Weakness Classification (CWE)
- CWE-824: Security Weakness
### Affected Products
**Fatek Automation - FvDesigner**
Affected versions:
- 1.6.24 (Status: affected)
### References
1. [ZDI-23-761](https://www.zerodayinitiative.com/advisories/ZDI-23-761/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49753, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49753 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49753
- **State**: PUBLISHED
- **Published Date**: May 17, 2024 at 08:38 UTC
- **Last Updated**: August 02, 2024 at 22:01 UTC
- **Reserved Date**: November 30, 2023 at 13:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spoonthemes Adifier System allows PHP Local File Inclusion.This issue affects Adifier System: from n/a before 3.1.4.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**spoonthemes - Adifier System**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/adifier-system/wordpress-adifier-classified-ads-wordpress-theme-theme-3-9-3-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- FearZzZz (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3298, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3298 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3298
- **State**: PUBLISHED
- **Published Date**: October 14, 2016 at 01:00 UTC
- **Last Updated**: February 10, 2025 at 16:44 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 9 through 11 and the Internet Messaging API in Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to determine the existence of arbitrary files via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS16-118](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-118)
2. [MS16-126](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-126)
3. [93392](http://www.securityfocus.com/bid/93392)
4. [1036992](http://www.securitytracker.com/id/1036992) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6560, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6560 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6560
- **State**: PUBLISHED
- **Published Date**: March 31, 2017 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 01:36 UTC
- **Reserved Date**: August 03, 2016 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
illumos osnet-incorporation bcopy() and bzero() implementations make signed instead of unsigned comparisons allowing a system crash.
### Weakness Classification (CWE)
- CWE-195: Security Weakness
### Affected Products
**illumos - osnet-incorporation**
Affected versions:
- proir to osnet-incorporation@0.5.11,5.11-2016.0.1.15933 (Status: affected)
### References
1. [](https://www.illumos.org/issues/7488)
2. [](https://github.com/illumos/illumos-gate/commit/5aaab1a49679c26dbcb6fb6dc25799950d70cc71)
3. [](https://www.openindiana.org/2016/11/01/cve-2016-6560-cve-2016-6561-security-issues-in-illumos/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2442
- **State**: PUBLISHED
- **Published Date**: July 20, 2021 at 22:44 UTC
- **Last Updated**: September 25, 2024 at 19:43 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 6.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - VM VirtualBox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2021.html)
2. [GLSA-202208-36](https://security.gentoo.org/glsa/202208-36) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3400, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3400
- **State**: PUBLISHED
- **Published Date**: January 27, 2017 at 22:01 UTC
- **Last Updated**: October 08, 2024 at 20:18 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
### Affected Products
**Oracle - Advanced Outbound Telephony**
Affected versions:
- 12.1.1 (Status: affected)
- 12.1.2 (Status: affected)
- 12.1.3 (Status: affected)
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
### References
1. [95531](http://www.securityfocus.com/bid/95531)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12958, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12958 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12958
- **State**: REJECTED
- **Published Date**: January 14, 2022 at 16:23 UTC
- **Last Updated**: January 14, 2022 at 16:23 UTC
- **Reserved Date**: May 15, 2020 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7522, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7522 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7522
- **State**: PUBLISHED
- **Published Date**: August 31, 2020 at 16:10 UTC
- **Last Updated**: August 04, 2024 at 09:33 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in SFAPV9601 - APC Easy UPS On-Line Software (V2.0 and earlier) when accessing a vulnerable method of `SoundUploadServlet` which may lead to uploading executable files to non-specified directories.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**n/a - SFAPV9601 - APC Easy UPS On-Line Software V2.0 and earlier**
Affected versions:
- SFAPV9601 - APC Easy UPS On-Line Software V2.0 and earlier (Status: affected)
### References
1. [](https://www.se.com/ww/en/download/document/SEVD-2020-224-04/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0911, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0911 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0911
- **State**: PUBLISHED
- **Published Date**: March 04, 2013 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 14:41 UTC
- **Reserved Date**: January 07, 2013 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Directory traversal vulnerability in Google Chrome before 25.0.1364.152 allows remote attackers to have an unspecified impact via vectors related to databases.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://code.google.com/p/chromium/issues/detail?id=172264)
2. [](http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_4.html)
3. [oval:org.mitre.oval:def:16377](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16377) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1953, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1953
- **State**: PUBLISHED
- **Published Date**: March 04, 2025 at 20:00 UTC
- **Last Updated**: March 04, 2025 at 20:36 UTC
- **Reserved Date**: March 04, 2025 at 14:20 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in vLLM AIBrix 0.2.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file pkg/plugins/gateway/prefixcacheindexer/hash.go of the component Prefix Caching. The manipulation leads to insufficiently random values. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 0.3.0 is able to address this issue. It is recommended to upgrade the affected component.
### CVSS Metrics
- **CVSS Base Score**: 2.6/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-330: Security Weakness
- CWE-310: Security Weakness
### Affected Products
**vLLM - AIBrix**
Affected versions:
- 0.2.0 (Status: affected)
### References
1. [VDB-298543 | vLLM AIBrix Prefix Caching hash.go random values](https://vuldb.com/?id.298543)
2. [VDB-298543 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.298543)
3. [Submit #509958 | Vllm aibrix 0.2.0 prefix cache reuse](https://vuldb.com/?submit.509958)
4. [](https://github.com/vllm-project/aibrix/issues/749)
5. [](https://github.com/vllm-project/aibrix/pull/752)
6. [](https://github.com/vllm-project/aibrix/pull/752/commits/3d25d95aebd66f24a549200edcebc5ea423b317a)
7. [](https://github.com/vllm-project/aibrix/issues/749#event-16488517974)
### Credits
- kexinoh (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42744, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42744 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42744
- **State**: PUBLISHED
- **Published Date**: November 19, 2021 at 18:36 UTC
- **Last Updated**: August 04, 2024 at 03:38 UTC
- **Reserved Date**: November 11, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Philips MRI 1.5T and MRI 3T Version 5.x.x exposes sensitive information to an actor not explicitly authorized to have access.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Philips - MRI 1.5T**
Affected versions:
- All 5.x.x (Status: affected)
**Philips - MRI 3T**
Affected versions:
- 5.x.x (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsma-21-313-01)
2. [](https://www.usa.philips.com/healthcare/about/customer-support/product-security)
### Credits
- Michael Aguilar, a Secureworks Adversary Group consultant, reported these vulnerabilities to Philips. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30010, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30010 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30010
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 16:57 UTC
- **Last Updated**: May 03, 2025 at 00:06 UTC
- **Reserved Date**: March 22, 2024 at 23:12 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Hyper-V Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-23: Security Weakness
### Affected Products
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Hyper-V Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30010) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13288, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13288 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13288
- **State**: PUBLISHED
- **Published Date**: April 01, 2019 at 14:27 UTC
- **Last Updated**: September 17, 2024 at 00:07 UTC
- **Reserved Date**: July 05, 2018 at 00:00 UTC
- **Assigned By**: synology
### Vulnerability Description
Information exposure vulnerability in SYNO.FolderSharing.List in Synology File Station before 1.2.3-0252 and before 1.1.5-0125 allows remote attackers to obtain sensitive information via the (1) folder_path or (2) real_path parameter.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Synology - File Station**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://www.synology.com/security/advisory/Synology_SA_18_35) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5701, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5701 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5701
- **State**: PUBLISHED
- **Published Date**: December 22, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 11:04 UTC
- **Reserved Date**: December 22, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Array index error in arch/mips/kernel/scall64-o32.S in the Linux kernel before 2.6.28-rc8 on 64-bit MIPS platforms allows local users to cause a denial of service (system crash) via an o32 syscall with a small syscall number, which leads to an attempted read operation outside the bounds of the syscall table.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20081209 CVE request: kernel: MIPS: Fix potential DOS by untrusted user app](http://openwall.com/lists/oss-security/2008/12/09/1)
2. [linux-kernel-mips-dos(47190)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47190)
3. [](http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc8)
4. [](http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=e807f9574e37a3f202e677feaaad1b7c5d2c0db8)
5. [DSA-1794](http://www.debian.org/security/2009/dsa-1794)
6. [33078](http://secunia.com/advisories/33078)
7. [35011](http://secunia.com/advisories/35011)
8. [34981](http://secunia.com/advisories/34981)
9. [32716](http://www.securityfocus.com/bid/32716)
10. [DSA-1787](http://www.debian.org/security/2009/dsa-1787) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1352, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1352 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1352
- **State**: PUBLISHED
- **Published Date**: October 14, 2007 at 19:00 UTC
- **Last Updated**: August 08, 2024 at 02:28 UTC
- **Reserved Date**: October 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Gabber 0.8.7 sends an email to a specific address during user login and logout, which allows remote attackers to obtain user session activity and Gabber version number by sniffing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6624](http://www.securityfocus.com/bid/6624)
2. [20030115 Gabber 0.8.7 leaks presence information without user authorization](http://archives.neohapsis.com/archives/bugtraq/2003-01/0179.html)
3. [gabber-information-leak(11115)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11115) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0661, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0661 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0661
- **State**: PUBLISHED
- **Published Date**: March 19, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 04:40 UTC
- **Reserved Date**: February 22, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Wee Enhanced Environment for Chat (WeeChat) 0.2.6 allows remote attackers to cause a denial of service (crash) via an IRC PRIVMSG command containing crafted color codes that trigger an out-of-bounds read.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://savannah.nongnu.org/bugs/index.php?25862)
2. [34148](http://www.securityfocus.com/bid/34148)
3. [34304](http://secunia.com/advisories/34304)
4. [](http://weechat.flashtux.org/)
5. [52763](http://osvdb.org/52763)
6. [ADV-2009-0758](http://www.vupen.com/english/advisories/2009/0758)
7. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519940)
8. [DSA-1744](http://www.debian.org/security/2009/dsa-1744)
9. [weechat-ircmessage-dos(49295)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49295)
10. [34328](http://secunia.com/advisories/34328)
11. [[oss-security] 20090317 Re: CVE request -- firefox, vlc, WeeChat](http://www.openwall.com/lists/oss-security/2009/03/17/8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0185, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0185 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0185
- **State**: PUBLISHED
- **Published Date**: November 10, 2022 at 22:00 UTC
- **Last Updated**: February 05, 2025 at 20:54 UTC
- **Reserved Date**: October 22, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper input validation in the firmware for some Intel(R) Server Board M10JNP Family before version 7.216 may allow a privileged user to potentially enable an escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Affected Products
**n/a - Intel(R) Server Board M10JNP Family**
Affected versions:
- before version 7.216 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00708.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00708.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35820, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35820
- **State**: PUBLISHED
- **Published Date**: August 09, 2022 at 20:11 UTC
- **Last Updated**: January 02, 2025 at 19:34 UTC
- **Reserved Date**: July 13, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Bluetooth Driver Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Bluetooth Driver Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35820) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16570, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16570 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16570
- **State**: REJECTED
- **Published Date**: April 17, 2019 at 13:34 UTC
- **Last Updated**: April 17, 2019 at 13:34 UTC
- **Reserved Date**: September 06, 2018 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6885, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6885 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6885
- **State**: PUBLISHED
- **Published Date**: May 14, 2019 at 18:35 UTC
- **Last Updated**: August 05, 2024 at 06:17 UTC
- **Reserved Date**: February 10, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in MicroStrategy Web Services (the Microsoft Office plugin) before 10.4 Hotfix 7, and before 10.11. The vulnerability is unauthenticated and leads to access to the asset files with the MicroStrategy user privileges. (This includes the credentials to access the admin dashboard which may lead to RCE.) The path traversal is located in a SOAP request in the web service component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://community.microstrategy.com/s/article/Web-Services-Security-Vulnerability) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-23706, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-23706 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23706
- **State**: PUBLISHED
- **Published Date**: July 15, 2021 at 21:55 UTC
- **Last Updated**: August 04, 2024 at 15:05 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A heap-based buffer overflow vulnerability in the function ok_jpg_decode_block_subsequent_scan() ok_jpg.c:1102 of ok-file-formats through 2020-06-26 allows attackers to cause a Denial of Service (DOS) via a crafted jpeg file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/brackeen/ok-file-formats/issues/7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5986, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5986 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5986
- **State**: PUBLISHED
- **Published Date**: November 15, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 15:47 UTC
- **Reserved Date**: November 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in include/functions.php in BtiTracker before 1.4.5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [btitracker-unspecified-sql-injection(38415)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38415)
2. [](http://sourceforge.net/project/shownotes.php?release_id=552477)
3. [](http://sourceforge.net/forum/forum.php?forum_id=752472)
4. [27550](http://secunia.com/advisories/27550)
5. [26551](http://www.securityfocus.com/bid/26551) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31061, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31061 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31061
- **State**: PUBLISHED
- **Published Date**: April 24, 2023 at 00:00 UTC
- **Last Updated**: February 04, 2025 at 19:29 UTC
- **Reserved Date**: April 24, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Repetier Server through 1.4.10 does not have CSRF protection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cybir.com/2023/cve/poc-repetier-server-140/)
2. [](https://www.repetier-server.com/download-repetier-server/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47546, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47546 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47546
- **State**: PUBLISHED
- **Published Date**: May 24, 2024 at 15:09 UTC
- **Last Updated**: May 04, 2025 at 12:41 UTC
- **Reserved Date**: May 24, 2024 at 15:02 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ipv6: fix memory leak in fib6_rule_suppress
The kernel leaks memory when a `fib` rule is present in IPv6 nftables
firewall rules and a suppress_prefix rule is present in the IPv6 routing
rules (used by certain tools such as wg-quick). In such scenarios, every
incoming packet will leak an allocation in `ip6_dst_cache` slab cache.
After some hours of `bpftrace`-ing and source code reading, I tracked
down the issue to ca7a03c41753 ("ipv6: do not free rt if
FIB_LOOKUP_NOREF is set on suppress rule").
The problem with that change is that the generic `args->flags` always have
`FIB_LOOKUP_NOREF` set[1][2] but the IPv6-specific flag
`RT6_LOOKUP_F_DST_NOREF` might not be, leading to `fib6_rule_suppress` not
decreasing the refcount when needed.
How to reproduce:
- Add the following nftables rule to a prerouting chain:
meta nfproto ipv6 fib saddr . mark . iif oif missing drop
This can be done with:
sudo nft create table inet test
sudo nft create chain inet test test_chain '{ type filter hook prerouting priority filter + 10; policy accept; }'
sudo nft add rule inet test test_chain meta nfproto ipv6 fib saddr . mark . iif oif missing drop
- Run:
sudo ip -6 rule add table main suppress_prefixlength 0
- Watch `sudo slabtop -o | grep ip6_dst_cache` to see memory usage increase
with every incoming ipv6 packet.
This patch exposes the protocol-specific flags to the protocol
specific `suppress` function, and check the protocol-specific `flags`
argument for RT6_LOOKUP_F_DST_NOREF instead of the generic
FIB_LOOKUP_NOREF when decreasing the refcount, like this.
[1]: https://github.com/torvalds/linux/blob/ca7a03c4175366a92cee0ccc4fec0038c3266e26/net/ipv6/fib6_rules.c#L71
[2]: https://github.com/torvalds/linux/blob/ca7a03c4175366a92cee0ccc4fec0038c3266e26/net/ipv6/fib6_rules.c#L99
### Affected Products
**Linux - Linux**
Affected versions:
- ca7a03c4175366a92cee0ccc4fec0038c3266e26 (Status: affected)
- ca7a03c4175366a92cee0ccc4fec0038c3266e26 (Status: affected)
- ca7a03c4175366a92cee0ccc4fec0038c3266e26 (Status: affected)
- ca7a03c4175366a92cee0ccc4fec0038c3266e26 (Status: affected)
- d37c966752043733eb847dd897d6e3405084c559 (Status: affected)
- ecc265624956ea784cb2bd2b31a95bd54c4f5f13 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.4 (Status: affected)
- 0 (Status: unaffected)
- 5.4.164 (Status: unaffected)
- 5.10.84 (Status: unaffected)
- 5.15.7 (Status: unaffected)
- 5.16 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/ee38eb8cf9a7323884c2b8e0adbbeb2192d31e29)
2. [](https://git.kernel.org/stable/c/209d35ee34e25f9668c404350a1c86d914c54ffa)
3. [](https://git.kernel.org/stable/c/8ef8a76a340ebdb2c2eea3f6fb0ebbed09a16383)
4. [](https://git.kernel.org/stable/c/cdef485217d30382f3bf6448c54b4401648fe3f1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28711, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28711 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28711
- **State**: PUBLISHED
- **Published Date**: April 14, 2022 at 19:56 UTC
- **Last Updated**: April 15, 2025 at 19:05 UTC
- **Reserved Date**: April 05, 2022 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A memory corruption vulnerability exists in the cgi.c unescape functionality of ArduPilot APWeb master branch 50b6b7ac - master branch 46177cb9. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**ArduPilot - APWeb**
Affected versions:
- master commit 50b6b7ac - master commit 46177cb9 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1512)
2. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1512) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6602, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6602 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6602
- **State**: PUBLISHED
- **Published Date**: April 07, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 15:33 UTC
- **Reserved Date**: March 09, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the CLI of Cisco Unified Computing System (UCS) Manager, Cisco Firepower 4100 Series Next-Generation Firewall (NGFW), and Cisco Firepower 9300 Security Appliance could allow an authenticated, local attacker to perform a command injection attack. More Information: CSCvb66189 CSCvb86775. Known Affected Releases: 2.0(1.68) 3.1(1k)A. Known Fixed Releases: 92.2(1.101) 92.1(1.1742) 92.1(1.1658) 2.1(1.38) 2.0(1.107) 2.0(1.87) 1.1(4.148) 1.1(4.138).
### Affected Products
**n/a - Cisco UCS Manager, Cisco Firepower 4100 Series NGFW, and Cisco Firepower 9300 Security Appliance**
Affected versions:
- Cisco UCS Manager, Cisco Firepower 4100 Series NGFW, and Cisco Firepower 9300 Security Appliance (Status: affected)
### References
1. [1038197](http://www.securitytracker.com/id/1038197)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cli2)
3. [97472](http://www.securityfocus.com/bid/97472) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2720
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 16:34 UTC
- **Last Updated**: September 30, 2024 at 15:50 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle FLEXCUBE Investor Servicing product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.1.0-12.4.0 and 14.0.0-14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Investor Servicing accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - FLEXCUBE Investor Servicing**
Affected versions:
- 12.1.0-12.4.0 (Status: affected)
- 14.0.0-14.1.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3762, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3762 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3762
- **State**: PUBLISHED
- **Published Date**: July 11, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:03 UTC
- **Reserved Date**: March 30, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
The sockets subsystem in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows attackers to gain privileges via a crafted application that uses (1) the AF_MSM_IPC socket class or (2) another socket class that is unrecognized by SELinux, aka internal bug 28612709.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://android.googlesource.com/platform/external/sepolicy/+/abf0663ed884af7bc880a05e9529e6671eb58f39)
2. [](http://source.android.com/security/bulletin/2016-07-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20911, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20911 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20911
- **State**: PUBLISHED
- **Published Date**: August 01, 2019 at 14:41 UTC
- **Last Updated**: August 05, 2024 at 12:12 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 70.0.23 allows code execution because "." is in @INC during a Perl syntax check of cpaddonsup (SEC-359).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/70+Change+Log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13223, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13223 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13223
- **State**: PUBLISHED
- **Published Date**: August 15, 2019 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 23:49 UTC
- **Reserved Date**: July 03, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A reachable assertion in the lookup1_values function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://nothings.org/stb_vorbis/)
2. [](https://github.com/nothings/stb/commits/master/stb_vorbis.c)
3. [](https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6)
4. [[debian-lts-announce] 20230131 [SECURITY] [DLA 3305-1] libstb security update](https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4694, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4694 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4694
- **State**: PUBLISHED
- **Published Date**: November 15, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 15:01 UTC
- **Reserved Date**: September 05, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Safari in Apple Mac OS X 10.4 through 10.4.10 allows remote attackers to access local content via file:// URLs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26444](http://www.securityfocus.com/bid/26444)
2. [APPLE-SA-2007-11-14](http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html)
3. [](http://docs.info.apple.com/article.html?artnum=307041)
4. [1018948](http://securitytracker.com/id?1018948)
5. [ADV-2007-3868](http://www.vupen.com/english/advisories/2007/3868)
6. [27643](http://secunia.com/advisories/27643)
7. [TA07-319A](http://www.us-cert.gov/cas/techalerts/TA07-319A.html)
8. [macosx-webcore-file-unauth-access(38481)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38481) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51503, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51503 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51503
- **State**: PUBLISHED
- **Published Date**: November 19, 2024 at 19:00 UTC
- **Last Updated**: November 21, 2024 at 04:55 UTC
- **Reserved Date**: October 28, 2024 at 17:36 UTC
- **Assigned By**: trendmicro
### Vulnerability Description
A security agent manual scan command injection vulnerability in the Trend Micro Deep Security 20 Agent could allow an attacker to escalate privileges and execute arbitrary code on an affected machine. In certain circumstances, attackers that have legitimate access to the domain may be able to remotely inject commands to other machines in the same domain.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability locally and must have domain user privileges to affect other machines.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Trend Micro, Inc. - Trend Micro Deep Security**
Affected versions:
- 20 (Status: affected)
### References
1. [](https://success.trendmicro.com/en-US/solution/KA-0018154)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-24-1516/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24068, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24068 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24068
- **State**: PUBLISHED
- **Published Date**: February 25, 2021 at 23:01 UTC
- **Last Updated**: August 03, 2024 at 19:21 UTC
- **Reserved Date**: January 13, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Excel Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Office Web Apps Server 2013 Service Pack 1**
Affected versions:
- 15.0.1 (Status: affected)
**Microsoft - Microsoft Excel 2010 Service Pack 2**
Affected versions:
- 13.0.0.0 (Status: affected)
**Microsoft - Microsoft Excel 2013 Service Pack 1**
Affected versions:
- 15.0.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24068) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18840, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18840
- **State**: PUBLISHED
- **Published Date**: April 20, 2020 at 15:53 UTC
- **Last Updated**: August 05, 2024 at 21:37 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by denial of service. This affects M4300-28G before 12.0.2.15, M4300-52G before 12.0.2.15, M4300-28G-POE+ before 12.0.2.15, M4300-52G-POE+ before 12.0.2.15, M4300-8X8F before 12.0.2.15, M4300-12X12F before 12.0.2.15, M4300-24X24F before 12.0.2.15, M4300-24X before 12.0.2.15, M4300-48X before 12.0.2.15, and M4200 before 12.0.2.15.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000049022/Security-Advisory-for-Denial-of-Service-Vulnerability-on-Some-Fully-Managed-Switches-PSV-2017-2005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2870, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2870 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2870
- **State**: PUBLISHED
- **Published Date**: July 02, 2016 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 23:40 UTC
- **Reserved Date**: March 09, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Buffer overflow in the CLI on IBM WebSphere DataPower XC10 appliances 2.1 and 2.5 allows remote authenticated users to cause a denial of service via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21983035)
2. [91551](http://www.securityfocus.com/bid/91551)
3. [IT14815](http://www-01.ibm.com/support/docview.wss?uid=swg1IT14815) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7910, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7910 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7910
- **State**: PUBLISHED
- **Published Date**: June 14, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 16:19 UTC
- **Reserved Date**: April 18, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
A Stack-Based Buffer Overflow issue was discovered in Digital Canal Structural Wind Analysis versions 9.1 and prior. An attacker may be able to run arbitrary code by remotely exploiting an executable to perform a denial-of-service attack.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**n/a - Digital Canal Structural Wind Analysis**
Affected versions:
- Digital Canal Structural Wind Analysis (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-157-02)
2. [98976](http://www.securityfocus.com/bid/98976) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21790, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21790 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21790
- **State**: PUBLISHED
- **Published Date**: August 05, 2021 at 20:04 UTC
- **Last Updated**: August 03, 2024 at 18:23 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An information disclosure vulnerability exists in the the way IOBit Advanced SystemCare Ultimate 14.2.0.220 driver handles Privileged I/O read requests. A specially crafted I/O request packet (IRP) can lead to privileged reads in the context of a driver which can result in sensitive information disclosure from the kernel. The IN instruction can read two bytes from the given I/O device, potentially leaking sensitive device data to unprivileged users.
### Weakness Classification (CWE)
- CWE-782: OS Command Injection
### Affected Products
**n/a - IOBit**
Affected versions:
- IOBit Advanced SystemCare Ultimate 14.2.0.220 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1255) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4401, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4401 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4401
- **State**: PUBLISHED
- **Published Date**: November 02, 2013 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 16:45 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The virConnectDomainXMLToNative API function in libvirt 1.1.0 through 1.1.3 checks for the connect:read permission instead of the connect:write permission, which allows attackers to gain domain:write privileges and execute Qemu binaries via crafted XML. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [60895](http://secunia.com/advisories/60895)
2. [GLSA-201412-04](http://security.gentoo.org/glsa/glsa-201412-04.xml)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1015259)
4. [](http://wiki.libvirt.org/page/Maintenance_Releases)
5. [](http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=57687fd6bf7f6e1b3662c52f3f26c06ab19dc96c)
6. [USN-2026-1](http://www.ubuntu.com/usn/USN-2026-1)
7. [55210](http://secunia.com/advisories/55210)
8. [1029241](http://www.securitytracker.com/id/1029241) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5132
- **State**: PUBLISHED
- **Published Date**: December 03, 2019 at 21:25 UTC
- **Last Updated**: August 04, 2024 at 19:47 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll GEM Raster parser of the Accusoft ImageGear 19.3.0 library. A specially crafted GEM file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**n/a - Accusoft**
Affected versions:
- Accusoft ImageGear 19.3.0 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2019-0921) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0523, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0523 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0523
- **State**: PUBLISHED
- **Published Date**: January 14, 2024 at 23:00 UTC
- **Last Updated**: August 01, 2024 at 18:11 UTC
- **Reserved Date**: January 14, 2024 at 16:18 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in CmsEasy up to 7.7.7. It has been declared as critical. Affected by this vulnerability is the function getslide_child_action in the library lib/admin/language_admin.php. The manipulation of the argument sid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250693 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**n/a - CmsEasy**
Affected versions:
- 7.7.0 (Status: affected)
- 7.7.1 (Status: affected)
- 7.7.2 (Status: affected)
- 7.7.3 (Status: affected)
- 7.7.4 (Status: affected)
- 7.7.5 (Status: affected)
- 7.7.6 (Status: affected)
- 7.7.7 (Status: affected)
### References
1. [](https://vuldb.com/?id.250693)
2. [](https://vuldb.com/?ctiid.250693)
3. [](https://github.com/V3geD4g/cmseasy_vul/blob/main/SQL1-EN.md)
### Credits
- V3geD4g (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1561, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1561 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1561
- **State**: PUBLISHED
- **Published Date**: April 08, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 19:01 UTC
- **Reserved Date**: March 12, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Finder module 6.x-1.x before 6.x-1.26, 7.x-1.x, and 7.x-2.x before 7.x-2.0-alpha8 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the "checkbox and radio button functionalities."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://drupal.org/node/1432320)
2. [](http://drupal.org/node/1432318)
3. [[oss-security] 20120319 Re: CVE-request: Drupal Finder SA-CONTRIB-2012-017](http://www.openwall.com/lists/oss-security/2012/03/19/9)
4. [79015](http://www.osvdb.org/79015)
5. [[oss-security] 20120316 CVE-request: Drupal Finder SA-CONTRIB-2012-017](http://www.openwall.com/lists/oss-security/2012/03/16/9)
6. [](http://www.madirish.net/content/drupal-finder-6x-19-xss-and-remote-code-execution-vulnerabilities)
7. [[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)](http://www.openwall.com/lists/oss-security/2012/04/07/1)
8. [47941](http://secunia.com/advisories/47941)
9. [](http://drupalcode.org/project/finder.git/commit/58443aa)
10. [](http://drupalcode.org/project/finder.git/commit/13e2d0c)
11. [](https://drupal.org/node/1432970)
12. [drupal-finder-unspecified-xss(73110)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73110)
13. [47943](http://secunia.com/advisories/47943) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0052, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0052 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0052
- **State**: PUBLISHED
- **Published Date**: October 10, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 20:52 UTC
- **Reserved Date**: November 16, 2017 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
If RSH service is enabled on Junos OS and if the PAM authentication is disabled, a remote unauthenticated attacker can obtain root access to the device. RSH service is disabled by default on Junos. There is no documented CLI command to enable this service. However, an undocumented CLI command allows a privileged Junos user to enable RSH service and disable PAM, and hence expose the system to unauthenticated root access. When RSH is enabled, the device is listing to RSH connections on port 514. This issue is not exploitable on platforms where Junos release is based on FreeBSD 10+. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D77 on SRX Series; 12.3 versions prior to 12.3R12-S10; 12.3X48 versions prior to 12.3X48-D75 on SRX Series; 14.1X53 versions prior to 14.1X53-D47 on QFX/EX Series; 15.1 versions prior to 15.1R4-S9, 15.1R6-S6, 15.1R7; 15.1X49 versions prior to 15.1X49-D131, 15.1X49-D140 on SRX Series; 15.1X53 versions prior to 15.1X53-D59 on EX2300/EX3400 Series; 15.1X53 versions prior to 15.1X53-D67 on QFX10K Series; 15.1X53 versions prior to 15.1X53-D233 on QFX5200/QFX5110 Series; 15.1X53 versions prior to 15.1X53-D471, 15.1X53-D490 on NFX Series; 16.1 versions prior to 16.1R3-S9, 16.1R4-S9, 16.1R5-S4, 16.1R6-S4, 16.1R7; 16.2 versions prior to 16.2R2-S5; 17.1 versions prior to 17.1R1-S7, 17.1R2-S7, 17.1R3; 17.2 versions prior to 17.2R1-S6, 17.2R2-S4, 17.2R3; 17.2X75 versions prior to 17.2X75-D110, 17.2X75-D91; 17.3 versions prior to 17.3R1-S4, 17.3R2-S2, 17.3R3; 17.4 versions prior to 17.4R1-S3, 17.4R2; 18.2X75 versions prior to 18.2X75-D5.
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 12.1X46 (Status: affected)
- 12.3X48 (Status: affected)
- 15.1X49 (Status: affected)
**Juniper Networks - Junos OS**
Affected versions:
- 12.3 (Status: affected)
- 15.1 (Status: affected)
- 16.1 (Status: affected)
- 16.2 (Status: affected)
- 17.1 (Status: affected)
- 17.2 (Status: affected)
- 17.2X75 (Status: affected)
- 17.3 (Status: affected)
- 17.4 (Status: affected)
- 18.2X75 (Status: affected)
**Juniper Networks - Junos OS**
Affected versions:
- 14.1X53 (Status: affected)
**Juniper Networks - Junos OS**
Affected versions:
- 15.1X53 (Status: affected)
**Juniper Networks - Junos OS**
Affected versions:
- 15.1X53 (Status: affected)
**Juniper Networks - Junos OS**
Affected versions:
- 15.1X53 (Status: affected)
**Juniper Networks - Junos OS**
Affected versions:
- 15.1X53 (Status: affected)
### References
1. [1041853](http://www.securitytracker.com/id/1041853)
2. [](https://kb.juniper.net/JSA10886) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5443, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5443 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5443
- **State**: PUBLISHED
- **Published Date**: June 02, 2025 at 11:31 UTC
- **Last Updated**: June 02, 2025 at 16:29 UTC
- **Reserved Date**: June 01, 2025 at 17:06 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function wirelessAdvancedHidden of the file /goform/wirelessAdvancedHidden. The manipulation of the argument ExtChSelector/24GSelector/5GSelector leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
- CWE-77: Security Weakness
### Affected Products
**Linksys - RE6500**
Affected versions:
- 1.0.013.001 (Status: affected)
- 1.0.04.001 (Status: affected)
- 1.0.04.002 (Status: affected)
- 1.1.05.003 (Status: affected)
- 1.2.07.001 (Status: affected)
**Linksys - RE6250**
Affected versions:
- 1.0.013.001 (Status: affected)
- 1.0.04.001 (Status: affected)
- 1.0.04.002 (Status: affected)
- 1.1.05.003 (Status: affected)
- 1.2.07.001 (Status: affected)
**Linksys - RE6300**
Affected versions:
- 1.0.013.001 (Status: affected)
- 1.0.04.001 (Status: affected)
- 1.0.04.002 (Status: affected)
- 1.1.05.003 (Status: affected)
- 1.2.07.001 (Status: affected)
**Linksys - RE6350**
Affected versions:
- 1.0.013.001 (Status: affected)
- 1.0.04.001 (Status: affected)
- 1.0.04.002 (Status: affected)
- 1.1.05.003 (Status: affected)
- 1.2.07.001 (Status: affected)
**Linksys - RE7000**
Affected versions:
- 1.0.013.001 (Status: affected)
- 1.0.04.001 (Status: affected)
- 1.0.04.002 (Status: affected)
- 1.1.05.003 (Status: affected)
- 1.2.07.001 (Status: affected)
**Linksys - RE9000**
Affected versions:
- 1.0.013.001 (Status: affected)
- 1.0.04.001 (Status: affected)
- 1.0.04.002 (Status: affected)
- 1.1.05.003 (Status: affected)
- 1.2.07.001 (Status: affected)
### References
1. [VDB-310782 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 wirelessAdvancedHidden os command injection](https://vuldb.com/?id.310782)
2. [VDB-310782 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.310782)
3. [Submit #584365 | Linksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection](https://vuldb.com/?submit.584365)
4. [](https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_6/6.md)
5. [](https://www.linksys.com/)
### Credits
- pjqwudi (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-48273, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-48273 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48273
- **State**: PUBLISHED
- **Published Date**: May 23, 2025 at 12:43 UTC
- **Last Updated**: May 27, 2025 at 14:36 UTC
- **Reserved Date**: May 19, 2025 at 14:13 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in wpjobportal WP Job Portal allows Path Traversal. This issue affects WP Job Portal: from n/a through 2.3.2.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**wpjobportal - WP Job Portal**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-job-portal/vulnerability/wordpress-wp-job-portal-2-3-2-arbitrary-file-download-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1973, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1973 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1973
- **State**: PUBLISHED
- **Published Date**: July 14, 2009 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 05:36 UTC
- **Reserved Date**: June 08, 2009 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Virtual Private Database component in Oracle Database 10.1.0.5, 10.2.0.4, and 11.1.0.7 allows remote authenticated users to affect confidentiality and integrity, related to VPD policies.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35776](http://secunia.com/advisories/35776)
2. [35687](http://www.securityfocus.com/bid/35687)
3. [ADV-2009-1900](http://www.vupen.com/english/advisories/2009/1900)
4. [](http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html)
5. [55890](http://osvdb.org/55890)
6. [1022560](http://www.securitytracker.com/id?1022560)
7. [oracle-db-vpd-unspecified(51757)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51757) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14475, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14475
- **State**: PUBLISHED
- **Published Date**: June 19, 2020 at 16:20 UTC
- **Last Updated**: August 04, 2024 at 12:46 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A reflected cross-site scripting (XSS) vulnerability in Dolibarr 11.0.3 allows remote attackers to inject arbitrary web script or HTML into public/notice.php (related to transphrase and transkey).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Dolibarr/dolibarr/commit/22ca5e067189bffe8066df26df923a386f044c08) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4813, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4813 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4813
- **State**: PUBLISHED
- **Published Date**: November 05, 2008 at 14:51 UTC
- **Last Updated**: August 07, 2024 at 10:31 UTC
- **Reserved Date**: October 31, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Adobe Reader and Acrobat 8.1.2 and earlier, and before 7.1.1, allow remote attackers to execute arbitrary code via a crafted PDF document that (1) performs unspecified actions on a Collab object that trigger memory corruption, related to a GetCosObj method; or (2) contains a malformed PDF object that triggers memory corruption during parsing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20081104 ZDI-08-074: Adobe Acrobat PDF Javascript getCosObj Memory Corruption Vulnerability](http://www.securityfocus.com/archive/1/498057/100/0/threaded)
2. [32700](http://secunia.com/advisories/32700)
3. [](http://www.adobe.com/support/security/bulletins/apsb09-04.html)
4. [](http://www.zerodayinitiative.com/advisories/ZDI-08-073/)
5. [32100](http://www.securityfocus.com/bid/32100)
6. [adobe-acrobatreader-collab-code-execution(46344)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46344)
7. [249366](http://download.oracle.com/sunalerts/1019937.1.html)
8. [20081104 ZDI-08-073: Adobe Acrobat Reader Malformed PDF Code Execution Vulnerability](http://www.securityfocus.com/archive/1/498056/100/0/threaded)
9. [32872](http://secunia.com/advisories/32872)
10. [4564](http://securityreason.com/securityalert/4564)
11. [](http://www.zerodayinitiative.com/advisories/ZDI-08-074/)
12. [](http://www.adobe.com/support/security/bulletins/apsb08-19.html)
13. [ADV-2009-0098](http://www.vupen.com/english/advisories/2009/0098)
14. [TA08-309A](http://www.us-cert.gov/cas/techalerts/TA08-309A.html)
15. [1021140](http://www.securitytracker.com/id?1021140)
16. [ADV-2008-3001](http://www.vupen.com/english/advisories/2008/3001)
17. [SUSE-SR:2008:026](http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html)
18. [adobe-acrobatreader-object-code-execution(46333)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46333)
19. [RHSA-2008:0974](http://www.redhat.com/support/errata/RHSA-2008-0974.html)
20. [](http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=800801) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50572, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50572 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50572
- **State**: PUBLISHED
- **Published Date**: December 29, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 22:16 UTC
- **Reserved Date**: December 11, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the component GroovyEngine.execute of jline-groovy v3.24.1 allows attackers to cause an OOM (OutofMemory) error.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jline/jline3/issues/909) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6031, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6031
- **State**: PUBLISHED
- **Published Date**: November 21, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 20:12 UTC
- **Reserved Date**: November 21, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Greater Cincinnati Internet Solutions (GCIS) ASPCart allow remote attackers to execute arbitrary SQL commands via (1) the prodid parameter in (a) prodetails.asp; (2) the page parameter in (b) display.asp; the (3) custid, (4) item, (5) price, (6) custom, (7) department, (8) start, (9) quantity, (10) submit, (11) custom1, (12) custom2, or (13) custom3 parameters in (c) addcart.asp; or the (14) customerid parameter in (d) payment.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21152](http://www.securityfocus.com/bid/21152)
2. [22946](http://secunia.com/advisories/22946)
3. [20061114 ASP Cart [multiples injection sql (post & get)]](http://www.securityfocus.com/archive/1/451858/100/0/threaded)
4. [1899](http://securityreason.com/securityalert/1899)
5. [ADV-2006-4580](http://www.vupen.com/english/advisories/2006/4580) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3151, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3151 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3151
- **State**: PUBLISHED
- **Published Date**: June 11, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 14:05 UTC
- **Reserved Date**: June 11, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
rpttop.htm in the web management interface in Packeteer PacketShaper 7.3.0g2 and 7.5.0g1 allows remote attackers to cause a denial of service (device reboot) via a request with empty values of the OP.MEAS.DATAQUERY and MEAS.TYPE parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2801](http://securityreason.com/securityalert/2801)
2. [packetshaper-meastype-dos(34780)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34780)
3. [20070608 Packeteer PacketShaper Web Management Denial of Service](http://www.securityfocus.com/archive/1/470835/100/0/threaded)
4. [24388](http://www.securityfocus.com/bid/24388)
5. [25577](http://secunia.com/advisories/25577)
6. [37230](http://osvdb.org/37230) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7797, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7797 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7797
- **State**: PUBLISHED
- **Published Date**: December 17, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 06:37 UTC
- **Reserved Date**: March 08, 2018 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A URL redirection vulnerability exists in Power Monitoring Expert, Energy Expert (formerly Power Manager) - EcoStruxure Power Monitoring Expert (PME) v8.2 (all editions), EcoStruxure Energy Expert 1.3 (formerly Power Manager), EcoStruxure Power SCADA Operation (PSO) 8.2 Advanced Reports and Dashboards Module, EcoStruxure Power Monitoring Expert (PME) v9.0, EcoStruxure Energy Expert v2.0, and EcoStruxure Power SCADA Operation (PSO) 9.0 Advanced Reports and Dashboards Module which could cause a phishing attack when redirected to a malicious site.
### Affected Products
**Schneider Electric SE - Power Monitoring Expert, Energy Expert (formerly Power Manager) - EcoStruxureª Power Monitoring Expert (PME) v8.2 (all editions), EcoStruxureª Energy Expert 1.3 (formerly Power Manager), EcoStruxureª Power SCADA Operation (PSO) 8.2 Advanced Reports and Dashboards Module, EcoStruxureª Power Monitoring Expert (PME) v9.0, EcoStruxureª Energy Expert v2.0, and EcoStruxureªPower SCADA Operation (PSO) 9.0 Advanced Reports and Dashboards Module**
Affected versions:
- EcoStruxureª (Status: affected)
- Power Monitoring Expert (PME) v8.2 (all editions), EcoStruxureª (Status: affected)
- Energy Expert 1.3 (formerly Power Manager), EcoStruxureª (Status: affected)
- Power SCADA Operation (PSO) 8.2 Advanced Reports and Dashboards Module, EcoStruxureª (Status: affected)
- Power Monitoring Expert (PME) v9.0, EcoStruxureª (Status: affected)
- Energy Expert v2.0, and EcoStruxureª (Status: affected)
- Power SCADA Operation (PSO) 9.0 Advanced Reports and Dashboards Module (Status: affected)
### References
1. [106277](http://www.securityfocus.com/bid/106277)
2. [](https://www.schneider-electric.com/en/download/document/SEVD-2018-347-01/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2386, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2386 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2386
- **State**: PUBLISHED
- **Published Date**: March 17, 2025 at 17:00 UTC
- **Last Updated**: March 17, 2025 at 18:56 UTC
- **Reserved Date**: March 16, 2025 at 17:11 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul Local Services Search Engine Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /serviceman-search.php. The manipulation of the argument location leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Local Services Search Engine Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-299885 | PHPGurukul Local Services Search Engine Management System serviceman-search.php sql injection](https://vuldb.com/?id.299885)
2. [VDB-299885 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.299885)
3. [Submit #516546 | PHPGurukul Local Services Search Engine Management System V1.0 SQL injection](https://vuldb.com/?submit.516546)
4. [](https://github.com/aionman/cve/issues/7)
5. [](https://phpgurukul.com/)
### Credits
- at1on (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49202, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49202 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49202
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 01:55 UTC
- **Last Updated**: May 04, 2025 at 08:32 UTC
- **Reserved Date**: February 26, 2025 at 01:49 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_uart: add missing NULL check in h5_enqueue
Syzbot hit general protection fault in __pm_runtime_resume(). The problem
was in missing NULL check.
hu->serdev can be NULL and we should not blindly pass &serdev->dev
somewhere, since it will cause GPF.
### Affected Products
**Linux - Linux**
Affected versions:
- d9dd833cf6d29695682ec7e7924c0d0992b906bc (Status: affected)
- d9dd833cf6d29695682ec7e7924c0d0992b906bc (Status: affected)
- d9dd833cf6d29695682ec7e7924c0d0992b906bc (Status: affected)
- d9dd833cf6d29695682ec7e7924c0d0992b906bc (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15 (Status: affected)
- 0 (Status: unaffected)
- 5.15.33 (Status: unaffected)
- 5.16.19 (Status: unaffected)
- 5.17.2 (Status: unaffected)
- 5.18 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/7235485433d290367d60ae22fcdfc565e61d42ab)
2. [](https://git.kernel.org/stable/c/e6b6c904c0f88588b6a3ace20e4c0d61eab124f8)
3. [](https://git.kernel.org/stable/c/8a3896c30f542439d36303183dc96f65df8cc528)
4. [](https://git.kernel.org/stable/c/32cb08e958696908a9aad5e49a78d74f7e32fffb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26055, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26055 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26055
- **State**: REJECTED
- **Published Date**: January 19, 2022 at 03:26 UTC
- **Last Updated**: January 19, 2022 at 03:26 UTC
- **Reserved Date**: January 25, 2021 at 00:00 UTC
- **Assigned By**: Joomla
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-28872, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-28872 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-28872
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 21:00 UTC
- **Last Updated**: March 12, 2025 at 13:52 UTC
- **Reserved Date**: March 11, 2025 at 08:08 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in jwpegram Block Spam By Math Reloaded allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Block Spam By Math Reloaded: from n/a through 2.2.4.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**jwpegram - Block Spam By Math Reloaded**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/block-spam-by-math-reloaded/vulnerability/wordpress-block-spam-by-math-reloaded-plugin-2-2-4-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Nabil Irawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34732
- **State**: PUBLISHED
- **Published Date**: September 13, 2022 at 18:41 UTC
- **Last Updated**: March 11, 2025 at 16:10 UTC
- **Reserved Date**: June 27, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft ODBC Driver Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Microsoft ODBC Driver Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34732) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12862, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12862 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12862
- **State**: PUBLISHED
- **Published Date**: April 21, 2025 at 14:22 UTC
- **Last Updated**: April 21, 2025 at 15:15 UTC
- **Reserved Date**: December 20, 2024 at 18:06 UTC
- **Assigned By**: OpenText
### Vulnerability Description
Incorrect Authorization vulnerability in the OpenText Content Server REST API on Windows, Linux allows users without the appropriate permissions to remove external collaborators.This issue affects Content Server: 20.2-24.4.
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**OpenText - Content Server**
Affected versions:
- 20.2-24.4 (Status: affected)
### References
1. [](https://support.opentext.com/csm?id=ot_kb_unauthenticated&sysparm_article=KB0839115)
### Credits
- Hussein Bahmad (NTT Data) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25472, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25472 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25472
- **State**: PUBLISHED
- **Published Date**: May 23, 2023 at 12:20 UTC
- **Last Updated**: January 08, 2025 at 22:06 UTC
- **Reserved Date**: February 06, 2023 at 12:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Podlove Podlove Podcast Publisher plugin <= 3.8.3 versions.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Podlove - Podlove Podcast Publisher**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/podlove-podcasting-plugin-for-wordpress/wordpress-podlove-podcast-publisher-plugin-3-8-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- yuyudhn (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7945
- **State**: PUBLISHED
- **Published Date**: January 22, 2015 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 13:03 UTC
- **Reserved Date**: October 06, 2014 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
OpenJPEG before r2908, as used in PDFium in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document, related to j2k.c, jp2.c, and t2.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [62665](http://secunia.com/advisories/62665)
2. [](http://googlechromereleases.blogspot.com/2015/01/stable-update.html)
3. [](https://pdfium.googlesource.com/pdfium/+/767aebbef641a89498deebc29369a078207b4dcc)
4. [72288](http://www.securityfocus.com/bid/72288)
5. [GLSA-201502-13](http://security.gentoo.org/glsa/glsa-201502-13.xml)
6. [1031623](http://www.securitytracker.com/id/1031623)
7. [](https://code.google.com/p/chromium/issues/detail?id=414310)
8. [openSUSE-SU-2015:0441](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html)
9. [RHSA-2015:0093](http://rhn.redhat.com/errata/RHSA-2015-0093.html)
10. [62383](http://secunia.com/advisories/62383) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2825, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2825
- **State**: PUBLISHED
- **Published Date**: April 21, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 05:24 UTC
- **Reserved Date**: April 01, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unrestricted file upload vulnerability in sam-ajax-admin.php in the Simple Ads Manager plugin before 2.5.96 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the directory specified by the path parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36614](https://www.exploit-db.com/exploits/36614/)
2. [](http://packetstormsecurity.com/files/131282/WordPress-Simple-Ads-Manager-2.5.94-File-Upload.html)
3. [](https://wordpress.org/plugins/simple-ads-manager/changelog/)
4. [](http://www.itas.vn/news/ITAS-Team-found-out-multiple-critical-vulnerabilities-in-Hakin9-IT-Security-Magazine-78.html)
5. [20150405 Wordpress plugin Simple Ads Manager - Arbitrary File Upload](http://seclists.org/fulldisclosure/2015/Apr/8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1534, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1534
- **State**: PUBLISHED
- **Published Date**: April 22, 2011 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 22:28 UTC
- **Reserved Date**: March 29, 2011 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP Network Node Manager i (NNMi) 9.0x allows remote authenticated users to obtain access to processes via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1025386](http://www.securitytracker.com/id?1025386)
2. [ADV-2011-1024](http://www.vupen.com/english/advisories/2011/1024)
3. [SSRT100633](http://marc.info/?l=bugtraq&m=132094759631216&w=2)
4. [44230](http://secunia.com/advisories/44230)
5. [HPSBMU02708](http://marc.info/?l=bugtraq&m=132094759631216&w=2)
6. [HPSBMA02659](https://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02788734)
7. [SSRT100440](https://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02788734) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1139, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1139
- **State**: PUBLISHED
- **Published Date**: December 31, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:39 UTC
- **Reserved Date**: December 06, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in the DICOM dissector in Ethereal 0.10.4 through 0.10.7 allows remote attackers to cause a denial of service (application crash).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ethereal.com/appnotes/enpa-sa-00016.html)
2. [CLA-2005:916](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916)
3. [GLSA-200412-15](http://www.gentoo.org/security/en/glsa/glsa-200412-15.xml)
4. [13468](http://secunia.com/advisories/13468/)
5. [MDKSA-2004:152](http://www.mandriva.com/security/advisories?name=MDKSA-2004:152)
6. [RHSA-2005:037](http://www.redhat.com/support/errata/RHSA-2005-037.html)
7. [11943](http://www.securityfocus.com/bid/11943)
8. [ethereal-dicom-dos(18484)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18484)
9. [oval:org.mitre.oval:def:11319](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11319)
10. [FLSA-2006:152922](http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html)
11. [P-061](http://www.ciac.org/ciac/bulletins/p-061.shtml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4454, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4454
- **State**: PUBLISHED
- **Published Date**: February 17, 2011 at 18:31 UTC
- **Last Updated**: August 07, 2024 at 03:43 UTC
- **Reserved Date**: December 06, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4462 and CVE-2010-4473.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html)
2. [](http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html)
3. [HPSBMU02799](http://marc.info/?l=bugtraq&m=134254866602253&w=2)
4. [SUSE-SU-2011:0823](http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html)
5. [oval:org.mitre.oval:def:12945](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12945)
6. [](http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html)
7. [44954](http://secunia.com/advisories/44954)
8. [46391](http://www.securityfocus.com/bid/46391)
9. [oracle-runtime-code-exec(65394)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65394)
10. [RHSA-2011:0880](http://www.redhat.com/support/errata/RHSA-2011-0880.html)
11. [RHSA-2011:0282](http://www.redhat.com/support/errata/RHSA-2011-0282.html)
12. [oval:org.mitre.oval:def:13546](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13546)
13. [SSRT100867](http://marc.info/?l=bugtraq&m=134254957702612&w=2)
14. [49198](http://secunia.com/advisories/49198)
15. [SUSE-SA:2011:024](http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html)
16. [HPSBUX02777](http://marc.info/?l=bugtraq&m=133728004526190&w=2)
17. [SSRT100854](http://marc.info/?l=bugtraq&m=133728004526190&w=2)
18. [HPSBMU02797](http://marc.info/?l=bugtraq&m=134254957702612&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4059
- **State**: PUBLISHED
- **Published Date**: December 07, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:31 UTC
- **Reserved Date**: December 07, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in searchdb.asp in LocazoList 1.03c and earlier allows remote attackers to execute arbitrary SQL commands via the q parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21531](http://www.osvdb.org/21531)
2. [ADV-2005-2756](http://www.vupen.com/english/advisories/2005/2756)
3. [](http://pridels0.blogspot.com/2005/12/locazolist-classifieds-v103c-vuln.html)
4. [15812](http://www.securityfocus.com/bid/15812)
5. [](http://locazo.net:81/applications/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5978, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5978 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5978
- **State**: PUBLISHED
- **Published Date**: September 20, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:03 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The memetan (aka memetan.android.com.activity) application 1.1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#864273](http://www.kb.cert.org/vuls/id/864273)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0818, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0818
- **State**: PUBLISHED
- **Published Date**: March 24, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 04:26 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2015:0636](http://lists.opensuse.org/opensuse-updates/2015-03/msg00096.html)
2. [openSUSE-SU-2015:0567](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html)
3. [GLSA-201504-01](https://security.gentoo.org/glsa/201504-01)
4. [73265](http://www.securityfocus.com/bid/73265)
5. [RHSA-2015:0718](http://rhn.redhat.com/errata/RHSA-2015-0718.html)
6. [DSA-3201](http://www.debian.org/security/2015/dsa-3201)
7. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html)
8. [](http://www.mozilla.org/security/announce/2015/mfsa2015-28.html)
9. [SUSE-SU-2015:0630](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00035.html)
10. [1031959](http://www.securitytracker.com/id/1031959)
11. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1144988)
12. [SUSE-SU-2015:0593](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html)
13. [USN-2538-1](http://www.ubuntu.com/usn/USN-2538-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3509, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3509 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3509
- **State**: PUBLISHED
- **Published Date**: January 18, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 23:37 UTC
- **Reserved Date**: September 16, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the EnterpriseOne Tools component in Oracle JD Edwards 8.98 SP 24 allows remote authenticated users to affect confidentiality, related to Enterprise Infrastructure SEC (JDENET), a different vulnerability than CVE-2011-2325, CVE-2011-2326, and CVE-2011-3524.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24403, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24403
- **State**: REJECTED
- **Last Updated**: May 01, 2024 at 19:35 UTC
- **Reserved Date**: January 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18997, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18997
- **State**: PUBLISHED
- **Published Date**: January 03, 2019 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 11:23 UTC
- **Reserved Date**: November 06, 2018 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Pluto Safety PLC Gateway Ethernet devices in ABB GATE-E1 and GATE-E2 all versions allows an unauthenticated attacker using the administrative web interface to insert an HTML/Javascript payload into any of the device properties, which may allow an attacker to display/execute the payload in a visitor browser.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - ABB GATE-E1 and GATE-E2**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-352-01)
2. [106247](http://www.securityfocus.com/bid/106247) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8462
- **State**: PUBLISHED
- **Published Date**: September 13, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 06:54 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
### Affected Products
**Microsoft - Windows Server 2016**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows 10**
Affected versions:
- 32-bit Systems (Status: affected)
- Version 1607 for 32-bit Systems (Status: affected)
- Version 1607 for x64-based Systems (Status: affected)
- Version 1703 for 32-bit Systems (Status: affected)
- Version 1703 for x64-based Systems (Status: affected)
- Version 1709 for 32-bit Systems (Status: affected)
- Version 1709 for x64-based Systems (Status: affected)
- Version 1803 for 32-bit Systems (Status: affected)
- Version 1803 for x64-based Systems (Status: affected)
- x64-based Systems (Status: affected)
**Microsoft - Windows 10 Servers**
Affected versions:
- version 1709 (Server Core Installation) (Status: affected)
- version 1803 (Server Core Installation) (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8462)
2. [1041629](http://www.securitytracker.com/id/1041629)
3. [105274](http://www.securityfocus.com/bid/105274) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35328, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35328
- **State**: PUBLISHED
- **Published Date**: March 04, 2021 at 15:44 UTC
- **Last Updated**: August 04, 2024 at 17:02 UTC
- **Reserved Date**: December 14, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Courier Management System 1.0 - 'First Name' Stored XSS
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/49241) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.