System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5755, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5755 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5755 - **State**: PUBLISHED - **Published Date**: September 09, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 11:55 UTC - **Reserved Date**: August 30, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The verizon (aka com.wverizonwirelessbill) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#820537](http://www.kb.cert.org/vuls/id/820537) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1677, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1677 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1677 - **State**: PUBLISHED - **Published Date**: March 28, 2023 at 21:31 UTC - **Last Updated**: August 02, 2024 at 05:57 UTC - **Reserved Date**: March 28, 2023 at 20:16 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in DriverGenius 9.70.0.346. It has been rated as problematic. Affected by this issue is the function 0x9c40a0c8/0x9c40a0dc/0x9c40a0e0/0x9c40a0d8/0x9c4060d4/0x9c402004/0x9c402088/0x9c40208c/0x9c4060d0/0x9c4060cc/0x9c4060c4/0x9c402084 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-224234 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-404: Security Weakness ### Affected Products **n/a - DriverGenius** Affected versions: - 9.70.0.346 (Status: affected) ### References 1. [](https://vuldb.com/?id.224234) 2. [](https://vuldb.com/?ctiid.224234) 3. [](https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1677) 4. [](https://drive.google.com/file/d/1C7afiLbOOLuYZVeeslPW3AdNeOIwUea9/view) ### Credits - Zeze7w (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22252, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22252 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22252 - **State**: PUBLISHED - **Published Date**: May 28, 2025 at 07:55 UTC - **Last Updated**: May 29, 2025 at 03:55 UTC - **Reserved Date**: January 02, 2025 at 10:21 UTC - **Assigned By**: fortinet ### Vulnerability Description A missing authentication for critical function in Fortinet FortiProxy versions 7.6.0 through 7.6.1, FortiSwitchManager version 7.2.5, and FortiOS versions 7.4.4 through 7.4.6 and version 7.6.0 may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass. ### CVSS Metrics - **CVSS Base Score**: 9/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:W/RC:C` ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **Fortinet - FortiProxy** Affected versions: - 7.6.0 (Status: affected) **Fortinet - FortiSwitchManager** Affected versions: - 7.2.5 (Status: affected) **Fortinet - FortiOS** Affected versions: - 7.6.0 (Status: affected) - 7.4.4 (Status: affected) ### References 1. [https://fortiguard.fortinet.com/psirt/FG-IR-24-472](https://fortiguard.fortinet.com/psirt/FG-IR-24-472)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36281, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36281 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36281 - **State**: PUBLISHED - **Published Date**: August 16, 2021 at 22:00 UTC - **Last Updated**: September 17, 2024 at 00:40 UTC - **Reserved Date**: July 08, 2021 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell EMC PowerScale OneFS versions 8.2.x - 9.2.x contain an incorrect permission assignment vulnerability. A low privileged authenticated user can potentially exploit this vulnerability to escalate privileges. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Dell - PowerScale OneFS** Affected versions: - 8.2.x - 9.2.x (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/000190408)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10672, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10672 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10672 - **State**: PUBLISHED - **Published Date**: November 12, 2024 at 03:24 UTC - **Last Updated**: November 12, 2024 at 11:20 UTC - **Reserved Date**: November 01, 2024 at 10:42 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Multiple Page Generator Plugin – MPG plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the mpg_upsert_project_source_block() function in all versions up to, and including, 4.0.2. This makes it possible for authenticated attackers, with editor-level access and above, to delete limited files on the server. ### CVSS Metrics - **CVSS Base Score**: 2.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-73: Security Weakness ### Affected Products **themeisle - Multiple Page Generator Plugin – MPG** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/8c21de03-4d62-4ecf-a2f1-57e0e416792b?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/multiple-pages-generator-by-porthas/tags/3.4.8/controllers/ProjectController.php#L147) 3. [](https://plugins.trac.wordpress.org/browser/multiple-pages-generator-by-porthas/tags/3.4.8/controllers/ProjectController.php#L139) 4. [](https://plugins.trac.wordpress.org/changeset/3183330/multiple-pages-generator-by-porthas/tags/4.0.3/controllers/ProjectController.php) ### Credits - Arkadiusz Hydzik
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8250, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8250 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8250 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 16, 2016 at 00:00 UTC - **Assigned By**: lenovo ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9212, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9212 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9212 - **State**: PUBLISHED - **Published Date**: March 22, 2021 at 17:31 UTC - **Last Updated**: August 04, 2024 at 10:19 UTC - **Reserved Date**: February 18, 2020 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description There is a vulnerability in some version of USG9500 that the device improperly handles the information when a user logs in to device. The attacker can exploit the vulnerability to perform some operation and can get information and cause information leak. ### Affected Products **n/a - USG9500** Affected versions: - V500R005C00SPC100,V500R005C00SPC200,V500R005C20SPC300,V500R005C20SPC500,V500R005C20SPC600 (Status: affected) ### References 1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2090, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2090 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2090 - **State**: PUBLISHED - **Published Date**: March 02, 2014 at 17:00 UTC - **Last Updated**: August 06, 2024 at 09:58 UTC - **Reserved Date**: February 24, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in ilias.php in ILIAS 4.4.1 allow remote authenticated users to inject arbitrary web script or HTML via the (1) tar, (2) tar_val, or (3) title parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/125350/ILIAS-4.4.1-Cross-Site-Scripting-Shell-Upload.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17598, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17598 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17598 - **State**: PUBLISHED - **Published Date**: December 13, 2017 at 09:00 UTC - **Last Updated**: August 05, 2024 at 20:59 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Affiliate MLM Script 1.0 has SQL Injection via the product-category.php key parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com/files/145304/Affiliate-MLM-Script-1.0-SQL-Injection.html) 2. [43265](https://www.exploit-db.com/exploits/43265/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23223, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23223 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23223 - **State**: PUBLISHED - **Published Date**: January 25, 2022 at 13:00 UTC - **Last Updated**: August 03, 2024 at 03:36 UTC - **Reserved Date**: January 14, 2022 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description On Apache ShenYu versions 2.4.0 and 2.4.1, and endpoint existed that disclosed the passwords of all users. Users are recommended to upgrade to version 2.4.2 or later. ### Weakness Classification (CWE) - CWE-522: Security Weakness ### Affected Products **Apache Software Foundation - Apache ShenYu (incubating) ** Affected versions: - Apache ShenYu (incubating) (Status: affected) ### References 1. [](https://lists.apache.org/thread/q2gg6ny6lpkph7nkrvjzqdvqpm805v8s) 2. [[oss-security] 20220125 CVE-2022-23223: Password leakage in Apache ShenYu](http://www.openwall.com/lists/oss-security/2022/01/25/7) 3. [[oss-security] 20220126 CVE-2022-23223: Apache ShenYu (incubating) Password leakage](http://www.openwall.com/lists/oss-security/2022/01/26/4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2608, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2608 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2608 - **State**: PUBLISHED - **Published Date**: October 21, 2015 at 21:00 UTC - **Last Updated**: August 06, 2024 at 05:17 UTC - **Reserved Date**: March 20, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in (1) the Oracle Communications Diameter Signaling Router (DSR) component in Oracle Communications Applications 4.1.6 and earlier, 5.1.0 and earlier, 6.0.2 and earlier, and 7.1.0 and earlier; (2) the Oracle Communications Performance Intelligence Center Software component in Oracle Communications Applications 9.0.3 and earlier and 10.1.5 and earlier; (3) the Oracle Communications Policy Management component in Oracle Communications Applications 9.9.0 and earlier, 10.5.0 and earlier, 11.5.0 and earlier, and 12.1.0 and earlier; and (4) the Oracle Communications Tekelec HLR Router component in Oracle Communications Applications 4.0.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to PMAC. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html) 2. [1033900](http://www.securitytracker.com/id/1033900)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7768 - **State**: PUBLISHED - **Published Date**: October 21, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 13:03 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Analects of Confucius (aka com.azbc88881.lunyu) application 8.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#623329](http://www.kb.cert.org/vuls/id/623329) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12260, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12260 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12260 - **State**: PUBLISHED - **Published Date**: October 19, 2017 at 08:00 UTC - **Last Updated**: August 05, 2024 at 18:28 UTC - **Reserved Date**: August 03, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the implementation of Session Initiation Protocol (SIP) functionality in Cisco Small Business SPA50x, SPA51x, and SPA52x Series IP Phones could allow an unauthenticated, remote attacker to cause an affected device to become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper handling of SIP request messages by an affected device. An attacker could exploit this vulnerability by using formatted specifiers in a SIP payload that is sent to an affected device. A successful exploit could allow the attacker to cause the affected device to become unresponsive, resulting in a DoS condition that persists until the device is restarted manually. This vulnerability affects Cisco Small Business SPA50x, SPA51x, and SPA52x Series IP Phones that are running firmware release 7.6.2SR1 or earlier. Cisco Bug IDs: CSCvc63986. ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **n/a - Cisco Small Business SPA50x, SPA51x, and SPA52x Series IP Phones** Affected versions: - Cisco Small Business SPA50x, SPA51x, and SPA52x Series IP Phones (Status: affected) ### References 1. [101495](http://www.securityfocus.com/bid/101495) 2. [1039616](http://www.securitytracker.com/id/1039616) 3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-sip1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-47063, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-47063 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-47063 - **State**: PUBLISHED - **Published Date**: December 13, 2023 at 09:30 UTC - **Last Updated**: August 02, 2024 at 21:01 UTC - **Reserved Date**: October 30, 2023 at 16:23 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Illustrator versions 28.0 (and earlier) and 27.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Adobe - Illustrator** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/illustrator/apsb23-68.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0293, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0293 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0293 - **State**: PUBLISHED - **Published Date**: February 08, 2010 at 20:00 UTC - **Last Updated**: September 16, 2024 at 16:48 UTC - **Reserved Date**: January 12, 2010 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The client logging functionality in chronyd in Chrony before 1.23.1 does not restrict the amount of memory used for storage of client information, which allows remote attackers to cause a denial of service (memory consumption) via spoofed (1) NTP or (2) cmdmon packets. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-1992](http://www.debian.org/security/2010/dsa-1992) 2. [38106](http://www.securityfocus.com/bid/38106) 3. [](http://git.tuxfamily.org/chrony/chrony.git/?p=gitroot/chrony/chrony.git%3Ba=commit%3Bh=2f63cf448560fdb96b80d8488aae6a15b802a753) 4. [](http://chrony.tuxfamily.org/News.html) 5. [38428](http://secunia.com/advisories/38428) 6. [](https://bugzilla.redhat.com/show_bug.cgi?id=555367) 7. [38480](http://secunia.com/advisories/38480)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0006 - **State**: PUBLISHED - **Published Date**: January 29, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:01 UTC - **Reserved Date**: January 05, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20040202-01-U](ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc) 2. [9489](http://www.securityfocus.com/bid/9489) 3. [DSA-434](http://www.debian.org/security/2004/dsa-434) 4. [20040201-01-U](ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc) 5. [RHSA-2004:032](http://www.redhat.com/support/errata/RHSA-2004-032.html) 6. [SuSE-SA:2004:004](http://www.novell.com/linux/security/advisories/2004_04_gaim.html) 7. [3732](http://www.osvdb.org/3732) 8. [SSA:2004-026](http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.361158) 9. [oval:org.mitre.oval:def:818](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A818) 10. [VU#871838](http://www.kb.cert.org/vuls/id/871838) 11. [VU#444158](http://www.kb.cert.org/vuls/id/444158) 12. [20040126 Advisory 01/2004: 12 x Gaim remote overflows](http://marc.info/?l=bugtraq&m=107513690306318&w=2) 13. [VU#297198](http://www.kb.cert.org/vuls/id/297198) 14. [gaim-login-value-bo(14941)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14941) 15. [oval:org.mitre.oval:def:10222](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10222) 16. [](http://ultramagnetic.sourceforge.net/advisories/001.html) 17. [GLSA-200401-04](http://security.gentoo.org/glsa/glsa-200401-04.xml) 18. [1008850](http://www.securitytracker.com/id?1008850) 19. [20040127 Ultramagnetic Advisory #001: Multiple vulnerabilities in Gaim code](http://marc.info/?l=bugtraq&m=107522432613022&w=2) 20. [](http://security.e-matters.de/advisories/012004.html) 21. [RHSA-2004:033](http://www.redhat.com/support/errata/RHSA-2004-033.html) 22. [MDKSA-2004:006](http://www.mandriva.com/security/advisories?name=MDKSA-2004:006) 23. [gaim-yahoowebpending-cookie-bo(14939)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14939) 24. [gaim-http-proxy-bo(14947)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14947) 25. [gaim-login-name-bo(14940)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14940) 26. [20040126 Advisory 01/2004: 12 x Gaim remote overflows](http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html) 27. [VU#527142](http://www.kb.cert.org/vuls/id/527142) 28. [gaim-urlparser-bo(14945)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14945) 29. [VU#371382](http://www.kb.cert.org/vuls/id/371382) 30. [gaim-yahoopacketread-keyname-bo(14943)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14943) 31. [CLA-2004:813](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813) 32. [3731](http://www.osvdb.org/3731) 33. [VU#503030](http://www.kb.cert.org/vuls/id/503030) 34. [RHSA-2004:045](http://www.redhat.com/support/errata/RHSA-2004-045.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2958, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2958 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2958 - **State**: PUBLISHED - **Published Date**: July 17, 2023 at 14:16 UTC - **Last Updated**: October 30, 2024 at 13:55 UTC - **Reserved Date**: May 29, 2023 at 11:48 UTC - **Assigned By**: TR-CERT ### Vulnerability Description Authorization Bypass Through User-Controlled Key vulnerability in Origin Software ATS Pro allows Authentication Abuse, Authentication Bypass.This issue affects ATS Pro: before 20230714. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **Origin Software - ATS Pro** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.usom.gov.tr/bildirim/tr-23-0410) ### Credits - Resul Melih MACIT
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18711, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18711 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18711 - **State**: REJECTED - **Published Date**: November 04, 2019 at 20:17 UTC - **Last Updated**: November 04, 2019 at 20:17 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2436, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2436 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2436 - **State**: PUBLISHED - **Published Date**: September 15, 2011 at 10:00 UTC - **Last Updated**: August 06, 2024 at 23:00 UTC - **Reserved Date**: June 06, 2011 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Heap-based buffer overflow in the image-parsing library in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:14218](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14218) 2. [](http://www.adobe.com/support/security/bulletins/apsb11-24.html) 3. [SUSE-SU-2011:1239](http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00013.html) 4. [SUSE-SA:2011:044](http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00025.html) 5. [openSUSE-SU-2011:1238](http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00012.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0965, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0965 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0965 - **State**: PUBLISHED - **Published Date**: May 18, 2023 at 18:38 UTC - **Last Updated**: January 22, 2025 at 14:33 UTC - **Reserved Date**: February 22, 2023 at 19:24 UTC - **Assigned By**: Silabs ### Vulnerability Description Compiler removal of buffer clearing in sli_cryptoacc_transparent_key_agreement in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM. ### CVSS Metrics - **CVSS Base Score**: 3.1/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-14: Security Weakness ### Affected Products **silabs.com - Gecko Platform** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/SiliconLabs/gecko_sdk) 2. [](https://community.silabs.com/sfc/servlet.shepherd/document/download/0698Y00000U19lGQAR?operationContext=S1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4847, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4847 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4847 - **State**: PUBLISHED - **Published Date**: July 10, 2014 at 16:00 UTC - **Last Updated**: August 06, 2024 at 11:27 UTC - **Reserved Date**: July 10, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Random Banner plugin 1.1.2.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the buffercode_RBanner_url_banner1 parameter in an update action to wp-admin/options.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/127292/WordPress-Random-Banner-1.1.2.1-Cross-Site-Scripting.html) 2. [68280](http://www.securityfocus.com/bid/68280)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1927, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1927 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1927 - **State**: PUBLISHED - **Published Date**: July 14, 2015 at 17:00 UTC - **Last Updated**: August 06, 2024 at 05:02 UTC - **Reserved Date**: February 19, 2015 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description The default configuration of IBM WebSphere Application Server (WAS) 7.0.0 before 7.0.0.39, 8.0.0 before 8.0.0.11, and 8.5 before 8.5.5.6 has a false value for the com.ibm.ws.webcontainer.disallowServeServletsByClassname WebContainer property, which allows remote attackers to obtain privileged access via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21963275) 2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21959083) 3. [PI31622](http://www-01.ibm.com/support/docview.wss?uid=swg1PI31622) 4. [75486](http://www.securityfocus.com/bid/75486) 5. [1033383](http://www.securitytracker.com/id/1033383)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-44084, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-44084 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-44084 - **State**: PUBLISHED - **Published Date**: May 20, 2025 at 00:00 UTC - **Last Updated**: May 21, 2025 at 19:27 UTC - **Reserved Date**: April 22, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description D-link DI-8100 16.07.26A1 is vulnerable to Command Injection. An attacker can exploit this vulnerability by crafting specific HTTP requests, triggering the command execution flaw and gaining the highest privilege shell access to the firmware system. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/piposy/IOTsec/blob/main/Dlink/DI8100/DI8100-A1-2.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11960, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11960 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11960 - **State**: PUBLISHED - **Published Date**: November 28, 2024 at 14:31 UTC - **Last Updated**: November 29, 2024 at 15:22 UTC - **Reserved Date**: November 28, 2024 at 08:58 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in D-Link DIR-605L 2.13B01. It has been declared as critical. This vulnerability affects the function formSetPortTr of the file /goform/formSetPortTr. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness - CWE-119: Security Weakness ### Affected Products **D-Link - DIR-605L** Affected versions: - 2.13B01 (Status: affected) ### References 1. [VDB-286342 | D-Link DIR-605L formSetPortTr buffer overflow](https://vuldb.com/?id.286342) 2. [VDB-286342 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.286342) 3. [Submit #447485 | D-Link DIR-605L 2.13B01 BETA Buffer Overflow](https://vuldb.com/?submit.447485) 4. [](https://github.com/offshore0315/loT-vulnerable/blob/main/D-Link/formSetPortTr.md) 5. [](https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10393) 6. [](https://www.dlink.com/) ### Credits - offshore0315 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26570, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26570 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26570 - **State**: PUBLISHED - **Published Date**: October 25, 2023 at 08:38 UTC - **Last Updated**: October 15, 2024 at 18:32 UTC - **Reserved Date**: February 26, 2023 at 06:25 UTC - **Assigned By**: TML ### Vulnerability Description Missing authentication in the StudentPopupDetails_Timetable method in IDAttend’s IDWeb application 3.1.052 and earlier allows extraction sensitive student data by unauthenticated attackers. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **IDAttend Pty Ltd - IDWeb** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.themissinglink.com.au/security-advisories/cve-2023-26570) ### Credits - Melodi Dey
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31184, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31184 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31184 - **State**: PUBLISHED - **Published Date**: March 31, 2025 at 22:22 UTC - **Last Updated**: April 07, 2025 at 18:29 UTC - **Reserved Date**: March 27, 2025 at 16:13 UTC - **Assigned By**: apple ### Vulnerability Description This issue was addressed with improved permissions checking. This issue is fixed in Safari 18.4, visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may gain unauthorized access to Local Network. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - visionOS** Affected versions: - unspecified (Status: affected) **Apple - Safari** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/122371) 2. [](https://support.apple.com/en-us/122373) 3. [](https://support.apple.com/en-us/122378) 4. [](https://support.apple.com/en-us/122379)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4695, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4695 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4695 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:42 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1284, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1284 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1284 - **State**: PUBLISHED - **Published Date**: April 24, 2025 at 08:23 UTC - **Last Updated**: April 24, 2025 at 15:22 UTC - **Reserved Date**: February 13, 2025 at 17:48 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Woocommerce Automatic Order Printing | ( Formerly WooCommerce Google Cloud Print) plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1 via the xc_woo_printer_preview AJAX action due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's invoices and orders which can contain sensitive information. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **xpertsclub - Woocommerce Automatic Order Printing | ( Formerly WooCommerce Google Cloud Print)** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/6f593dce-4b56-46c0-becd-75fd16f165a8?source=cve) 2. [](https://codecanyon.net/item/woocommerce-google-cloud-print/21129093) ### Credits - Lucio Sá
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25157, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25157 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25157 - **State**: PUBLISHED - **Published Date**: March 30, 2021 at 01:33 UTC - **Last Updated**: August 03, 2024 at 19:56 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A remote arbitrary file read vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.6 and below; Aruba Instant 8.7.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability. ### Affected Products **n/a - Aruba Instant Access Points** Affected versions: - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below (Status: affected) - Aruba Instant 6.5.x: 6.5.4.18 and below (Status: affected) - Aruba Instant 8.3.x: 8.3.0.14 and below (Status: affected) - Aruba Instant 8.5.x: 8.5.0.11 and below (Status: affected) - Aruba Instant 8.6.x: 8.6.0.6 and below (Status: affected) - Aruba Instant 8.7.x: 8.7.1.0 and below (Status: affected) ### References 1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt) 2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf) 3. [](http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5133 - **State**: PUBLISHED - **Published Date**: October 02, 2006 at 20:00 UTC - **Last Updated**: August 07, 2024 at 19:41 UTC - **Reserved Date**: October 02, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in GuildFTPd 0.999.13 allows remote attackers to have an unknown impact, possibly code execution related to input containing "globbing chars." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [25721](http://www.osvdb.org/25721) 2. [](http://forums.guildftpd.com/viewtopic.php?t=452) 3. [1675](http://securityreason.com/securityalert/1675) 4. [](http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-05-03) 5. [20060508 INFIGO-2006-05-03: Multiple FTP Servers vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2006-05/0139.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0053, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0053 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0053 - **State**: PUBLISHED - **Published Date**: January 04, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 12:03 UTC - **Reserved Date**: January 04, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in detail.asp in ASP SiteWare autoDealer 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the iPro parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [32539](http://osvdb.org/32539) 2. [21833](http://www.securityfocus.com/bid/21833) 3. [23572](http://secunia.com/advisories/23572) 4. [3062](https://www.exploit-db.com/exploits/3062) 5. [autodealer-detail-sql-injection(31219)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31219) 6. [ADV-2007-0016](http://www.vupen.com/english/advisories/2007/0016)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2871, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2871 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2871 - **State**: PUBLISHED - **Published Date**: September 28, 2009 at 18:20 UTC - **Last Updated**: August 07, 2024 at 06:07 UTC - **Reserved Date**: August 19, 2009 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Unspecified vulnerability in Cisco IOS 12.2 and 12.4, when SSLVPN sessions, SSH sessions, or IKE encrypted nonces are enabled, allows remote attackers to cause a denial of service (device reload) via a crafted encrypted packet, aka Bug ID CSCsq24002. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20090923 Cisco IOS Software Crafted Encryption Packet Denial of Service Vulnerability](http://www.cisco.com/en/US/products/products_security_advisory09186a0080af811c.shtml) 2. [1022930](http://www.securitytracker.com/id?1022930) 3. [ADV-2009-2759](http://www.vupen.com/english/advisories/2009/2759) 4. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=18892)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22692, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22692 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22692 - **State**: REJECTED - **Published Date**: March 03, 2022 at 21:08 UTC - **Last Updated**: March 03, 2022 at 21:08 UTC - **Reserved Date**: January 05, 2021 at 00:00 UTC - **Assigned By**: pivotal ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-6030, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-6030 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-6030 - **State**: PUBLISHED - **Published Date**: December 26, 2019 at 15:16 UTC - **Last Updated**: August 04, 2024 at 20:16 UTC - **Reserved Date**: January 10, 2019 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in Custom Body Class 0.6.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. ### Affected Products **Andrei Lupu - Custom Body Class** Affected versions: - 0.6.0 and earlier (Status: affected) ### References 1. [](https://wordpress.org/plugins/wp-custom-body-class/) 2. [](http://jvn.jp/en/jp/JVN26847507/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3421, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3421 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3421 - **State**: PUBLISHED - **Published Date**: April 07, 2024 at 12:31 UTC - **Last Updated**: August 01, 2024 at 20:12 UTC - **Reserved Date**: April 06, 2024 at 11:02 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Online Courseware 1.0. It has been classified as critical. This affects an unknown part of the file admin/deactivatestud.php. The manipulation of the argument selector leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259593 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Online Courseware** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-259593 | SourceCodester Online Courseware deactivatestud.php sql injection](https://vuldb.com/?id.259593) 2. [VDB-259593 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.259593) 3. [Submit #311599 | https://www.sourcecodester.com Online Courseware 1.0 SQL Injection](https://vuldb.com/?submit.311599) 4. [](https://github.com/thisissuperann/Vul/blob/Online-Courseware/Online-Courseware-06.md) ### Credits - liuann (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-3150, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-3150 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-3150 - **State**: PUBLISHED - **Published Date**: October 17, 2018 at 01:00 UTC - **Last Updated**: October 02, 2024 at 19:42 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Utility). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). ### Affected Products **Oracle Corporation - Java** Affected versions: - Java SE: 11 (Status: affected) ### References 1. [](https://security.netapp.com/advisory/ntap-20181018-0001/) 2. [105597](http://www.securityfocus.com/bid/105597) 3. [USN-3804-1](https://usn.ubuntu.com/3804-1/) 4. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html) 5. [1041889](http://www.securitytracker.com/id/1041889) 6. [RHSA-2018:3521](https://access.redhat.com/errata/RHSA-2018:3521) 7. [GLSA-201908-10](https://security.gentoo.org/glsa/201908-10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1972, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1972 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1972 - **State**: PUBLISHED - **Published Date**: March 13, 2016 at 18:00 UTC - **Last Updated**: August 05, 2024 at 23:17 UTC - **Reserved Date**: January 20, 2016 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description Race condition in libvpx in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1218124) 2. [84220](http://www.securityfocus.com/bid/84220) 3. [openSUSE-SU-2016:0731](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html) 4. [](http://www.mozilla.org/security/announce/2016/mfsa2016-32.html) 5. [openSUSE-SU-2016:0733](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html) 6. [1035215](http://www.securitytracker.com/id/1035215) 7. [GLSA-201605-06](https://security.gentoo.org/glsa/201605-06)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0930, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0930 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0930 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 15:12 UTC - **Last Updated**: February 28, 2025 at 20:09 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-0923, CVE-2020-0924, CVE-2020-0925, CVE-2020-0926, CVE-2020-0927, CVE-2020-0933, CVE-2020-0954, CVE-2020-0973, CVE-2020-0978. ### Affected Products **Microsoft - Microsoft SharePoint Enterprise Server** Affected versions: - 2016 (Status: affected) - 2013 Service Pack 1 (Status: affected) **Microsoft - Microsoft SharePoint Server** Affected versions: - 2019 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0930)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4812, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4812 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4812 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10321, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10321 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10321 - **State**: PUBLISHED - **Published Date**: May 31, 2019 at 14:20 UTC - **Last Updated**: August 04, 2024 at 22:17 UTC - **Reserved Date**: March 29, 2019 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. ### Affected Products **Jenkins project - Jenkins Artifactory Plugin** Affected versions: - 3.2.2 and earlier (Status: affected) ### References 1. [[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/05/31/2) 2. [108540](http://www.securityfocus.com/bid/108540) 3. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787) 4. [](https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%281%29)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52401, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52401 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52401 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:32 UTC - **Last Updated**: November 20, 2024 at 14:26 UTC - **Reserved Date**: November 11, 2024 at 06:39 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in 荒野无灯 Hacklog DownloadManager allows Upload a Web Shell to a Web Server.This issue affects Hacklog DownloadManager: from n/a through 2.1.4. ### CVSS Metrics - **CVSS Base Score**: 9.6/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **荒野无灯 - Hacklog DownloadManager** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/hacklog-downloadmanager/wordpress-hacklog-downloadmanager-plugin-2-1-4-csrf-to-arbitrary-file-upload-vulnerability?_s_id=cve) ### Credits - Joshua Chan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5700, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5700 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5700 - **State**: PUBLISHED - **Published Date**: October 11, 2017 at 00:00 UTC - **Last Updated**: September 16, 2024 at 23:56 UTC - **Reserved Date**: February 01, 2017 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Insufficient protection of password storage in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows local attackers to bypass Administrator and User passwords via access to password storage. ### Affected Products **Intel Corporation - NUC Kits** Affected versions: - BN0049 and below (Status: affected) ### References 1. [](https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084&languageid=en-fr) 2. [101241](http://www.securityfocus.com/bid/101241)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39174, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39174 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39174 - **State**: PUBLISHED - **Published Date**: August 27, 2021 at 23:25 UTC - **Last Updated**: August 04, 2024 at 01:58 UTC - **Reserved Date**: August 16, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-75: Security Weakness ### Affected Products **fiveai - Cachet** Affected versions: - < 2.5.1 (Status: affected) ### References 1. [](https://github.com/fiveai/Cachet/releases/tag/v2.5.1) 2. [](https://github.com/fiveai/Cachet/security/advisories/GHSA-88f9-7xxh-c688) 3. [](https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-37953, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-37953 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-37953 - **State**: PUBLISHED - **Published Date**: May 20, 2025 at 16:01 UTC - **Last Updated**: June 04, 2025 at 12:57 UTC - **Reserved Date**: April 16, 2025 at 04:51 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: sch_htb: make htb_deactivate() idempotent Alan reported a NULL pointer dereference in htb_next_rb_node() after we made htb_qlen_notify() idempotent. It turns out in the following case it introduced some regression: htb_dequeue_tree(): |-> fq_codel_dequeue() |-> qdisc_tree_reduce_backlog() |-> htb_qlen_notify() |-> htb_deactivate() |-> htb_next_rb_node() |-> htb_deactivate() For htb_next_rb_node(), after calling the 1st htb_deactivate(), the clprio[prio]->ptr could be already set to NULL, which means htb_next_rb_node() is vulnerable here. For htb_deactivate(), although we checked qlen before calling it, in case of qlen==0 after qdisc_tree_reduce_backlog(), we may call it again which triggers the warning inside. To fix the issues here, we need to: 1) Make htb_deactivate() idempotent, that is, simply return if we already call it before. 2) Make htb_next_rb_node() safe against ptr==NULL. Many thanks to Alan for testing and for the reproducer. ### Affected Products **Linux - Linux** Affected versions: - e6b45f4de763b00dc1c55e685e2dd1aaf525d3c1 (Status: affected) - 73cf6af13153d62f9b76eff422eea79dbc70f15e (Status: affected) - bbbf5e0f87078b715e7a665d662a2c0e77f044ae (Status: affected) - 0a188c0e197383683fd093ab1ea6ce9a5869a6ea (Status: affected) - a61f1b5921761fbaf166231418bc1db301e5bf59 (Status: affected) - 5ba8b837b522d7051ef81bacf3d95383ff8edce5 (Status: affected) **Linux - Linux** Affected versions: - 6.1.138 (Status: affected) - 6.6.90 (Status: affected) - 6.12.28 (Status: affected) - 6.14.6 (Status: affected) ### References 1. [](https://git.kernel.org/stable/c/99ff8a20fd61315bf9ae627440a5ff07d22ee153) 2. [](https://git.kernel.org/stable/c/c928dd4f6bf0c25c72b11824a1e9ac9bd37296a0) 3. [](https://git.kernel.org/stable/c/31ff70ad39485698cf779f2078132d80b57f6c07) 4. [](https://git.kernel.org/stable/c/98cd7ed92753090a714f0802d4434314526fe61d) 5. [](https://git.kernel.org/stable/c/c4792b9e38d2f61b07eac72f10909fa76130314b) 6. [](https://git.kernel.org/stable/c/3769478610135e82b262640252d90f6efb05be71)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1622, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1622 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1622 - **State**: PUBLISHED - **Published Date**: April 08, 2020 at 19:25 UTC - **Last Updated**: September 16, 2024 at 19:35 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via the EvoSharedObjStore. This issue affects all versions of Junos OS Evolved prior to 19.1R1. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-664: Security Weakness ### Affected Products **Juniper Networks - Junos OS Evolved** Affected versions: - unspecified (Status: affected) ### References 1. [](https://kb.juniper.net/JSA11003)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0660, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0660 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0660 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: December 09, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-44444, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-44444 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-44444 - **State**: PUBLISHED - **Published Date**: December 14, 2021 at 12:07 UTC - **Last Updated**: August 04, 2024 at 04:25 UTC - **Reserved Date**: November 30, 2021 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing specially crafted JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-15052) ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Siemens - JT Utilities** Affected versions: - All versions < V13.1.1.0 (Status: affected) **Siemens - JTTK** Affected versions: - All versions < V11.1.1.0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-802578.pdf) 2. [](http://packetstormsecurity.com/files/167317/Microsoft-Office-MSDT-Follina-Proof-Of-Concept.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23980, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23980 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23980 - **State**: PUBLISHED - **Published Date**: February 16, 2023 at 00:00 UTC - **Last Updated**: March 19, 2025 at 15:18 UTC - **Reserved Date**: January 13, 2021 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description A mutation XSS affects users calling bleach.clean with all of: svg or math in the allowed tags p or br in allowed tags style, title, noscript, script, textarea, noframes, iframe, or xmp in allowed tags the keyword argument strip_comments=False Note: none of the above tags are in the default allowed tags and strip_comments defaults to True. ### Affected Products **Mozilla - Mozilla Bleach** Affected versions: - unspecified (Status: affected) ### References 1. [](https://github.com/mozilla/bleach/security/advisories/GHSA-vv2x-vrpj-qqpq) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2021-23980)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20797 - **State**: PUBLISHED - **Published Date**: May 17, 2020 at 23:06 UTC - **Last Updated**: August 05, 2024 at 02:53 UTC - **Reserved Date**: May 17, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in e6y prboom-plus 2.5.1.5. There is a buffer overflow in client and server code responsible for handling received UDP packets, as demonstrated by I_SendPacket or I_SendPacketTo in i_network.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/p/prboom-plus/bugs/252/) 2. [](https://sourceforge.net/p/prboom-plus/bugs/253/) 3. [](https://logicaltrust.net/blog/2019/10/prboom1.html) 4. [FEDORA-2020-3f9a846b40](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77J22ZEQXS5SAYZGBDJ475AKFFJNKX5L/) 5. [FEDORA-2020-fe80f1f388](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3WS7GRZUIHCGLFET33MGC3PEKCH37W6/) 6. [openSUSE-SU-2020:0807](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00027.html) 7. [openSUSE-SU-2020:0820](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00028.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32163, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32163 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32163 - **State**: PUBLISHED - **Published Date**: September 06, 2023 at 04:02 UTC - **Last Updated**: September 26, 2024 at 20:43 UTC - **Reserved Date**: May 03, 2023 at 20:10 UTC - **Assigned By**: zdi ### Vulnerability Description Wacom Drivers for Windows Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Drivers for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Tablet Service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-16857. ### Weakness Classification (CWE) - CWE-59: Security Weakness ### Affected Products **Wacom - Drivers for Windows** Affected versions: - 6.3.45-1 (Status: affected) ### References 1. [Zero Day Initiative Security Advisory ZDI-23-742](https://www.zerodayinitiative.com/advisories/ZDI-23-742)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5198 - **State**: PUBLISHED - **Published Date**: January 19, 2017 at 05:43 UTC - **Last Updated**: January 29, 2025 at 17:18 UTC - **Reserved Date**: May 31, 2016 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description V8 in Google Chrome prior to 54.0.2840.90 for Linux, and 54.0.2840.85 for Android, and 54.0.2840.87 for Windows and Mac included incorrect optimisation assumptions, which allowed a remote attacker to perform arbitrary read/write operations, leading to code execution, via a crafted HTML page. ### Affected Products **n/a - Google Chrome prior to 54.0.2840.90 for Linux, and 54.0.2840.85 for Android, and 54.0.2840.87 for Windows and Mac** Affected versions: - Google Chrome prior to 54.0.2840.90 for Linux, and 54.0.2840.85 for Android, and 54.0.2840.87 for Windows and Mac (Status: affected) ### References 1. [](https://crbug.com/659475) 2. [94079](http://www.securityfocus.com/bid/94079) 3. [1037224](http://www.securitytracker.com/id/1037224) 4. [RHSA-2016:2672](http://rhn.redhat.com/errata/RHSA-2016-2672.html) 5. [](https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28997, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28997 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28997 - **State**: PUBLISHED - **Published Date**: April 04, 2023 at 12:42 UTC - **Last Updated**: February 11, 2025 at 15:32 UTC - **Reserved Date**: March 29, 2023 at 17:39 UTC - **Assigned By**: GitHub_M ### Vulnerability Description The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.6.5, a malicious server administrator can recover and modify the contents of end-to-end encrypted files. Users should upgrade the Nextcloud Desktop client to 3.6.5 to receive a patch. No known workarounds are available. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-323: Security Weakness ### Affected Products **nextcloud - security-advisories** Affected versions: - >= 3.0.0, < 3.6.5 (Status: affected) ### References 1. [https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4p33-rw27-j5fc](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4p33-rw27-j5fc) 2. [https://github.com/nextcloud/desktop/pull/5324](https://github.com/nextcloud/desktop/pull/5324) 3. [https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf](https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8205, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8205 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8205 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 13, 2015 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5987, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5987 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5987 - **State**: PUBLISHED - **Published Date**: February 17, 2018 at 07:00 UTC - **Last Updated**: August 05, 2024 at 05:47 UTC - **Reserved Date**: January 22, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL Injection exists in the Pinterest Clone Social Pinboard 2.0 component for Joomla! via the pin_id or user_id parameter in a task=getlikeinfo action, the ends parameter in a view=gift action, the category parameter in a view=home action, the uid parameter in a view=pindisplay action, the searchVal parameter in a view=search action, or the uid parameter in a view=likes action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [44131](https://exploit-db.com/exploits/44131)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36922, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36922 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36922 - **State**: PUBLISHED - **Published Date**: July 27, 2022 at 14:29 UTC - **Last Updated**: August 03, 2024 at 10:14 UTC - **Reserved Date**: July 27, 2022 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not escape the search query parameter displayed on the 'search' result page, resulting in a reflected cross-site scripting (XSS) vulnerability. ### Affected Products **Jenkins project - Jenkins Lucene-Search Plugin** Affected versions: - unspecified (Status: affected) - next of 370.v62a5f618cd3a (Status: unknown) ### References 1. [](https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2812) 2. [[oss-security] 20220727 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/07/27/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15472, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15472 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15472 - **State**: PUBLISHED - **Published Date**: April 15, 2023 at 00:00 UTC - **Last Updated**: February 10, 2025 at 15:09 UTC - **Reserved Date**: August 17, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. The diff formatter using rouge can block for a long time in Sidekiq jobs without any timeout. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://about.gitlab.com/blog/categories/releases/) 2. [](https://about.gitlab.com/releases/2018/10/01/security-release-gitlab-11-dot-3-dot-1-released/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48396, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48396 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48396 - **State**: PUBLISHED - **Published Date**: July 30, 2024 at 08:15 UTC - **Last Updated**: February 13, 2025 at 17:18 UTC - **Reserved Date**: November 16, 2023 at 06:55 UTC - **Assigned By**: apache ### Vulnerability Description Web Authentication vulnerability in Apache SeaTunnel. Since the jwt key is hardcoded in the application, an attacker can forge any token to log in any user. Attacker can get secret key in /seatunnel-server/seatunnel-app/src/main/resources/application.yml and then create a token. This issue affects Apache SeaTunnel: 1.0.0. Users are recommended to upgrade to version 1.0.1, which fixes the issue. ### Weakness Classification (CWE) - CWE-290: Security Weakness ### Affected Products **Apache Software Foundation - Apache SeaTunnel Web** Affected versions: - 1.0.0 (Status: affected) ### References 1. [](https://lists.apache.org/thread/1tdxfjksx0vb9gtyt77wlr6rdcy1qwmw) 2. [](http://www.openwall.com/lists/oss-security/2024/07/30/1) ### Credits - jiahua huang / Joyh
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6603, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6603 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6603 - **State**: PUBLISHED - **Published Date**: April 03, 2009 at 18:00 UTC - **Last Updated**: August 07, 2024 at 11:34 UTC - **Reserved Date**: April 03, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MoinMoin 1.6.2 and 1.7 does not properly enforce ACL checks when acl_hierarchic is set to True, which might allow remote attackers to bypass intended access restrictions, a different vulnerability than CVE-2008-1937. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://moinmo.in/SecurityFixes) 2. [](http://hg.moinmo.in/moin/1.6/rev/543ae9bdbe26) 3. [moinmoin-acl-security-bypass(41911)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41911) 4. [](http://moinmo.in/MoinMoinBugs/AclHierarchicPageAclSupercededByAclRightsAfter) 5. [34655](http://www.securityfocus.com/bid/34655) 6. [48875](http://osvdb.org/48875) 7. [](http://hg.moinmo.in/moin/1.7/rev/88356b3f849a) 8. [ADV-2008-1307](http://www.vupen.com/english/advisories/2008/1307)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3763, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3763 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3763 - **State**: PUBLISHED - **Published Date**: July 13, 2010 at 21:00 UTC - **Last Updated**: August 07, 2024 at 06:38 UTC - **Reserved Date**: October 23, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the Access Manager / OpenSSO component in Oracle OpenSSO Enterprise 7.1, 7, 2005Q4, and 8.0 allows remote attackers to affect integrity via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33112, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33112 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33112 - **State**: PUBLISHED - **Published Date**: May 06, 2024 at 00:00 UTC - **Last Updated**: January 07, 2025 at 04:56 UTC - **Reserved Date**: April 23, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description D-Link DIR-845L router v1.01KRb03 and before is vulnerable to Command injection via the hnap_main()func. ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md) 2. [](https://github.com/yj94/Yj_learning/blob/b597925953d8bbb286a63f0019bb547c1617cb61/Week16/D-LINK-POC.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7931, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7931 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7931 - **State**: PUBLISHED - **Published Date**: August 19, 2024 at 22:00 UTC - **Last Updated**: August 20, 2024 at 14:02 UTC - **Reserved Date**: August 19, 2024 at 14:07 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0 and classified as critical. This issue affects some unknown processing of the file /tracking/admin/view_csprofile.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Online Graduate Tracer System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-275117 | SourceCodester Online Graduate Tracer System view_csprofile.php sql injection](https://vuldb.com/?id.275117) 2. [VDB-275117 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275117) 3. [Submit #392942 | sourcecodester Online Graduate Tracer System v1.0 SQL injection](https://vuldb.com/?submit.392942) 4. [](https://github.com/Pingxy/cve/blob/main/sql3.md) ### Credits - pingxinyao (VulDB User) - pingxinyao (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3813, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3813 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3813 - **State**: PUBLISHED - **Published Date**: July 17, 2013 at 10:00 UTC - **Last Updated**: August 06, 2024 at 16:22 UTC - **Reserved Date**: June 03, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle Solaris 10 allows remote attackers to affect confidentiality and integrity via vectors related to Libraries/PAM-Unix. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oracle-cpujuly2013-cve20133813(85697)](https://exchange.xforce.ibmcloud.com/vulnerabilities/85697) 2. [](http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html) 3. [oval:org.mitre.oval:def:19221](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19221) 4. [95310](http://osvdb.org/95310)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32499, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32499 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32499 - **State**: PUBLISHED - **Published Date**: August 23, 2023 at 13:59 UTC - **Last Updated**: August 02, 2024 at 15:18 UTC - **Reserved Date**: May 09, 2023 at 07:39 UTC - **Assigned By**: Patchstack ### Vulnerability Description Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Tony Zeoli, Tony Hayes Radio Station by netmix® – Manage and play your Show Schedule in WordPress! plugin <= 2.4.0.9 versions. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Tony Zeoli, Tony Hayes - Radio Station by netmix® – Manage and play your Show Schedule in WordPress!** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/radio-station/wordpress-radio-station-plugin-2-4-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - minhtuanact (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2851, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2851 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2851 - **State**: PUBLISHED - **Published Date**: April 26, 2025 at 08:00 UTC - **Last Updated**: April 28, 2025 at 18:09 UTC - **Reserved Date**: March 27, 2025 at 06:21 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x. Affected is an unknown function of the file plugins.so of the component RPC Handler. The manipulation leads to buffer overflow. It is recommended to upgrade the affected component. ### CVSS Metrics - **CVSS Base Score**: 8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness - CWE-119: Security Weakness ### Affected Products **GL.iNet - GL-A1300 Slate Plus** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-AR300M16 Shadow** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-AR300M Shadow** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-AR750 Creta** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-AR750S-EXT Slate** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-AX1800 Flint** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-AXT1800 Slate AX** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-B1300 Convexa-B** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-B3000 Marble** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-BE3600 Slate 7** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-E750** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-E750V2 Mudi** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-MT300N-V2 Mango** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-MT1300 Beryl** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-MT2500 Brume 2** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-MT3000 Beryl AX** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-MT6000 Flint 2** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-SFT1200 Opal** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-X300B Collie** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-X750 Spitz** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-X3000 Spitz AX** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-XE300 Puli** Affected versions: - 4.x (Status: affected) **GL.iNet - GL-XE3000 Puli AX** Affected versions: - 4.x (Status: affected) ### References 1. [VDB-306288 | GL.iNet GL-A1300 Slate Plus RPC plugins.so buffer overflow](https://vuldb.com/?id.306288) 2. [VDB-306288 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.306288) 3. [](https://www.gl-inet.com/security-updates/security-advisories-vulnerabilities-and-cves-apr-24-2025/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41646, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41646 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41646 - **State**: PUBLISHED - **Published Date**: October 29, 2021 at 17:02 UTC - **Last Updated**: August 04, 2024 at 03:15 UTC - **Reserved Date**: September 27, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Remote Code Execution (RCE) vulnerability exists in Sourcecodester Online Reviewer System 1.0 by uploading a maliciously crafted PHP file that bypasses the image upload filters.. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.exploit-db.com/exploits/50319) 2. [](https://www.nu11secur1ty.com/2021/12/cve-2021-41646.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5462, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5462 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5462 - **State**: PUBLISHED - **Published Date**: July 21, 2016 at 10:00 UTC - **Last Updated**: October 11, 2024 at 20:36 UTC - **Reserved Date**: June 16, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Siebel Core - Server Framework component in Oracle Siebel CRM 8.1.1, 8.2.2, IP2014, IP2015, and IP2016 allows remote administrators to affect confidentiality via vectors related to Workspaces. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1036400](http://www.securitytracker.com/id/1036400) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html) 3. [91787](http://www.securityfocus.com/bid/91787) 4. [91968](http://www.securityfocus.com/bid/91968)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1540, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1540 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1540 - **State**: PUBLISHED - **Published Date**: June 04, 2021 at 16:46 UTC - **Last Updated**: November 07, 2024 at 22:09 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in the authorization process of Cisco ASR 5000 Series Software (StarOS) could allow an authenticated, remote attacker to bypass authorization and execute a subset of CLI commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H` ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **Cisco - Cisco ASR 5000 Series Software** Affected versions: - n/a (Status: affected) ### References 1. [20210602 Cisco ASR 5000 Series Software Authorization Bypass Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr5k-autho-bypass-mJDF5S7n)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0502, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0502 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0502 - **State**: PUBLISHED - **Published Date**: March 08, 2017 at 01:00 UTC - **Last Updated**: August 05, 2024 at 13:11 UTC - **Reserved Date**: November 29, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description An elevation of privilege vulnerability in MediaTek components, including the M4U driver, sound driver, touchscreen driver, GPU driver, and Command Queue driver, could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-28430164. References: M-ALPS02710027. ### Affected Products **Google Inc. - Android** Affected versions: - n/a (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-03-01) 2. [1037968](http://www.securitytracker.com/id/1037968) 3. [96726](http://www.securityfocus.com/bid/96726)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4420 - **State**: PUBLISHED - **Published Date**: July 01, 2020 at 14:25 UTC - **Last Updated**: September 16, 2024 at 20:52 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow an unauthenticated attacker to cause a denial of service due a hang in the execution of a terminate command. IBM X-Force ID: 180076. ### Affected Products **IBM - DB2 for Linux- UNIX and Windows** Affected versions: - 9.7 (Status: affected) - 10.1 (Status: affected) - 10.5 (Status: affected) - 11.1 (Status: affected) - 11.5 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6242362) 2. [ibm-db2-cve20204420-dos (180076)](https://exchange.xforce.ibmcloud.com/vulnerabilities/180076)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0797 - **State**: PUBLISHED - **Published Date**: March 10, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:05 UTC - **Reserved Date**: September 17, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unknown vulnerability in rpc.mountd in SGI IRIX 6.5 through 6.5.22 allows remote attackers to cause a denial of service (process death) via unknown attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [9084](http://www.securityfocus.com/bid/9084) 2. [20031102-01-P](ftp://patches.sgi.com/support/free/security/advisories/20031102-01-P.asc) 3. [20031102-02-P](ftp://patches.sgi.com/support/free/security/advisories/20031102-02-P.asc) 4. [8520](http://www.osvdb.org/8520) 5. [rpcmountd-dos(13808)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13808)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-25406, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-25406 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-25406 - **State**: PUBLISHED - **Published Date**: November 18, 2020 at 15:51 UTC - **Last Updated**: August 04, 2024 at 15:33 UTC - **Reserved Date**: September 14, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description app\admin\controller\sys\Uploads.php in lemocms 1.8.x allows users to upload files to upload executable files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.misakikata.com/codes/File%20Upload.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37361, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37361 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37361 - **State**: PUBLISHED - **Published Date**: July 25, 2023 at 00:00 UTC - **Last Updated**: October 23, 2024 at 19:57 UTC - **Reserved Date**: June 30, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description REDCap 12.0.26 LTS and 12.3.2 Standard allows SQL Injection via scheduling, repeatforms, purpose, app_title, or randomization. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://trustwave.com) 2. [](https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=32305)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3299, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3299 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3299 - **State**: PUBLISHED - **Published Date**: November 03, 2009 at 16:00 UTC - **Last Updated**: September 16, 2024 at 20:17 UTC - **Reserved Date**: September 22, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the resume blocktype in Mahara before 1.0.13, and 1.1.x before 1.1.7, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [36892](http://www.securityfocus.com/bid/36892) 2. [59583](http://www.osvdb.org/59583) 3. [ADV-2009-3101](http://www.vupen.com/english/advisories/2009/3101) 4. [37218](http://secunia.com/advisories/37218) 5. [](http://eduforge.org/frs/shownotes.php?release_id=546) 6. [](http://eduforge.org/frs/shownotes.php?release_id=547) 7. [](http://mahara.org/interaction/forum/topic.php?id=1170) 8. [37217](http://secunia.com/advisories/37217) 9. [DSA-1924](http://www.debian.org/security/2009/dsa-1924)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8167, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8167 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8167 - **State**: PUBLISHED - **Published Date**: November 13, 2019 at 16:11 UTC - **Last Updated**: August 06, 2024 at 13:10 UTC - **Reserved Date**: October 10, 2014 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description vdsm and vdsclient does not validate certficate hostname from another vdsm which could facilitate a man-in-the-middle attack ### Affected Products **vdsm and vdsclient - vdsm and vdsclient** Affected versions: - through 2014-11-18 (Status: affected) ### References 1. [](https://access.redhat.com/security/cve/cve-2014-8167) 2. [Red Hat](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8167)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18397, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18397 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18397 - **State**: PUBLISHED - **Published Date**: August 02, 2019 at 13:07 UTC - **Last Updated**: August 05, 2024 at 21:20 UTC - **Reserved Date**: July 31, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description cPanel before 68.0.15 does not preserve permissions for local backup transport (SEC-330). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://documentation.cpanel.net/display/CL/68+Change+Log)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13867, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13867 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13867 - **State**: PUBLISHED - **Published Date**: June 05, 2020 at 17:30 UTC - **Last Updated**: August 04, 2024 at 12:32 UTC - **Reserved Date**: June 05, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Open-iSCSI targetcli-fb through 2.1.52 has weak permissions for /etc/target (and for the backup directory and backup files). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/open-iscsi/targetcli-fb/pull/172) 2. [FEDORA-2020-83d2616f81](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6LANBGRCCZBPKKBD5ZMJS7C7DYAHYR6B/) 3. [openSUSE-SU-2020:1141](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00003.html) 4. [openSUSE-SU-2020:1144](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00005.html) 5. [GLSA-202008-22](https://security.gentoo.org/glsa/202008-22)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-2132, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-2132 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-2132 - **State**: PUBLISHED - **Published Date**: November 16, 2005 at 07:37 UTC - **Last Updated**: September 16, 2024 at 23:16 UTC - **Reserved Date**: November 16, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Windows File Protection (WFP) in Windows 2000 and XP does not remove old security catalog .CAT files, which could allow local users to replace new files with vulnerable old files that have valid hash codes. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [6483](http://www.securityfocus.com/bid/6483) 2. [wfp-security-catalogs(10957)](http://www.iss.net/security_center/static/10957.php) 3. [20021226 Full Disclosure: Windows File Protection Old Security Catalog Vulnerability](http://archives.neohapsis.com/archives/bugtraq/2002-12/0250.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3401, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3401 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3401 - **State**: PUBLISHED - **Published Date**: July 31, 2008 at 16:00 UTC - **Last Updated**: August 07, 2024 at 09:37 UTC - **Reserved Date**: July 31, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in hioxRandomAd.php in HIOX Random Ad (HRA) 1.3 allows remote attackers to execute arbitrary PHP code via a URL in the hm parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [6161](https://www.exploit-db.com/exploits/6161) 2. [hioxrandomad-hm-file-include(44061)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44061) 3. [20080730 HIOX Random Ad 1.3 (hioxRandomAd.php hm) RFI Vulnerability](http://www.securityfocus.com/archive/1/494927/100/0/threaded) 4. [30435](http://www.securityfocus.com/bid/30435) 5. [31300](http://secunia.com/advisories/31300) 6. [4082](http://securityreason.com/securityalert/4082)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15188, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15188 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15188 - **State**: PUBLISHED - **Published Date**: August 10, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 09:46 UTC - **Reserved Date**: August 07, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP Scripts Mall advanced-real-estate-script 4.0.9 allows remote attackers to cause a denial of service (page structure loss) via crafted JavaScript code in the Name field of a profile. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gkaim.com/cve-2018-15188-vikas-chaudhary/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20355, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20355 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20355 - **State**: PUBLISHED - **Published Date**: June 24, 2022 at 16:15 UTC - **Last Updated**: September 17, 2024 at 02:52 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 194891. ### Affected Products **IBM - Jazz Team Server** Affected versions: - 6.0.6 (Status: affected) - 6.0.6.1 (Status: affected) - 7.0 (Status: affected) - 7.0.1 (Status: affected) - 7.0.2 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6597583) 2. [ibm-jazz-cve202120355-info-disc (194891)](https://exchange.xforce.ibmcloud.com/vulnerabilities/194891)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4086, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4086 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4086 - **State**: PUBLISHED - **Published Date**: April 29, 2025 at 13:13 UTC - **Last Updated**: May 01, 2025 at 14:22 UTC - **Reserved Date**: April 29, 2025 at 13:13 UTC - **Assigned By**: mozilla ### Vulnerability Description A specially crafted filename containing a large number of encoded newline characters could obscure the file's extension when displayed in the download dialog. *This bug only affects Thunderbird for Android. Other versions of Thunderbird are unaffected.* This vulnerability affects Firefox < 138 and Thunderbird < 138. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) **Mozilla - Thunderbird** Affected versions: - unspecified (Status: affected) ### References 1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1945705) 2. [](https://www.mozilla.org/security/advisories/mfsa2025-28/) 3. [](https://www.mozilla.org/security/advisories/mfsa2025-31/) ### Credits - Hafiizh
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11962, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11962 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11962 - **State**: PUBLISHED - **Published Date**: February 11, 2019 at 15:00 UTC - **Last Updated**: August 05, 2024 at 08:24 UTC - **Reserved Date**: June 07, 2018 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Use-after-free issue in heap while loading audio effects config in audio effects factory. ### Affected Products **Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android** Affected versions: - All Android releases from CAF using the Linux kernel (Status: affected) ### References 1. [](https://www.codeaurora.org/security-bulletin/2019/01/07/january-2019-code-aurora-security-bulletin) 2. [106496](http://www.securityfocus.com/bid/106496)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12775, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12775 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12775 - **State**: PUBLISHED - **Published Date**: March 01, 2022 at 01:55 UTC - **Last Updated**: September 16, 2024 at 22:35 UTC - **Reserved Date**: May 11, 2020 at 00:00 UTC - **Assigned By**: twcert ### Vulnerability Description Hicos citizen certificate client-side component does not filter special characters for command parameters in specific web URLs. An unauthenticated remote attacker can exploit this vulnerability to perform command injection attack to execute arbitrary system command, disrupt system or terminate service. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Hicos - citizen certificate client-side component** Affected versions: - unspecified (Status: affected) **Hicos - citizen certificate client-side component** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.twcert.org.tw/tw/cp-132-5695-421a7-1.html) 2. [](https://moica.nat.gov.tw/rac_plugin.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5251, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5251 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5251 - **State**: PUBLISHED - **Published Date**: October 06, 2007 at 17:00 UTC - **Last Updated**: August 07, 2024 at 15:24 UTC - **Reserved Date**: October 06, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Helm 3.2.16 allow remote attackers to inject arbitrary web script or HTML via (1) the showOption parameter to domain.asp, or the (2) Folder or (3) StartPath parameter to FileManager.asp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://pridels-team.blogspot.com/2007/10/helm-xss-vuln.html) 2. [25940](http://www.securityfocus.com/bid/25940) 3. [helm-domain-filemanager-xss(36962)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36962) 4. [27080](http://secunia.com/advisories/27080)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-42969, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-42969 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-42969 - **State**: PUBLISHED - **Published Date**: May 13, 2022 at 11:39 UTC - **Last Updated**: August 04, 2024 at 03:47 UTC - **Reserved Date**: October 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain Anaconda3 2021.05 are affected by OS command injection. When a user installs Anaconda, an attacker can create a new file and write something in usercustomize.py. When the user opens the terminal or activates Anaconda, the command will be executed. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://yuaneuro.cn/anaconda/anaconda_command_execution.docx)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0331, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0331 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0331 - **State**: PUBLISHED - **Published Date**: January 21, 2006 at 00:00 UTC - **Last Updated**: August 07, 2024 at 16:34 UTC - **Reserved Date**: January 20, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in Change passwd 3.1 (chpasswd) SquirrelMail plugin allows local users to execute arbitrary code via long command line arguments. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [363](http://securityreason.com/securityalert/363) 2. [changepassword-changepasswd-bo(24258)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24258) 3. [20060119 Change passwd 3.1 (SquirrelMail plugin )](http://www.securityfocus.com/archive/1/422414/100/0/threaded) 4. [](http://www.squirrelmail.org/plugin_view.php?id=117)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10748, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10748 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10748 - **State**: PUBLISHED - **Published Date**: September 16, 2020 at 17:56 UTC - **Last Updated**: August 04, 2024 at 11:14 UTC - **Reserved Date**: March 20, 2020 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in Keycloak's data filter, in version 10.0.1, where it allowed the processing of data URLs in some circumstances. This flaw allows an attacker to conduct cross-site scripting or further attacks. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **n/a - keycloak** Affected versions: - keycloak 10.0.1 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1836786)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6352, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6352 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6352 - **State**: PUBLISHED - **Published Date**: January 27, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 06:01 UTC - **Reserved Date**: January 27, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In PoDoFo 0.9.5, there is an Excessive Iteration in the PdfParser::ReadObjectsInternal function of base/PdfParser.cpp. Remote attackers could leverage this vulnerability to cause a denial of service through a crafted pdf file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1539237)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40954, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40954 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40954 - **State**: PUBLISHED - **Published Date**: June 23, 2022 at 09:03 UTC - **Last Updated**: August 04, 2024 at 02:59 UTC - **Reserved Date**: September 13, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Laiketui 3.5.0 is affected by an arbitrary file upload vulnerability that can allow an attacker to execute arbitrary code. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/bettershop/LaikeTui/issues/11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3743, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3743 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3743 - **State**: PUBLISHED - **Published Date**: April 25, 2025 at 06:45 UTC - **Last Updated**: April 25, 2025 at 14:29 UTC - **Reserved Date**: April 16, 2025 at 17:46 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Upsell Funnel Builder for WooCommerce plugin for WordPress is vulnerable to order manipulation in all versions up to, and including, 3.0.0. This is due to the plugin allowing the additional product ID and discount field to be manipulated prior to processing via the 'add_offer_in_cart' function. This makes it possible for unauthenticated attackers to arbitrarily update the product associated with any order bump, and arbitrarily update the discount applied to any order bump item, when adding it to the cart. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-472: Security Weakness ### Affected Products **wpswings - Upsell Funnel Builder for WooCommerce** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/b0e1546b-c8cc-4d57-9909-153209e3a9c6?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/upsell-order-bump-offer-for-woocommerce/tags/3.0.0/public/class-upsell-order-bump-offer-for-woocommerce-public.php#L1773) 3. [](https://plugins.trac.wordpress.org/browser/upsell-order-bump-offer-for-woocommerce/tags/3.0.0/public/class-upsell-order-bump-offer-for-woocommerce-public.php#L1818) 4. [](https://plugins.trac.wordpress.org/browser/upsell-order-bump-offer-for-woocommerce/tags/3.0.0/public/class-upsell-order-bump-offer-for-woocommerce-public.php#L1829) 5. [](https://plugins.trac.wordpress.org/browser/upsell-order-bump-offer-for-woocommerce/tags/3.0.0/public/class-upsell-order-bump-offer-for-woocommerce-public.php#L1771) 6. [](https://plugins.trac.wordpress.org/changeset/3279944/) ### Credits - pwn4TheLulz
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2701, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2701 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2701 - **State**: PUBLISHED - **Published Date**: November 01, 2013 at 14:00 UTC - **Last Updated**: September 16, 2024 at 20:12 UTC - **Reserved Date**: March 26, 2013 at 00:00 UTC - **Assigned By**: flexera ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in the Social Sharing Toolkit plugin 2.1.1 for WordPress allows remote attackers to hijack the authentication of administrators for requests that manipulate plugin settings via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [52951](http://secunia.com/advisories/52951) 2. [63198](http://www.securityfocus.com/bid/63198)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27490, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27490 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27490 - **State**: PUBLISHED - **Published Date**: May 27, 2021 at 16:08 UTC - **Last Updated**: August 03, 2024 at 21:26 UTC - **Reserved Date**: February 19, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior are vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code. ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **n/a - Datakit Software libraries embedded in Luxion KeyShot software** Affected versions: - CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior (Status: affected) ### References 1. [](https://www.zerodayinitiative.com/advisories/ZDI-21-566/) 2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf) 3. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22368, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22368 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22368 - **State**: PUBLISHED - **Published Date**: June 30, 2021 at 17:20 UTC - **Last Updated**: August 03, 2024 at 18:44 UTC - **Reserved Date**: January 05, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description There is a Permission Control Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect normal use of the device. ### Affected Products **n/a - EMUI;Magic UI** Affected versions: - EMUI 10.1.1 (Status: affected) - Magic UI 3.1.1 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2021/5/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-57603, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-57603 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-57603 - **State**: PUBLISHED - **Published Date**: February 12, 2025 at 00:00 UTC - **Last Updated**: February 13, 2025 at 19:03 UTC - **Reserved Date**: January 09, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in MaysWind ezBookkeeping 0.7.0 allows a remote attacker to escalate privileges via the lack of rate limiting. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/mayswind/ezbookkeeping/issues/33) 2. [](https://hkohi.ca/vulnerability/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2199, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2199 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2199 - **State**: PUBLISHED - **Published Date**: September 25, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 19:26 UTC - **Reserved Date**: April 04, 2012 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description The server message channel agent in the queue manager in the server in IBM WebSphere MQ 7.0.1 before 7.0.1.9, 7.1, and 7.5 on Solaris allows remote attackers to cause a denial of service (invalid address alignment exception and daemon crash) via vectors involving a multiplexed channel. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [IC82725](http://www-01.ibm.com/support/docview.wss?uid=swg1IC82725) 2. [](http://www.ibm.com/support/docview.wss?uid=swg21610285) 3. [wmq-smca-dos(76434)](https://exchange.xforce.ibmcloud.com/vulnerabilities/76434)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15123, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15123 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15123 - **State**: PUBLISHED - **Published Date**: June 12, 2020 at 20:42 UTC - **Last Updated**: August 05, 2024 at 00:34 UTC - **Reserved Date**: August 16, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Branding Module in Viki Vera 4.9.1.26180 allows an authenticated user to change the logo on the website. An attacker could use this to upload a malicious .aspx file and gain Remote Code Execution on the site. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.vikisolutions.com/products/Vera.html) 2. [](https://www.gosecure.net/blog/2020/06/11/vera-vulnerable-to-authenticated-remote-code-execution-cve-2019-15123/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2594, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2594 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2594 - **State**: PUBLISHED - **Published Date**: May 11, 2007 at 10:00 UTC - **Last Updated**: August 07, 2024 at 13:42 UTC - **Reserved Date**: May 11, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in inc/articles.inc.php in phpMyPortal 3.0.0 RC3 allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[CHEMINMODULES] parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [35908](http://osvdb.org/35908) 2. [ADV-2007-1738](http://www.vupen.com/english/advisories/2007/1738) 3. [3879](https://www.exploit-db.com/exploits/3879) 4. [25210](http://secunia.com/advisories/25210) 5. [phpmyportal-articles-file-include(34186)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34186) 6. [23898](http://www.securityfocus.com/bid/23898)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-18378, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-18378 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-18378 - **State**: PUBLISHED - **Published Date**: August 22, 2023 at 00:00 UTC - **Last Updated**: October 03, 2024 at 20:30 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A NULL pointer dereference was discovered in SExpressionWasmBuilder::makeBlock in wasm/wasm-s-parser.c in Binaryen 1.38.26. A crafted wasm input can cause a segmentation fault, leading to denial-of-service, as demonstrated by wasm-as. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/WebAssembly/binaryen/issues/1900)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-5091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-5091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-5091 - **State**: PUBLISHED - **Published Date**: August 26, 2012 at 18:00 UTC - **Last Updated**: September 16, 2024 at 23:20 UTC - **Reserved Date**: April 30, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The setName function in filesystem/File.php in SilverStripe 2.3.x before 2.3.8 and 2.4.x before 2.4.1 allows remote authenticated users with CMS author privileges to execute arbitrary PHP code by changing the extension of an uploaded file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20120501 Re: CVE-request: SilverStripe before 2.4.4](http://www.openwall.com/lists/oss-security/2012/05/01/3) 2. [](http://open.silverstripe.org/ticket/5693) 3. [[oss-security] 20120430 CVE-request: SilverStripe before 2.4.4](http://www.openwall.com/lists/oss-security/2012/04/30/1) 4. [[oss-security] 20120430 Re: CVE-request: SilverStripe before 2.4.4](http://www.openwall.com/lists/oss-security/2012/04/30/3) 5. [](http://dl.packetstormsecurity.net/1006-exploits/silverstripe-shell.txt) 6. [](http://doc.silverstripe.org/sapphire/en/trunk/changelogs//2.4.1) 7. [](http://open.silverstripe.org/changeset/107273) 8. [](http://doc.silverstripe.org/sapphire/en/trunk/changelogs//2.3.8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21887, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21887 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21887 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 14:57 UTC - **Last Updated**: May 04, 2025 at 13:06 UTC - **Reserved Date**: December 29, 2024 at 08:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up The issue was caused by dput(upper) being called before ovl_dentry_update_reval(), while upper->d_flags was still accessed in ovl_dentry_remote(). Move dput(upper) after its last use to prevent use-after-free. BUG: KASAN: slab-use-after-free in ovl_dentry_remote fs/overlayfs/util.c:162 [inline] BUG: KASAN: slab-use-after-free in ovl_dentry_update_reval+0xd2/0xf0 fs/overlayfs/util.c:167 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114 print_address_description mm/kasan/report.c:377 [inline] print_report+0xc3/0x620 mm/kasan/report.c:488 kasan_report+0xd9/0x110 mm/kasan/report.c:601 ovl_dentry_remote fs/overlayfs/util.c:162 [inline] ovl_dentry_update_reval+0xd2/0xf0 fs/overlayfs/util.c:167 ovl_link_up fs/overlayfs/copy_up.c:610 [inline] ovl_copy_up_one+0x2105/0x3490 fs/overlayfs/copy_up.c:1170 ovl_copy_up_flags+0x18d/0x200 fs/overlayfs/copy_up.c:1223 ovl_rename+0x39e/0x18c0 fs/overlayfs/dir.c:1136 vfs_rename+0xf84/0x20a0 fs/namei.c:4893 ... </TASK> ### Affected Products **Linux - Linux** Affected versions: - 62f29ca45f832e281fc14966ac25f6ff3bd121ca (Status: affected) - e4f2a1feebb3f209a0fca82aa53507a5b8be4d53 (Status: affected) - b07d5cc93e1b28df47a72c519d09d0a836043613 (Status: affected) - b07d5cc93e1b28df47a72c519d09d0a836043613 (Status: affected) - b07d5cc93e1b28df47a72c519d09d0a836043613 (Status: affected) - b07d5cc93e1b28df47a72c519d09d0a836043613 (Status: affected) - 714ba10a6dd19752a349e59aa875f3288ccb59b9 (Status: affected) - 33ab4dd6202f359558a0a2678b94d1b9994c17e5 (Status: affected) - 1ecdc55e5cd9f70f8d7513802971d4cffb9f77af (Status: affected) **Linux - Linux** Affected versions: - 6.5 (Status: affected) - 0 (Status: unaffected) - 5.15.179 (Status: unaffected) - 6.1.130 (Status: unaffected) - 6.6.81 (Status: unaffected) - 6.12.18 (Status: unaffected) - 6.13.6 (Status: unaffected) - 6.14 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/4b49d939b5a79117f939b77cc67efae2694d9799) 2. [](https://git.kernel.org/stable/c/a7c41830ffcd17b2177a95a9b99b270302090c35) 3. [](https://git.kernel.org/stable/c/64455c8051c3aedc71abb7ec8d47c80301f99f00) 4. [](https://git.kernel.org/stable/c/3594aad97e7be2557ca9fa9c931b206b604028c8) 5. [](https://git.kernel.org/stable/c/60b4b5c1277fc491da9e1e7abab307bfa39c2db7) 6. [](https://git.kernel.org/stable/c/c84e125fff2615b4d9c259e762596134eddd2f27)