System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9373, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9373 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9373
- **State**: PUBLISHED
- **Published Date**: June 16, 2017 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 17:02 UTC
- **Reserved Date**: June 02, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Memory leak in QEMU (aka Quick Emulator), when built with IDE AHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the AHCI device.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-3920](http://www.debian.org/security/2017/dsa-3920)
2. [](http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d68f0f778e7f4fbd674627274267f269e40f0b04)
3. [[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update](https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html)
4. [98921](http://www.securityfocus.com/bid/98921)
5. [RHSA-2017:2392](https://access.redhat.com/errata/RHSA-2017:2392)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=1458270)
7. [[oss-security] 20170605 CVE-2017-9373 Qemu: ide: ahci host memory leakage during hotunplug](http://www.openwall.com/lists/oss-security/2017/06/05/1)
8. [RHSA-2017:2408](https://access.redhat.com/errata/RHSA-2017:2408) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45794, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45794 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45794
- **State**: PUBLISHED
- **Published Date**: November 07, 2024 at 17:42 UTC
- **Last Updated**: November 07, 2024 at 19:33 UTC
- **Reserved Date**: September 09, 2024 at 14:23 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
devtron is an open source tool integration platform for Kubernetes. In affected versions an authenticated user (with minimum permission) could utilize and exploit SQL Injection to allow the execution of malicious SQL queries via CreateUser API (/orchestrator/user). This issue has been addressed in version 0.7.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**devtron-labs - devtron**
Affected versions:
- < 0.7.2 (Status: affected)
### References
1. [https://github.com/devtron-labs/devtron/security/advisories/GHSA-q78v-cv36-8fxj](https://github.com/devtron-labs/devtron/security/advisories/GHSA-q78v-cv36-8fxj) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2769
- **State**: PUBLISHED
- **Published Date**: August 11, 2022 at 11:50 UTC
- **Last Updated**: April 15, 2025 at 13:52 UTC
- **Reserved Date**: August 11, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in SourceCodester Company Website CMS. This issue affects some unknown processing of the file /dashboard/contact. The manipulation of the argument phone leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206165 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SourceCodester - Company Website CMS**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Company%20Website%20CMS%28XSS%29.md)
2. [](https://vuldb.com/?id.206165) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16223, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16223 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16223
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 02:00 UTC
- **Last Updated**: September 17, 2024 at 02:20 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
nodeaaaaa is a static file server. nodeaaaaa is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**HackerOne - nodeaaaaa node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/446)
2. [](https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/nodeaaaaa) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22598, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22598 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22598
- **State**: PUBLISHED
- **Published Date**: March 18, 2022 at 17:59 UTC
- **Last Updated**: August 03, 2024 at 03:14 UTC
- **Reserved Date**: January 05, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue with app access to camera metadata was addressed with improved logic. This issue is fixed in iOS 15.4 and iPadOS 15.4. An app may be able to learn information about the current camera view before being granted camera access.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213182) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19001
- **State**: PUBLISHED
- **Published Date**: December 07, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 11:23 UTC
- **Reserved Date**: November 06, 2018 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Philips HealthSuite Health Android App, all versions. The software uses simple encryption that is not strong enough for the level of protection required.
### Weakness Classification (CWE)
- CWE-326: Security Weakness
### Affected Products
**n/a - Philips HealthSuite Health Android App**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSMA-18-340-01)
2. [106126](http://www.securityfocus.com/bid/106126) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47861, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47861 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47861
- **State**: PUBLISHED
- **Published Date**: January 11, 2023 at 00:00 UTC
- **Last Updated**: April 09, 2025 at 14:32 UTC
- **Reserved Date**: December 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Lead Management System v1.0 is vulnerable to SQL Injection via the id parameter in removeLead.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sourcecodester.com/php/15933/lead-management-system-php-open-source-free-download.html)
2. [](https://github.com/xiumulty/CVE/blob/main/Lead%20management%20system%20v1.0/sql%20in%20removeLead.php.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4676, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4676
- **State**: PUBLISHED
- **Published Date**: June 19, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 19, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in ticket.php in TickFa 1.x allows remote authenticated users to execute arbitrary SQL commands via the tid parameter in a read action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/132186/TickFa-1.x-SQL-Injection.html)
2. [75343](http://www.securityfocus.com/bid/75343) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0754, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0754
- **State**: PUBLISHED
- **Published Date**: March 07, 2022 at 12:45 UTC
- **Last Updated**: August 02, 2024 at 23:40 UTC
- **Reserved Date**: February 24, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
SQL Injection in GitHub repository salesagility/suitecrm prior to 7.12.5.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**salesagility - salesagility/suitecrm**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/salesagility/suitecrm/commit/e93b269f637de313f45b32c58cef5ec012a34f58)
2. [](https://huntr.dev/bounties/8afb7991-c6ed-42d9-bd9b-1cc83418df88) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9885, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9885 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9885
- **State**: PUBLISHED
- **Published Date**: October 30, 2024 at 02:32 UTC
- **Last Updated**: October 30, 2024 at 13:02 UTC
- **Reserved Date**: October 11, 2024 at 19:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Widget or Sidebar Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sidebar' shortcode in all versions up to, and including, 0.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**fstaude - Widget or Sidebar Shortcode**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/20584675-0d4a-4215-8132-e9ea95bee09b?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/widget-or-sidebar-per-shortcode/trunk/class-widget-or-sidebar-per-shortcode.php#L89)
3. [](https://wordpress.org/plugins/widget-or-sidebar-per-shortcode/)
### Credits
- Youcef Hamdani |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1716, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1716 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1716
- **State**: PUBLISHED
- **Published Date**: April 09, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 09:50 UTC
- **Reserved Date**: January 29, 2014 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Runtime_SetPrototype function in runtime.cc in Google V8, as used in Google Chrome before 34.0.1847.116, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://code.google.com/p/chromium/issues/detail?id=354123)
2. [](https://code.google.com/p/v8/source/detail?r=20138)
3. [](http://googlechromereleases.blogspot.com/2014/04/stable-channel-update.html)
4. [openSUSE-SU-2014:0601](http://lists.opensuse.org/opensuse-updates/2014-05/msg00012.html)
5. [GLSA-201408-16](http://security.gentoo.org/glsa/glsa-201408-16.xml)
6. [DSA-2905](http://www.debian.org/security/2014/dsa-2905) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0431, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0431 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0431
- **State**: PUBLISHED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:41 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5634
- **State**: PUBLISHED
- **Published Date**: December 01, 2023 at 13:19 UTC
- **Last Updated**: October 15, 2024 at 17:40 UTC
- **Reserved Date**: October 18, 2023 at 11:04 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ArslanSoft Education Portal allows SQL Injection.This issue affects Education Portal: before v1.1.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**ArslanSoft - Education Portal**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-23-0670)
### Credits
- Ömer Kaan COŞKUN |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26211, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26211 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26211
- **State**: PUBLISHED
- **Published Date**: May 27, 2025 at 00:00 UTC
- **Last Updated**: May 27, 2025 at 14:06 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Gibbon before 29.0.00 allows CSRF.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**GibbonEdu - Gibbon**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/GibbonEdu/core/blob/be891ab97b058a933b68354559457c9e310c13b8/modules/Timetable%20Admin/tt_delete.php#L24)
2. [](https://github.com/GibbonEdu/core/releases/tag/v29.0.00) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42051, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42051 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42051
- **State**: PUBLISHED
- **Published Date**: July 28, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 04:54 UTC
- **Reserved Date**: July 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The MSI installer for Splashtop Streamer for Windows before 3.6.2.0 uses a temporary folder with weak permissions during installation. A local user can exploit this to escalate privileges to SYSTEM by replacing InstRegExp.reg.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/SpacePlant/Vulns/blob/main/Advisories/2024/3.md)
2. [](https://support-splashtopbusiness.splashtop.com/hc/en-us/articles/20716875636763-Splashtop-Streamer-version-v3-6-2-0-for-Windows-released) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29524, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29524
- **State**: PUBLISHED
- **Published Date**: May 14, 2021 at 19:35 UTC
- **Last Updated**: August 03, 2024 at 22:11 UTC
- **Reserved Date**: March 30, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/496c2630e51c1a478f095b084329acedb253db6b/tensorflow/core/kernels/conv_grad_shape_utils.cc#L130) does a modulus operation where the divisor is controlled by the caller. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 2.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-369: Security Weakness
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- < 2.1.4 (Status: affected)
- >= 2.2.0, < 2.2.3 (Status: affected)
- >= 2.3.0, < 2.3.3 (Status: affected)
- >= 2.4.0, < 2.4.2 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4pj-74mg-8868)
2. [](https://github.com/tensorflow/tensorflow/commit/fca9874a9b42a2134f907d2fb46ab774a831404a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4926
- **State**: PUBLISHED
- **Published Date**: October 20, 2023 at 07:29 UTC
- **Last Updated**: February 05, 2025 at 19:05 UTC
- **Reserved Date**: September 12, 2023 at 21:05 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The BEAR for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.3.3. This is due to missing or incorrect nonce validation on the woobe_bulk_delete_products function. This makes it possible for unauthenticated attackers to delete products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Affected Products
**realmag777 - BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/ab633506-63a1-4be1-b402-c7f0bcc4ea7a?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/woo-bulk-editor/trunk/ext/bulk/bulk.php#L159)
3. [](https://plugins.trac.wordpress.org/changeset/2970262/woo-bulk-editor/trunk/ext/bulk/bulk.php?contextall=1&old=2844667&old_path=%2Fwoo-bulk-editor%2Ftrunk%2Fext%2Fbulk%2Fbulk.php)
### Credits
- Marco Wotschka |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0804, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0804 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0804
- **State**: PUBLISHED
- **Published Date**: January 12, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 09:27 UTC
- **Reserved Date**: January 06, 2014 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Directory traversal vulnerability in the CGENE Security File Manager Pro application 1.0.6 and earlier, and Security File Manager Trial application 1.0.6 and earlier, for Android allows attackers to overwrite or create arbitrary files via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://play.google.com/store/apps/details?id=com.cgene.android.secret.filelock.free)
2. [JVN#44392991](http://jvn.jp/en/jp/JVN44392991/index.html)
3. [JVNDB-2014-000003](http://jvndb.jvn.jp/jvndb/JVNDB-2014-000003)
4. [](https://play.google.com/store/apps/details?id=com.cgene.android.secret.filelock.pro) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8797, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8797 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8797
- **State**: PUBLISHED
- **Published Date**: September 14, 2024 at 05:40 UTC
- **Last Updated**: September 15, 2024 at 19:57 UTC
- **Reserved Date**: September 13, 2024 at 17:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP Booking System – Booking Calendar plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.0.19.8. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**murgroland - WP Booking System – Booking Calendar**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1bea55b5-b2d7-4eaf-8868-d2645ce18619?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/wp-booking-system/tags/2.0.19.10/includes/modules/update-checker/views/view-register-website.php#L21)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3150487%40wp-booking-system&new=3150487%40wp-booking-system&sfp_email=&sfph_mail=)
### Credits
- Dale Mavers |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1846, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1846 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1846
- **State**: PUBLISHED
- **Published Date**: June 27, 2022 at 08:58 UTC
- **Last Updated**: August 03, 2024 at 00:17 UTC
- **Reserved Date**: May 24, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Tiny Contact Form WordPress plugin through 0.7 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - Tiny Contact Form**
Affected versions:
- 0.7 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/5fa5838e-4843-4d9c-9884-e3ebbf56fc6a)
### Credits
- Daniel Ruf |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5964, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5964 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5964
- **State**: PUBLISHED
- **Published Date**: August 24, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 07:06 UTC
- **Reserved Date**: August 07, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The (1) contrib.sessions.backends.base.SessionBase.flush and (2) cache_db.SessionStore.flush functions in Django 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions create empty sessions in certain circumstances, which allows remote attackers to cause a denial of service (session store consumption) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2015-1dd5bc998f](http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html)
2. [RHSA-2015:1894](http://rhn.redhat.com/errata/RHSA-2015-1894.html)
3. [DSA-3338](http://www.debian.org/security/2015/dsa-3338)
4. [1033318](http://www.securitytracker.com/id/1033318)
5. [RHSA-2015:1767](http://rhn.redhat.com/errata/RHSA-2015-1767.html)
6. [USN-2720-1](http://www.ubuntu.com/usn/USN-2720-1)
7. [RHSA-2015:1766](http://rhn.redhat.com/errata/RHSA-2015-1766.html)
8. [76440](http://www.securityfocus.com/bid/76440)
9. [](https://www.djangoproject.com/weblog/2015/aug/18/security-releases/)
10. [](http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46773, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46773
- **State**: PUBLISHED
- **Published Date**: March 15, 2023 at 19:57 UTC
- **Last Updated**: February 26, 2025 at 16:11 UTC
- **Reserved Date**: December 07, 2022 at 20:04 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Robotic Process Automation 21.0.0 - 21.0.7 and 23.0.0 is vulnerable to client-side validation bypass for credential pools. Invalid credential pools may be created as a result. IBM X-Force ID: 242951.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**IBM - Robotic Process Automation**
Affected versions:
- 21.0.0 (Status: affected)
- 23.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6962155)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/242951) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3515, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3515
- **State**: PUBLISHED
- **Published Date**: October 13, 2010 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 03:11 UTC
- **Reserved Date**: September 20, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Solaris component in Oracle Solaris 9 and 10, and OpenSolaris, allows local users to affect availability via unknown vectors related to Kernel/Disk Driver.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html)
2. [TA10-287A](http://www.us-cert.gov/cas/techalerts/TA10-287A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3118, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3118 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3118
- **State**: PUBLISHED
- **Published Date**: October 06, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 23:01 UTC
- **Reserved Date**: October 03, 2005 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
Mason before 1.0.0 does not install the init script after the user uses Mason to configure a firewall, which causes the system to run without a firewall after a reboot.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19875](http://www.osvdb.org/19875)
2. [ADV-2005-1976](http://www.vupen.com/english/advisories/2005/1976)
3. [17084](http://secunia.com/advisories/17084)
4. [DSA-845](http://www.debian.org/security/2005/dsa-845)
5. [15019](http://www.securityfocus.com/bid/15019) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47702, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47702 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47702
- **State**: PUBLISHED
- **Published Date**: May 14, 2025 at 17:01 UTC
- **Last Updated**: May 15, 2025 at 14:36 UTC
- **Reserved Date**: May 07, 2025 at 16:02 UTC
- **Assigned By**: drupal
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal oEmbed Providers allows Cross-Site Scripting (XSS).This issue affects oEmbed Providers: from 0.0.0 before 2.2.2.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Drupal - oEmbed Providers**
Affected versions:
- 0.0.0 (Status: affected)
### References
1. [](https://www.drupal.org/sa-contrib-2025-048)
### Credits
- Pierre Rudloff (prudloff)
- Chris Burge (chris burge)
- Greg Knaddison (greggles)
- Juraj Nemec (poker10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2839, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2839 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2839
- **State**: PUBLISHED
- **Published Date**: January 12, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 10:28 UTC
- **Reserved Date**: April 10, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the GD Star Rating plugin 19.22 for WordPress allows remote administrators to execute arbitrary SQL commands via the s parameter in the gd-star-rating-stats page to wp-admin/admin.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://advisories.dxw.com/advisories/csrf-and-blind-sql-injection-in-gd-star-rating-1-9-22/)
2. [gdstart-wordpress-sql-injection(92156)](https://exchange.xforce.ibmcloud.com/vulnerabilities/92156)
3. [20140328 XSS, CSRF and blind SQL injection in GD Star Rating 1.9.22 (WordPress plugin)](http://seclists.org/fulldisclosure/2014/Mar/399) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7959, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7959 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7959
- **State**: REJECTED
- **Published Date**: March 06, 2017 at 02:00 UTC
- **Last Updated**: March 06, 2017 at 01:57 UTC
- **Reserved Date**: October 23, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4448, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4448
- **State**: PUBLISHED
- **Published Date**: September 05, 2012 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 16:44 UTC
- **Reserved Date**: November 15, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in actions/usersettings/usersettings.php in WikkaWiki 1.3.1 and 1.3.2 allows remote attackers to execute arbitrary SQL commands via the default_comment_display parameter in an update action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://wush.net/trac/wikka/changeset/1820)
2. [](http://wush.net/trac/wikka/ticket/1097) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1528, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1528 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1528
- **State**: PUBLISHED
- **Published Date**: April 26, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 01:28 UTC
- **Reserved Date**: April 26, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in include/template.php in Uiga Proxy, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the content parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [39365](http://www.securityfocus.com/bid/39365)
2. [63528](http://www.osvdb.org/63528)
3. [12049](http://www.exploit-db.com/exploits/12049)
4. [39313](http://secunia.com/advisories/39313)
5. [uigaproxy-template-file-include(57515)](https://exchange.xforce.ibmcloud.com/vulnerabilities/57515) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1125, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1125 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1125
- **State**: PUBLISHED
- **Published Date**: April 16, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:35 UTC
- **Reserved Date**: April 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Race condition in libsafe 2.0.16 and earlier, when running in multi-threaded applications, allows attackers to bypass libsafe protection and exploit other vulnerabilities before the _libsafe_die function call is completed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050415 [Overflow.pl] Libsafe - Safety Check Bypass Vulnerability](http://www.securityfocus.com/archive/1/395999)
2. [13190](http://www.securityfocus.com/bid/13190)
3. [](http://www.overflow.pl/adv/libsafebypass.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40112, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40112 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40112
- **State**: PUBLISHED
- **Published Date**: November 04, 2021 at 15:35 UTC
- **Last Updated**: November 07, 2024 at 21:57 UTC
- **Reserved Date**: August 25, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Cisco - Cisco Catalyst PON Series**
Affected versions:
- n/a (Status: affected)
### References
1. [20211103 Cisco Catalyst PON Series Switches Optical Network Terminal Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catpon-multivulns-CE3DSYGr) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1256, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1256 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1256
- **State**: PUBLISHED
- **Published Date**: July 05, 2017 at 13:00 UTC
- **Last Updated**: September 17, 2024 at 04:05 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Guardium 10.0, 10.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 124678
### Affected Products
**IBM - Security Guardium**
Affected versions:
- 10.0 (Status: affected)
- 10.0.1 (Status: affected)
- 10.1 (Status: affected)
- 10.1.2 (Status: affected)
### References
1. [99376](http://www.securityfocus.com/bid/99376)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/124678)
3. [](http://www.ibm.com/support/docview.wss?uid=swg22004461) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0368, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0368 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0368
- **State**: PUBLISHED
- **Published Date**: January 18, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 07:39 UTC
- **Reserved Date**: January 18, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
onedcu in IBM Informix Dynamic Server (IDS) 10.x before 10.00.xC8 allows local users to create arbitrary files via the Trace file argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27328](http://www.securityfocus.com/bid/27328)
2. [28534](http://secunia.com/advisories/28534)
3. [ADV-2008-0169](http://www.vupen.com/english/advisories/2008/0169)
4. [ibm-ids-onedcu-sqlidebug-unspecified(39751)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39751)
5. [20080131 IBM Informix Dynamic Server onedcu File Creation Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=651)
6. [IC54307](http://www-1.ibm.com/support/docview.wss?uid=swg1IC54307)
7. [1019237](http://www.securitytracker.com/id?1019237)
8. [](http://www-1.ibm.com/support/docview.wss?uid=swg27011556) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5374, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5374
- **State**: PUBLISHED
- **Published Date**: July 14, 2020 at 19:30 UTC
- **Last Updated**: September 16, 2024 at 18:43 UTC
- **Reserved Date**: January 03, 2020 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell EMC OpenManage Integration for Microsoft System Center (OMIMSSC) for SCCM and SCVMM versions prior to 7.2.1 contain a hard-coded cryptographic key vulnerability. A remote unauthenticated attacker may exploit this vulnerability to gain access to the appliance data for remotely managed devices.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-256: Security Weakness
### Affected Products
**Dell - OMIMSSC (OpenManage Integration for Microsoft System Center)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/article/en-us/sln322169/dsa-2020-163-dell-emc-openmanage-integration-for-microsoft-system-center-multiple-vulnerabilities?lang=en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4336
- **State**: PUBLISHED
- **Published Date**: January 06, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 00:25 UTC
- **Reserved Date**: April 27, 2016 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
An exploitable out-of-bounds write exists in the Bzip2 parsing of the Lexmark Perspective Document Filters conversion functionality. A crafted Bzip2 document can lead to a stack-based buffer overflow causing an out-of-bounds write which under the right circumstance could potentially be leveraged by an attacker to gain arbitrary code execution.
### Affected Products
**Lexmark - Perceptive Document Filters**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.talosintelligence.com/reports/TALOS-2016-0173/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0214
- **State**: PUBLISHED
- **Published Date**: April 22, 2021 at 19:36 UTC
- **Last Updated**: September 17, 2024 at 00:45 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
A vulnerability in the distributed or centralized periodic packet management daemon (PPMD) of Juniper Networks Junos OS may cause receipt of a malformed packet to crash and restart the PPMD process, leading to network destabilization, service interruption, and a Denial of Service (DoS) condition. Continued receipt and processing of these malformed packets will repeatedly crash the PPMD process and sustain the Denial of Service (DoS) condition. Due to the nature of the specifically crafted packet, exploitation of this issue requires direct, adjacent connectivity to the vulnerable component. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S12, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S6; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S4; 19.2 versions prior to 19.2R1-S5, 19.2R3-S1; 19.3 versions prior to 19.3R2-S5, 19.3R3-S1; 19.4 versions prior to 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S2, 20.2R2.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 17.3 (Status: affected)
- 17.4 (Status: affected)
- 18.1 (Status: affected)
- 18.2 (Status: affected)
- 18.3 (Status: affected)
- 18.4 (Status: affected)
- 19.1 (Status: affected)
- 19.2 (Status: affected)
- 19.3 (Status: affected)
- 19.4 (Status: affected)
- 20.1 (Status: affected)
- 20.2 (Status: affected)
### References
1. [](https://kb.juniper.net/JSA11117) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24352, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24352 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24352
- **State**: PUBLISHED
- **Published Date**: October 16, 2020 at 05:05 UTC
- **Last Updated**: August 04, 2024 at 15:12 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.qemu.org/?p=qemu.git)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1847584)
3. [](https://security.netapp.com/advisory/ntap-20201123-0003/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5490, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5490
- **State**: PUBLISHED
- **Published Date**: December 12, 2008 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 10:56 UTC
- **Reserved Date**: December 12, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in PHPStore Yahoo Answers allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4718](http://securityreason.com/securityalert/4718)
2. [yahooanswers-index-sql-injection(46624)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46624)
3. [ADV-2008-3169](http://www.vupen.com/english/advisories/2008/3169)
4. [32316](http://www.securityfocus.com/bid/32316)
5. [32717](http://secunia.com/advisories/32717)
6. [7131](https://www.exploit-db.com/exploits/7131) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36435, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36435
- **State**: PUBLISHED
- **Published Date**: October 10, 2023 at 17:08 UTC
- **Last Updated**: April 14, 2025 at 22:46 UTC
- **Reserved Date**: June 21, 2023 at 15:14 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft QUIC Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Microsoft - PowerShell 7.3**
Affected versions:
- 7.3.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - .NET 7.0**
Affected versions:
- 7.0.0 (Status: affected)
### References
1. [Microsoft QUIC Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36435) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30381, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30381
- **State**: PUBLISHED
- **Published Date**: April 12, 2024 at 14:56 UTC
- **Last Updated**: August 02, 2024 at 01:32 UTC
- **Reserved Date**: March 26, 2024 at 23:06 UTC
- **Assigned By**: juniper
### Vulnerability Description
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Juniper Networks Paragon Active Assurance Control Center allows a network-adjacent attacker with root access to a Test Agent Appliance the ability to access sensitive information about downstream devices.
The "netrounds-probe-login" daemon (also called probe_serviced) exposes functions where the Test Agent (TA) Appliance pushes interface state/config, unregister itself, etc. The remote service accidentally exposes an internal database object that can be used for direct database access on the Paragon Active Assurance Control Center.
This issue affects Paragon Active Assurance: 4.1.0, 4.2.0.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Juniper Networks - Paragon Active Assurance**
Affected versions:
- 4.1.0 (Status: affected)
- 4.2.0 (Status: affected)
### References
1. [](https://supportportal.juniper.net/JSA79173)
2. [](https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11124, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11124 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11124
- **State**: PUBLISHED
- **Published Date**: July 06, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 08:01 UTC
- **Reserved Date**: May 15, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Attributes functionality in Open-AudIT Community edition before 2.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted attribute name of an Attribute.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.google.com/document/d/1dJP1CQupHGXjsMWthgPGepOkcnxYA4mDfdjOE46nrhM/edit?usp=sharing)
2. [45053](https://www.exploit-db.com/exploits/45053/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9633, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9633 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9633
- **State**: PUBLISHED
- **Published Date**: February 03, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 13:47 UTC
- **Reserved Date**: January 22, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The bdisk.sys driver in COMODO Backup before 4.4.1.23 allows remote attackers to gain privileges via a crafted device handle, which triggers a NULL pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35905](http://www.exploit-db.com/exploits/35905)
2. [](http://packetstormsecurity.com/files/130094/Comodo-Backup-4.4.0.0-NULL-Pointer-Dereference.html)
3. [](http://forums.comodo.com/news-announcements-feedback-cb/comodo-backup-44123-released-t107293.0.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5882, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5882 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5882
- **State**: PUBLISHED
- **Published Date**: January 15, 2014 at 00:30 UTC
- **Last Updated**: August 06, 2024 at 17:22 UTC
- **Reserved Date**: September 18, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedures.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [64854](http://www.securityfocus.com/bid/64854)
2. [56491](http://secunia.com/advisories/56491)
3. [oracle-cpujan2014-cve20135882(90374)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90374)
4. [64758](http://www.securityfocus.com/bid/64758)
5. [](http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html)
6. [GLSA-201409-04](http://security.gentoo.org/glsa/glsa-201409-04.xml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28480, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28480 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28480
- **State**: PUBLISHED
- **Published Date**: April 29, 2022 at 16:14 UTC
- **Last Updated**: August 03, 2024 at 05:56 UTC
- **Reserved Date**: April 04, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ALLMediaServer 1.6 is vulnerable to Buffer Overflow via MediaServer.exe.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/166465/ALLMediaServer-1.6-Remote-Buffer-Overflow.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34408, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34408
- **State**: PUBLISHED
- **Published Date**: June 05, 2023 at 00:00 UTC
- **Last Updated**: January 08, 2025 at 19:37 UTC
- **Reserved Date**: June 05, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DokuWiki before 2023-04-04a allows XSS via RSS titles.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/dokuwiki/dokuwiki/pull/3967)
2. [](https://www.github.com/splitbrain/dokuwiki/commit/53df38b0e4465894a67a5890f74a6f5f82e827de)
3. [](https://huntr.dev/bounties/c6119106-1a5c-464c-94dd-ee7c5d0bece0/)
4. [](https://github.com/dokuwiki/dokuwiki/compare/release-2023-04-04...release-2023-04-04a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37444, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37444
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 14:18 UTC
- **Last Updated**: November 01, 2024 at 18:15 UTC
- **Reserved Date**: June 09, 2024 at 08:52 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in WPMU DEV Defender Security allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Defender Security: from n/a through 4.7.1.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**WPMU DEV - Defender Security**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/defender-security/wordpress-defender-plugin-4-7-1-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2355, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2355 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2355
- **State**: PUBLISHED
- **Published Date**: May 20, 2008 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 08:58 UTC
- **Reserved Date**: May 20, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in index.php in WR-Meeting 1.0, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the msnum parameter in a coment event.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5637](https://www.exploit-db.com/exploits/5637)
2. [30296](http://secunia.com/advisories/30296)
3. [29262](http://www.securityfocus.com/bid/29262)
4. [wrmeeting-index-file-include(42497)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42497)
5. [ADV-2008-1566](http://www.vupen.com/english/advisories/2008/1566/references) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2229
- **State**: PUBLISHED
- **Published Date**: April 22, 2021 at 21:53 UTC
- **Last Updated**: September 26, 2024 at 15:05 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Depot Repair product of Oracle E-Business Suite (component: LOVs). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Depot Repair. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Depot Repair accessible data as well as unauthorized access to critical data or complete access to all Oracle Depot Repair accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Oracle Corporation - Depot Repair**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21401, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21401 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21401
- **State**: PUBLISHED
- **Published Date**: March 23, 2021 at 17:45 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 22, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Nanopb is a small code-size Protocol Buffers implementation in ansi C. In Nanopb before versions 0.3.9.8 and 0.4.5, decoding a specifically formed message can cause invalid `free()` or `realloc()` calls if the message type contains an `oneof` field, and the `oneof` directly contains both a pointer field and a non-pointer field. If the message data first contains the non-pointer field and then the pointer field, the data of the non-pointer field is incorrectly treated as if it was a pointer value. Such message data rarely occurs in normal messages, but it is a concern when untrusted data is parsed. This has been fixed in versions 0.3.9.8 and 0.4.5. See referenced GitHub Security Advisory for more information including workarounds.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L`
### Weakness Classification (CWE)
- CWE-763: Security Weakness
### Affected Products
**nanopb - nanopb**
Affected versions:
- >= 0.3.2, <= 0.3.9.7 (Status: affected)
- >= 0.4.0, <= 0.4.4 (Status: affected)
### References
1. [](https://github.com/nanopb/nanopb/security/advisories/GHSA-7mv5-5mxh-qg88)
2. [](https://github.com/nanopb/nanopb/issues/647)
3. [](https://github.com/nanopb/nanopb/commit/e2f0ccf939d9f82931d085acb6df8e9a182a4261)
4. [](https://github.com/nanopb/nanopb/blob/c9124132a604047d0ef97a09c0e99cd9bed2c818/CHANGELOG.txt#L1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4790, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4790 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4790
- **State**: PUBLISHED
- **Published Date**: September 05, 2013 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 16:34 UTC
- **Reserved Date**: July 11, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Open-Xchange AppSuite before 7.0.2 rev14, 7.2.0 before rev11, 7.2.1 before rev10, and 7.2.2 before rev9 relies on user-supplied data to predict the IMAP server hostname for an external domain name, which allows remote authenticated users to discover e-mail credentials of other users in opportunistic circumstances via a manual-mode association of a personal e-mail address with the hostname of a crafted IMAP server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130731 Open-Xchange Security Advisory 2013-07-31](http://archives.neohapsis.com/archives/bugtraq/2013-07/0204.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8921, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8921 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8921
- **State**: PUBLISHED
- **Published Date**: March 02, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 13:33 UTC
- **Reserved Date**: November 14, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by conducting a phishing attack involving an encrypted e-mail message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21690582) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13021, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13021
- **State**: REJECTED
- **Published Date**: January 14, 2022 at 16:23 UTC
- **Last Updated**: January 14, 2022 at 16:23 UTC
- **Reserved Date**: May 15, 2020 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51692, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51692 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51692
- **State**: PUBLISHED
- **Published Date**: November 09, 2024 at 12:50 UTC
- **Last Updated**: November 09, 2024 at 15:24 UTC
- **Reserved Date**: October 30, 2024 at 15:05 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Askew Brook Bing Search API Integration allows Reflected XSS.This issue affects Bing Search API Integration: from n/a through 0.3.3.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Askew Brook - Bing Search API Integration**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/abbs-bing-search/wordpress-bing-search-api-integration-plugin-0-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1068, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1068 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1068
- **State**: PUBLISHED
- **Published Date**: June 19, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 14:49 UTC
- **Reserved Date**: January 11, 2013 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
The OpenStack Nova (python-nova) package 1:2013.2.3-0 before 1:2013.2.3-0ubuntu1.2 and 1:2014.1-0 before 1:2014.1-0ubuntu1.2 and Openstack Cinder (python-cinder) package 1:2013.2.3-0 before 1:2013.2.3-0ubuntu1.1 and 1:2014.1-0 before 1:2014.1-0ubuntu1.1 for Ubuntu 13.10 and 14.04 LTS does not properly set the sudo configuration, which makes it easier for attackers to gain privileges by leveraging another vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2248-1](http://ubuntu.com/usn/usn-2248-1)
2. [USN-2247-1](http://www.ubuntu.com/usn/USN-2247-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1465, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1465 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1465
- **State**: PUBLISHED
- **Published Date**: May 12, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 17:12 UTC
- **Reserved Date**: March 28, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Apple QuickTime before 7.1 allows remote attackers to execute arbitrary code via a crafted QuickTime AVI video format file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20069](http://secunia.com/advisories/20069)
2. [APPLE-SA-2006-05-11](http://lists.apple.com/archives/security-announce/2006/May/msg00002.html)
3. [1016067](http://securitytracker.com/id?1016067)
4. [TA06-132B](http://www.us-cert.gov/cas/techalerts/TA06-132B.html)
5. [887](http://securityreason.com/securityalert/887)
6. [17953](http://www.securityfocus.com/bid/17953)
7. [ADV-2006-1778](http://www.vupen.com/english/advisories/2006/1778)
8. [20060512 Apple QuickDraw/QuickTime Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/433831/100/0/threaded)
9. [quicktime-avi-bo(26399)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26399) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4108, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4108 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4108
- **State**: PUBLISHED
- **Published Date**: October 13, 2013 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 04:19 UTC
- **Reserved Date**: July 31, 2012 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges and execute arbitrary operating-system commands via crafted parameters to a file-related command, aka Bug ID CSCtq86554.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20131011 Cisco Unified Computing System Fabric Interconnect Command Injection Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4108) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4505, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4505 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4505
- **State**: PUBLISHED
- **Published Date**: August 23, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 15:01 UTC
- **Reserved Date**: August 23, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in the RemoSitory component (com_remository) for Mambo allows remote attackers to execute arbitrary SQL commands via the cat parameter in a selectcat action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4306](https://www.exploit-db.com/exploits/4306)
2. [38359](http://osvdb.org/38359)
3. [remository-index-sql-injection(36220)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36220) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0949, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0949
- **State**: PUBLISHED
- **Published Date**: August 31, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:03 UTC
- **Reserved Date**: August 16, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Telindus 1100 series ADSL router allows remote attackers to gain privileges to the device via a certain packet to UDP port 9833, which generates a reply that includes the router's password and other sensitive information in cleartext.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4946](http://www.securityfocus.com/bid/4946)
2. [telindus-adsl-information-leak(9277)](http://www.iss.net/security_center/static/9277.php)
3. [20020605 Some vulnerabilities in the Telindus 11xx router series](http://archives.neohapsis.com/archives/bugtraq/2002-06/0028.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3055, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3055 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3055
- **State**: PUBLISHED
- **Published Date**: April 25, 2013 at 01:00 UTC
- **Last Updated**: September 16, 2024 at 17:33 UTC
- **Reserved Date**: April 15, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Lexmark Markvision Enterprise before 1.8 provides a diagnostic interface on TCP port 9789, which allows remote attackers to execute arbitrary code, change the configuration, or obtain sensitive fleet-management information via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.lexmark.com/index?page=content&id=TE530) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2566, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2566
- **State**: PUBLISHED
- **Published Date**: April 23, 2019 at 18:16 UTC
- **Last Updated**: October 02, 2024 at 15:49 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Audit Plug-in). Supported versions that are affected are 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.7.25 and prior (Status: affected)
- 8.0.15 and prior (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html)
2. [](https://support.f5.com/csp/article/K58502649)
3. [USN-3957-1](https://usn.ubuntu.com/3957-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3458
- **State**: PUBLISHED
- **Published Date**: July 07, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 18:30 UTC
- **Reserved Date**: July 07, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zope 2.7.0 to 2.7.8, 2.8.0 to 2.8.7, and 2.9.0 to 2.9.3 (Zope2) does not disable the "raw" command when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows local users to read arbitrary files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21025](http://secunia.com/advisories/21025)
2. [zope-docutils-information-disclosure(27636)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27636)
3. [](http://www.zope.org/Products/Zope/Hotfix-2006-07-05/Hotfix-20060705/README.txt)
4. [ADV-2006-2681](http://www.vupen.com/english/advisories/2006/2681)
5. [21130](http://secunia.com/advisories/21130)
6. [21459](http://secunia.com/advisories/21459)
7. [SUSE-SR:2006:019](http://www.novell.com/linux/security/advisories/2006_19_sr.html)
8. [DSA-1113](http://www.debian.org/security/2006/dsa-1113)
9. [18856](http://www.securityfocus.com/bid/18856)
10. [20988](http://secunia.com/advisories/20988)
11. [[Zope-announce] 20060706 Serious security problem with Zope 2](http://mail.zope.org/pipermail/zope-announce/2006-July/001984.html)
12. [USN-317-1](https://usn.ubuntu.com/317-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7177
- **State**: PUBLISHED
- **Published Date**: July 29, 2024 at 01:31 UTC
- **Last Updated**: August 01, 2024 at 21:52 UTC
- **Reserved Date**: July 28, 2024 at 05:35 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. It has been classified as critical. Affected is the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument langType leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-272598 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**TOTOLINK - A3600R**
Affected versions:
- 4.1.2cu.5182_B20201102 (Status: affected)
### References
1. [VDB-272598 | TOTOLINK A3600R cstecgi.cgi setLanguageCfg buffer overflow](https://vuldb.com/?id.272598)
2. [VDB-272598 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.272598)
3. [Submit #378044 | TOTOLINK A3600R V4.1.2cu.5182_B20201102 Buffer Overflow](https://vuldb.com/?submit.378044)
4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setLanguageCfg.md)
### Credits
- wxhwxhwxh_mie (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6135
- **State**: PUBLISHED
- **Published Date**: November 19, 2019 at 16:56 UTC
- **Last Updated**: August 06, 2024 at 21:28 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
RubyGems passenger 4.0.0 betas 1 and 2 allows remote attackers to delete arbitrary files during the startup process.
### Affected Products
**ruby-passenger - ruby-passenger**
Affected versions:
- 4.0.53-1 (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2012-6135)
2. [](http://www.openwall.com/lists/oss-security/2013/03/02/1)
3. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/82533)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6135)
5. [58259](https://www.securityfocus.com/bid/58259) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7406
- **State**: PUBLISHED
- **Published Date**: May 24, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 06:24 UTC
- **Reserved Date**: February 22, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Foxit Reader before 9.1 and PhantomPDF before 9.1. This vulnerability allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the u3d images inside of a pdf. The issue results from the lack of proper validation of user-supplied data, which can result in an array indexing issue. An attacker can leverage this to execute code in the context of the current process.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [104300](http://www.securityfocus.com/bid/104300)
3. [](https://srcincite.io/advisories/src-2018-0017/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6538
- **State**: PUBLISHED
- **Published Date**: December 27, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 16:11 UTC
- **Reserved Date**: December 27, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in ing/blocks/mrbs/code/web/view_entry.php in the MRBS plugin for Moodle allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28198](http://secunia.com/advisories/28198)
2. [20071222 Re: Re: Moodle SQL Injection](http://www.securityfocus.com/archive/1/485459/100/200/threaded)
3. [20071222 Re: Moodle SQL Injection](http://www.securityfocus.com/archive/1/485455/100/200/threaded)
4. [3492](http://securityreason.com/securityalert/3492)
5. [39619](http://osvdb.org/39619)
6. [moodle-viewentry-sql-injection(39190)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39190)
7. [](http://cvs.moodle.org/contrib/plugins/blocks/mrbs/web/view_entry.php?r1=1.1&r2=1.2)
8. [20071221 Moodle SQL Injection](http://www.securityfocus.com/archive/1/485434/100/0/threaded)
9. [26977](http://www.securityfocus.com/bid/26977) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49193, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49193 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49193
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 01:55 UTC
- **Last Updated**: May 04, 2025 at 08:32 UTC
- **Reserved Date**: February 26, 2025 at 01:49 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ice: fix 'scheduling while atomic' on aux critical err interrupt
There's a kernel BUG splat on processing aux critical error
interrupts in ice_misc_intr():
[ 2100.917085] BUG: scheduling while atomic: swapper/15/0/0x00010000
...
[ 2101.060770] Call Trace:
[ 2101.063229] <IRQ>
[ 2101.065252] dump_stack+0x41/0x60
[ 2101.068587] __schedule_bug.cold.100+0x4c/0x58
[ 2101.073060] __schedule+0x6a4/0x830
[ 2101.076570] schedule+0x35/0xa0
[ 2101.079727] schedule_preempt_disabled+0xa/0x10
[ 2101.084284] __mutex_lock.isra.7+0x310/0x420
[ 2101.088580] ? ice_misc_intr+0x201/0x2e0 [ice]
[ 2101.093078] ice_send_event_to_aux+0x25/0x70 [ice]
[ 2101.097921] ice_misc_intr+0x220/0x2e0 [ice]
[ 2101.102232] __handle_irq_event_percpu+0x40/0x180
[ 2101.106965] handle_irq_event_percpu+0x30/0x80
[ 2101.111434] handle_irq_event+0x36/0x53
[ 2101.115292] handle_edge_irq+0x82/0x190
[ 2101.119148] handle_irq+0x1c/0x30
[ 2101.122480] do_IRQ+0x49/0xd0
[ 2101.125465] common_interrupt+0xf/0xf
[ 2101.129146] </IRQ>
...
As Andrew correctly mentioned previously[0], the following call
ladder happens:
ice_misc_intr() <- hardirq
ice_send_event_to_aux()
device_lock()
mutex_lock()
might_sleep()
might_resched() <- oops
Add a new PF state bit which indicates that an aux critical error
occurred and serve it in ice_service_task() in process context.
The new ice_pf::oicr_err_reg is read-write in both hardirq and
process contexts, but only 3 bits of non-critical data probably
aren't worth explicit synchronizing (and they're even in the same
byte [31:24]).
[0] https://lore.kernel.org/all/YeSRUVmrdmlUXHDn@lunn.ch
### Affected Products
**Linux - Linux**
Affected versions:
- 348048e724a0e8f08b63948d728d27596f6d3769 (Status: affected)
- 348048e724a0e8f08b63948d728d27596f6d3769 (Status: affected)
- 348048e724a0e8f08b63948d728d27596f6d3769 (Status: affected)
- 348048e724a0e8f08b63948d728d27596f6d3769 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.14 (Status: affected)
- 0 (Status: unaffected)
- 5.15.33 (Status: unaffected)
- 5.16.19 (Status: unaffected)
- 5.17.2 (Status: unaffected)
- 5.18 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/9b77c8cf69a41d1e3851370aeaa04a9ea83b865c)
2. [](https://git.kernel.org/stable/c/24d7ac8426306ae7ccea7f7dd612a7368fe7201d)
3. [](https://git.kernel.org/stable/c/59e88a50afad7469c55804e46bf2924b9130281f)
4. [](https://git.kernel.org/stable/c/32d53c0aa3a7b727243473949bad2a830b908edc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2017, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2017
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 20:42 UTC
- **Last Updated**: March 12, 2025 at 14:41 UTC
- **Reserved Date**: March 05, 2025 at 23:40 UTC
- **Assigned By**: zdi
### Vulnerability Description
Ashlar-Vellum Cobalt CO File Parsing Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25240.
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Ashlar-Vellum - Cobalt**
Affected versions:
- 1204.91 (Status: affected)
### References
1. [ZDI-25-121](https://www.zerodayinitiative.com/advisories/ZDI-25-121/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56157
- **State**: PUBLISHED
- **Published Date**: May 14, 2025 at 14:40 UTC
- **Last Updated**: May 14, 2025 at 15:13 UTC
- **Reserved Date**: December 17, 2024 at 18:16 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
iTop is an web based IT Service Management tool. Prior to versions 3.1.3 and 3.2.1, by filling malicious code in a CSV content, a cross-site scripting attack can be performed when importing this content. The issue is fixed in versions 3.1.3 and 3.2.1. As a workaround, check CSV content before importing it.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Combodo - iTop**
Affected versions:
- < 3.1.3 (Status: affected)
- >= 3.2.0, < 3.2.1 (Status: affected)
### References
1. [https://github.com/Combodo/iTop/security/advisories/GHSA-6p48-74j9-977j](https://github.com/Combodo/iTop/security/advisories/GHSA-6p48-74j9-977j) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8974, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8974 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8974
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 23:01 UTC
- **Reserved Date**: May 15, 2017 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A Local Authentication Restriction Bypass vulnerability in HPE NonStop Server version L-Series: T6533L01 through T6533L01^ADN; J-Series and H-series: T6533H02 through T6533H04^ADF and T6533H05 through T6533H05^ADL was found.
### Affected Products
**Hewlett Packard Enterprise - NonStop Server**
Affected versions:
- L-Series: T6533L01 through T6533L01^ADN (Status: affected)
- J-Series and H-series: T6533H02 through T6533H04^ADF and T6533H05 through T6533H05^ADL (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbns03804en_us)
2. [102530](http://www.securityfocus.com/bid/102530) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26867, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26867 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26867
- **State**: PUBLISHED
- **Published Date**: June 02, 2022 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 17:03 UTC
- **Reserved Date**: March 10, 2022 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
PowerStore SW v2.1.1.0 supports the option to export data to either a CSV or an XLSX file. The data is taken as is, without any validation or sanitization. It allows a malicious, authenticated user to inject payloads that might get interpreted as formulas by the corresponding spreadsheet application that is being used to open the CSV/XLSX file.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-1236: Security Weakness
### Affected Products
**Dell - PowerStore**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/000196367) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17824, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17824
- **State**: PUBLISHED
- **Published Date**: December 21, 2017 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 20:59 UTC
- **Reserved Date**: December 20, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Batch Manager component of Piwigo 2.9.2 is vulnerable to SQL Injection via the admin/batch_manager_unit.php element_ids parameter in unit mode. An attacker can exploit this to gain access to the data in a connected MySQL database.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Multiple%20SQL%20Injection%20Vulnerabilities%20in%20Piwigo%202.9.2.md)
2. [](https://github.com/Piwigo/Piwigo/commit/f7c8e0a947a857ff5d31dafd03842df41959b84c)
3. [](https://github.com/Piwigo/Piwigo/issues/825) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23057, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23057
- **State**: PUBLISHED
- **Published Date**: January 11, 2024 at 00:00 UTC
- **Last Updated**: August 30, 2024 at 19:15 UTC
- **Reserved Date**: January 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the tz parameter in the setNtpCfg function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/5/TOTOlink%20A3300R%20setNtpCfg.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-11058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-11058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-11058
- **State**: PUBLISHED
- **Published Date**: April 28, 2020 at 16:12 UTC
- **Last Updated**: August 06, 2024 at 03:47 UTC
- **Reserved Date**: April 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The NETGEAR genie application before 2.4.34 for Android is affected by mishandling of hard-coded API keys and session IDs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/30922/NETGEAR-genie-App-for-Android-Hard-coded-API-Key-and-Session-ID-Vulnerability) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1430, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1430 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1430
- **State**: PUBLISHED
- **Published Date**: May 03, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 23:27 UTC
- **Reserved Date**: May 03, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mac OS X 10.3.x and earlier uses insecure permissions for a pseudo terminal tty (pty) that is managed by a non-setuid program, which allows local users to read or modify sessions of other users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050501 Insecure pty permissions in OS X < 10.4](http://www.security-focus.com/archive/1/397306) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29031, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29031
- **State**: PUBLISHED
- **Published Date**: March 24, 2021 at 12:03 UTC
- **Last Updated**: August 03, 2024 at 21:55 UTC
- **Reserved Date**: March 22, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/users_import.php URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27816
- **State**: PUBLISHED
- **Published Date**: March 07, 2025 at 00:00 UTC
- **Last Updated**: March 07, 2025 at 19:35 UTC
- **Reserved Date**: March 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability was discovered in the Arctera InfoScale 7.0 through 8.0.2 where a .NET remoting endpoint can be exploited due to the insecure deserialization of potentially untrusted messages. The vulnerability is present in the Windows Plugin_Host service, which runs on all the servers where InfoScale is installed. The service is used only when applications are configured for Disaster Recovery (DR) using the DR wizard. Disabling the Plugin_Host service manually will eliminate the vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.veritas.com/content/support/en_US/security/ARC25-002) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8282, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8282
- **State**: PUBLISHED
- **Published Date**: October 02, 2024 at 09:31 UTC
- **Last Updated**: October 02, 2024 at 15:34 UTC
- **Reserved Date**: August 28, 2024 at 18:57 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Ibtana – WordPress Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘align’ attribute within the 'wp:ive/ive-productscarousel' Gutenberg block in all versions up to, and including, 1.2.4.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**vowelweb - Ibtana – WordPress Website Builder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/0a281774-226a-4cb7-ba4a-ebb76f20eb47?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/ibtana-visual-editor/trunk/dist/blocks.build.js)
3. [](https://wordpress.org/plugins/ibtana-visual-editor/#developers)
4. [](https://plugins.trac.wordpress.org/changeset/3160421/)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3000, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3000 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3000
- **State**: PUBLISHED
- **Published Date**: August 30, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 02:55 UTC
- **Reserved Date**: August 13, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple integer overflows in the ParseKnownType function in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows allow remote attackers to execute arbitrary code via crafted (1) HX_FLV_META_AMF_TYPE_MIXEDARRAY or (2) HX_FLV_META_AMF_TYPE_ARRAY data in an FLV file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2010-2216](http://www.vupen.com/english/advisories/2010/2216)
2. [41096](http://secunia.com/advisories/41096)
3. [realplayer-parseknowntype-code-exec(61423)](https://exchange.xforce.ibmcloud.com/vulnerabilities/61423)
4. [oval:org.mitre.oval:def:6651](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6651)
5. [20100826 ZDI-10-167: RealNetworks RealPlayer FLV Parsing Multiple Integer Overflow Vulnerabilities](http://www.securityfocus.com/archive/1/513383/100/0/threaded)
6. [](http://service.real.com/realplayer/security/08262010_player/en/)
7. [1024370](http://www.securitytracker.com/id?1024370)
8. [](http://www.zerodayinitiative.com/advisories/ZDI-10-167)
9. [41154](http://secunia.com/advisories/41154) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3698, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3698 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3698
- **State**: PUBLISHED
- **Published Date**: September 23, 2011 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 16:57 UTC
- **Reserved Date**: September 23, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AdaptCMS 2.0.2 Beta allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by inc/poll_vote.php and certain other files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability](http://www.openwall.com/lists/oss-security/2011/06/27/6)
2. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/AdaptCMS_2.0.2_Beta)
3. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22026, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22026 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22026
- **State**: PUBLISHED
- **Published Date**: October 17, 2023 at 21:02 UTC
- **Last Updated**: February 13, 2025 at 16:43 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.42 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- * (Status: affected)
- * (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2023.html)
2. [](https://security.netapp.com/advisory/ntap-20231027-0009/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24792
- **State**: PUBLISHED
- **Published Date**: June 27, 2024 at 17:37 UTC
- **Last Updated**: August 01, 2024 at 23:28 UTC
- **Reserved Date**: January 30, 2024 at 16:05 UTC
- **Assigned By**: Go
### Vulnerability Description
Parsing a corrupt or malicious image with invalid color indices can cause a panic.
### Affected Products
**golang.org/x/image - golang.org/x/image/tiff**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://go.dev/cl/588115)
2. [](https://go.dev/issue/67624)
3. [](https://pkg.go.dev/vuln/GO-2024-2937)
### Credits
- John Wright <jsw@google.com> |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41508
- **State**: PUBLISHED
- **Published Date**: September 05, 2023 at 00:00 UTC
- **Last Updated**: September 26, 2024 at 20:50 UTC
- **Reserved Date**: August 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A hard coded password in Super Store Finder v3.6 allows attackers to access the administration panel.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://superstorefinder.net/support/forums/topic/super-store-finder-patch-notes/)
2. [](https://github.com/redblueteam/CVE-2023-41508/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19514, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19514
- **State**: PUBLISHED
- **Published Date**: March 17, 2019 at 22:06 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 23, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Webgalamb through 7.0, an arbitrary code execution vulnerability could be exploited remotely without authentication. Exploitation requires authentication bypass to access administrative functions of the site to upload a crafted CSV file with a malicious payload that becomes part of a PHP eval() expression in the subscriber.php file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html)
2. [](http://seclists.org/fulldisclosure/2019/Jan/15) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4363, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4363 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4363
- **State**: PUBLISHED
- **Published Date**: June 15, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 06:11 UTC
- **Reserved Date**: June 05, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Open redirect vulnerability in the finder_form_goto function in the Finder module for Drupal allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [72959](http://www.securityfocus.com/bid/72959)
2. [[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)](http://www.openwall.com/lists/oss-security/2015/04/25/6)
3. [](https://www.drupal.org/node/2445967) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1203, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1203 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1203
- **State**: PUBLISHED
- **Published Date**: October 24, 2017 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 09:34 UTC
- **Reserved Date**: January 07, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The get_login_ip_config_file function in Eyou Mail System before 3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in the domain parameter to admin/domain/ip_login_set/d_ip_login_get.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20140108 [CVE-2014-1203] Eyou Mail System Remote Code Execution](http://seclists.org/fulldisclosure/2014/Jan/32) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5321, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5321
- **State**: PUBLISHED
- **Published Date**: September 30, 2023 at 13:43 UTC
- **Last Updated**: September 23, 2024 at 15:59 UTC
- **Reserved Date**: September 30, 2023 at 13:43 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Missing Authorization in GitHub repository hamza417/inure prior to build94.
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**hamza417 - hamza417/inure**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/b1becc68-e738-458f-bd99-06ee77580d3a)
2. [](https://github.com/hamza417/inure/commit/57fda918bfd2fb863f579841a46363fe8e10c29b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26704, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26704
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 06:55 UTC
- **Last Updated**: March 11, 2025 at 17:29 UTC
- **Reserved Date**: February 14, 2025 at 06:13 UTC
- **Assigned By**: zte
### Vulnerability Description
Improper Privilege Management vulnerability in ZTE GoldenDB allows Privilege Escalation.This issue affects GoldenDB: from 6.1.03 through 6.1.03.05.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**ZTE - GoldenDB**
Affected versions:
- 6.1.03 (Status: affected)
### References
1. [](https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/6999218053484646494) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0124, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0124 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0124
- **State**: PUBLISHED
- **Published Date**: June 02, 2000 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:27 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files that can be accessed by the gopher daemon.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0124) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25748
- **State**: PUBLISHED
- **Published Date**: October 19, 2022 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 15:51 UTC
- **Reserved Date**: February 22, 2022 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption in WLAN due to integer overflow to buffer overflow while parsing GTK frames. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8009 (Status: affected)
- APQ8017 (Status: affected)
- APQ8076 (Status: affected)
- APQ8096AU (Status: affected)
- AQT1000 (Status: affected)
- AR8031 (Status: affected)
- AR8035 (Status: affected)
- AR9380 (Status: affected)
- CSR8811 (Status: affected)
- CSRA6620 (Status: affected)
- CSRA6640 (Status: affected)
- CSRB31024 (Status: affected)
- IPQ4018 (Status: affected)
- IPQ4028 (Status: affected)
- IPQ4029 (Status: affected)
- IPQ5010 (Status: affected)
- IPQ5018 (Status: affected)
- IPQ5028 (Status: affected)
- IPQ6000 (Status: affected)
- IPQ6010 (Status: affected)
- IPQ6018 (Status: affected)
- IPQ6028 (Status: affected)
- IPQ8064 (Status: affected)
- IPQ8069 (Status: affected)
- IPQ8070 (Status: affected)
- IPQ8070A (Status: affected)
- IPQ8071 (Status: affected)
- IPQ8071A (Status: affected)
- IPQ8072 (Status: affected)
- IPQ8072A (Status: affected)
- IPQ8074 (Status: affected)
- IPQ8074A (Status: affected)
- IPQ8076 (Status: affected)
- IPQ8076A (Status: affected)
- IPQ8078 (Status: affected)
- IPQ8078A (Status: affected)
- IPQ8173 (Status: affected)
- IPQ8174 (Status: affected)
- IPQ9008 (Status: affected)
- MDM8215 (Status: affected)
- MDM9206 (Status: affected)
- MDM9215 (Status: affected)
- MDM9250 (Status: affected)
- MDM9310 (Status: affected)
- MDM9607 (Status: affected)
- MDM9615 (Status: affected)
- MDM9628 (Status: affected)
- MDM9640 (Status: affected)
- MDM9645 (Status: affected)
- MDM9650 (Status: affected)
- MSM8976 (Status: affected)
- MSM8996AU (Status: affected)
- PMP8074 (Status: affected)
- QAM8295P (Status: affected)
- QCA1023 (Status: affected)
- QCA1062 (Status: affected)
- QCA1064 (Status: affected)
- QCA2062 (Status: affected)
- QCA2064 (Status: affected)
- QCA2065 (Status: affected)
- QCA2066 (Status: affected)
- QCA4020 (Status: affected)
- QCA4024 (Status: affected)
- QCA4531 (Status: affected)
- QCA6174 (Status: affected)
- QCA6174A (Status: affected)
- QCA6175A (Status: affected)
- QCA6310 (Status: affected)
- QCA6320 (Status: affected)
- QCA6335 (Status: affected)
- QCA6390 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6428 (Status: affected)
- QCA6430 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA6438 (Status: affected)
- QCA6554A (Status: affected)
- QCA6564 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584 (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCA8072 (Status: affected)
- QCA8075 (Status: affected)
- QCA8081 (Status: affected)
- QCA8082 (Status: affected)
- QCA8084 (Status: affected)
- QCA8085 (Status: affected)
- QCA8337 (Status: affected)
- QCA8386 (Status: affected)
- QCA9367 (Status: affected)
- QCA9377 (Status: affected)
- QCA9379 (Status: affected)
- QCA9888 (Status: affected)
- QCA9889 (Status: affected)
- QCA9898 (Status: affected)
- QCA9980 (Status: affected)
- QCA9984 (Status: affected)
- QCA9990 (Status: affected)
- QCA9992 (Status: affected)
- QCA9994 (Status: affected)
- QCC5100 (Status: affected)
- QCM2290 (Status: affected)
- QCM4290 (Status: affected)
- QCM6125 (Status: affected)
- QCM6490 (Status: affected)
- QCN5021 (Status: affected)
- QCN5022 (Status: affected)
- QCN5024 (Status: affected)
- QCN5052 (Status: affected)
- QCN5054 (Status: affected)
- QCN5122 (Status: affected)
- QCN5124 (Status: affected)
- QCN5152 (Status: affected)
- QCN5154 (Status: affected)
- QCN5164 (Status: affected)
- QCN6023 (Status: affected)
- QCN6024 (Status: affected)
- QCN6100 (Status: affected)
- QCN6102 (Status: affected)
- QCN6112 (Status: affected)
- QCN6122 (Status: affected)
- QCN6132 (Status: affected)
- QCN7605 (Status: affected)
- QCN7606 (Status: affected)
- QCN9000 (Status: affected)
- QCN9001 (Status: affected)
- QCN9002 (Status: affected)
- QCN9003 (Status: affected)
- QCN9011 (Status: affected)
- QCN9012 (Status: affected)
- QCN9022 (Status: affected)
- QCN9024 (Status: affected)
- QCN9070 (Status: affected)
- QCN9072 (Status: affected)
- QCN9074 (Status: affected)
- QCN9100 (Status: affected)
- QCN9274 (Status: affected)
- QCS2290 (Status: affected)
- QCS405 (Status: affected)
- QCS410 (Status: affected)
- QCS4290 (Status: affected)
- QCS603 (Status: affected)
- QCS605 (Status: affected)
- QCS610 (Status: affected)
- QCS6125 (Status: affected)
- QCS6490 (Status: affected)
- QCX315 (Status: affected)
- QRB5165 (Status: affected)
- QRB5165M (Status: affected)
- QRB5165N (Status: affected)
- QSM8250 (Status: affected)
- QSM8350 (Status: affected)
- SA4150P (Status: affected)
- SA4155P (Status: affected)
- SA415M (Status: affected)
- SA515M (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8295P (Status: affected)
- SC8180X+SDX55 (Status: affected)
- SD 455 (Status: affected)
- SD 636 (Status: affected)
- SD 675 (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD 8CX (Status: affected)
- SD 8cx Gen2 (Status: affected)
- SD 8cx Gen3 (Status: affected)
- SD460 (Status: affected)
- SD480 (Status: affected)
- SD660 (Status: affected)
- SD662 (Status: affected)
- SD665 (Status: affected)
- SD670 (Status: affected)
- SD675 (Status: affected)
- SD678 (Status: affected)
- SD680 (Status: affected)
- SD690 5G (Status: affected)
- SD695 (Status: affected)
- SD710 (Status: affected)
- SD712 (Status: affected)
- SD720G (Status: affected)
- SD730 (Status: affected)
- SD750G (Status: affected)
- SD765 (Status: affected)
- SD765G (Status: affected)
- SD768G (Status: affected)
- SD778G (Status: affected)
- SD780G (Status: affected)
- SD7c (Status: affected)
- SD820 (Status: affected)
- SD821 (Status: affected)
- SD835 (Status: affected)
- SD845 (Status: affected)
- SD850 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SD870 (Status: affected)
- SD888 (Status: affected)
- SD888 5G (Status: affected)
- SDM630 (Status: affected)
- SDX12 (Status: affected)
- SDX20 (Status: affected)
- SDX20M (Status: affected)
- SDX24 (Status: affected)
- SDX50M (Status: affected)
- SDX55 (Status: affected)
- SDX55M (Status: affected)
- SDX65 (Status: affected)
- SDXR1 (Status: affected)
- SDXR2 5G (Status: affected)
- SM4125 (Status: affected)
- SM4375 (Status: affected)
- SM6250 (Status: affected)
- SM6250P (Status: affected)
- SM7250P (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- SW5100 (Status: affected)
- SW5100P (Status: affected)
- SXR2150P (Status: affected)
- WCD9326 (Status: affected)
- WCD9330 (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9360 (Status: affected)
- WCD9370 (Status: affected)
- WCD9371 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3610 (Status: affected)
- WCN3615 (Status: affected)
- WCN3660B (Status: affected)
- WCN3680B (Status: affected)
- WCN3910 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WCN3991 (Status: affected)
- WCN3998 (Status: affected)
- WCN3999 (Status: affected)
- WCN6740 (Status: affected)
- WCN6750 (Status: affected)
- WCN6850 (Status: affected)
- WCN6851 (Status: affected)
- WCN6855 (Status: affected)
- WCN6856 (Status: affected)
- WCN7850 (Status: affected)
- WCN7851 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/october-2022-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-1096, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-1096 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-1096
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:45 UTC
- **Reserved Date**: December 14, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
crontab by Paul Vixie uses predictable file names for a temporary file and does not properly ensure that the file is owned by the user executing the crontab -e command, which allows local users with write access to the crontab spool directory to execute arbitrary commands by creating world-writeable temporary files and modifying them while the victim is editing the file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [vixie-cron-execute-commands(5543)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5543)
2. [20001116 vixie cron...](http://archives.neohapsis.com/archives/bugtraq/2000-11/0237.html)
3. [1960](http://www.securityfocus.com/bid/1960) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27775, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27775
- **State**: PUBLISHED
- **Published Date**: June 01, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 05:32 UTC
- **Reserved Date**: March 23, 2022 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**n/a - https://github.com/curl/curl**
Affected versions:
- curl 7.65.0 to 7.82.0 are vulnerable (Status: affected)
### References
1. [](https://hackerone.com/reports/1546268)
2. [](https://security.netapp.com/advisory/ntap-20220609-0008/)
3. [DSA-5197](https://www.debian.org/security/2022/dsa-5197)
4. [GLSA-202212-01](https://security.gentoo.org/glsa/202212-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40579
- **State**: PUBLISHED
- **Published Date**: November 14, 2024 at 00:00 UTC
- **Last Updated**: November 15, 2024 at 18:18 UTC
- **Reserved Date**: July 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting vulnerability in Virtuozzo Hybrid Server for WHMCS Open Source v.1.7.1 allows a remote attacker to obtain sensitive information via modification of the hostname parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vxcyber.com/cve-2024-40579.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45281, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45281 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45281
- **State**: PUBLISHED
- **Published Date**: September 10, 2024 at 04:32 UTC
- **Last Updated**: September 16, 2024 at 16:17 UTC
- **Reserved Date**: August 26, 2024 at 10:39 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP BusinessObjects Business Intelligence Platform allows a high privilege user to run client desktop applications even if some of the DLLs are not digitally signed or if the signature is broken. The attacker needs to have local access to the vulnerable system to perform DLL related tasks. This could result in a high impact on confidentiality and integrity of the application.
### CVSS Metrics
- **CVSS Base Score**: 5.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-426: Security Weakness
### Affected Products
**SAP_SE - SAP BusinessObjects Business Intelligence Platform**
Affected versions:
- 430 (Status: affected)
### References
1. [](https://me.sap.com/notes/3425287)
2. [](https://url.sap/sapsecuritypatchday) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43535, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43535
- **State**: PUBLISHED
- **Published Date**: February 06, 2024 at 05:47 UTC
- **Last Updated**: August 02, 2024 at 19:44 UTC
- **Reserved Date**: September 19, 2023 at 14:48 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption when negative display IDs are sent as input while processing DISPLAYESCAPE event trigger.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-129: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- FastConnect 6700 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- SC8380XP (Status: affected)
- Snapdragon 7c+ Gen 3 Compute (Status: affected)
- Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB) (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WSA8830 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16736, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16736 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16736
- **State**: PUBLISHED
- **Published Date**: January 12, 2018 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 20:35 UTC
- **Reserved Date**: November 09, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An Unrestricted Upload Of File With Dangerous Type issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows a remote attacker to upload arbitrary files.
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**n/a - Advantech WebAccess**
Affected versions:
- Advantech WebAccess (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-004-02A) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24739, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24739
- **State**: PUBLISHED
- **Published Date**: January 24, 2025 at 17:25 UTC
- **Last Updated**: January 24, 2025 at 18:28 UTC
- **Reserved Date**: January 23, 2025 at 14:52 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in FluentSMTP & WPManageNinja Team FluentSMTP allows Cross Site Request Forgery. This issue affects FluentSMTP: from n/a through 2.2.80.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**FluentSMTP & WPManageNinja Team - FluentSMTP**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/fluent-smtp/vulnerability/wordpress-fluentsmtp-plugin-2-2-80-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11509, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11509 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11509
- **State**: PUBLISHED
- **Published Date**: March 28, 2018 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 22:24 UTC
- **Reserved Date**: July 21, 2017 at 00:00 UTC
- **Assigned By**: tenable
### Vulnerability Description
An authenticated remote attacker can execute arbitrary code in Firebird SQL Server versions 2.5.7 and 3.0.2 by executing a malformed SQL statement.
### Affected Products
**Firebird Foundation - Firebird SQL Server**
Affected versions:
- 2.5.7 (Status: affected)
- 3.0.2 (Status: affected)
### References
1. [[debian-lts-announce] 20180511 [SECURITY] [DLA 1374-1] firebird2.5 security update](https://lists.debian.org/debian-lts-announce/2018/05/msg00005.html)
2. [](https://www.tenable.com/security/research/tra-2017-36)
3. [[debian-lts-announce] 20200229 [SECURITY] [DLA 2129-1] firebird2.5 security update](https://lists.debian.org/debian-lts-announce/2020/02/msg00036.html)
4. [[debian-lts-announce] 20211120 [SECURITY] [DLA 2824-1] firebird3.0 security update](https://lists.debian.org/debian-lts-announce/2021/11/msg00018.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0123, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0123 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0123
- **State**: PUBLISHED
- **Published Date**: February 02, 2023 at 22:57 UTC
- **Last Updated**: January 16, 2025 at 21:58 UTC
- **Reserved Date**: January 09, 2023 at 19:11 UTC
- **Assigned By**: icscert
### Vulnerability Description
Delta Electronics DOPSoft versions 4.00.16.22 and prior are vulnerable to a stack-based buffer overflow, which could allow an attacker to remotely execute arbitrary code when a malformed file is introduced to the software.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Delta Industrial Automation - DOPSoft**
Affected versions:
- all versions (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-23-031-01)
### Credits
- Natnael Samson (@NattiSamson), working with Trend Micro’s Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23506
- **State**: PUBLISHED
- **Published Date**: January 22, 2025 at 14:31 UTC
- **Last Updated**: January 22, 2025 at 15:11 UTC
- **Reserved Date**: January 16, 2025 at 11:25 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP IMAP Auth allows Reflected XSS. This issue affects WP IMAP Auth: from n/a through 4.0.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NotFound - WP IMAP Auth**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-imap-authentication/vulnerability/wordpress-wp-imap-auth-plugin-4-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47746, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47746 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47746
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 12:14 UTC
- **Last Updated**: May 04, 2025 at 09:38 UTC
- **Reserved Date**: September 30, 2024 at 16:00 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
fuse: use exclusive lock when FUSE_I_CACHE_IO_MODE is set
This may be a typo. The comment has said shared locks are
not allowed when this bit is set. If using shared lock, the
wait in `fuse_file_cached_io_open` may be forever.
### Affected Products
**Linux - Linux**
Affected versions:
- 205c1d8026835746d8597e1aa70c370e014e83fa (Status: affected)
- 205c1d8026835746d8597e1aa70c370e014e83fa (Status: affected)
- 205c1d8026835746d8597e1aa70c370e014e83fa (Status: affected)
**Linux - Linux**
Affected versions:
- 6.9 (Status: affected)
- 0 (Status: unaffected)
- 6.10.13 (Status: unaffected)
- 6.11.2 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/fa4890bd8237e5a1e7428acd7328729db2703b23)
2. [](https://git.kernel.org/stable/c/4e181761ffec67307157a7e8a78d58ee4130cf00)
3. [](https://git.kernel.org/stable/c/2f3d8ff457982f4055fe8f7bf19d3821ba22c376) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.