System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1606, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1606 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1606
- **State**: PUBLISHED
- **Published Date**: December 11, 2017 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 16:22 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Financial Transaction Manager (FTM) for Multi-Platform (MP) 3.0.0.0 through 3.0.0.7 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 132926.
### Affected Products
**IBM - Financial Transaction Manager**
Affected versions:
- 3.0.0.0 (Status: affected)
- 3.0.0.1 (Status: affected)
- 3.0.0.2 (Status: affected)
- 3.0.0.3 (Status: affected)
- 3.0.0.4 (Status: affected)
- 3.0.0.5 (Status: affected)
- 3.0.0.6 (Status: affected)
- 3.0.0.7 (Status: affected)
### References
1. [102049](http://www.securityfocus.com/bid/102049)
2. [](http://www.ibm.com/support/docview.wss?uid=swg22011179)
3. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/132926) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0644, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0644 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0644
- **State**: PUBLISHED
- **Published Date**: October 06, 2021 at 14:11 UTC
- **Last Updated**: August 03, 2024 at 15:47 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In conditionallyRemoveIdentifiers of SubscriptionController.java, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-181053462
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-09-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4766, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4766 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4766
- **State**: PUBLISHED
- **Published Date**: September 25, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 00:39 UTC
- **Reserved Date**: May 11, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit in Apple iOS before 10, tvOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4759, CVE-2016-4765, CVE-2016-4767, and CVE-2016-4768.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2016-09-20-3](http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html)
2. [](https://support.apple.com/HT207157)
3. [](https://support.apple.com/HT207158)
4. [93067](http://www.securityfocus.com/bid/93067)
5. [APPLE-SA-2016-09-20-6](http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html)
6. [1036854](http://www.securitytracker.com/id/1036854)
7. [](https://support.apple.com/HT207142)
8. [](https://support.apple.com/HT207143)
9. [APPLE-SA-2016-09-20-7](http://lists.apple.com/archives/security-announce/2016/Sep/msg00012.html)
10. [APPLE-SA-2016-09-20-2](http://lists.apple.com/archives/security-announce/2016/Sep/msg00007.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40542, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40542 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40542
- **State**: PUBLISHED
- **Published Date**: October 11, 2021 at 12:44 UTC
- **Last Updated**: August 04, 2024 at 02:44 UTC
- **Reserved Date**: September 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Opensis-Classic Version 8.0 is affected by cross-site scripting (XSS). An unauthenticated user can inject and execute JavaScript code through the link_url parameter in Ajax_url_encode.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/OS4ED/openSIS-Classic/issues/189) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27886, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27886 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27886
- **State**: PUBLISHED
- **Published Date**: March 01, 2021 at 23:40 UTC
- **Last Updated**: August 03, 2024 at 21:33 UTC
- **Reserved Date**: March 01, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
rakibtg Docker Dashboard before 2021-02-28 allows command injection in backend/utilities/terminal.js via shell metacharacters in the command parameter of an API request. NOTE: this is NOT a Docker, Inc. product.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/rakibtg/docker-web-gui/issues/23)
2. [](https://github.com/rakibtg/docker-web-gui/commit/79cdc41809f2030fce21a1109898bd79e4190661)
3. [](https://www.docker.com/legal/trademark-guidelines)
4. [](http://packetstormsecurity.com/files/163416/Docker-Dashboard-Remote-Command-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2982, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2982 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2982
- **State**: PUBLISHED
- **Published Date**: June 01, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 13:57 UTC
- **Reserved Date**: May 31, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in the British Telecommunications Business Connect webhelper ActiveX control before 1.0.0.7 in btbconnectwebcontrol.dll allow remote attackers to execute arbitrary code via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#210257](http://www.kb.cert.org/vuls/id/210257)
2. [24216](http://www.securityfocus.com/bid/24216)
3. [british-btwebcontrol-bo(34589)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34589)
4. [36718](http://osvdb.org/36718)
5. [25472](http://secunia.com/advisories/25472)
6. [ADV-2007-1979](http://www.vupen.com/english/advisories/2007/1979) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1493, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1493 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1493
- **State**: PUBLISHED
- **Published Date**: October 24, 2007 at 23:00 UTC
- **Last Updated**: August 08, 2024 at 02:28 UTC
- **Reserved Date**: October 24, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Memory leak in HP OpenView Network Node Manager (NNM) 6.2 and 6.4 allows remote attackers to cause a denial of service (memory exhaustion) via crafted TCP packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBUX0310-291](http://archives.neohapsis.com/archives/hp/2003-q4/0019.html)
2. [openview-nnm-packet-dos(13467)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13467)
3. [8859](http://www.securityfocus.com/bid/8859) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13549, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13549 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13549
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:07 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for NeuroToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/NeuroToken)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30819, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30819
- **State**: PUBLISHED
- **Published Date**: May 31, 2022 at 17:40 UTC
- **Last Updated**: August 03, 2024 at 07:03 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Wedding Management System v1.0, there is an arbitrary file upload vulnerability in the picture upload point of "photos_edit.php" file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/codeastro.com/wedding-management-system/RCE-3.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9263, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9263 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9263
- **State**: PUBLISHED
- **Published Date**: December 08, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 13:40 UTC
- **Reserved Date**: December 04, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in the PocketNetNVRMediaClientAxCtrl.NVRMediaViewer.1 control in 3S Pocketnet Tech VMS allow remote attackers to execute arbitrary code via a crafted string to the (1) StartRecord, (2) StartRecordEx, (3) StartScheduledRecord, (4) SetDisplayText, (5) GetONVIFDeviceInformation, (6) GetONVIFProfiles, or (7) GetONVIFStreamUri method or a crafted filename to the (8) SaveCurrentImage or (9) SaveCurrentImageEx method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-14-397/)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-14-396/)
3. [](http://www.zerodayinitiative.com/advisories/ZDI-14-395/)
4. [](http://www.zerodayinitiative.com/advisories/ZDI-14-394/)
5. [](http://www.zerodayinitiative.com/advisories/ZDI-14-393/)
6. [71488](http://www.securityfocus.com/bid/71488) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47287, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47287
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 14:34 UTC
- **Last Updated**: May 04, 2025 at 07:07 UTC
- **Reserved Date**: May 21, 2024 at 13:27 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
driver core: auxiliary bus: Fix memory leak when driver_register() fail
If driver_register() returns with error we need to free the memory
allocated for auxdrv->driver.name before returning from
__auxiliary_driver_register()
### Affected Products
**Linux - Linux**
Affected versions:
- 7de3697e9cbd4bd3d62bafa249d57990e1b8f294 (Status: affected)
- 7de3697e9cbd4bd3d62bafa249d57990e1b8f294 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.11 (Status: affected)
- 0 (Status: unaffected)
- 5.13.6 (Status: unaffected)
- 5.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409)
2. [](https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34058
- **State**: PUBLISHED
- **Published Date**: October 27, 2023 at 04:53 UTC
- **Last Updated**: March 06, 2025 at 15:40 UTC
- **Reserved Date**: May 25, 2023 at 17:21 UTC
- **Assigned By**: vmware
### Vulnerability Description
VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**n/a - VMware Tools**
Affected versions:
- 12.x.x (Status: affected)
- 11.x.x (Status: affected)
- 10.3.x (Status: affected)
**n/a - open-vm-tools**
Affected versions:
- 11.0.0 (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2023-0024.html)
2. [](http://www.openwall.com/lists/oss-security/2023/10/27/1)
3. [](https://www.debian.org/security/2023/dsa-5543)
4. [](https://lists.debian.org/debian-lts-announce/2023/11/msg00002.html)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLTKVTRKQW2GD2274H3UOW6XU4E62GSK/)
6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7G77Z76CQPGUF7VHRA6O3UFCMPPR4O2/)
7. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQUOFQL2SNNNMKROQ3TZQY4HEYMNOIBW/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11574, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11574 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11574
- **State**: PUBLISHED
- **Published Date**: June 14, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 08:10 UTC
- **Reserved Date**: May 30, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3810-1](https://usn.ubuntu.com/3810-1/)
2. [[oss-security] 20180611 Buffer Overflow in pppd EAP-TLS implementation](http://www.openwall.com/lists/oss-security/2018/06/11/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32824, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32824
- **State**: PUBLISHED
- **Published Date**: February 27, 2023 at 00:00 UTC
- **Last Updated**: March 11, 2025 at 16:21 UTC
- **Reserved Date**: June 09, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The issue was addressed with improved memory handling. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6. An app may be able to disclose kernel memory.
### Affected Products
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213340)
2. [](https://support.apple.com/en-us/HT213342)
3. [](https://support.apple.com/en-us/HT213346) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49568, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49568
- **State**: PUBLISHED
- **Published Date**: January 12, 2024 at 10:36 UTC
- **Last Updated**: August 02, 2024 at 22:01 UTC
- **Reserved Date**: November 27, 2023 at 14:21 UTC
- **Assigned By**: Bitdefender
### Vulnerability Description
A denial of service (DoS) vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in go-git clients.
Applications using only the in-memory filesystem supported by go-git are not affected by this vulnerability.
This is a go-git implementation issue and does not affect the upstream git cli.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**go-git - go-git**
Affected versions:
- 5.11.0 (Status: affected)
### References
1. [](https://github.com/go-git/go-git/security/advisories/GHSA-mw99-9chc-xw7r)
### Credits
- Ionuț Lalu |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7719, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7719
- **State**: PUBLISHED
- **Published Date**: September 01, 2020 at 09:30 UTC
- **Last Updated**: September 17, 2024 at 01:26 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
Versions of package locutus before 2.0.12 are vulnerable to prototype Pollution via the php.strings.parse_str function.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**n/a - locutus**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-LOCUTUS-598675)
2. [](https://github.com/kvz/locutus/pull/418/)
### Credits
- NerdJS |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2705, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2705 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2705
- **State**: PUBLISHED
- **Published Date**: June 16, 2008 at 18:26 UTC
- **Last Updated**: August 07, 2024 at 09:14 UTC
- **Reserved Date**: June 16, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Sun Java System Access Manager (AM) 7.1, when used with certain versions and configurations of Sun Directory Server Enterprise Edition (DSEE), allows remote attackers to bypass authentication via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [sun-jsam-unspecified-security-bypass(43004)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43004)
2. [30652](http://secunia.com/advisories/30652)
3. [238416](http://sunsolve.sun.com/search/document.do?assetkey=1-26-238416-1)
4. [29676](http://www.securityfocus.com/bid/29676)
5. [1020273](http://www.securitytracker.com/id?1020273)
6. [ADV-2008-1806](http://www.vupen.com/english/advisories/2008/1806) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31868, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31868 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31868
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 14:52 UTC
- **Last Updated**: April 01, 2025 at 15:47 UTC
- **Reserved Date**: April 01, 2025 at 13:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in JoomSky JS Job Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JS Job Manager: from n/a through 2.0.2.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**JoomSky - JS Job Manager**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/js-jobs/vulnerability/wordpress-js-job-manager-plugin-2-0-2-broken-access-control-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37014, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37014 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37014
- **State**: PUBLISHED
- **Published Date**: June 10, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 03:43 UTC
- **Reserved Date**: May 30, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/langflow-ai/langflow/issues/1973) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0611, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0611 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0611
- **State**: PUBLISHED
- **Published Date**: February 15, 2022 at 23:30 UTC
- **Last Updated**: August 02, 2024 at 23:32 UTC
- **Reserved Date**: February 14, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Missing Authorization in Packagist snipe/snipe-it prior to 5.3.11.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**snipe - snipe/snipe-it**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/7b7447fc-f1b0-446c-b016-ee3f6511010b)
2. [](https://github.com/snipe/snipe-it/commit/321be4733d3997fc738f0118e1b9af5905f95439) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4733, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4733 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4733
- **State**: PUBLISHED
- **Published Date**: July 16, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 06:25 UTC
- **Reserved Date**: June 24, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2015:1243](http://rhn.redhat.com/errata/RHSA-2015-1243.html)
2. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html)
3. [RHSA-2015:1229](http://rhn.redhat.com/errata/RHSA-2015-1229.html)
4. [1032910](http://www.securitytracker.com/id/1032910)
5. [USN-2706-1](http://www.ubuntu.com/usn/USN-2706-1)
6. [RHSA-2015:1526](http://rhn.redhat.com/errata/RHSA-2015-1526.html)
7. [RHSA-2015:1485](http://rhn.redhat.com/errata/RHSA-2015-1485.html)
8. [RHSA-2015:1544](http://rhn.redhat.com/errata/RHSA-2015-1544.html)
9. [openSUSE-SU-2015:1289](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html)
10. [RHSA-2015:1228](http://rhn.redhat.com/errata/RHSA-2015-1228.html)
11. [DSA-3316](http://www.debian.org/security/2015/dsa-3316)
12. [GLSA-201603-11](https://security.gentoo.org/glsa/201603-11)
13. [75832](http://www.securityfocus.com/bid/75832)
14. [RHSA-2015:1486](http://rhn.redhat.com/errata/RHSA-2015-1486.html)
15. [GLSA-201603-14](https://security.gentoo.org/glsa/201603-14)
16. [USN-2696-1](http://www.ubuntu.com/usn/USN-2696-1)
17. [DSA-3339](http://www.debian.org/security/2015/dsa-3339)
18. [RHSA-2015:1242](http://rhn.redhat.com/errata/RHSA-2015-1242.html)
19. [RHSA-2015:1488](http://rhn.redhat.com/errata/RHSA-2015-1488.html)
20. [SUSE-SU-2015:1319](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html)
21. [SUSE-SU-2015:1320](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html)
22. [openSUSE-SU-2015:1288](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html)
23. [RHSA-2015:1241](http://rhn.redhat.com/errata/RHSA-2015-1241.html)
24. [RHSA-2015:1230](http://rhn.redhat.com/errata/RHSA-2015-1230.html)
25. [RHSA-2015:1604](http://rhn.redhat.com/errata/RHSA-2015-1604.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47924, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47924
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 13:41 UTC
- **Last Updated**: February 19, 2025 at 16:25 UTC
- **Reserved Date**: December 22, 2022 at 04:58 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
An high privileged attacker may pass crafted arguments to the validate function of csaf-validator-lib of a locally installed Secvisogram in versions < 0.1.0 wich can result in arbitrary code execution and DoS once the users triggers the validation.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Secvisogram - csaf-validator-lib**
Affected versions:
- 0.0.0 (Status: affected)
### References
1. [](https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.json)
### Credits
- Damian Pfammatter from Cyber-Defense Campus |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5771, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5771 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5771
- **State**: PUBLISHED
- **Published Date**: November 06, 2023 at 20:06 UTC
- **Last Updated**: September 04, 2024 at 18:55 UTC
- **Reserved Date**: October 25, 2023 at 17:57 UTC
- **Assigned By**: Proofpoint
### Vulnerability Description
Proofpoint Enterprise Protection contains a stored XSS vulnerability in the AdminUI. An unauthenticated attacker can send a specially crafted email with HTML in the subject which triggers XSS when viewing quarantined messages. This issue affects Proofpoint Enterprise Protection: from 8.20.0 before patch 4796, from 8.18.6 before patch 4795 and all other prior versions.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Proofpoint - Proofpoint Enterprise Protection**
Affected versions:
- 8.20.0 (Status: affected)
- 8.18.6 (Status: affected)
- 8.0 (Status: affected)
### References
1. [](https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0010) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26354, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26354
- **State**: PUBLISHED
- **Published Date**: February 12, 2025 at 13:28 UTC
- **Last Updated**: February 17, 2025 at 10:08 UTC
- **Reserved Date**: February 07, 2025 at 09:03 UTC
- **Assigned By**: Nozomi
### Vulnerability Description
A CWE-35 "Path Traversal" in maxtime/api/database/database.lua (copy endpoint) in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to overwrite sensitive files via crafted HTTP requests.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-35: Security Weakness
### Affected Products
**Q-Free - MaxTime**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26354)
### Credits
- Diego Giubertoni of Nozomi Networks found this bug during a security research activity.
- Q-Free |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1653, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1653
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: January 23, 2014 at 00:00 UTC
- **Assigned By**: symantec
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41158, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41158
- **State**: PUBLISHED
- **Published Date**: September 13, 2023 at 00:00 UTC
- **Last Updated**: September 25, 2024 at 20:36 UTC
- **Reserved Date**: August 24, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://webmin.com/tags/webmin-changelog/)
2. [](https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41158) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42114, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42114 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42114
- **State**: PUBLISHED
- **Published Date**: July 30, 2024 at 07:46 UTC
- **Last Updated**: May 04, 2025 at 09:23 UTC
- **Reserved Date**: July 29, 2024 at 15:50 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
syzbot is able to trigger softlockups, setting NL80211_ATTR_TXQ_QUANTUM
to 2^31.
We had a similar issue in sch_fq, fixed with commit
d9e15a273306 ("pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM")
watchdog: BUG: soft lockup - CPU#1 stuck for 26s! [kworker/1:0:24]
Modules linked in:
irq event stamp: 131135
hardirqs last enabled at (131134): [<ffff80008ae8778c>] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:85 [inline]
hardirqs last enabled at (131134): [<ffff80008ae8778c>] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:95
hardirqs last disabled at (131135): [<ffff80008ae85378>] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]
hardirqs last disabled at (131135): [<ffff80008ae85378>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551
softirqs last enabled at (125892): [<ffff80008907e82c>] neigh_hh_init net/core/neighbour.c:1538 [inline]
softirqs last enabled at (125892): [<ffff80008907e82c>] neigh_resolve_output+0x268/0x658 net/core/neighbour.c:1553
softirqs last disabled at (125896): [<ffff80008904166c>] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19
CPU: 1 PID: 24 Comm: kworker/1:0 Not tainted 6.9.0-rc7-syzkaller-gfda5695d692c #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Workqueue: mld mld_ifc_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __list_del include/linux/list.h:195 [inline]
pc : __list_del_entry include/linux/list.h:218 [inline]
pc : list_move_tail include/linux/list.h:310 [inline]
pc : fq_tin_dequeue include/net/fq_impl.h:112 [inline]
pc : ieee80211_tx_dequeue+0x6b8/0x3b4c net/mac80211/tx.c:3854
lr : __list_del_entry include/linux/list.h:218 [inline]
lr : list_move_tail include/linux/list.h:310 [inline]
lr : fq_tin_dequeue include/net/fq_impl.h:112 [inline]
lr : ieee80211_tx_dequeue+0x67c/0x3b4c net/mac80211/tx.c:3854
sp : ffff800093d36700
x29: ffff800093d36a60 x28: ffff800093d36960 x27: dfff800000000000
x26: ffff0000d800ad50 x25: ffff0000d800abe0 x24: ffff0000d800abf0
x23: ffff0000e0032468 x22: ffff0000e00324d4 x21: ffff0000d800abf0
x20: ffff0000d800abf8 x19: ffff0000d800abf0 x18: ffff800093d363c0
x17: 000000000000d476 x16: ffff8000805519dc x15: ffff7000127a6cc8
x14: 1ffff000127a6cc8 x13: 0000000000000004 x12: ffffffffffffffff
x11: ffff7000127a6cc8 x10: 0000000000ff0100 x9 : 0000000000000000
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
x5 : ffff80009287aa08 x4 : 0000000000000008 x3 : ffff80008034c7fc
x2 : ffff0000e0032468 x1 : 00000000da0e46b8 x0 : ffff0000e0032470
Call trace:
__list_del include/linux/list.h:195 [inline]
__list_del_entry include/linux/list.h:218 [inline]
list_move_tail include/linux/list.h:310 [inline]
fq_tin_dequeue include/net/fq_impl.h:112 [inline]
ieee80211_tx_dequeue+0x6b8/0x3b4c net/mac80211/tx.c:3854
wake_tx_push_queue net/mac80211/util.c:294 [inline]
ieee80211_handle_wake_tx_queue+0x118/0x274 net/mac80211/util.c:315
drv_wake_tx_queue net/mac80211/driver-ops.h:1350 [inline]
schedule_and_wake_txq net/mac80211/driver-ops.h:1357 [inline]
ieee80211_queue_skb+0x18e8/0x2244 net/mac80211/tx.c:1664
ieee80211_tx+0x260/0x400 net/mac80211/tx.c:1966
ieee80211_xmit+0x278/0x354 net/mac80211/tx.c:2062
__ieee80211_subif_start_xmit+0xab8/0x122c net/mac80211/tx.c:4338
ieee80211_subif_start_xmit+0xe0/0x438 net/mac80211/tx.c:4532
__netdev_start_xmit include/linux/netdevice.h:4903 [inline]
netdev_start_xmit include/linux/netdevice.h:4917 [inline]
xmit_one net/core/dev.c:3531 [inline]
dev_hard_start_xmit+0x27c/0x938 net/core/dev.c:3547
__dev_queue_xmit+0x1678/0x33fc net/core/dev.c:4341
dev_queue_xmit include/linux/netdevice.h:3091 [inline]
neigh_resolve_output+0x558/0x658 net/core/neighbour.c:1563
neigh_output include/net/neighbour.h:542 [inline]
ip6_fini
---truncated---
### Affected Products
**Linux - Linux**
Affected versions:
- 52539ca89f365d3db530535fbffa88a3cca4d2ec (Status: affected)
- 52539ca89f365d3db530535fbffa88a3cca4d2ec (Status: affected)
- 52539ca89f365d3db530535fbffa88a3cca4d2ec (Status: affected)
- 52539ca89f365d3db530535fbffa88a3cca4d2ec (Status: affected)
- 52539ca89f365d3db530535fbffa88a3cca4d2ec (Status: affected)
- 52539ca89f365d3db530535fbffa88a3cca4d2ec (Status: affected)
**Linux - Linux**
Affected versions:
- 4.18 (Status: affected)
- 0 (Status: unaffected)
- 5.10.224 (Status: unaffected)
- 5.15.165 (Status: unaffected)
- 6.1.106 (Status: unaffected)
- 6.6.47 (Status: unaffected)
- 6.9.9 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/80ac0cc9c0bef984e29637b1efa93d7214b42f53)
2. [](https://git.kernel.org/stable/c/33ac5a4eb3d4bea2146658f1b6d1fa86d62d2b22)
3. [](https://git.kernel.org/stable/c/3fc06f6d142d2840735543216a60d0a8c345bdec)
4. [](https://git.kernel.org/stable/c/8a3ac7fb36962c34698f884bd697938054ff2afa)
5. [](https://git.kernel.org/stable/c/e87c2f098f52aa2fe20258a5bb1738d6a74e9ed7)
6. [](https://git.kernel.org/stable/c/d1cba2ea8121e7fdbe1328cea782876b1dd80993) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25318, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25318
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 04:36 UTC
- **Reserved Date**: February 18, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Cerebrate through 1.4. An incorrect sharing group ACL allowed an unprivileged user to edit and modify sharing groups.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cerebrate-project/cerebrate/commit/15190b930ebada9e8d294db57c96832799d9d93e)
2. [](https://zigrin.com/advisories/cerebrate-an-incorrect-sharing-group-acl/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0089, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0089 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0089
- **State**: PUBLISHED
- **Published Date**: March 08, 2023 at 00:27 UTC
- **Last Updated**: February 28, 2025 at 16:36 UTC
- **Reserved Date**: January 05, 2023 at 19:17 UTC
- **Assigned By**: Proofpoint
### Vulnerability Description
The webutils in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows an authenticated user to execute remote code through 'eval injection'.
This affects all versions 8.20.0 and below.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-95: Security Weakness
### Affected Products
**proofpoint - enterprise_protection**
Affected versions:
- 8.* (Status: affected)
### References
1. [](https://www.proofpoint.com/security/security-advisories/pfpt-sa-2023-0001)
### Credits
- ly1g3 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39390
- **State**: PUBLISHED
- **Published Date**: August 13, 2023 at 12:24 UTC
- **Last Updated**: October 10, 2024 at 14:00 UTC
- **Reserved Date**: July 31, 2023 at 04:41 UTC
- **Assigned By**: huawei
### Vulnerability Description
Vulnerability of input parameter verification in certain APIs in the window management module. Successful exploitation of this vulnerability may cause the device to restart.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 13.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2023/8/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40129
- **State**: PUBLISHED
- **Published Date**: July 16, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 04:33 UTC
- **Reserved Date**: July 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Open5GS v2.6.4 is vulnerable to Buffer Overflow. via /lib/pfcp/context.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/open5gs/open5gs/issues/2585)
2. [](https://github.com/open5gs/open5gs/commit/2fbc445d32aa7749166396a9c055a199f90a1b01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21491, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21491
- **State**: PUBLISHED
- **Published Date**: January 21, 2025 at 20:52 UTC
- **Last Updated**: January 23, 2025 at 19:18 UTC
- **Reserved Date**: December 24, 2024 at 23:18 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- * (Status: affected)
- * (Status: affected)
- * (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2025.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6196, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6196 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6196
- **State**: PUBLISHED
- **Published Date**: November 26, 2014 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 12:10 UTC
- **Reserved Date**: September 02, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in IBM Web Experience Factory (WEF) 6.1.5 through 8.5.0.1, as used in WebSphere Dashboard Framework (WDF) and Lotus Widget Factory (LWF), allows remote attackers to inject arbitrary web script or HTML by leveraging a Dojo builder error in an unspecified WebSphere Portal configuration, leading to improper construction of a response page by an application.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [LO82674](http://www-01.ibm.com/support/docview.wss?uid=swg1LO82674)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21690018)
3. [LO82675](http://www-01.ibm.com/support/docview.wss?uid=swg1LO82675)
4. [ibm-wef-cve20146196-xss(98608)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98608)
5. [LO82672](http://www-01.ibm.com/support/docview.wss?uid=swg1LO82672)
6. [LO82676](http://www-01.ibm.com/support/docview.wss?uid=swg1LO82676)
7. [59546](http://secunia.com/advisories/59546)
8. [LO82673](http://www-01.ibm.com/support/docview.wss?uid=swg1LO82673) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45919, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45919
- **State**: PUBLISHED
- **Published Date**: November 27, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 14:24 UTC
- **Reserved Date**: November 27, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://lore.kernel.org/linux-media/20221121063308.GA33821%40ubuntu/T/#u)
2. [](https://security.netapp.com/advisory/ntap-20230113-0008/)
3. [](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=280a8ab81733da8bc442253c700a52c4c0886ffd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24369, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24369 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24369
- **State**: PUBLISHED
- **Published Date**: January 27, 2025 at 22:57 UTC
- **Last Updated**: January 28, 2025 at 15:18 UTC
- **Reserved Date**: January 20, 2025 at 15:18 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Anubis is a tool that allows administrators to protect bots against AI scrapers through bot-checking heuristics and a proof-of-work challenge to discourage scraping from multiple IP addresses. Anubis allows attackers to bypass the bot protection by requesting a challenge, formulates any nonce (such as 42069), and then passes the challenge with difficulty zero. Commit e09d0226a628f04b1d80fd83bee777894a45cd02 fixes this behavior by not using a client-specified difficulty value.
### Weakness Classification (CWE)
- CWE-807: Security Weakness
### Affected Products
**Xe - x**
Affected versions:
- < v1.11.0-37-gd98d70a (Status: affected)
### References
1. [https://github.com/Xe/x/security/advisories/GHSA-56w8-8ppj-2p4f](https://github.com/Xe/x/security/advisories/GHSA-56w8-8ppj-2p4f)
2. [https://github.com/Xe/x/commit/7bd7b209f4f1b897de85ec8973458dc8be606a8b](https://github.com/Xe/x/commit/7bd7b209f4f1b897de85ec8973458dc8be606a8b)
3. [https://github.com/Xe/x/commit/e09d0226a628f04b1d80fd83bee777894a45cd02](https://github.com/Xe/x/commit/e09d0226a628f04b1d80fd83bee777894a45cd02)
4. [https://xeiaso.net/notes/2025/GHSA-56w8-8ppj-2p4f](https://xeiaso.net/notes/2025/GHSA-56w8-8ppj-2p4f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16366
- **State**: PUBLISHED
- **Published Date**: December 09, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 20:27 UTC
- **Reserved Date**: November 01, 2017 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability is an instance of a security bypass vulnerability in the AcroPDF plugin.
### Affected Products
**n/a - Adobe Acrobat Reader 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, 11.0.22 and earlier versions**
Affected versions:
- Adobe Acrobat Reader 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, 11.0.22 and earlier versions (Status: affected)
### References
1. [1039791](http://www.securitytracker.com/id/1039791)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb17-36.html)
3. [101830](http://www.securityfocus.com/bid/101830) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47647
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 14:20 UTC
- **Last Updated**: May 07, 2025 at 18:11 UTC
- **Reserved Date**: May 07, 2025 at 10:45 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in OTWthemes Sidebar Manager Light allows Cross Site Request Forgery. This issue affects Sidebar Manager Light: from n/a through 1.18.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**OTWthemes - Sidebar Manager Light**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/sidebar-manager-light/vulnerability/wordpress-sidebar-manager-light-1-18-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Nguyen Thi Huyen Trang - Skalucy (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4798, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4798 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4798
- **State**: PUBLISHED
- **Published Date**: May 09, 2006 at 20:00 UTC
- **Last Updated**: August 08, 2024 at 00:01 UTC
- **Reserved Date**: May 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-1183](http://www.debian.org/security/2006/dsa-1183)
2. [oval:org.mitre.oval:def:11536](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11536)
3. [22082](http://secunia.com/advisories/22082)
4. [SUSE-SA:2006:028](http://www.novell.com/linux/security/advisories/2006-05-31.html)
5. [20186](http://www.securityfocus.com/bid/20186)
6. [](http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b)
7. [[linux-kernel] 20050912 [PATCH] nfs client, kernel 2.4.31: readlink result overflow](http://www.ussg.iu.edu/hypermail/linux/kernel/0509.1/1333.html)
8. [20398](http://secunia.com/advisories/20398)
9. [](http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commitdiff%3Bh=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b)
10. [22093](http://secunia.com/advisories/22093)
11. [DSA-1184](http://www.debian.org/security/2006/dsa-1184) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4395, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4395 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4395
- **State**: PUBLISHED
- **Published Date**: December 14, 2010 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 03:43 UTC
- **Reserved Date**: December 02, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and Linux RealPlayer 11.0.2.1744 allows remote attackers to execute arbitrary code via a crafted conditional component in AAC frame data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [69854](http://osvdb.org/69854)
2. [1024861](http://www.securitytracker.com/id?1024861)
3. [](http://www.zerodayinitiative.com/advisories/ZDI-10-267)
4. [](http://service.real.com/realplayer/security/12102010_player/en/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23407, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23407
- **State**: REJECTED
- **Last Updated**: January 01, 2025 at 00:00 UTC
- **Reserved Date**: January 16, 2024 at 17:32 UTC
- **Assigned By**: atlassian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1060, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1060
- **State**: PUBLISHED
- **Published Date**: April 12, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:35 UTC
- **Reserved Date**: April 12, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in the TCP/IP functionality (TCPIP.NLM) in Novell Netware 6.x allows remote attackers to cause a denial of service (ABEND by Page Fault Processor Exception) via certain packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.novell.com/cgi-bin/search/searchtid.cgi?/2970467.htm)
2. [14874](http://secunia.com/advisories/14874)
3. [novell-netware-tcpipnlm-dos(20024)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20024)
4. [13067](http://www.securityfocus.com/bid/13067) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3450, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3450
- **State**: PUBLISHED
- **Published Date**: January 28, 2011 at 21:13 UTC
- **Last Updated**: August 07, 2024 at 03:11 UTC
- **Reserved Date**: September 17, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple directory traversal vulnerabilities in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allow remote attackers to overwrite arbitrary files via a .. (dot dot) in an entry in (1) an XSLT JAR filter description file, (2) an Extension (aka OXT) file, or unspecified other (3) JAR or (4) ZIP files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [40775](http://secunia.com/advisories/40775)
2. [70711](http://osvdb.org/70711)
3. [46031](http://www.securityfocus.com/bid/46031)
4. [DSA-2151](http://www.debian.org/security/2011/dsa-2151)
5. [60799](http://secunia.com/advisories/60799)
6. [](http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html)
7. [GLSA-201408-19](http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml)
8. [43118](http://secunia.com/advisories/43118)
9. [43065](http://secunia.com/advisories/43065)
10. [ADV-2011-0230](http://www.vupen.com/english/advisories/2011/0230)
11. [1025002](http://www.securitytracker.com/id?1025002)
12. [ADV-2011-0232](http://www.vupen.com/english/advisories/2011/0232)
13. [RHSA-2011:0182](http://www.redhat.com/support/errata/RHSA-2011-0182.html)
14. [USN-1056-1](http://ubuntu.com/usn/usn-1056-1)
15. [RHSA-2011:0181](http://www.redhat.com/support/errata/RHSA-2011-0181.html)
16. [ADV-2011-0279](http://www.vupen.com/english/advisories/2011/0279)
17. [](http://www.openoffice.org/security/cves/CVE-2010-3450.html)
18. [43105](http://secunia.com/advisories/43105)
19. [MDVSA-2011:027](http://www.mandriva.com/security/advisories?name=MDVSA-2011:027)
20. [](https://bugzilla.redhat.com/show_bug.cgi?id=602324)
21. [42999](http://secunia.com/advisories/42999) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0941, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0941 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0941
- **State**: PUBLISHED
- **Published Date**: May 01, 2014 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 09:34 UTC
- **Reserved Date**: January 06, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in webtop/eventviewer/eventViewer.jsp in the Web GUI in IBM Netcool/OMNIbus 7.4.0 before FP2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2014-0942.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21671686)
2. [ibm-netcoolomnibus-cve20140941-xss(92400)](https://exchange.xforce.ibmcloud.com/vulnerabilities/92400) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29461, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29461
- **State**: PUBLISHED
- **Published Date**: April 20, 2021 at 19:45 UTC
- **Last Updated**: August 03, 2024 at 22:02 UTC
- **Reserved Date**: March 30, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Discord Recon Server is a bot that allows one to do one's reconnaissance process from one's Discord. A vulnerability in Discord Recon Server prior to 0.0.3 could be exploited to read internal files from the system and write files into the system resulting in remote code execution. This issue has been fixed in version 0.0.3. As a workaround, one may copy the code from `assets/CommandInjection.py` in the Discord Recon Server code repository and overwrite vulnerable code from one's own Discord Recon Server implementation with code that contains the patch.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**DEMON1A - Discord-Recon**
Affected versions:
- < 0.0.3 (Status: affected)
### References
1. [](https://github.com/DEMON1A/Discord-Recon/security/advisories/GHSA-3m9v-v33c-g83x) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4863, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4863 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4863
- **State**: PUBLISHED
- **Published Date**: September 12, 2023 at 14:24 UTC
- **Last Updated**: February 13, 2025 at 17:18 UTC
- **Reserved Date**: September 09, 2023 at 01:02 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
### Affected Products
**Google - Chrome**
Affected versions:
- 116.0.5845.187 (Status: affected)
**Google - libwebp**
Affected versions:
- 1.3.2 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html)
2. [](https://crbug.com/1479274)
3. [](https://en.bandisoft.com/honeyview/history/)
4. [](https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/)
5. [](https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/)
6. [](https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a)
7. [](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863)
8. [](https://security-tracker.debian.org/tracker/CVE-2023-4863)
9. [](https://bugzilla.suse.com/show_bug.cgi?id=1215231)
10. [](https://news.ycombinator.com/item?id=37478403)
11. [](https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/)
12. [](https://www.debian.org/security/2023/dsa-5496)
13. [](https://www.debian.org/security/2023/dsa-5497)
14. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/)
15. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/)
16. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/)
17. [](https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html)
18. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/)
19. [](https://www.debian.org/security/2023/dsa-5498)
20. [](https://security.gentoo.org/glsa/202309-05)
21. [](https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html)
22. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/)
23. [](https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/)
24. [](https://github.com/webmproject/libwebp/releases/tag/v1.3.2)
25. [](https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html)
26. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/)
27. [](http://www.openwall.com/lists/oss-security/2023/09/21/4)
28. [](https://blog.isosceles.com/the-webp-0day/)
29. [](http://www.openwall.com/lists/oss-security/2023/09/22/1)
30. [](http://www.openwall.com/lists/oss-security/2023/09/22/3)
31. [](http://www.openwall.com/lists/oss-security/2023/09/22/4)
32. [](http://www.openwall.com/lists/oss-security/2023/09/22/5)
33. [](http://www.openwall.com/lists/oss-security/2023/09/22/8)
34. [](http://www.openwall.com/lists/oss-security/2023/09/22/7)
35. [](http://www.openwall.com/lists/oss-security/2023/09/22/6)
36. [](http://www.openwall.com/lists/oss-security/2023/09/26/1)
37. [](http://www.openwall.com/lists/oss-security/2023/09/26/7)
38. [](http://www.openwall.com/lists/oss-security/2023/09/28/1)
39. [](http://www.openwall.com/lists/oss-security/2023/09/28/2)
40. [](http://www.openwall.com/lists/oss-security/2023/09/28/4)
41. [](https://security.netapp.com/advisory/ntap-20230929-0011/)
42. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/)
43. [](https://sethmlarson.dev/security-developer-in-residence-weekly-report-16)
44. [](https://www.bentley.com/advisories/be-2023-0001/)
45. [](https://security.gentoo.org/glsa/202401-10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5821, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5821
- **State**: PUBLISHED
- **Published Date**: September 18, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 06:59 UTC
- **Reserved Date**: August 06, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT205221)
2. [1033609](http://www.securitytracker.com/id/1033609)
3. [](https://support.apple.com/HT205212)
4. [76766](http://www.securityfocus.com/bid/76766)
5. [](https://support.apple.com/HT205265)
6. [APPLE-SA-2015-09-16-3](http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html)
7. [APPLE-SA-2015-09-30-2](http://lists.apple.com/archives/security-announce/2015/Sep/msg00007.html)
8. [APPLE-SA-2015-09-16-1](http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1903, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1903 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1903
- **State**: PUBLISHED
- **Published Date**: June 27, 2022 at 08:58 UTC
- **Last Updated**: August 03, 2024 at 00:17 UTC
- **Reserved Date**: May 27, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The ARMember WordPress plugin before 3.4.8 is vulnerable to account takeover (even the administrator) due to missing nonce and authorization checks in an AJAX action available to unauthenticated users, allowing them to change the password of arbitrary users by knowing their username
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Unknown - ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup**
Affected versions:
- 3.4.8 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/28d26aa6-a8db-4c20-9ec7-39821c606a08)
### Credits
- cydave |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22476
- **State**: PUBLISHED
- **Published Date**: February 23, 2023 at 19:00 UTC
- **Last Updated**: March 10, 2025 at 21:06 UTC
- **Reserved Date**: December 29, 2022 at 17:41 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Mantis Bug Tracker (MantisBT) is an open source issue tracker. In versions prior to 2.25.6, due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can access to the _Summary_ field of private Issues (i.e. having Private view status, or belonging to a private Project) via a crafted `bug_arr[]` parameter in *bug_actiongroup_ext.php*. This issue is fixed in version 2.25.6. There are no workarounds.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**mantisbt - mantisbt**
Affected versions:
- < 2.25.6 (Status: affected)
### References
1. [https://github.com/mantisbt/mantisbt/security/advisories/GHSA-hf4x-6h87-hm79](https://github.com/mantisbt/mantisbt/security/advisories/GHSA-hf4x-6h87-hm79)
2. [https://www.mantisbt.org/bugs/view.php?id=31086](https://www.mantisbt.org/bugs/view.php?id=31086) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25649, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25649
- **State**: PUBLISHED
- **Published Date**: August 25, 2023 at 09:37 UTC
- **Last Updated**: October 02, 2024 at 15:09 UTC
- **Reserved Date**: February 09, 2023 at 19:47 UTC
- **Assigned By**: zte
### Vulnerability Description
There is a command injection vulnerability in a mobile internet product of ZTE. Due to insufficient validation of SET_DEVICE_LED interface parameter, an authenticated attacker could use the vulnerability to execute arbitrary commands.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**ZTE - MF286R**
Affected versions:
- CR_LVWRGBMF286RV1.0.0B04 (Status: affected)
### References
1. [](https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032544) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31952, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31952 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31952
- **State**: PUBLISHED
- **Published Date**: June 08, 2021 at 22:46 UTC
- **Last Updated**: August 03, 2024 at 23:10 UTC
- **Reserved Date**: April 30, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31952) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1197, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1197
- **State**: PUBLISHED
- **Published Date**: June 23, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 01:14 UTC
- **Reserved Date**: March 30, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, does not properly handle situations in which both "Content-Disposition: attachment" and "Content-Type: multipart" are present in HTTP headers, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an uploaded HTML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [40481](http://secunia.com/advisories/40481)
2. [USN-930-1](http://ubuntu.com/usn/usn-930-1)
3. [oval:org.mitre.oval:def:14186](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14186)
4. [FEDORA-2010-10361](http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.html)
5. [1024138](http://www.securitytracker.com/id?1024138)
6. [ADV-2010-1640](http://www.vupen.com/english/advisories/2010/1640)
7. [oval:org.mitre.oval:def:10168](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10168)
8. [41050](http://www.securityfocus.com/bid/41050)
9. [RHSA-2010:0501](http://www.redhat.com/support/errata/RHSA-2010-0501.html)
10. [ADV-2010-1557](http://www.vupen.com/english/advisories/2010/1557)
11. [MDVSA-2010:125](http://www.mandriva.com/security/advisories?name=MDVSA-2010:125)
12. [ADV-2010-1773](http://www.vupen.com/english/advisories/2010/1773)
13. [](https://bugzilla.mozilla.org/show_bug.cgi?id=537120)
14. [RHSA-2010:0499](http://www.redhat.com/support/errata/RHSA-2010-0499.html)
15. [ADV-2010-1556](http://www.vupen.com/english/advisories/2010/1556)
16. [ADV-2010-1592](http://www.vupen.com/english/advisories/2010/1592)
17. [USN-930-2](http://www.ubuntu.com/usn/usn-930-2)
18. [41103](http://www.securityfocus.com/bid/41103)
19. [ADV-2010-1551](http://www.vupen.com/english/advisories/2010/1551)
20. [RHSA-2010:0500](http://www.redhat.com/support/errata/RHSA-2010-0500.html)
21. [SUSE-SA:2010:030](http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html)
22. [40401](http://secunia.com/advisories/40401)
23. [FEDORA-2010-10344](http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html)
24. [firefox-contentdisposition-security-bypass(59667)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59667)
25. [40326](http://secunia.com/advisories/40326)
26. [](http://www.mozilla.org/security/announce/2010/mfsa2010-32.html)
27. [](http://support.avaya.com/css/P8/documents/100091069) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39909, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39909
- **State**: PUBLISHED
- **Published Date**: July 12, 2024 at 14:34 UTC
- **Last Updated**: August 02, 2024 at 04:33 UTC
- **Reserved Date**: July 02, 2024 at 19:37 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and filesystems. A time/boolean SQL Injection is present in the following resource `/api/applicationResources` via the following parameter `packageID`. As it can be seen in backend/pkg/database/id_view.go, while building the SQL Query the `fmt.Sprintf` function is used to build the query string without the input having first been subjected to any validation. This vulnerability is fixed in 2.23.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**openclarity - kubeclarity**
Affected versions:
- < 2.23.1 (Status: affected)
### References
1. [https://github.com/openclarity/kubeclarity/security/advisories/GHSA-5248-h45p-9pgw](https://github.com/openclarity/kubeclarity/security/advisories/GHSA-5248-h45p-9pgw)
2. [https://github.com/openclarity/kubeclarity/commit/1d1178840703a72d9082b7fc4aea0a3326c5d294](https://github.com/openclarity/kubeclarity/commit/1d1178840703a72d9082b7fc4aea0a3326c5d294)
3. [https://github.com/openclarity/kubeclarity/blob/main/backend/pkg/database/id_view.go#L79](https://github.com/openclarity/kubeclarity/blob/main/backend/pkg/database/id_view.go#L79) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41409, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41409
- **State**: PUBLISHED
- **Published Date**: July 18, 2023 at 00:00 UTC
- **Last Updated**: October 28, 2024 at 18:22 UTC
- **Reserved Date**: September 26, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/PCRE2Project/pcre2/issues/141)
2. [](https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d9450768aa15d04c25547a35) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19415, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19415 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19415
- **State**: PUBLISHED
- **Published Date**: July 08, 2020 at 16:58 UTC
- **Last Updated**: August 05, 2024 at 02:16 UTC
- **Reserved Date**: November 29, 2019 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
### Affected Products
**Huawei - AR120-S**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 V200R008C30 (Status: affected)
**Huawei - AR1200**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 V200R008C30 (Status: affected)
**Huawei - AR1200-S**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei - AR150**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C01 (Status: affected)
- V200R007C02 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei - AR150-S**
Affected versions:
- V200R006C10SPC300 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei - AR160**
Affected versions:
- V200R006C10 (Status: affected)
- V200R006C12 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C01 (Status: affected)
- V200R007C02 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei - AR200**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C01 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei - AR200-S**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei - AR2200**
Affected versions:
- V200R006C10 (Status: affected)
- V200R006C13 (Status: affected)
- V200R006C16PWE (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C01 (Status: affected)
- V200R007C02 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei - AR2200-S**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei - AR3200**
Affected versions:
- V200R006C10 (Status: affected)
- V200R006C11 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C01 (Status: affected)
- V200R007C02 (Status: affected)
- V200R008C00 (Status: affected)
- V200R008C10 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei - AR3600**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C01 (Status: affected)
- V200R008C20 (Status: affected)
**Huawei - AR510**
Affected versions:
- V200R006C10 (Status: affected)
- V200R006C12 (Status: affected)
- V200R006C13 (Status: affected)
- V200R006C15 (Status: affected)
- V200R006C16 (Status: affected)
- V200R006C17 (Status: affected)
- V200R007C00SPC180T (Status: affected)
- V200R007C00SPC600 (Status: affected)
- V200R007C00SPC900 (Status: affected)
- V200R007C00SPCb00 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei - DP300**
Affected versions:
- V500R002C00 (Status: affected)
**Huawei - IPS Module**
Affected versions:
- V100R001C10 (Status: affected)
- V100R001C20 (Status: affected)
- V100R001C30 (Status: affected)
- V500R001C00 (Status: affected)
- V500R001C20 (Status: affected)
- V500R001C30 (Status: affected)
- V500R001C50 (Status: affected)
**Huawei - NGFW Module**
Affected versions:
- V100R001C10 (Status: affected)
- V100R001C20 (Status: affected)
- V100R001C30 (Status: affected)
- V500R001C00 (Status: affected)
- V500R001C20 (Status: affected)
- V500R002C00 (Status: affected)
- V500R002C10 (Status: affected)
**Huawei - NIP6300**
Affected versions:
- V500R001C00 (Status: affected)
- V500R001C20 (Status: affected)
- V500R001C30 (Status: affected)
- V500R001C50 (Status: affected)
**Huawei - NIP6600**
Affected versions:
- V500R001C00 (Status: affected)
- V500R001C20 (Status: affected)
- V500R001C30 (Status: affected)
- V500R001C50 (Status: affected)
**Huawei - NIP6800**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C50 (Status: affected)
**Huawei - NetEngine16EX**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei - RSE6500**
Affected versions:
- V500R002C00 (Status: affected)
**Huawei - SMC2.0**
Affected versions:
- V100R003C00SPC200T (Status: affected)
- V100R003C00SPC300T (Status: affected)
- V100R003C00SPC301T (Status: affected)
- V100R003C10 (Status: affected)
- V100R005C00SPC100 (Status: affected)
- V100R005C00SPC101B001T (Status: affected)
- V100R005C00SPC102 (Status: affected)
- V100R005C00SPC103 (Status: affected)
- V100R005C00SPC200 (Status: affected)
- V100R005C00SPC201T (Status: affected)
- V500R002C00 (Status: affected)
- V600R006C00 (Status: affected)
**Huawei - SRG1300**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C02 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei - SRG2300**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R007C02 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei - SRG3300**
Affected versions:
- V200R006C10 (Status: affected)
- V200R007C00 (Status: affected)
- V200R008C20 (Status: affected)
- V200R008C30 (Status: affected)
**Huawei - SVN5600**
Affected versions:
- V200R003C00 (Status: affected)
- V200R003C10 (Status: affected)
**Huawei - SVN5800**
Affected versions:
- V200R003C00 (Status: affected)
- V200R003C10 (Status: affected)
**Huawei - SVN5800-C**
Affected versions:
- V200R003C00 (Status: affected)
- V200R003C10 (Status: affected)
**Huawei - SeMG9811**
Affected versions:
- V300R001C01SPC500 (Status: affected)
- V300R001C01SPC500T (Status: affected)
- V300R001C01SPC700 (Status: affected)
- V300R001C01SPCa00 (Status: affected)
**Huawei - Secospace USG6300**
Affected versions:
- V100R001C10 (Status: affected)
- V100R001C20 (Status: affected)
- V100R001C30 (Status: affected)
- V500R001C00 (Status: affected)
- V500R001C20 (Status: affected)
- V500R001C30 (Status: affected)
- V500R001C50 (Status: affected)
**Huawei - Secospace USG6500**
Affected versions:
- V100R001C10 (Status: affected)
- V100R001C20 (Status: affected)
- V100R001C30 (Status: affected)
- V500R001C00 (Status: affected)
- V500R001C20 (Status: affected)
- V500R001C30 (Status: affected)
- V500R001C50 (Status: affected)
**Huawei - Secospace USG6600**
Affected versions:
- V100R001C00 (Status: affected)
- V100R001C10 (Status: affected)
- V100R001C20 (Status: affected)
- V100R001C30 (Status: affected)
- V500R001C00 (Status: affected)
- V500R001C20 (Status: affected)
- V500R001C30 (Status: affected)
- V500R001C50 (Status: affected)
**Huawei - SoftCo**
Affected versions:
- V200R001C01SPC300 (Status: affected)
- V200R001C01SPC400 (Status: affected)
- V200R001C01SPC500 (Status: affected)
- V200R001C01SPC600 (Status: affected)
- V200R001C01SPH703 (Status: affected)
- V200R003C00SPC100 (Status: affected)
- V200R003C00SPC200 (Status: affected)
- V200R003C00SPC300 (Status: affected)
- V200R003C00SPC500 (Status: affected)
- V200R003C20 (Status: affected)
**Huawei - TE30**
Affected versions:
- V100R001C02SPC100 (Status: affected)
- V100R001C02SPC200 V100R001C10 (Status: affected)
- V500R002C00SPC200 (Status: affected)
- V500R002C00SPC600 (Status: affected)
- V500R002C00SPC700 (Status: affected)
- V500R002C00SPC900 (Status: affected)
- V500R002C00SPCb00 (Status: affected)
- V600R006C00 (Status: affected)
**Huawei - TE40**
Affected versions:
- V500R002C00SPC600 (Status: affected)
- V500R002C00SPC700 (Status: affected)
- V500R002C00SPC900 (Status: affected)
- V500R002C00SPCb00 (Status: affected)
- V600R006C00 (Status: affected)
**Huawei - TE50**
Affected versions:
- V500R002C00SPC600 (Status: affected)
- V500R002C00SPCb00 (Status: affected)
- V600R006C00 (Status: affected)
**Huawei - TE60**
Affected versions:
- V100R001C01SPC100 (Status: affected)
- V100R001C10 (Status: affected)
- V100R001C10SPC300 (Status: affected)
- V100R001C10SPC400 (Status: affected)
- V100R001C10SPC500 (Status: affected)
- V100R001C10SPC600 (Status: affected)
- V100R001C10SPC800 (Status: affected)
- V100R003C00 (Status: affected)
- V500R002C00 (Status: affected)
- V500R002C00SPC100 (Status: affected)
- V500R002C00SPC200 (Status: affected)
- V500R002C00SPC300 (Status: affected)
- V500R002C00SPC600 (Status: affected)
- V500R002C00SPC700 (Status: affected)
- V500R002C00SPC800 (Status: affected)
- V500R002C00SPC900 (Status: affected)
- V500R002C00SPCa00 (Status: affected)
- V500R002C00SPCb00 (Status: affected)
- V600R006C00 (Status: affected)
- V600R006C00SPC200 (Status: affected)
**Huawei - TP3206**
Affected versions:
- V100R002C00 (Status: affected)
**Huawei - USG9500**
Affected versions:
- V300R001C01 (Status: affected)
- V300R001C20 (Status: affected)
- V500R001C00 (Status: affected)
- V500R001C20 (Status: affected)
- V500R001C30 (Status: affected)
- V500R001C50 (Status: affected)
**Huawei - USG9520**
Affected versions:
- V300R001C01SPC800PWE (Status: affected)
**Huawei - USG9560**
Affected versions:
- V300R001C20SPC300 (Status: affected)
**Huawei - VP9660**
Affected versions:
- V200R001C02SPC100 (Status: affected)
- V200R001C02SPC200 (Status: affected)
- V200R001C02SPC300 (Status: affected)
- V200R001C02SPC300T (Status: affected)
- V200R001C02SPC400 (Status: affected)
- V200R001C30SPC100 (Status: affected)
- V200R001C30SPC100B015T (Status: affected)
- V200R001C30SPC101 (Status: affected)
- V200R001C30SPC101TB015 (Status: affected)
- V200R001C30SPC102T (Status: affected)
- V200R001C30SPC103T (Status: affected)
- V200R001C30SPC104T (Status: affected)
- V200R001C30SPC200 (Status: affected)
- V200R001C30SPC200B022T (Status: affected)
- V200R001C30SPC201B023T (Status: affected)
- V200R001C30SPC202B025T (Status: affected)
- V200R001C30SPC203T (Status: affected)
- V200R001C30SPC206T (Status: affected)
- V200R001C30SPC207T (Status: affected)
- V200R001C30SPC208T (Status: affected)
- V200R001C30SPC209T (Status: affected)
- V200R001C30SPC300 (Status: affected)
- V200R001C30SPC400 (Status: affected)
- V200R001C30SPC400B001 (Status: affected)
- V200R001C30SPC400T (Status: affected)
- V200R001C30SPC401T (Status: affected)
- V200R001C30SPC402T (Status: affected)
- V200R001C30SPC403T (Status: affected)
- V200R001C30SPC404T (Status: affected)
- V200R001C30SPC405T (Status: affected)
- V200R001C30SPC600 (Status: affected)
- V200R001C30SPC700 (Status: affected)
- V200R001C30SPC700T (Status: affected)
- V200R001C30SPC701T (Status: affected)
- V200R001C30SPC702T (Status: affected)
- V200R001C30SPC703T (Status: affected)
- V200R001C30SPC800 (Status: affected)
- V200R001C30SPC800T (Status: affected)
- V200R001C30SPC900 (Status: affected)
- V200R001C30SPCa00 (Status: affected)
- V200R001C30SPCa00T (Status: affected)
- V200R001C30SPCa01 (Status: affected)
- V200R001C30SPCa01T (Status: affected)
- V200R001C30SPCa02T (Status: affected)
- V200R001C30SPCb00 (Status: affected)
- V200R001C30SPCc00 (Status: affected)
- V200R001C30SPCd00 (Status: affected)
- V200R001C30SPCd00T (Status: affected)
- V200R001C30SPCd01T (Status: affected)
- V200R001C30SPCd (Status: affected)
**Huawei - ViewPoint 8660**
Affected versions:
- V100R008C03B013SP02 (Status: affected)
- V100R008C03B013SP03 (Status: affected)
- V100R008C03B013SP04 (Status: affected)
- V100R008C03SPC100 (Status: affected)
- V100R008C03SPC200 (Status: affected)
- V100R008C03SPC300 (Status: affected)
- V100R008C03SPC400 (Status: affected)
- V100R008C03SPC500 (Status: affected)
- V100R008C03SPC600 (Status: affected)
- V100R008C03SPC700 (Status: affected)
- V100R008C03SPC800 (Status: affected)
- V100R008C03SPC900 (Status: affected)
- V100R008C03SPCa00 (Status: affected)
- V100R008C03SPCb00 (Status: affected)
- V100R008C03SPCc00 (Status: affected)
**Huawei - ViewPoint 9030**
Affected versions:
- V100R011C02SPC100 (Status: affected)
- V100R011C03B012SP15 (Status: affected)
- V100R011C03B012SP16 (Status: affected)
- V100R011C03B015SP03 (Status: affected)
- V100R011C03LGWL01SPC100 (Status: affected)
- V100R011C03LGWL01SPC100B012 (Status: affected)
- V100R011C03SPC100 (Status: affected)
- V100R011C03SPC200 (Status: affected)
- V100R011C03SPC300 (Status: affected)
- V100R011C03SPC400 (Status: affected)
- V100R011C03SPC500 (Status: affected)
**Huawei - eSpace U1910**
Affected versions:
- V100R001C20SPC300 (Status: affected)
- V100R001C20SPC400 (Status: affected)
- V100R001C20SPC500 (Status: affected)
- V100R001C20SPC600 (Status: affected)
- V100R001C20SPH703 (Status: affected)
- V200R003C00 (Status: affected)
- V200R003C20 (Status: affected)
- V200R003C30 (Status: affected)
**Huawei - eSpace U1911**
Affected versions:
- V100R001C20SPC300 (Status: affected)
- V100R001C20SPC400 (Status: affected)
- V100R001C20SPC500 (Status: affected)
- V100R001C20SPC600 (Status: affected)
- V100R001C20SPH309 (Status: affected)
- V100R001C20SPH703 (Status: affected)
- V200R003C00 (Status: affected)
- V200R003C20 (Status: affected)
- V200R003C30 (Status: affected)
**Huawei - eSpace U1930**
Affected versions:
- V100R001C20SPC300 (Status: affected)
- V100R001C20SPC400 (Status: affected)
- V100R001C20SPC500 (Status: affected)
- V100R001C20SPC600 (Status: affected)
- V100R001C20SPH703 (Status: affected)
- V200R003C00 (Status: affected)
- V200R003C20 (Status: affected)
- V200R003C30 (Status: affected)
**Huawei - eSpace U1960**
Affected versions:
- V100R001C01SPC500 (Status: affected)
- V100R001C20LCRW01T (Status: affected)
- V100R001C20SPC300 (Status: affected)
- V100R001C20SPC400 (Status: affected)
- V100R001C20SPC600 (Status: affected)
- V100R001C20SPC600T (Status: affected)
- V100R001C20SPH309 (Status: affected)
- V100R001C20SPH703 (Status: affected)
- V200R003C00 (Status: affected)
- V200R003C20 (Status: affected)
- V200R003C30 (Status: affected)
**Huawei - eSpace U1980**
Affected versions:
- V100R001C01SPC500T (Status: affected)
- V100R001C20SPC300 (Status: affected)
- V100R001C20SPC400 (Status: affected)
- V100R001C20SPC500T (Status: affected)
- V100R001C20SPC502 (Status: affected)
- V100R001C20SPC600 (Status: affected)
- V100R001C20SPH309 (Status: affected)
- V100R001C20SPH703 (Status: affected)
- V200R003C00 (Status: affected)
- V200R003C20 (Status: affected)
- V200R003C30 (Status: affected)
**Huawei - eSpace U1981**
Affected versions:
- V100R001C20SPC300 (Status: affected)
- V100R001C20SPC400 (Status: affected)
- V100R001C20SPC500 (Status: affected)
- V100R001C20SPC600 (Status: affected)
- V100R001C20SPC700 (Status: affected)
- V100R001C20SPH702 (Status: affected)
- V100R001C20SPH703 (Status: affected)
- V100R001C30 (Status: affected)
- V200R003C00 (Status: affected)
- V200R003C20 (Status: affected)
- V200R003C30 (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4262, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4262 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4262
- **State**: PUBLISHED
- **Published Date**: December 15, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:38 UTC
- **Reserved Date**: December 15, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the News module in Envolution allows remote attackers to inject arbitrary web script or HTML via the (1) startrow and (2) catid parameter. NOTE: this issue might be resultant from the SQL injection problem (CVE-2005-4263).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2005-2927](http://www.vupen.com/english/advisories/2005/2927)
2. [18069](http://secunia.com/advisories/18069)
3. [1015351](http://securitytracker.com/id?1015351)
4. [15857](http://www.securityfocus.com/bid/15857)
5. [21751](http://www.osvdb.org/21751) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-19586, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-19586 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-19586
- **State**: PUBLISHED
- **Published Date**: September 14, 2022 at 02:48 UTC
- **Last Updated**: August 04, 2024 at 14:15 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Incorrect Access Control issue in Yellowfin Business Intelligence 7.3 allows remote attackers to escalate privilege via MIAdminStyles.i4 Admin UI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Deepak983/CVE-2020-19586/blob/main/Stored%20XSS%20in%20MIAdminStyles.i4%20through%20privileges%20escalation.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1302
- **State**: PUBLISHED
- **Published Date**: December 22, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:46 UTC
- **Reserved Date**: December 20, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The id3tag_sort function in id3tag.c for YAMT 0.5 allows remote attackers to execute arbitrary commands via an MP3 file with double quotes in the Artist tag.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [13554](http://secunia.com/advisories/13554)
2. [11999](http://www.securityfocus.com/bid/11999)
3. [](http://tigger.uic.edu/~jlongs2/holes/yamt.txt)
4. [yamt-id3tagsort-bo(18614)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18614)
5. [](http://rpmfind.net/linux/RPM/suse/updates/8.2/i386/rpm/i586/yamt-0.5-1277.i586.html)
6. [1012583](http://securitytracker.com/id?1012583) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26605, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26605 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26605
- **State**: PUBLISHED
- **Published Date**: February 24, 2024 at 15:17 UTC
- **Last Updated**: May 04, 2025 at 12:54 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
PCI/ASPM: Fix deadlock when enabling ASPM
A last minute revert in 6.7-final introduced a potential deadlock when
enabling ASPM during probe of Qualcomm PCIe controllers as reported by
lockdep:
============================================
WARNING: possible recursive locking detected
6.7.0 #40 Not tainted
--------------------------------------------
kworker/u16:5/90 is trying to acquire lock:
ffffacfa78ced000 (pci_bus_sem){++++}-{3:3}, at: pcie_aspm_pm_state_change+0x58/0xdc
but task is already holding lock:
ffffacfa78ced000 (pci_bus_sem){++++}-{3:3}, at: pci_walk_bus+0x34/0xbc
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(pci_bus_sem);
lock(pci_bus_sem);
*** DEADLOCK ***
Call trace:
print_deadlock_bug+0x25c/0x348
__lock_acquire+0x10a4/0x2064
lock_acquire+0x1e8/0x318
down_read+0x60/0x184
pcie_aspm_pm_state_change+0x58/0xdc
pci_set_full_power_state+0xa8/0x114
pci_set_power_state+0xc4/0x120
qcom_pcie_enable_aspm+0x1c/0x3c [pcie_qcom]
pci_walk_bus+0x64/0xbc
qcom_pcie_host_post_init_2_7_0+0x28/0x34 [pcie_qcom]
The deadlock can easily be reproduced on machines like the Lenovo ThinkPad
X13s by adding a delay to increase the race window during asynchronous
probe where another thread can take a write lock.
Add a new pci_set_power_state_locked() and associated helper functions that
can be called with the PCI bus semaphore held to avoid taking the read lock
twice.
### Affected Products
**Linux - Linux**
Affected versions:
- b9c370b61d735a0e5390c42771e7eb21413f7868 (Status: affected)
- 8cc22ba3f77c59df5f1ac47d62df51efb28cd868 (Status: affected)
- f93e71aea6c60ebff8adbd8941e678302d377869 (Status: affected)
- f93e71aea6c60ebff8adbd8941e678302d377869 (Status: affected)
- 1f2f662c8bec75d1311e063efaa9107435cf16c8 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.7 (Status: affected)
- 0 (Status: unaffected)
- 6.1.88 (Status: unaffected)
- 6.6.29 (Status: unaffected)
- 6.7.5 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/0f7908a016c092cfdaa16d785fa5099d867bc1a3)
2. [](https://git.kernel.org/stable/c/b0f4478838be1f1d330061201898fef65bf8fd7c)
3. [](https://git.kernel.org/stable/c/ef90508574d7af48420bdc5f7b9a4f1cdd26bc70)
4. [](https://git.kernel.org/stable/c/1e560864159d002b453da42bd2c13a1805515a20) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43434, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43434
- **State**: PUBLISHED
- **Published Date**: October 19, 2022 at 00:00 UTC
- **Last Updated**: May 08, 2025 at 18:18 UTC
- **Reserved Date**: October 18, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins NeuVector Vulnerability Scanner Plugin 1.20 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download.
### Affected Products
**Jenkins project - Jenkins NeuVector Vulnerability Scanner Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 1.20 (Status: unknown)
### References
1. [](https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2865)
2. [[oss-security] 20221019 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/10/19/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3732
- **State**: PUBLISHED
- **Published Date**: September 23, 2011 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 19:15 UTC
- **Reserved Date**: September 23, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
eggBlog 4.1.2 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by _lib/fckeditor/editor/dialog/fck_spellerpages/spellerpages/server-scripts/spellchecker.php and certain other files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability](http://www.openwall.com/lists/oss-security/2011/06/27/6)
2. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/eggblog_4.1.2)
3. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8328, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8328
- **State**: PUBLISHED
- **Published Date**: August 30, 2024 at 02:20 UTC
- **Last Updated**: August 30, 2024 at 14:39 UTC
- **Reserved Date**: August 30, 2024 at 01:25 UTC
- **Assigned By**: twcert
### Vulnerability Description
Easy test Online Learning and Testing Platform from HWA JIUH DIGITAL TECHNOLOGY does not properly validate a specific page parameter, allowing remote attackers with regular privilege to inject arbitrary JavaScript code and perform Reflected Cross-site scripting attacks.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**HWA JIUH DIGITAL TECHNOLOGY - Easy test Online Learning and Testing Platform**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-8028-360e1-1.html)
2. [](https://www.twcert.org.tw/en/cp-139-8033-0a98f-2.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35113
- **State**: PUBLISHED
- **Published Date**: January 07, 2021 at 13:49 UTC
- **Last Updated**: August 04, 2024 at 16:55 UTC
- **Reserved Date**: December 10, 2020 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Mozilla developers reported memory safety bugs present in Firefox 83 and Firefox ESR 78.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2020-54/)
2. [](https://www.mozilla.org/security/advisories/mfsa2020-56/)
3. [](https://www.mozilla.org/security/advisories/mfsa2020-55/)
4. [](https://bugzilla.mozilla.org/buglist.cgi?bug_id=1664831%2C1673589) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2820, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2820
- **State**: PUBLISHED
- **Published Date**: October 12, 2011 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 23:15 UTC
- **Reserved Date**: July 20, 2011 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:17211](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17211)
2. [](http://support.apple.com/kb/HT4981)
3. [APPLE-SA-2011-10-12-1](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html)
4. [APPLE-SA-2011-10-11-1](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html)
5. [APPLE-SA-2011-10-12-4](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00004.html)
6. [50066](http://www.securityfocus.com/bid/50066)
7. [](http://support.apple.com/kb/HT4999)
8. [](http://support.apple.com/kb/HT5000) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37185, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37185 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37185
- **State**: PUBLISHED
- **Published Date**: February 09, 2022 at 15:16 UTC
- **Last Updated**: April 18, 2025 at 18:33 UTC
- **Reserved Date**: July 21, 2021 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SIMATIC Drive Controller family (All versions >= V2.9.2 < V2.9.4), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions >= V21.9 < V21.9.4), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions >= V4.5.0 < V4.5.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.9.2 < V2.9.4), SIMATIC S7-1500 Software Controller (All versions >= V21.9 < V21.9.4), SIMATIC S7-PLCSIM Advanced (All versions >= V4.0 < V4.0 SP1), SIPLUS TIM 1531 IRC (All versions < V2.3.6), TIM 1531 IRC (All versions < V2.3.6). An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over port 102/tcp. A restart of the affected device is needed to restore normal operations.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-672: Security Weakness
### Affected Products
**Siemens - SIMATIC Drive Controller family**
Affected versions:
- All versions >= V2.9.2 < V2.9.4 (Status: affected)
**Siemens - SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)**
Affected versions:
- All versions >= V21.9 < V21.9.4 (Status: affected)
**Siemens - SIMATIC S7-1200 CPU family (incl. SIPLUS variants)**
Affected versions:
- All versions >= V4.5.0 < V4.5.2 (Status: affected)
**Siemens - SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)**
Affected versions:
- All versions >= V2.9.2 < V2.9.4 (Status: affected)
**Siemens - SIMATIC S7-1500 Software Controller**
Affected versions:
- All versions >= V21.9 < V21.9.4 (Status: affected)
**Siemens - SIMATIC S7-PLCSIM Advanced**
Affected versions:
- All versions >= V4.0 < V4.0 SP1 (Status: affected)
**Siemens - SIPLUS TIM 1531 IRC**
Affected versions:
- All versions < V2.3.6 (Status: affected)
**Siemens - TIM 1531 IRC**
Affected versions:
- All versions < V2.3.6 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-838121.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23156
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 12:55 UTC
- **Last Updated**: May 26, 2025 at 05:19 UTC
- **Reserved Date**: January 11, 2025 at 14:28 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
media: venus: hfi_parser: refactor hfi packet parsing logic
words_count denotes the number of words in total payload, while data
points to payload of various property within it. When words_count
reaches last word, data can access memory beyond the total payload. This
can lead to OOB access. With this patch, the utility api for handling
individual properties now returns the size of data consumed. Accordingly
remaining bytes are calculated before parsing the payload, thereby
eliminates the OOB access possibilities.
### Affected Products
**Linux - Linux**
Affected versions:
- 1a73374a04e555103e5369429a30999114001dda (Status: affected)
- 1a73374a04e555103e5369429a30999114001dda (Status: affected)
- 1a73374a04e555103e5369429a30999114001dda (Status: affected)
- 1a73374a04e555103e5369429a30999114001dda (Status: affected)
- 1a73374a04e555103e5369429a30999114001dda (Status: affected)
- 1a73374a04e555103e5369429a30999114001dda (Status: affected)
- 1a73374a04e555103e5369429a30999114001dda (Status: affected)
- 1a73374a04e555103e5369429a30999114001dda (Status: affected)
**Linux - Linux**
Affected versions:
- 4.19 (Status: affected)
- 0 (Status: unaffected)
- 5.10.237 (Status: unaffected)
- 5.15.181 (Status: unaffected)
- 6.1.135 (Status: unaffected)
- 6.6.88 (Status: unaffected)
- 6.12.24 (Status: unaffected)
- 6.13.12 (Status: unaffected)
- 6.14.3 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/0beabe9b49190a02321b02792b29fc0f0e28b51f)
2. [](https://git.kernel.org/stable/c/f195e94c7af921d99abd79f57026a218d191d2c7)
3. [](https://git.kernel.org/stable/c/0f9a4bab7d83738963365372e4745854938eab2d)
4. [](https://git.kernel.org/stable/c/05b07e52a0d08239147ba3460045855f4fb398de)
5. [](https://git.kernel.org/stable/c/bb3fd8b7906a12dc2b61389abb742bf6542d97fb)
6. [](https://git.kernel.org/stable/c/a736c72d476d1c7ca7be5018f2614ee61168ad01)
7. [](https://git.kernel.org/stable/c/6d278c5548d840c4d85d445347b2a5c31b2ab3a0)
8. [](https://git.kernel.org/stable/c/9edaaa8e3e15aab1ca413ab50556de1975bcb329) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4451, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4451 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4451
- **State**: PUBLISHED
- **Published Date**: November 18, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 11:20 UTC
- **Reserved Date**: June 20, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Apple iOS before 8.1.1 does not properly enforce the failed-passcode limit, which makes it easier for physically proximate attackers to bypass the lock-screen protection mechanism via a series of guesses.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [appleios-cve20144451-sec-bypass(98776)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98776)
2. [APPLE-SA-2014-11-17-1](http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html)
3. [](https://support.apple.com/en-us/HT6590)
4. [62504](http://secunia.com/advisories/62504)
5. [71138](http://www.securityfocus.com/bid/71138)
6. [1031232](http://www.securitytracker.com/id/1031232)
7. [](https://support.apple.com/en-us/HT204418) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11159
- **State**: PUBLISHED
- **Published Date**: August 23, 2017 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 17:54 UTC
- **Reserved Date**: July 10, 2017 at 00:00 UTC
- **Assigned By**: synology
### Vulnerability Description
Multiple untrusted search path vulnerabilities in installer in Synology Photo Station Uploader before 1.4.2-084 on Windows allows local attackers to execute arbitrary code and conduct DLL hijacking attack via a Trojan horse (1) shfolder.dll, (2) ntmarta.dll, (3) secur32.dll or (4) dwmapi.dll file in the current working directory.
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**Synology - Photo Station Uploader**
Affected versions:
- before 1.4.2-084 (Status: affected)
### References
1. [](https://www.synology.com/en-global/support/security/Synology_SA_17_45_Photo_Station_Uploader) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11576, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11576 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11576
- **State**: PUBLISHED
- **Published Date**: November 22, 2024 at 20:42 UTC
- **Last Updated**: December 04, 2024 at 21:42 UTC
- **Reserved Date**: November 20, 2024 at 22:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
Luxion KeyShot 3DS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of 3DS files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23681.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Luxion - KeyShot**
Affected versions:
- 2024 13.0.0 Build 92 4.10.171 (Status: affected)
### References
1. [ZDI-24-1607](https://www.zerodayinitiative.com/advisories/ZDI-24-1607/)
2. [vendor-provided URL](https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0&_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47316, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47316 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47316
- **State**: PUBLISHED
- **Published Date**: October 05, 2024 at 12:27 UTC
- **Last Updated**: October 07, 2024 at 14:14 UTC
- **Reserved Date**: September 24, 2024 at 13:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authorization Bypass Through User-Controlled Key vulnerability in Salon Booking System Salon booking system.This issue affects Salon booking system: from n/a through 10.9.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**Salon Booking System - Salon booking system**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/salon-booking-system/wordpress-salon-booking-wordpress-plugin-plugin-10-9-insecure-direct-object-references-idor-vulnerability?_s_id=cve)
### Credits
- Sharanabasappa (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26966, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26966 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26966
- **State**: PUBLISHED
- **Published Date**: June 29, 2023 at 00:00 UTC
- **Last Updated**: November 27, 2024 at 15:42 UTC
- **Reserved Date**: February 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/libtiff/libtiff/-/issues/530)
2. [](https://gitlab.com/libtiff/libtiff/-/merge_requests/473)
3. [[debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update](https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22127, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22127 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22127
- **State**: PUBLISHED
- **Published Date**: May 25, 2022 at 13:56 UTC
- **Last Updated**: August 03, 2024 at 03:07 UTC
- **Reserved Date**: December 21, 2021 at 00:00 UTC
- **Assigned By**: Salesforce
### Vulnerability Description
Tableau is aware of a broken access control vulnerability present in Tableau Server affecting Tableau Server customers using Local Identity Store for managing users. The vulnerability allows a malicious site administrator to change passwords for users in different sites hosted on the same Tableau Server, resulting in the potential for unauthorized access to data.Tableau Server versions affected are:2020.4.16, 2021.1.13, 2021.2.10, 2021.3.9, 2021.4.4 and earlierNote: All future releases of Tableau Server will address this security issue. Versions that are no longer supported are not tested and may be vulnerable.
### Affected Products
**n/a - Tableau Server**
Affected versions:
- 2020.4.16, 2021.1.13, 2021.2.10, 2021.3.9, 2021.4.4 and earlier (Status: affected)
### References
1. [](https://help.salesforce.com/s/articleView?id=000365493&type=1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24693
- **State**: PUBLISHED
- **Published Date**: January 24, 2025 at 17:24 UTC
- **Last Updated**: January 24, 2025 at 18:55 UTC
- **Reserved Date**: January 23, 2025 at 14:52 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Yehi Advanced Notifications allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Advanced Notifications: from n/a through 1.2.7.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Yehi - Advanced Notifications**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/advanced-notifications/vulnerability/wordpress-advanced-notifications-plugin-1-2-7-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3394
- **State**: PUBLISHED
- **Published Date**: October 10, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:43 UTC
- **Reserved Date**: May 07, 2014 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(7.15), 8.6 before 8.6(1.14), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to bypass certificate validation via an arbitrary VeriSign certificate, aka Bug ID CSCun10916.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20141008 Multiple Vulnerabilities in Cisco ASA Software](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8116, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8116 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8116
- **State**: PUBLISHED
- **Published Date**: February 04, 2020 at 19:08 UTC
- **Last Updated**: August 04, 2024 at 09:48 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.
### Weakness Classification (CWE)
- CWE-471: Security Weakness
### Affected Products
**n/a - dot-prop**
Affected versions:
- before 4.2.1 (Status: affected)
- 5.x before 5.1.1 (Status: affected)
- Fixed in 5.1.1 (Status: affected)
### References
1. [](https://hackerone.com/reports/719856)
2. [](https://github.com/sindresorhus/dot-prop/tree/v4)
3. [](https://github.com/advisories/GHSA-ff7x-qrg7-qggm)
4. [](https://github.com/sindresorhus/dot-prop/issues/63) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30640, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30640
- **State**: PUBLISHED
- **Published Date**: July 12, 2021 at 14:55 UTC
- **Last Updated**: August 03, 2024 at 22:40 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
### Affected Products
**Apache Software Foundation - Apache Tomcat**
Affected versions:
- Apache Tomcat 10 10.0.0-M1 to 10.0.5 (Status: affected)
- Apache Tomcat 9 9.0.0.M1 to 9.0.45 (Status: affected)
- Apache Tomcat 8.5 8.5.0 to 8.5.65 (Status: affected)
- Apache Tomcat 7 7.0.0 to 7.0.108 (Status: affected)
### References
1. [](https://lists.apache.org/thread.html/r59f9ef03929d32120f91f4ea7e6e79edd5688d75d0a9b65fd26d1fe8%40%3Cannounce.tomcat.apache.org%3E)
2. [](https://www.oracle.com//security-alerts/cpujul2021.html)
3. [[debian-lts-announce] 20210805 [SECURITY] [DLA 2733-1] tomcat8 security update](https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html)
4. [DSA-4952](https://www.debian.org/security/2021/dsa-4952)
5. [DSA-4986](https://www.debian.org/security/2021/dsa-4986)
6. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
7. [](https://security.netapp.com/advisory/ntap-20210827-0007/)
8. [](https://www.oracle.com/security-alerts/cpujan2022.html)
9. [GLSA-202208-34](https://security.gentoo.org/glsa/202208-34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9154
- **State**: PUBLISHED
- **Published Date**: December 23, 2016 at 05:00 UTC
- **Last Updated**: August 06, 2024 at 02:42 UTC
- **Reserved Date**: November 03, 2016 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
Siemens Desigo PX Web modules PXA40-W0, PXA40-W1, PXA40-W2 for Desigo PX automation controllers PXC00-E.D, PXC50-E.D, PXC100-E.D, PXC200-E.D (All firmware versions < V6.00.046) and Desigo PX Web modules PXA30-W0, PXA30-W1, PXA30-W2 for Desigo PX automation controllers PXC00-U, PXC64-U, PXC128-U (All firmware versions < V6.00.046) use a pseudo random number generator with insufficient entropy to generate certificates for HTTPS, potentially allowing remote attackers to reconstruct the corresponding private key.
### Weakness Classification (CWE)
- CWE-332: Security Weakness
### Affected Products
**n/a - Desigo PX Web modules with all firmware versions < V6.00.046**
Affected versions:
- Desigo PX Web modules with all firmware versions < V6.00.046 (Status: affected)
### References
1. [](http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856492.pdf)
2. [94962](http://www.securityfocus.com/bid/94962)
3. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-355-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-29130, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-29130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-29130
- **State**: PUBLISHED
- **Published Date**: November 26, 2020 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 16:48 UTC
- **Reserved Date**: November 26, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://lists.freedesktop.org/archives/slirp/2020-November/000115.html)
2. [[oss-security] 20201127 CVE-2020-29129 CVE-2020-29130 QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets](http://www.openwall.com/lists/oss-security/2020/11/27/1)
3. [FEDORA-2020-77f93f41be](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPCOHDEONMHH6QPJZKRLLCNRGRYODG7X/)
4. [FEDORA-2020-331e1318dd](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45S5IHSWYITJKMRT23HCHJQDI674AMTQ/)
5. [[debian-lts-announce] 20210218 [SECURITY] [DLA 2560-1] qemu security update](https://lists.debian.org/debian-lts-announce/2021/02/msg00024.html)
6. [[debian-lts-announce] 20230314 [SECURITY] [DLA 3362-1] qemu security update](https://lists.debian.org/debian-lts-announce/2023/03/msg00013.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27917, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27917
- **State**: PUBLISHED
- **Published Date**: March 06, 2024 at 19:36 UTC
- **Last Updated**: August 05, 2024 at 20:07 UTC
- **Reserved Date**: February 28, 2024 at 15:14 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Shopware is an open commerce platform based on Symfony Framework and Vue. The Symfony Session Handler pops the Session Cookie and assigns it to the Response. Since Shopware 6.5.8.0, the 404 pages are cached to improve the performance of 404 pages. So the cached Response which contains a Session Cookie when the Browser accessing the 404 page, has no cookies yet. The Symfony Session Handler is in use, when no explicit Session configuration has been done. When Redis is in use for Sessions using the PHP Redis extension, this exploiting code is not used. Shopware version 6.5.8.7 contains a patch for this issue. As a workaround, use Redis for Sessions, as this does not trigger the exploit code.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-524: Security Weakness
### Affected Products
**shopware - shopware**
Affected versions:
- >= 6.5.8.0, < 6.5.8.7 (Status: affected)
### References
1. [https://github.com/shopware/shopware/security/advisories/GHSA-c2f9-4jmm-v45m](https://github.com/shopware/shopware/security/advisories/GHSA-c2f9-4jmm-v45m)
2. [https://github.com/shopware/shopware/commit/7d9cb03225efca5f97e69b800d8747598dd15ce3](https://github.com/shopware/shopware/commit/7d9cb03225efca5f97e69b800d8747598dd15ce3)
3. [https://github.com/shopware/storefront/commit/3477e4a425d3c54b4bfae82d703fe3838dc21d3e](https://github.com/shopware/storefront/commit/3477e4a425d3c54b4bfae82d703fe3838dc21d3e)
4. [https://github.com/shopware/shopware/releases/tag/v6.5.8.7](https://github.com/shopware/shopware/releases/tag/v6.5.8.7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13164, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13164
- **State**: PUBLISHED
- **Published Date**: December 06, 2017 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 19:56 UTC
- **Reserved Date**: August 23, 2017 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An information disclosure vulnerability in the kernel binder driver. Product: Android. Versions: Android kernel. Android ID A-36007193.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2017-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3837
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 07:46 UTC
- **Last Updated**: February 13, 2025 at 17:53 UTC
- **Reserved Date**: April 15, 2024 at 17:25 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in QUIC in Google Chrome prior to 124.0.6367.60 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
### Affected Products
**Google - Chrome**
Affected versions:
- 124.0.6367.60 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html)
2. [](https://issues.chromium.org/issues/41491379)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/)
6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/)
7. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/)
8. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2875
- **State**: PUBLISHED
- **Published Date**: September 26, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 19:50 UTC
- **Reserved Date**: May 19, 2012 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Multiple unspecified vulnerabilities in the PDF functionality in Google Chrome before 22.0.1229.79 allow remote attackers to have an unknown impact via a crafted document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://code.google.com/p/chromium/issues/detail?id=144579)
2. [](https://code.google.com/p/chromium/issues/detail?id=137288)
3. [](https://code.google.com/p/chromium/issues/detail?id=145163)
4. [](https://code.google.com/p/chromium/issues/detail?id=134955)
5. [](https://code.google.com/p/chromium/issues/detail?id=137106)
6. [google-chrome-cve20122875(78836)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78836)
7. [](https://code.google.com/p/chromium/issues/detail?id=137556)
8. [](https://code.google.com/p/chromium/issues/detail?id=137880)
9. [](https://code.google.com/p/chromium/issues/detail?id=137606)
10. [](https://code.google.com/p/chromium/issues/detail?id=145121)
11. [](http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html)
12. [](https://code.google.com/p/chromium/issues/detail?id=145079)
13. [](https://code.google.com/p/chromium/issues/detail?id=137928)
14. [](https://code.google.com/p/chromium/issues/detail?id=137547)
15. [](https://code.google.com/p/chromium/issues/detail?id=146462)
16. [](https://code.google.com/p/chromium/issues/detail?id=137635)
17. [](https://code.google.com/p/chromium/issues/detail?id=137302)
18. [](https://code.google.com/p/chromium/issues/detail?id=135488)
19. [oval:org.mitre.oval:def:15627](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15627) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45740, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45740 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45740
- **State**: PUBLISHED
- **Published Date**: February 04, 2022 at 01:33 UTC
- **Last Updated**: August 04, 2024 at 04:47 UTC
- **Reserved Date**: December 27, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK A720R v4.1.5cu.470_B20200911 was discovered to contain a stack overflow in the setWiFiWpsStart function. This vulnerability allows attackers to cause a Denial of Service (DoS) via the pin parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/pjqwudi/my_vuln/blob/main/totolink/vuln_4/4.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1169
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:19 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DATEV Nutzungskontrolle 2.1 and 2.2 has insecure write permissions for critical registry keys, which allows local users to bypass access restrictions by importing NukoInfo values in certain DATEV keys, which disables Nutzungskontrolle.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [nutzungskontrolle-registry-security-bypass(13589)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13589)
2. [20031101 DATEV Nutzungskontrolle Bypassing (REG)](http://lists.grok.org.uk/pipermail/full-disclosure/2003-November/013113.html)
3. [8950](http://www.securityfocus.com/bid/8950) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1564, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1564
- **State**: PUBLISHED
- **Published Date**: May 22, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:02 UTC
- **Reserved Date**: January 08, 2016 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in wp-includes/class-wp-theme.php in WordPress before 4.4.1 allow remote attackers to inject arbitrary web script or HTML via a (1) stylesheet name or (2) template name to wp-admin/customize.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1034622](http://www.securitytracker.com/id/1034622)
2. [](https://codex.wordpress.org/Version_4.4.1)
3. [DSA-3444](http://www.debian.org/security/2016/dsa-3444)
4. [[oss-security] 20160108 Re: CVE Request: WordPress: cross-site scripting vulnerability fixed in new 4.4.1 release](http://www.openwall.com/lists/oss-security/2016/01/08/4)
5. [](http://twitter.com/brutelogic/statuses/685105483397619713)
6. [](https://wpvulndb.com/vulnerabilities/8358)
7. [](https://wordpress.org/news/2016/01/wordpress-4-4-1-security-and-maintenance-release/)
8. [](https://core.trac.wordpress.org/changeset/36185) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0526
- **State**: PUBLISHED
- **Published Date**: March 12, 2020 at 20:02 UTC
- **Last Updated**: August 04, 2024 at 06:02 UTC
- **Reserved Date**: October 28, 2019 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper input validation in firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
### Affected Products
**Intel - Intel(R) NUC Firmware**
Affected versions:
- See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4404, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4404
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52817
- **State**: PUBLISHED
- **Published Date**: December 10, 2024 at 22:04 UTC
- **Last Updated**: December 11, 2024 at 16:33 UTC
- **Reserved Date**: November 15, 2024 at 18:03 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14776, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14776 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14776
- **State**: PUBLISHED
- **Published Date**: August 01, 2018 at 06:00 UTC
- **Last Updated**: September 16, 2024 at 16:13 UTC
- **Reserved Date**: August 01, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Click Studios Passwordstate before 8.3 Build 8397 allows XSS by authenticated users via an uploaded HTML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.clickstudios.com.au/about/secure-code-data.aspx)
2. [](https://www.clickstudios.com.au/passwordstate-changelog.aspx) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2383, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2383
- **State**: PUBLISHED
- **Published Date**: July 20, 2021 at 22:43 UTC
- **Last Updated**: September 26, 2024 at 13:55 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.25 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2021.html)
2. [](https://security.netapp.com/advisory/ntap-20210723-0001/)
3. [FEDORA-2021-dc4299a8d0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/)
4. [FEDORA-2021-df40c41094](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1000103, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1000103 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000103
- **State**: PUBLISHED
- **Published Date**: October 04, 2017 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 21:53 UTC
- **Reserved Date**: October 03, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The custom Details view of the Static Analysis Utilities based DRY Plugin, was vulnerable to a persisted cross-site scripting vulnerability: Malicious users able to influence the input to this plugin could insert arbitrary HTML into this view.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2017-08-07/)
2. [101061](http://www.securityfocus.com/bid/101061) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42085, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42085 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42085
- **State**: PUBLISHED
- **Published Date**: October 07, 2021 at 19:36 UTC
- **Last Updated**: August 04, 2024 at 03:22 UTC
- **Reserved Date**: October 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Zammad before 4.1.1. There is stored XSS via a custom Avatar.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://zammad.com/en/advisories/zaa-2021-17) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9101
- **State**: PUBLISHED
- **Published Date**: June 25, 2017 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 08:36 UTC
- **Reserved Date**: June 25, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The fill_buffer_resample function in util.c in libmp3lame.a in LAME 3.98.4, 3.98.2, 3.98, 3.99, 3.99.1, 3.99.2, 3.99.3, 3.99.4 and 3.99.5 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [99269](http://www.securityfocus.com/bid/99269)
2. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777161)
3. [](https://blogs.gentoo.org/ago/2017/06/17/lame-heap-based-buffer-overflow-in-fill_buffer_resample-util-c/)
4. [](https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2015-9101) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9799, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9799 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9799
- **State**: PUBLISHED
- **Published Date**: July 11, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 13:55 UTC
- **Reserved Date**: May 31, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
The makefile in the Qualcomm components in Android before 2016-07-05 on Nexus 5 and 7 (2013) devices omits the -fno-strict-overflow option to gcc, which might allow attackers to gain privileges via a crafted application that leverages incorrect compiler optimization of an integer-overflow protection mechanism, aka Android internal bug 28821731 and Qualcomm internal bug CR691916.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [91628](http://www.securityfocus.com/bid/91628)
2. [](https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=c2119f1fba46f3b6e153aa018f15ee46fe6d5b76)
3. [](http://source.android.com/security/bulletin/2016-07-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0848
- **State**: PUBLISHED
- **Published Date**: August 20, 2012 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 18:38 UTC
- **Reserved Date**: January 19, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Heap-based buffer overflow in the ws_snd_decode_frame function in libavcodec/ws-snd1.c in FFmpeg 0.9.1 allows remote attackers to cause a denial of service (application crash) via a crafted media file, related to an incorrect calculation, aka "wrong samples count."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20120214 Re: CVE Requests for FFmpeg 0.9.1](http://www.openwall.com/lists/oss-security/2012/02/14/4)
2. [](http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=5257743aee0c3982f0079e6553aabc6aa39401d2)
3. [ffmpeg-wssnddecodeframe-bo(78936)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78936)
4. [](http://ffmpeg.org/security.html)
5. [[oss-security] 20120201 Re: CVE Requests for FFmpeg 0.9.1](http://www.openwall.com/lists/oss-security/2012/02/01/11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2467, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2467 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2467
- **State**: PUBLISHED
- **Published Date**: July 22, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 05:52 UTC
- **Reserved Date**: July 15, 2009 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Mozilla Firefox before 3.0.12 and 3.5 before 3.5.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a Flash object, a slow script dialog, and the unloading of the Flash plugin, which triggers attempted use of a deleted object.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2009-7961](https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html)
2. [36145](http://secunia.com/advisories/36145)
3. [35944](http://secunia.com/advisories/35944)
4. [266148](http://sunsolve.sun.com/search/document.do?assetkey=1-66-266148-1)
5. [oval:org.mitre.oval:def:10473](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10473)
6. [SUSE-SA:2009:039](http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html)
7. [RHSA-2009:1162](http://rhn.redhat.com/errata/RHSA-2009-1162.html)
8. [35758](http://www.securityfocus.com/bid/35758)
9. [](http://www.mozilla.org/security/announce/2009/mfsa2009-35.html)
10. [36005](http://secunia.com/advisories/36005)
11. [SUSE-SA:2009:042](http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html)
12. [35914](http://secunia.com/advisories/35914)
13. [ADV-2009-1972](http://www.vupen.com/english/advisories/2009/1972)
14. [](https://bugzilla.mozilla.org/show_bug.cgi?id=493601) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3559
- **State**: PUBLISHED
- **Published Date**: July 21, 2016 at 10:00 UTC
- **Last Updated**: October 11, 2024 at 20:45 UTC
- **Reserved Date**: March 17, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Email Center component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect integrity via vectors related to Email Center Agent Console, a different vulnerability than CVE-2016-3558.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html)
2. [91903](http://www.securityfocus.com/bid/91903)
3. [91787](http://www.securityfocus.com/bid/91787)
4. [1036403](http://www.securitytracker.com/id/1036403) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6439, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6439
- **State**: PUBLISHED
- **Published Date**: March 15, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 15:25 UTC
- **Reserved Date**: March 02, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the parse_string_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (out-of-bounds write) via a crafted plist file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [97278](http://www.securityfocus.com/bid/97278)
2. [](https://github.com/libimobiledevice/libplist/commit/32ee5213fe64f1e10ec76c1ee861ee6f233120dd)
3. [](https://github.com/libimobiledevice/libplist/issues/95)
4. [[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update](https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49092, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49092
- **State**: PUBLISHED
- **Published Date**: November 28, 2023 at 20:57 UTC
- **Last Updated**: November 27, 2024 at 16:03 UTC
- **Reserved Date**: November 21, 2023 at 18:57 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
RustCrypto/RSA is a portable RSA implementation in pure Rust. Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key. There is currently no fix available. As a workaround, avoid using the RSA crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-385: Security Weakness
### Affected Products
**RustCrypto - RSA**
Affected versions:
- <= 0.9.5 (Status: affected)
### References
1. [https://github.com/RustCrypto/RSA/security/advisories/GHSA-c38w-74pg-36hr](https://github.com/RustCrypto/RSA/security/advisories/GHSA-c38w-74pg-36hr)
2. [https://github.com/RustCrypto/RSA/issues/19#issuecomment-1822995643](https://github.com/RustCrypto/RSA/issues/19#issuecomment-1822995643) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24253, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24253 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24253
- **State**: PUBLISHED
- **Published Date**: May 05, 2021 at 18:39 UTC
- **Last Updated**: August 03, 2024 at 19:28 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Classyfrieds WordPress plugin through 3.8 does not properly check the uploaded file when an authenticated user adds a listing, only checking the content-type in the request. This allows any authenticated user to upload arbitrary PHP files via the Add Listing feature of the plugin, leading to RCE.
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Unknown - Classyfrieds**
Affected versions:
- 3.8 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/ee42c233-0ff6-4b27-a5ec-ad3246bef079)
2. [](https://github.com/jinhuang1102/CVE-ID-Reports/blob/master/classyfrieds.md)
### Credits
- Jin Huang |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51738, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51738 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51738
- **State**: PUBLISHED
- **Published Date**: January 20, 2025 at 15:26 UTC
- **Last Updated**: January 21, 2025 at 14:59 UTC
- **Reserved Date**: October 31, 2024 at 14:12 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Sunshine is a self-hosted game stream host for Moonlight. In 0.23.1 and earlier, Sunshine's pairing protocol implementation does not validate request order and is thereby vulnerable to a MITM attack, potentially allowing an unauthenticated attacker to pair a client by hijacking a legitimate pairing attempt. This bug may also be used by a remote attacker to crash Sunshine. This vulnerability is fixed in 2025.118.151840.
### Weakness Classification (CWE)
- CWE-305: Security Weakness
- CWE-476: NULL Pointer Dereference
- CWE-841: Security Weakness
### Affected Products
**LizardByte - Sunshine**
Affected versions:
- < 2025.118.151840 (Status: affected)
### References
1. [https://github.com/LizardByte/Sunshine/security/advisories/GHSA-3hrw-xv8h-9499](https://github.com/LizardByte/Sunshine/security/advisories/GHSA-3hrw-xv8h-9499)
2. [https://github.com/LizardByte/Sunshine/commit/89f097ae65277d42b5d40163d09d92e412e6d7dd](https://github.com/LizardByte/Sunshine/commit/89f097ae65277d42b5d40163d09d92e412e6d7dd) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.