System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0180, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0180 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0180 - **State**: PUBLISHED - **Published Date**: February 11, 2025 at 06:54 UTC - **Last Updated**: February 11, 2025 at 15:28 UTC - **Reserved Date**: January 02, 2025 at 20:21 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP Foodbakery plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.3. This is due to the plugin not properly restricting what user meta can be updated during profile registration. This makes it possible for unauthenticated attackers to register on the site as an administrator. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **Chimpstudio - WP Foodbakery** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/d7140a6e-a528-428e-850e-5e4a481c5d7d?source=cve) 2. [](https://themeforest.net/item/food-bakery-restaurant-bakery-responsive-wordpress-theme/18970331) ### Credits - Tonn
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36534, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36534 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36534 - **State**: PUBLISHED - **Published Date**: September 16, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 10:07 UTC - **Reserved Date**: July 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Super Flexible Software GmbH & Co. KG Syncovery 9 for Linux v9.47x and below was discovered to contain multiple remote code execution (RCE) vulnerabilities via the Job_ExecuteBefore and Job_ExecuteAfter parameters at post_profilesettings.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://super.com) 2. [](http://syncovery.com) 3. [](https://www.mgm-sp.com/en/multiple-vulnerabilities-in-syncovery-for-linux/) 4. [](http://packetstormsecurity.com/files/170245/Syncovery-For-Linux-Web-GUI-Authenticated-Remote-Command-Execution.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30280, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30280 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30280 - **State**: PUBLISHED - **Published Date**: April 08, 2025 at 08:22 UTC - **Last Updated**: June 10, 2025 at 15:17 UTC - **Reserved Date**: March 20, 2025 at 11:01 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.21.0), Mendix Runtime V10.12 (All versions < V10.12.16), Mendix Runtime V10.18 (All versions < V10.18.5), Mendix Runtime V10.6 (All versions < V10.6.22), Mendix Runtime V8 (All versions < V8.18.35), Mendix Runtime V9 (All versions < V9.24.34). Affected applications allow for entity enumeration due to distinguishable responses in certain client actions. This could allow an unauthenticated remote attacker to list all valid entities and attribute names of a Mendix Runtime-based application. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-204: Improper Input Validation ### Affected Products **Siemens - Mendix Runtime V10** Affected versions: - 0 (Status: affected) **Siemens - Mendix Runtime V10.12** Affected versions: - 0 (Status: affected) **Siemens - Mendix Runtime V10.18** Affected versions: - 0 (Status: affected) **Siemens - Mendix Runtime V10.6** Affected versions: - 0 (Status: affected) **Siemens - Mendix Runtime V8** Affected versions: - 0 (Status: affected) **Siemens - Mendix Runtime V9** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/html/ssa-874353.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15864, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15864 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15864 - **State**: PUBLISHED - **Published Date**: August 25, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 10:10 UTC - **Reserved Date**: August 24, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unchecked NULL pointer usage in resolve_keysym in xkbcomp/parser.y in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because a map access attempt can occur for a map that was never created. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201810-05](https://security.gentoo.org/glsa/201810-05) 2. [](https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html) 3. [](https://github.com/xkbcommon/libxkbcommon/commit/a8ea7a1d3daa7bdcb877615ae0a252c189153bd2) 4. [USN-3786-1](https://usn.ubuntu.com/3786-1/) 5. [USN-3786-2](https://usn.ubuntu.com/3786-2/) 6. [RHSA-2019:2079](https://access.redhat.com/errata/RHSA-2019:2079)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16673, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16673 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16673 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:46 UTC - **Last Updated**: December 20, 2021 at 22:46 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1357, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1357 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1357 - **State**: PUBLISHED - **Published Date**: April 11, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 12:50 UTC - **Reserved Date**: March 08, 2007 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The atalk_sum_skb function in AppleTalk for Linux kernel 2.6.x before 2.6.21, and possibly 2.4.x, allows remote attackers to cause a denial of service (crash) via an AppleTalk frame that is shorter than the specified length, which triggers a BUG_ON call when an attempt is made to perform a checksum. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-1286](http://www.debian.org/security/2007/dsa-1286) 2. [ADV-2007-1340](http://www.vupen.com/english/advisories/2007/1340) 3. [USN-464-1](http://www.ubuntu.com/usn/usn-464-1) 4. [SUSE-SA:2007:043](http://www.novell.com/linux/security/advisories/2007_43_kernel.html) 5. [24901](http://secunia.com/advisories/24901) 6. [](https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235857) 7. [23376](http://www.securityfocus.com/bid/23376) 8. [](https://issues.rpath.com/browse/RPL-1244) 9. [25226](http://secunia.com/advisories/25226) 10. [SUSE-SA:2007:029](http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html) 11. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.5) 12. [25683](http://secunia.com/advisories/25683) 13. [24793](http://secunia.com/advisories/24793) 14. [25099](http://secunia.com/advisories/25099) 15. [20070615 rPSA-2007-0124-1 kernel xen](http://www.securityfocus.com/archive/1/471457) 16. [25961](http://secunia.com/advisories/25961) 17. [25078](http://secunia.com/advisories/25078) 18. [25392](http://secunia.com/advisories/25392) 19. [SUSE-SA:2007:030](http://www.novell.com/linux/security/advisories/2007_30_kernel.html) 20. [DSA-1304](http://www.debian.org/security/2007/dsa-1304) 21. [25714](http://secunia.com/advisories/25714) 22. [SUSE-SA:2007:035](http://www.novell.com/linux/security/advisories/2007_35_kernel.html) 23. [25691](http://secunia.com/advisories/25691)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0269, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0269 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0269 - **State**: PUBLISHED - **Published Date**: April 19, 2018 at 20:00 UTC - **Last Updated**: November 29, 2024 at 15:14 UTC - **Reserved Date**: November 27, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web framework of the Cisco Digital Network Architecture Center (DNA Center) could allow an unauthenticated, remote attacker to communicate with the Kong API server without restriction. The vulnerability is due to an overly permissive Cross Origin Resource Sharing (CORS) policy. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. An exploit could allow the attacker to communicate with the API and exfiltrate sensitive information. Cisco Bug IDs: CSCvh99208. ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **n/a - Cisco DNA Center** Affected versions: - Cisco DNA Center (Status: affected) ### References 1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-dna1) 2. [103950](http://www.securityfocus.com/bid/103950)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4237, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4237 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4237 - **State**: PUBLISHED - **Published Date**: August 21, 2006 at 18:00 UTC - **Last Updated**: August 07, 2024 at 19:06 UTC - **Reserved Date**: August 21, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in pageheaderdefault.inc.php in Invisionix Roaming System Remote (IRSR) 0.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the _sysSessionPath parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2199](https://www.exploit-db.com/exploits/2199) 2. [irsr-pageheader-file-include(28427)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28427) 3. [19567](http://www.securityfocus.com/bid/19567)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0718, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0718 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0718 - **State**: PUBLISHED - **Published Date**: January 19, 2024 at 15:31 UTC - **Last Updated**: August 29, 2024 at 19:43 UTC - **Reserved Date**: January 19, 2024 at 07:29 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as problematic, has been found in liuwy-dlsdys zhglxt 4.7.7. This issue affects some unknown processing of the file /oa/notify/edit of the component HTTP POST Request Handler. The manipulation of the argument notifyTitle leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251543. ### CVSS Metrics - **CVSS Base Score**: 2.4/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **liuwy-dlsdys - zhglxt** Affected versions: - 4.7.7 (Status: affected) ### References 1. [](https://vuldb.com/?id.251543) 2. [](https://vuldb.com/?ctiid.251543) 3. [](https://github.com/biantaibao/zhglxt_xss/blob/main/xss.md) ### Credits - biantaibao (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52774, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52774 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52774 - **State**: PUBLISHED - **Published Date**: May 21, 2024 at 15:30 UTC - **Last Updated**: May 04, 2025 at 07:42 UTC - **Reserved Date**: May 21, 2024 at 15:19 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: s390/dasd: protect device queue against concurrent access In dasd_profile_start() the amount of requests on the device queue are counted. The access to the device queue is unprotected against concurrent access. With a lot of parallel I/O, especially with alias devices enabled, the device queue can change while dasd_profile_start() is accessing the queue. In the worst case this leads to a kernel panic due to incorrect pointer accesses. Fix this by taking the device lock before accessing the queue and counting the requests. Additionally the check for a valid profile data pointer can be done earlier to avoid unnecessary locking in a hot path. ### Affected Products **Linux - Linux** Affected versions: - 4fa52aa7a82f9226b3874a69816bda3af821f002 (Status: affected) - 4fa52aa7a82f9226b3874a69816bda3af821f002 (Status: affected) - 4fa52aa7a82f9226b3874a69816bda3af821f002 (Status: affected) - 4fa52aa7a82f9226b3874a69816bda3af821f002 (Status: affected) - 4fa52aa7a82f9226b3874a69816bda3af821f002 (Status: affected) - 4fa52aa7a82f9226b3874a69816bda3af821f002 (Status: affected) - 4fa52aa7a82f9226b3874a69816bda3af821f002 (Status: affected) - 4fa52aa7a82f9226b3874a69816bda3af821f002 (Status: affected) **Linux - Linux** Affected versions: - 3.1 (Status: affected) - 0 (Status: unaffected) - 4.14.332 (Status: unaffected) - 4.19.301 (Status: unaffected) - 5.4.263 (Status: unaffected) - 5.10.203 (Status: unaffected) - 5.15.141 (Status: unaffected) - 6.1.65 (Status: unaffected) - 6.6.4 (Status: unaffected) - 6.7 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/ebdc569a07a3e8dbe66b4184922ad6f88ac0b96f) 2. [](https://git.kernel.org/stable/c/f75617cc8df4155374132f0b500b0b3ebb967458) 3. [](https://git.kernel.org/stable/c/f1ac7789406e2ca9ac51c41ad2daa597f47bdd4d) 4. [](https://git.kernel.org/stable/c/c841de6247e94e07566d57163d3c0d8b29278f7a) 5. [](https://git.kernel.org/stable/c/6062c527d0403cef27c54b91ac8390c3a497b250) 6. [](https://git.kernel.org/stable/c/dc96fde8fcb2b896fd6c64802a7f4ece2e69b0be) 7. [](https://git.kernel.org/stable/c/9372aab5d0ff621ea203c8c603e7e5f75e888240) 8. [](https://git.kernel.org/stable/c/db46cd1e0426f52999d50fa72cfa97fa39952885)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5309, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5309 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5309 - **State**: PUBLISHED - **Published Date**: November 29, 2019 at 20:21 UTC - **Last Updated**: August 04, 2024 at 19:54 UTC - **Reserved Date**: January 04, 2019 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description Honor play smartphones with versions earlier than 9.1.0.333(C00E333R1P1T8) have an information disclosure vulnerability in certain Huawei . An attacker could view certain information after a series of operation without unlock the screen lock. Successful exploit could cause an information disclosure condition. ### Affected Products **n/a - Honor play** Affected versions: - Versions earlier than 9.1.0.333(C00E333R1P1T8) (Status: affected) ### References 1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191127-02-smartphone-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-44852, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-44852 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-44852 - **State**: PUBLISHED - **Published Date**: January 01, 2022 at 05:11 UTC - **Last Updated**: August 04, 2024 at 04:32 UTC - **Reserved Date**: December 13, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://nephosec.com/biostar-exploit/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3767, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3767 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3767 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:40 UTC - **Reserved Date**: June 19, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2254, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2254 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2254 - **State**: REJECTED - **Published Date**: January 22, 2019 at 20:00 UTC - **Last Updated**: January 22, 2019 at 17:57 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2725, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2725 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2725 - **State**: PUBLISHED - **Published Date**: March 22, 2024 at 13:35 UTC - **Last Updated**: August 01, 2024 at 19:25 UTC - **Reserved Date**: March 20, 2024 at 11:33 UTC - **Assigned By**: INCIBE ### Vulnerability Description Information exposure vulnerability in the CIGESv2 system. A remote attacker might be able to access /vendor/composer/installed.json and retrieve all installed packages used by the application. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **Ciges - CIGESv2** Affected versions: - CIGESv2 (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system) ### Credits - Rubén López Herrera
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6607, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6607 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6607 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 04, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7334, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7334 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7334 - **State**: PUBLISHED - **Published Date**: February 04, 2019 at 19:00 UTC - **Last Updated**: September 16, 2024 at 18:04 UTC - **Reserved Date**: February 04, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'Exportfile' parameter value in the view export (export.php) because proper filtration is omitted. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ZoneMinder/zoneminder/issues/2443)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53705, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53705 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53705 - **State**: PUBLISHED - **Published Date**: January 09, 2025 at 06:58 UTC - **Last Updated**: January 09, 2025 at 15:03 UTC - **Reserved Date**: November 22, 2024 at 09:54 UTC - **Assigned By**: sonicwall ### Vulnerability Description A Server-Side Request Forgery vulnerability in the SonicOS SSH management interface allows a remote attacker to establish a TCP connection to an IP address on any port when the user is logged in to the firewall. ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **SonicWall - SonicOS** Affected versions: - 6.5.4.15-117n and older versions (Status: affected) - 7.0.1-5161 and older versions (Status: affected) - 7.1.1-7058 and older versions (Status: affected) - 7.1.2-7019 (Status: affected) - 8.0.0-8035 (Status: affected) ### References 1. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003) ### Credits - Daan Keuper, Thijs Alkemade and Khaled Nassar of Computest Security through Trend Micro (Zero Day Initiative)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49039, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49039 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49039 - **State**: PUBLISHED - **Published Date**: September 26, 2024 at 03:33 UTC - **Last Updated**: September 26, 2024 at 14:51 UTC - **Reserved Date**: September 24, 2024 at 08:40 UTC - **Assigned By**: synology ### Vulnerability Description Out-of-bounds write vulnerability in backup task management functionality in Synology Drive Client before 3.4.0-15721 allows local users with administrator privileges to execute arbitrary commands via unspecified vectors. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Synology - Synology Drive Client** Affected versions: - * (Status: affected) ### References 1. [Synology-SA-24:10 Synology Drive Client](https://www.synology.com/en-global/security/advisory/Synology_SA_24_10) ### Credits - Zhao Runzi (赵润梓)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6492, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6492 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6492 - **State**: PUBLISHED - **Published Date**: December 20, 2007 at 20:00 UTC - **Last Updated**: August 07, 2024 at 16:11 UTC - **Reserved Date**: December 20, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The IMWeb.IMWebControl.1 ActiveX control in IMWeb.dll 7.0.0.x, and possibly IMWebControl.dll, in iMesh 7.1.0.x and earlier allows remote attackers to cause a denial of service (Internet Explorer 7 crash) via an empty string in the argument to the ProcessRequestEx method. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [40240](http://osvdb.org/40240) 2. [ADV-2007-4240](http://www.vupen.com/english/advisories/2007/4240) 3. [20071218 iMesh <= 7.1.0.x IMWebControl Class (IMWeb.dll 7.0.0.x) remote exploit](http://www.securityfocus.com/archive/1/485261/100/0/threaded) 4. [28134](http://secunia.com/advisories/28134) 5. [](http://retrogod.altervista.org/rgod_imesh.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11025, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11025 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11025 - **State**: PUBLISHED - **Published Date**: April 08, 2019 at 22:20 UTC - **Last Updated**: August 04, 2024 at 22:40 UTC - **Reserved Date**: April 08, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In clearFilter() in utilities.php in Cacti before 1.2.3, no escaping occurs before printing out the value of the SNMP community string (SNMP Options) in the View poller cache, leading to XSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Cacti/cacti/issues/2581) 2. [](https://github.com/Cacti/cacti/compare/6ea486a...99995bb) 3. [[debian-lts-announce] 20190416 [SECURITY] [DLA 1757-1] cacti security update](https://lists.debian.org/debian-lts-announce/2019/04/msg00017.html) 4. [[debian-lts-announce] 20220329 [SECURITY] [DLA 2965-1] cacti security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00038.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28581, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28581 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28581 - **State**: PUBLISHED - **Published Date**: September 05, 2023 at 06:24 UTC - **Last Updated**: February 27, 2025 at 21:01 UTC - **Reserved Date**: March 17, 2023 at 11:41 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory corruption in WLAN Firmware while parsing receieved GTK Keys in GTK KDE. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - FastConnect 6800 (Status: affected) - FastConnect 6900 (Status: affected) - FastConnect 7800 (Status: affected) - QCA6391 (Status: affected) - QCA6426 (Status: affected) - QCA6436 (Status: affected) - SD 8 Gen1 5G (Status: affected) - SD865 5G (Status: affected) - Snapdragon 8 Gen 1 Mobile Platform (Status: affected) - Snapdragon 865 5G Mobile Platform (Status: affected) - Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected) - Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected) - Snapdragon AR2 Gen 1 Platform (Status: affected) - Snapdragon XR2 5G Platform (Status: affected) - SSG2115P (Status: affected) - SSG2125P (Status: affected) - SXR1230P (Status: affected) - SXR2230P (Status: affected) - WCD9380 (Status: affected) - WCD9385 (Status: affected) - WCN6740 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) - WSA8830 (Status: affected) - WSA8832 (Status: affected) - WSA8835 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34509, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34509 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34509 - **State**: PUBLISHED - **Published Date**: July 22, 2022 at 14:17 UTC - **Last Updated**: August 03, 2024 at 09:15 UTC - **Reserved Date**: June 26, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The wikifaces package in PyPI v1.0 included a code execution backdoor inserted by a third party. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://pypi.doubanio.com/simple/request) 2. [](https://pypi.org/project/wikifaces/) 3. [](https://github.com/tford9/Wiki-Faces-Downloader/issues/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17859, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17859 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17859 - **State**: PUBLISHED - **Published Date**: October 09, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 10:54 UTC - **Reserved Date**: October 01, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Joomla! before 3.8.13. Inadequate checks in com_contact could allow mail submission in disabled forms. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [105559](http://www.securityfocus.com/bid/105559) 2. [1041914](http://www.securitytracker.com/id/1041914) 3. [](https://developer.joomla.org/security-centre/751-20181001-core-hardening-com-contact-contact-form.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8022, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8022 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8022 - **State**: PUBLISHED - **Published Date**: January 15, 2015 at 22:00 UTC - **Last Updated**: August 06, 2024 at 13:10 UTC - **Reserved Date**: October 08, 2014 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Cisco Identity Services Engine allow remote attackers to inject arbitrary web script or HTML via input to unspecified web pages, aka Bug IDs CSCur69835 and CSCur69776. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [cisco-ises-cve20148022-xss(100664)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100664) 2. [1031560](http://www.securitytracker.com/id/1031560) 3. [20150115 Cisco Identity Services Engine Cross-Site Scripting Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8022) 4. [20150128 Cisco Identity Services Engine Cross-Site Scripting Vulnerability](https://tools.cisco.com/security/center/viewAlert.x?alertId=37045) 5. [72083](http://www.securityfocus.com/bid/72083)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10735, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10735 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10735 - **State**: PUBLISHED - **Published Date**: May 16, 2018 at 13:00 UTC - **Last Updated**: August 05, 2024 at 07:46 UTC - **Reserved Date**: May 04, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/commandline.php cname parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.seebug.org/vuldb/ssvid-97265)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7382, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7382 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7382 - **State**: PUBLISHED - **Published Date**: April 03, 2017 at 05:44 UTC - **Last Updated**: August 05, 2024 at 15:56 UTC - **Reserved Date**: March 31, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The PdfFontFactory.cpp:200:88 code in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PDF document. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blogs.gentoo.org/ago/2017/03/31/podofo-four-null-pointer-dereference) 2. [97296](http://www.securityfocus.com/bid/97296)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48729, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48729 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48729 - **State**: REJECTED - **Last Updated**: February 13, 2025 at 17:18 UTC - **Reserved Date**: February 01, 2024 at 21:32 UTC - **Assigned By**: f5 ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3438, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3438 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3438 - **State**: PUBLISHED - **Published Date**: May 20, 2021 at 13:32 UTC - **Last Updated**: August 03, 2024 at 16:53 UTC - **Reserved Date**: March 12, 2021 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description A potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege. ### Affected Products **n/a - Certain HP LaserJet products and Samsung product printers, see Security Bulletin** Affected versions: - Various, see Security Bulletin (Status: affected) ### References 1. [](https://support.hp.com/us-en/document/ish_3900395-3833905-16)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-2077, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-2077 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-2077 - **State**: PUBLISHED - **Published Date**: July 14, 2005 at 04:00 UTC - **Last Updated**: September 16, 2024 at 19:51 UTC - **Reserved Date**: July 14, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The DCOM client in Windows 2000 before SP3 does not properly clear memory before sending an "alter context" request, which may allow remote attackers to obtain sensitive information by sniffing the session. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4410](http://www.securityfocus.com/bid/4410) 2. [20020402 Windows 2000 DCOM clients may leak sensitive information onto the network](http://www.bindview.com/Services/razor/Advisories/2002/adv_dcom.cfm) 3. [Q300367](http://support.microsoft.com/default.aspx?scid=kb%3BEN-US%3Bq300367) 4. [win2k-dcom-memory-leak(8739)](http://www.iss.net/security_center/static/8739.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3544, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3544 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3544 - **State**: PUBLISHED - **Published Date**: October 13, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 09:45 UTC - **Reserved Date**: August 07, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple stack-based buffer overflows in ovalarmsrv in HP OpenView Network Node Manager (OV NNM) 7.51, and possibly 7.01, 7.50, and 7.53, allow remote attackers to execute arbitrary code via a long (1) REQUEST_SEV_CHANGE (aka number 47), (2) REQUEST_SAVE_STATE (aka number 61), or (3) REQUEST_RESTORE_STATE (aka number 62) request to TCP port 2954. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://aluigi.altervista.org/adv/closedview_old-adv.txt) 2. [4397](http://securityreason.com/securityalert/4397) 3. [](http://downloads.securityfocus.com/vulnerabilities/exploits/28668.c) 4. [31688](http://secunia.com/advisories/31688) 5. [HPSBMA02362](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01537275) 6. [28668](http://www.securityfocus.com/bid/28668) 7. [20080407 Multiple vulnerabilities in HP OpenView NNM 7.53](http://www.securityfocus.com/archive/1/490541) 8. [SSRT080042](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01537275)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6558, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6558 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6558 - **State**: PUBLISHED - **Published Date**: September 21, 2020 at 19:06 UTC - **Last Updated**: August 04, 2024 at 09:11 UTC - **Reserved Date**: January 08, 2020 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Insufficient policy enforcement in iOSWeb in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://crbug.com/1109120) 2. [](https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html) 3. [openSUSE-SU-2020:1499](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html) 4. [openSUSE-SU-2020:1510](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html) 5. [openSUSE-SU-2020:1514](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html) 6. [DSA-4824](https://www.debian.org/security/2021/dsa-4824)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13922, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13922 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13922 - **State**: PUBLISHED - **Published Date**: January 11, 2021 at 09:40 UTC - **Last Updated**: February 13, 2025 at 16:27 UTC - **Reserved Date**: June 08, 2020 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description Versions of Apache DolphinScheduler prior to 1.3.2 allowed an ordinary user under any tenant to override another users password through the API interface. ### Weakness Classification (CWE) - CWE-264: Security Weakness ### Affected Products **Apache Software Foundation - Apache DolphinScheduler** Affected versions: - Apache DolphinScheduler (Status: affected) ### References 1. [](https://www.mail-archive.com/announce%40apache.org/msg06076.html) ### Credits - This issue was discovered by xuxiang of DtDream security
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5849, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5849 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5849 - **State**: PUBLISHED - **Published Date**: August 13, 2024 at 12:32 UTC - **Last Updated**: August 15, 2024 at 14:14 UTC - **Reserved Date**: June 11, 2024 at 07:44 UTC - **Assigned By**: CERTVDE ### Vulnerability Description An unauthenticated remote attacker may use a reflected XSS vulnerability to obtain information from a user or reboot the affected device once. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Pepperl+Fuchs - ICDM-RX/TCP-DB9/RJ45-DIN** Affected versions: - SocketServer (Status: affected) **Pepperl+Fuchs - ICDM-RX/TCP-ST/RJ45-DIN** Affected versions: - SocketServer (Status: affected) **Pepperl+Fuchs - ICDM-RX/TCP-4DB9/2RJ45-DIN** Affected versions: - SocketServer (Status: affected) **Pepperl+Fuchs - ICDM-RX/TCP-DB9/RJ45-PM** Affected versions: - SocketServer (Status: affected) **Pepperl+Fuchs - ICDM-RX/TCP-2DB9/RJ45-DIN** Affected versions: - SocketServer (Status: affected) **Pepperl+Fuchs - ICDM-RX/TCP-2ST/RJ45-DIN** Affected versions: - SocketServer (Status: affected) **Pepperl+Fuchs - ICDM-RX/TCP-4DB9/2RJ45-PM** Affected versions: - SocketServer (Status: affected) **Pepperl+Fuchs - ICDM-RX/TCP-8DB9/2RJ45-PM** Affected versions: - SocketServer (Status: affected) **Pepperl+Fuchs - ICDM-RX/TCP-16RJ45/RJ45-RM** Affected versions: - SocketServer (Status: affected) **Pepperl+Fuchs - ICDM-RX/TCP-16DB9/RJ45-RM** Affected versions: - SocketServer (Status: affected) **Pepperl+Fuchs - ICDM-RX/TCP-32RJ45/RJ45-RM** Affected versions: - SocketServer (Status: affected) **Pepperl+Fuchs - ICDM-RX/TCP-DB9/RJ45-PM2** Affected versions: - SocketServer (Status: affected) **Pepperl+Fuchs - ICDM-RX/TCP-16RJ45/2RJ45-PM** Affected versions: - SocketServer (Status: affected) **Pepperl+Fuchs - ICDM-RX/PN-DB9/RJ45-DIN** Affected versions: - PROFINET (Status: affected) **Pepperl+Fuchs - ICDM-RX/PN-ST/RJ45-DIN** Affected versions: - PROFINET (Status: affected) **Pepperl+Fuchs - ICDM-RX/PN-4DB9/2RJ45-DIN** Affected versions: - PROFINET (Status: affected) **Pepperl+Fuchs - ICDM-RX/PN-DB9/RJ45-PM** Affected versions: - PROFINET (Status: affected) **Pepperl+Fuchs - ICDM-RX/PN-2DB9/RJ45-DIN** Affected versions: - PROFINET (Status: affected) **Pepperl+Fuchs - ICDM-RX/PN-2ST/RJ45-DIN** Affected versions: - PROFINET (Status: affected) **Pepperl+Fuchs - ICDM-RX/PN1-DB9/RJ45-PM** Affected versions: - PROFINET/Modbus (Status: affected) **Pepperl+Fuchs - ICDM-RX/PN1-DB9/RJ45-DIN** Affected versions: - PROFINET/Modbus (Status: affected) **Pepperl+Fuchs - ICDM-RX/PN1-ST/RJ45-DIN** Affected versions: - PROFINET/Modbus (Status: affected) **Pepperl+Fuchs - ICDM-RX/PN1-2DB9/RJ45-DIN** Affected versions: - PROFINET/Modbus (Status: affected) **Pepperl+Fuchs - ICDM-RX/PN1-4DB9/2RJ45-DIN** Affected versions: - PROFINET/Modbus (Status: affected) **Pepperl+Fuchs - ICDM-RX/PN1-2ST/RJ45-DIN** Affected versions: - PROFINET/Modbus (Status: affected) **Pepperl+Fuchs - ICDM-RX/EN-DB9/RJ45-DIN** Affected versions: - EtherNet/IP (Status: affected) **Pepperl+Fuchs - ICDM-RX/EN-ST/RJ45-DIN** Affected versions: - EtherNet/IP (Status: affected) **Pepperl+Fuchs - ICDM-RX/EN-4DB9/2RJ45-DIN** Affected versions: - EtherNet/IP (Status: affected) **Pepperl+Fuchs - ICDM-RX/EN-DB9/RJ45-PM** Affected versions: - EtherNet/IP (Status: affected) **Pepperl+Fuchs - ICDM-RX/EN-2DB9/RJ45-DIN** Affected versions: - EtherNet/IP (Status: affected) **Pepperl+Fuchs - ICDM-RX/EN-2ST/RJ45-DIN** Affected versions: - EtherNet/IP (Status: affected) **Pepperl+Fuchs - ICDM-RX/EN1-DB9/RJ45-PM** Affected versions: - EIP/Modbus (Status: affected) **Pepperl+Fuchs - ICDM-RX/EN1-DB9/RJ45-DIN** Affected versions: - EIP/Modbus (Status: affected) **Pepperl+Fuchs - ICDM-RX/EN1-ST/RJ45-DIN** Affected versions: - EIP/Modbus (Status: affected) **Pepperl+Fuchs - ICDM-RX/EN1-2DB9/RJ45-DIN** Affected versions: - EIP/Modbus (Status: affected) **Pepperl+Fuchs - ICDM-RX/EN1-4DB9/2RJ45-DIN** Affected versions: - EIP/Modbus (Status: affected) **Pepperl+Fuchs - ICDM-RX/EN1-2ST/RJ45-DIN** Affected versions: - EIP/Modbus (Status: affected) **Pepperl+Fuchs - ICDM-RX/MOD-DB9/RJ45-DIN** Affected versions: - Modbus Router (Status: affected) - Modbus Server (Status: affected) - Modbus TCP (Status: affected) **Pepperl+Fuchs - ICDM-RX/MOD-ST/RJ45-DIN** Affected versions: - Modbus Router (Status: affected) - Modbus Server (Status: affected) - Modbus TCP (Status: affected) **Pepperl+Fuchs - ICDM-RX/MOD-4DB9/2RJ45-DIN** Affected versions: - Modbus Router (Status: affected) - Modbus Server (Status: affected) - Modbus TCP (Status: affected) **Pepperl+Fuchs - ICDM-RX/MOD-DB9/RJ45-PM** Affected versions: - Modbus Router (Status: affected) - Modbus Server (Status: affected) - Modbus TCP (Status: affected) **Pepperl+Fuchs - ICDM-RX/MOD-2DB9/RJ45-DIN** Affected versions: - Modbus Router (Status: affected) - Modbus Server (Status: affected) - Modbus TCP (Status: affected) **Pepperl+Fuchs - ICDM-RX/MOD-2ST/RJ45-DIN** Affected versions: - Modbus Router (Status: affected) - Modbus Server (Status: affected) - Modbus TCP (Status: affected) **Pepperl+Fuchs - ICDM-RX/MOD-16RJ45/2RJ45-PM** Affected versions: - Modbus Router (Status: affected) - Modbus Server (Status: affected) - Modbus TCP (Status: affected) ### References 1. [](https://cert.vde.com/en/advisories/VDE-2024-033) ### Credits - Christopher Di-Nozzi
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0929, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0929 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0929 - **State**: PUBLISHED - **Published Date**: January 31, 2025 at 13:37 UTC - **Last Updated**: January 31, 2025 at 14:58 UTC - **Reserved Date**: January 31, 2025 at 11:36 UTC - **Assigned By**: INCIBE ### Vulnerability Description SQL injection vulnerability in TeamCal Neo, version 3.8.2. This could allow an attacker to retrieve, update and delete all database information by injecting a malicious SQL statement via the ‘abs’ parameter in ‘/teamcal/src/index.php’. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Lewe - TeamCal Neo** Affected versions: - 3.8.2 (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-teamcal-neo) ### Credits - Ignacio Garcia Mestre (Br4v3n)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-36255, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-36255 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-36255 - **State**: PUBLISHED - **Published Date**: May 26, 2024 at 13:32 UTC - **Last Updated**: August 02, 2024 at 03:37 UTC - **Reserved Date**: May 23, 2024 at 10:57 UTC - **Assigned By**: Mattermost ### Vulnerability Description Mattermost versions 9.5.x <= 9.5.3, 9.6.x <= 9.6.1 and 8.1.x <= 8.1.12 fail to perform proper input validation on post actions which allows an attacker to run a playbook checklist task command as another user via creating and sharing a deceptive post action that unexpectedly runs a slash command in some arbitrary channel. ### CVSS Metrics - **CVSS Base Score**: 5.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Mattermost - Mattermost** Affected versions: - 9.5.0 (Status: affected) - 9.6.0 (Status: affected) - 8.1.0 (Status: affected) - 9.7.0 (Status: unaffected) - 9.5.4 (Status: unaffected) - 9.6.2 (Status: unaffected) - 8.1.13 (Status: unaffected) ### References 1. [](https://mattermost.com/security-updates) ### Credits - Juho Nurminen
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1405, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1405 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1405 - **State**: PUBLISHED - **Published Date**: April 08, 2021 at 04:30 UTC - **Last Updated**: November 08, 2024 at 23:25 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the email parsing module in Clam AntiVirus (ClamAV) Software version 0.103.1 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper variable initialization that may result in an NULL pointer read. An attacker could exploit this vulnerability by sending a crafted email to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **Cisco - ClamAV** Affected versions: - unspecified (Status: affected) ### References 1. [](https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html) 2. [[debian-lts-announce] 20210414 [SECURITY] [DLA 2626-1] clamav security update](https://lists.debian.org/debian-lts-announce/2021/04/msg00012.html) 3. [GLSA-202104-07](https://security.gentoo.org/glsa/202104-07)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4419, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4419 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4419 - **State**: PUBLISHED - **Published Date**: December 24, 2009 at 17:00 UTC - **Last Updated**: August 07, 2024 at 07:01 UTC - **Reserved Date**: December 24, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Intel Q35, GM45, PM45 Express, Q45, and Q43 Express chipsets in the SINIT Authenticated Code Module (ACM), which allows local users to bypass the Trusted Execution Technology protection mechanism and gain privileges by modifying the MCHBAR register to point to an attacker-controlled region, which prevents the SENTER instruction from properly applying VT-d protection while an MLE is being loaded. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00021&languageid=en-fr) 2. [1023382](http://www.securitytracker.com/id?1023382) 3. [37430](http://www.securityfocus.com/bid/37430) 4. [61248](http://osvdb.org/61248) 5. [](http://invisiblethingslab.com/resources/misc09/Another%20TXT%20Attack.pdf) 6. [ADV-2009-3618](http://www.vupen.com/english/advisories/2009/3618) 7. [37900](http://secunia.com/advisories/37900) 8. [intel-chipset-sinit-priv-escalation(54963)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54963) 9. [](http://theinvisiblethings.blogspot.com/2009/12/another-txt-attack.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5527, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5527 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5527 - **State**: PUBLISHED - **Published Date**: October 25, 2016 at 14:00 UTC - **Last Updated**: October 10, 2024 at 18:31 UTC - **Reserved Date**: June 16, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Agile PLM component in Oracle Supply Chain Products Suite 9.3.4 and 9.3.5 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2016-5524. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html) 2. [93665](http://www.securityfocus.com/bid/93665)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4565, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4565 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4565 - **State**: PUBLISHED - **Published Date**: June 26, 2020 at 13:45 UTC - **Last Updated**: September 17, 2024 at 02:00 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Spectrum Protect Plus 10.1.0 through 10.1.5 could allow an attacker to obtain sensitive information due to insecure communications being used between the application and server. IBM X-Force ID: 183935. ### Affected Products **IBM - Spectrum Protect Plus** Affected versions: - 10.1.0 (Status: affected) - 10.1.5 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6238920) 2. [ibm-spectrum-cve20204565-info-disc (183935)](https://exchange.xforce.ibmcloud.com/vulnerabilities/183935)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1579, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1579 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1579 - **State**: PUBLISHED - **Published Date**: June 02, 2008 at 14:00 UTC - **Last Updated**: August 07, 2024 at 08:24 UTC - **Reserved Date**: March 31, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Wiki Server in Apple Mac OS X 10.5 before 10.5.3 allows remote attackers to obtain sensitive information (user names) by reading the error message produced upon access to a nonexistent blog. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [TA08-150A](http://www.us-cert.gov/cas/techalerts/TA08-150A.html) 2. [1020143](http://securitytracker.com/id?1020143) 3. [30430](http://secunia.com/advisories/30430) 4. [APPLE-SA-2008-05-28](http://lists.apple.com/archives/security-announce/2008//May/msg00001.html) 5. [ADV-2008-1697](http://www.vupen.com/english/advisories/2008/1697) 6. [macosx-wikiserver-information-disclosure(42727)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42727) 7. [29412](http://www.securityfocus.com/bid/29412)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0447, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0447 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0447 - **State**: PUBLISHED - **Published Date**: February 08, 2017 at 15:00 UTC - **Last Updated**: August 05, 2024 at 13:03 UTC - **Reserved Date**: November 29, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description An elevation of privilege vulnerability in the HTC touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-32919560. ### Affected Products **Google Inc. - Android** Affected versions: - Kernel-3.18 (Status: affected) ### References 1. [96054](http://www.securityfocus.com/bid/96054) 2. [1037798](http://www.securitytracker.com/id/1037798) 3. [](https://source.android.com/security/bulletin/2017-02-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49758, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49758 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49758 - **State**: PUBLISHED - **Published Date**: November 15, 2024 at 15:17 UTC - **Last Updated**: November 15, 2024 at 18:52 UTC - **Reserved Date**: October 18, 2024 at 13:43 UTC - **Assigned By**: GitHub_M ### Vulnerability Description LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can add Notes to a device, the application did not properly sanitize the user input, when the ExamplePlugin enable, if java script code is inside the device's Notes, its will be trigger. This vulnerability is fixed in 24.10.0. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **librenms - librenms** Affected versions: - < 24.10.0 (Status: affected) ### References 1. [https://github.com/librenms/librenms/security/advisories/GHSA-c86q-rj37-8f85](https://github.com/librenms/librenms/security/advisories/GHSA-c86q-rj37-8f85) 2. [https://github.com/librenms/librenms/commit/24b142d753898e273ec20b542a27dd6eb530c7d8](https://github.com/librenms/librenms/commit/24b142d753898e273ec20b542a27dd6eb530c7d8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3956, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3956 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3956 - **State**: PUBLISHED - **Published Date**: July 31, 2013 at 10:00 UTC - **Last Updated**: August 06, 2024 at 16:30 UTC - **Reserved Date**: June 05, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The NICM.SYS kernel driver 3.1.11.0 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003; Novell Client 2 SP2 on Windows Vista and Windows Server 2008; and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted 0x143B6B IOCTL call. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://pastebin.com/GB4iiEwR) 2. [26452](http://www.exploit-db.com/exploits/26452) 3. [27191](http://www.exploit-db.com/exploits/27191) 4. [](http://www.novell.com/support/kb/doc.php?id=7012497)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7874, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7874 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7874 - **State**: PUBLISHED - **Published Date**: December 06, 2024 at 20:54 UTC - **Last Updated**: December 10, 2024 at 14:43 UTC - **Reserved Date**: August 16, 2024 at 11:43 UTC - **Assigned By**: CERT-PL ### Vulnerability Description Tungsten Automation (Kofax) TotalAgility in versions all through 7.9.0.25.0.954 is vulnerable to a Reflected XSS attacks through mfpConnectionId parameter manipulation in a form sent to endpoints "/TotalAgility/Kofax/BrowserDevice/ScanFront.aspx" and "/TotalAgility/Kofax/BrowserDevice/ScanFrontDebug.aspx" This allows for injection of a malicious JavaScript code, leading to a possible information leak.  Exploitation is possible only while using POST requests and also requires retrieving/generating a proper VIEWSTATE parameter, which limits the risk of a successful attack. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Tungsten Automation - TotalAgility** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.tungstenautomation.com/products/totalagility) 2. [](https://cert.pl/en/posts/2024/12/CVE-2024-7874) 3. [](https://cert.pl/posts/2024/12/CVE-2024-7874) ### Credits - Amin ACHOUR - Abderrahmane Bounhidja
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49890, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49890 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49890 - **State**: PUBLISHED - **Published Date**: May 01, 2025 at 14:10 UTC - **Last Updated**: May 04, 2025 at 08:47 UTC - **Reserved Date**: May 01, 2025 at 14:05 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: capabilities: fix potential memleak on error path from vfs_getxattr_alloc() In cap_inode_getsecurity(), we will use vfs_getxattr_alloc() to complete the memory allocation of tmpbuf, if we have completed the memory allocation of tmpbuf, but failed to call handler->get(...), there will be a memleak in below logic: |-- ret = (int)vfs_getxattr_alloc(mnt_userns, ...) | /* ^^^ alloc for tmpbuf */ |-- value = krealloc(*xattr_value, error + 1, flags) | /* ^^^ alloc memory */ |-- error = handler->get(handler, ...) | /* error! */ |-- *xattr_value = value | /* xattr_value is &tmpbuf (memory leak!) */ So we will try to free(tmpbuf) after vfs_getxattr_alloc() fails to fix it. [PM: subject line and backtrace tweaks] ### Affected Products **Linux - Linux** Affected versions: - 8db6c34f1dbc8e06aa016a9b829b06902c3e1340 (Status: affected) - 8db6c34f1dbc8e06aa016a9b829b06902c3e1340 (Status: affected) - 8db6c34f1dbc8e06aa016a9b829b06902c3e1340 (Status: affected) - 8db6c34f1dbc8e06aa016a9b829b06902c3e1340 (Status: affected) - 8db6c34f1dbc8e06aa016a9b829b06902c3e1340 (Status: affected) - 8db6c34f1dbc8e06aa016a9b829b06902c3e1340 (Status: affected) - 8db6c34f1dbc8e06aa016a9b829b06902c3e1340 (Status: affected) **Linux - Linux** Affected versions: - 4.14 (Status: affected) - 0 (Status: unaffected) - 4.14.299 (Status: unaffected) - 4.19.265 (Status: unaffected) - 5.4.224 (Status: unaffected) - 5.10.154 (Status: unaffected) - 5.15.78 (Status: unaffected) - 6.0.8 (Status: unaffected) - 6.1 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/6bb00eb21c0fbf18e5d3538c9ff0cf63fd0ace85) 2. [](https://git.kernel.org/stable/c/90577bcc01c4188416a47269f8433f70502abe98) 3. [](https://git.kernel.org/stable/c/0c3e6288da650d1ec911a259c77bc2d88e498603) 4. [](https://git.kernel.org/stable/c/cdf01c807e974048c43c7fd3ca574f6086a57906) 5. [](https://git.kernel.org/stable/c/2de8eec8afb75792440b8900a01d52b8f6742fd1) 6. [](https://git.kernel.org/stable/c/7480aeff0093d8c54377553ec6b31110bea37b4d) 7. [](https://git.kernel.org/stable/c/8cf0a1bc12870d148ae830a4ba88cfdf0e879cee)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2914, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2914 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2914 - **State**: PUBLISHED - **Published Date**: March 28, 2025 at 16:31 UTC - **Last Updated**: March 28, 2025 at 16:54 UTC - **Reserved Date**: March 28, 2025 at 11:01 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic has been found in HDF5 up to 1.14.6. This affects the function H5FS__sinfo_Srialize_Sct_cb of the file src/H5FScache.c. The manipulation of the argument sect leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 3.3/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow - CWE-119: Security Weakness ### Affected Products **n/a - HDF5** Affected versions: - 1.14.0 (Status: affected) - 1.14.1 (Status: affected) - 1.14.2 (Status: affected) - 1.14.3 (Status: affected) - 1.14.4 (Status: affected) - 1.14.5 (Status: affected) - 1.14.6 (Status: affected) ### References 1. [VDB-301887 | HDF5 H5FScache.c H5FS__sinfo_Srialize_Sct_cb heap-based overflow](https://vuldb.com/?id.301887) 2. [VDB-301887 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.301887) 3. [Submit #520880 | https://github.com/HDFGroup/hdf5 HDF5 v1.14.6 Heap-based Buffer Overflow](https://vuldb.com/?submit.520880) 4. [](https://github.com/HDFGroup/hdf5/issues/5379)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37224, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37224 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37224 - **State**: PUBLISHED - **Published Date**: July 14, 2023 at 00:00 UTC - **Last Updated**: October 30, 2024 at 15:49 UTC - **Reserved Date**: June 29, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in Archer Platform before v.6.13 fixed in v.6.12.0.6 and v.6.13.0 allows an authenticated attacker to obtain sensitive information via the log files. ### CVSS Metrics - **CVSS Base Score**: 6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AC:L/AV:L/A:N/C:H/I:N/PR:H/S:C/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://archerirm.com) 2. [](https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/702362)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4281, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4281 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4281 - **State**: PUBLISHED - **Published Date**: November 10, 2008 at 11:00 UTC - **Last Updated**: August 07, 2024 at 10:08 UTC - **Reserved Date**: September 26, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in VMWare ESXi 3.5 before ESXe350-200810401-O-UG and ESX 3.5 before ESX350-200810201-UG allows administrators with the Datastore.FileManagement privilege to gain privileges via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[Security-announce] 20081106 VMSA-2008-0018 VMware Hosted products and patches for ESX and ESXi resolve two security issues](http://lists.vmware.com/pipermail/security-announce/2008/000042.html) 2. [32172](http://www.securityfocus.com/bid/32172) 3. [20081107 VMSA-2008-0018 VMware Hosted products and patches for ESX and ESXi resolve two security issues](http://www.securityfocus.com/archive/1/498138/100/0/threaded) 4. [oval:org.mitre.oval:def:6425](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6425) 5. [vmware-virtualcenter-directory-traversal(46418)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46418) 6. [32624](http://secunia.com/advisories/32624) 7. [1021155](http://www.securitytracker.com/id?1021155) 8. [](http://www.vmware.com/security/advisories/VMSA-2008-0018.html) 9. [ADV-2008-3052](http://www.vupen.com/english/advisories/2008/3052)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48782, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48782 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48782 - **State**: PUBLISHED - **Published Date**: July 16, 2024 at 11:13 UTC - **Last Updated**: May 04, 2025 at 08:23 UTC - **Reserved Date**: June 20, 2024 at 11:09 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: mctp: fix use after free Clang static analysis reports this problem route.c:425:4: warning: Use of memory after it is freed trace_mctp_key_acquire(key); ^~~~~~~~~~~~~~~~~~~~~~~~~~~ When mctp_key_add() fails, key is freed but then is later used in trace_mctp_key_acquire(). Add an else statement to use the key only when mctp_key_add() is successful. ### Affected Products **Linux - Linux** Affected versions: - 4f9e1ba6de45aa8797a83f1fe5b82ec4bac16899 (Status: affected) - 4f9e1ba6de45aa8797a83f1fe5b82ec4bac16899 (Status: affected) **Linux - Linux** Affected versions: - 5.16 (Status: affected) - 0 (Status: unaffected) - 5.16.11 (Status: unaffected) - 5.17 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/1dd3ecbec5f606b2a526c47925c8634b1a6bb81e) 2. [](https://git.kernel.org/stable/c/7e5b6a5c8c44310784c88c1c198dde79f6402f7b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3606, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3606 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3606 - **State**: PUBLISHED - **Published Date**: April 24, 2025 at 23:15 UTC - **Last Updated**: April 25, 2025 at 16:02 UTC - **Reserved Date**: April 14, 2025 at 19:44 UTC - **Assigned By**: icscert ### Vulnerability Description Vestel AC Charger version 3.75.0 contains a vulnerability that could enable an attacker to access files containing sensitive information, such as credentials which could be used to further compromise the device. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-497: Security Weakness ### Affected Products **Vestel - AC Charger EVC04** Affected versions: - 3.75.0 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-25-114-03) 2. [](https://firebasestorage.googleapis.com/v0/b/vestel-shield.firebasestorage.app/o/PRODUCTION%2F1%2FVSA-1_R2.pdf?alt=media&token=8201f299-5014-4720-9200-f1b335736ac1) ### Credits - Cumhur Kizilari reported this vulnerability to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6217, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6217 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6217 - **State**: PUBLISHED - **Published Date**: January 25, 2018 at 08:00 UTC - **Last Updated**: August 05, 2024 at 05:54 UTC - **Reserved Date**: January 25, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The WStr::_alloc_iostr_data() function in kso.dll in Kingsoft WPS Office 10.1.0.7106 and 10.2.0.5978 allows remote attackers to cause a denial of service (application crash) via a crafted (a) web page, (b) office document, or (c) .rtf file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Khwarezmia/WPS_POC/tree/master/wps_20180122)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6766, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6766 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6766 - **State**: PUBLISHED - **Published Date**: August 06, 2024 at 06:00 UTC - **Last Updated**: August 06, 2024 at 13:29 UTC - **Reserved Date**: July 15, 2024 at 19:31 UTC - **Assigned By**: WPScan ### Vulnerability Description The shortcodes-ultimate-pro WordPress plugin before 7.2.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - shortcodes-ultimate-pro** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/77bb1dcf-4e84-497a-955e-f3c0b649ad1c/) ### Credits - Dmitrii Ignatyev - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2249, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2249 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2249 - **State**: PUBLISHED - **Published Date**: May 09, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:43 UTC - **Reserved Date**: May 08, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in search.php in CuteNews 1.4.1 and earlier, and possibly 1.4.5, allow remote attackers to inject arbitrary web script or HTML via the (1) user, (2) story, or (3) title parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-1683](http://www.vupen.com/english/advisories/2006/1683) 2. [860](http://securityreason.com/securityalert/860) 3. [20026](http://secunia.com/advisories/20026) 4. [20060505 CuteNews 1.4.1 Multiple vulnerabilities](http://www.securityfocus.com/archive/1/433058/100/0/threaded) 5. [25304](http://www.osvdb.org/25304) 6. [](http://neosecurityteam.net/index.php?action=advisories&id=21) 7. [cutenews-search-parameters-xss(26270)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26270) 8. [17850](http://www.securityfocus.com/bid/17850)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2644, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2644 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2644 - **State**: REJECTED - **Published Date**: October 05, 2014 at 01:00 UTC - **Last Updated**: October 06, 2014 at 01:57 UTC - **Reserved Date**: March 22, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15066, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15066 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15066 - **State**: PUBLISHED - **Published Date**: October 17, 2019 at 19:22 UTC - **Last Updated**: September 16, 2024 at 16:48 UTC - **Reserved Date**: August 15, 2019 at 00:00 UTC - **Assigned By**: twcert ### Vulnerability Description An “invalid command” handler issue was discovered in HiNet GPON firmware < I040GWR190731. It allows an attacker to execute arbitrary command through port 6998. CVSS 3.0 Base score 10.0. CVSS vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). ### CVSS Metrics - **CVSS Base Score**: 10/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Affected Products **HiNET - GPON** Affected versions: - firmware < I040GWR190731 (Status: affected) ### References 1. [](https://www.twcert.org.tw/en/cp-128-3017-fd6bc-2.html) 2. [](https://tvn.twcert.org.tw/taiwanvn/TVN-201908012) ### Credits - DEVCORE
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20383, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20383 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20383 - **State**: PUBLISHED - **Published Date**: December 23, 2018 at 21:00 UTC - **Last Updated**: September 16, 2024 at 18:13 UTC - **Reserved Date**: December 23, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ARRIS DG950A 7.10.145 and DG950S 7.10.145.EURO devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv) 2. [](https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32577, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32577 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32577 - **State**: PUBLISHED - **Published Date**: May 10, 2023 at 13:16 UTC - **Last Updated**: January 27, 2025 at 18:08 UTC - **Reserved Date**: June 19, 2022 at 03:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper input validation in BIOS Firmware for some Intel(R) NUC Kits before version PY0081 may allow a privileged user to potentially enable information disclosure or denial of service via local access ### CVSS Metrics - **CVSS Base Score**: 3.4/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **n/a - Intel(R) NUC Kits** Affected versions: - before version PY0081 (Status: affected) ### References 1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11827, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11827 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11827 - **State**: PUBLISHED - **Published Date**: September 18, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 08:17 UTC - **Reserved Date**: June 07, 2018 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, improper validation of array index in WMA roam synchronization handler can lead to OOB write. ### Affected Products **Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android** Affected versions: - All Android releases from CAF using the Linux kernel (Status: affected) ### References 1. [](https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin) 2. [](https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=4c74687be66c19be0b9bd83d78d033dff5d1a9ae) 3. [107770](http://www.securityfocus.com/bid/107770)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5181, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5181 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5181 - **State**: PUBLISHED - **Published Date**: October 24, 2013 at 01:00 UTC - **Last Updated**: September 16, 2024 at 18:44 UTC - **Reserved Date**: August 15, 2013 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description The auto-configuration feature in Mail in Apple Mac OS X before 10.9 selects plaintext authentication for unspecified servers that support CRAM-MD5 authentication, which allows remote attackers to obtain sensitive information by sniffing the network. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2013-10-22-3](http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20210, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20210 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20210 - **State**: PUBLISHED - **Published Date**: March 25, 2021 at 18:57 UTC - **Last Updated**: August 03, 2024 at 17:30 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in Privoxy in versions before 3.0.29. Memory leak in the show-status CGI handler when no filter files are configured can lead to a system crash. ### Weakness Classification (CWE) - CWE-401: Security Weakness ### Affected Products **n/a - privoxy** Affected versions: - Privoxy 3.0.29 (Status: affected) ### References 1. [](https://www.privoxy.org/3.0.29/user-manual/whatsnew.html) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1928729) 3. [GLSA-202107-16](https://security.gentoo.org/glsa/202107-16)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5314, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5314 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5314 - **State**: PUBLISHED - **Published Date**: October 09, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 15:24 UTC - **Reserved Date**: October 09, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in system/funcs/xkurl.php in xKiosk WEB 3.0.1i, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the PEARPATH parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4502](https://www.exploit-db.com/exploits/4502) 2. [ADV-2007-3427](http://www.vupen.com/english/advisories/2007/3427) 3. [37620](http://osvdb.org/37620) 4. [27140](http://secunia.com/advisories/27140) 5. [xkioskweb-xkurl-file-include(37030)](https://exchange.xforce.ibmcloud.com/vulnerabilities/37030)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0274, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0274 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0274 - **State**: PUBLISHED - **Published Date**: January 18, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 16:25 UTC - **Reserved Date**: January 18, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the Oracle Reports Developer component of Oracle Application Server 9.0.4.2 and 10.1.2.0.2 has unspecified impact and attack vectors, as identified by Oracle Vuln# REP03. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oracle-january2006-update(24321)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24321) 2. [18493](http://secunia.com/advisories/18493) 3. [ADV-2006-0323](http://www.vupen.com/english/advisories/2006/0323) 4. [16287](http://www.securityfocus.com/bid/16287) 5. [VU#545804](http://www.kb.cert.org/vuls/id/545804) 6. [1015499](http://securitytracker.com/id?1015499) 7. [ADV-2006-0243](http://www.vupen.com/english/advisories/2006/0243) 8. [](http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html) 9. [18608](http://secunia.com/advisories/18608)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0679, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0679 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0679 - **State**: PUBLISHED - **Published Date**: March 21, 2013 at 15:00 UTC - **Last Updated**: September 16, 2024 at 16:12 UTC - **Reserved Date**: December 19, 2012 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Directory traversal vulnerability in the web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote authenticated users to read arbitrary files via vectors involving a query for a pathname. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf) 2. [](http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50083, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50083 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50083 - **State**: PUBLISHED - **Published Date**: October 29, 2024 at 00:50 UTC - **Last Updated**: May 23, 2025 at 13:11 UTC - **Reserved Date**: October 21, 2024 at 19:36 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: tcp: fix mptcp DSS corruption due to large pmtu xmit Syzkaller was able to trigger a DSS corruption: TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5227 at net/mptcp/protocol.c:695 __mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695 Modules linked in: CPU: 0 UID: 0 PID: 5227 Comm: syz-executor350 Not tainted 6.11.0-syzkaller-08829-gaf9c191ac2a0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:__mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695 Code: 0f b6 dc 31 ff 89 de e8 b5 dd ea f5 89 d8 48 81 c4 50 01 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 98 da ea f5 90 <0f> 0b 90 e9 47 ff ff ff e8 8a da ea f5 90 0f 0b 90 e9 99 e0 ff ff RSP: 0018:ffffc90000006db8 EFLAGS: 00010246 RAX: ffffffff8ba9df18 RBX: 00000000000055f0 RCX: ffff888030023c00 RDX: 0000000000000100 RSI: 00000000000081e5 RDI: 00000000000055f0 RBP: 1ffff110062bf1ae R08: ffffffff8ba9cf12 R09: 1ffff110062bf1b8 R10: dffffc0000000000 R11: ffffed10062bf1b9 R12: 0000000000000000 R13: dffffc0000000000 R14: 00000000700cec61 R15: 00000000000081e5 FS: 000055556679c380(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020287000 CR3: 0000000077892000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <IRQ> move_skbs_to_msk net/mptcp/protocol.c:811 [inline] mptcp_data_ready+0x29c/0xa90 net/mptcp/protocol.c:854 subflow_data_ready+0x34a/0x920 net/mptcp/subflow.c:1490 tcp_data_queue+0x20fd/0x76c0 net/ipv4/tcp_input.c:5283 tcp_rcv_established+0xfba/0x2020 net/ipv4/tcp_input.c:6237 tcp_v4_do_rcv+0x96d/0xc70 net/ipv4/tcp_ipv4.c:1915 tcp_v4_rcv+0x2dc0/0x37f0 net/ipv4/tcp_ipv4.c:2350 ip_protocol_deliver_rcu+0x22e/0x440 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x341/0x5f0 net/ipv4/ip_input.c:233 NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314 NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314 __netif_receive_skb_one_core net/core/dev.c:5662 [inline] __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5775 process_backlog+0x662/0x15b0 net/core/dev.c:6107 __napi_poll+0xcb/0x490 net/core/dev.c:6771 napi_poll net/core/dev.c:6840 [inline] net_rx_action+0x89b/0x1240 net/core/dev.c:6962 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 do_softirq+0x11b/0x1e0 kernel/softirq.c:455 </IRQ> <TASK> __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline] __dev_queue_xmit+0x1764/0x3e80 net/core/dev.c:4451 dev_queue_xmit include/linux/netdevice.h:3094 [inline] neigh_hh_output include/net/neighbour.h:526 [inline] neigh_output include/net/neighbour.h:540 [inline] ip_finish_output2+0xd41/0x1390 net/ipv4/ip_output.c:236 ip_local_out net/ipv4/ip_output.c:130 [inline] __ip_queue_xmit+0x118c/0x1b80 net/ipv4/ip_output.c:536 __tcp_transmit_skb+0x2544/0x3b30 net/ipv4/tcp_output.c:1466 tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline] tcp_mtu_probe net/ipv4/tcp_output.c:2547 [inline] tcp_write_xmit+0x641d/0x6bf0 net/ipv4/tcp_output.c:2752 __tcp_push_pending_frames+0x9b/0x360 net/ipv4/tcp_output.c:3015 tcp_push_pending_frames include/net/tcp.h:2107 [inline] tcp_data_snd_check net/ipv4/tcp_input.c:5714 [inline] tcp_rcv_established+0x1026/0x2020 net/ipv4/tcp_input.c:6239 tcp_v4_do_rcv+0x96d/0xc70 net/ipv4/tcp_ipv4.c:1915 sk_backlog_rcv include/net/sock.h:1113 [inline] __release_sock+0x214/0x350 net/core/sock.c:3072 release_sock+0x61/0x1f0 net/core/sock.c:3626 mptcp_push_ ---truncated--- ### Affected Products **Linux - Linux** Affected versions: - 85712484110df308215077be6ee21c4e57d7dec2 (Status: affected) - 85712484110df308215077be6ee21c4e57d7dec2 (Status: affected) - 85712484110df308215077be6ee21c4e57d7dec2 (Status: affected) - 85712484110df308215077be6ee21c4e57d7dec2 (Status: affected) - 85712484110df308215077be6ee21c4e57d7dec2 (Status: affected) - 85712484110df308215077be6ee21c4e57d7dec2 (Status: affected) **Linux - Linux** Affected versions: - 5.6 (Status: affected) - 0 (Status: unaffected) - 5.10.228 (Status: unaffected) - 5.15.169 (Status: unaffected) - 6.1.114 (Status: unaffected) - 6.6.58 (Status: unaffected) - 6.11.5 (Status: unaffected) - 6.12 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/c38add9ac0e4d4f418e6443a688491499021add9) 2. [](https://git.kernel.org/stable/c/9729010a0ac5945c1bf6847dd0778d8a1a4b72ac) 3. [](https://git.kernel.org/stable/c/ba8e65814e519eeb17d086952bce7de93f7a40da) 4. [](https://git.kernel.org/stable/c/229dfdc36f31a8d47433438bc0e6e1662c4ab404) 5. [](https://git.kernel.org/stable/c/db04d1848777ae52a7ab93c4591e7c0bf8f55fb4) 6. [](https://git.kernel.org/stable/c/4dabcdf581217e60690467a37c956a5b8dbc6bd9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2611, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2611 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2611 - **State**: PUBLISHED - **Published Date**: July 01, 2010 at 21:00 UTC - **Last Updated**: August 07, 2024 at 02:39 UTC - **Reserved Date**: July 01, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in show_search_result.php in i-netsolution Job Search Engine allows remote attackers to execute arbitrary SQL commands via the keyword parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2010-1625](http://www.vupen.com/english/advisories/2010/1625) 2. [](http://packetstormsecurity.org/1006-exploits/inetsolutionjobsearch-sql.txt) 3. [14079](http://www.exploit-db.com/exploits/14079) 4. [inetjobsearch-showsearchresult-sql-injection(59777)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59777)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47477, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47477 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47477 - **State**: PUBLISHED - **Published Date**: March 07, 2023 at 01:31 UTC - **Last Updated**: March 06, 2025 at 16:15 UTC - **Reserved Date**: December 15, 2022 at 08:22 UTC - **Assigned By**: Unisoc ### Vulnerability Description In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000** Affected versions: - Android10/Android11 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1632612109718192129)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9493, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9493 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9493 - **State**: PUBLISHED - **Published Date**: January 24, 2025 at 14:28 UTC - **Last Updated**: January 27, 2025 at 18:09 UTC - **Reserved Date**: October 03, 2024 at 18:21 UTC - **Assigned By**: Silabs ### Vulnerability Description DLL hijacking vulnerabilities, caused by an uncontrolled search path in the  ToolStick installer can lead to privilege escalation and arbitrary code execution when running the impacted installer. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-427: Security Weakness ### Affected Products **silabs.com - ToolStick** Affected versions: - 0 (Status: affected) ### References 1. [](https://community.silabs.com/068Vm00000JUQwd) ### Credits - Thanks to Sahil Shah and Shaurya for reporting this issue.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0827, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0827 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0827 - **State**: PUBLISHED - **Published Date**: February 04, 2000 at 05:00 UTC - **Last Updated**: August 01, 2024 at 16:48 UTC - **Reserved Date**: December 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description By default, Internet Explorer 5.0 and other versions enables the "Navigate sub-frames across different domains" option, which allows frame spoofing. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0827)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-28620, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-28620 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-28620 - **State**: PUBLISHED - **Published Date**: August 24, 2021 at 18:15 UTC - **Last Updated**: April 23, 2025 at 19:32 UTC - **Reserved Date**: March 16, 2021 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Animate version 21.0.6 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Adobe - Animate** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/animate/apsb21-50.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2484, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2484 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2484 - **State**: PUBLISHED - **Published Date**: October 25, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:29 UTC - **Reserved Date**: October 25, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in PHP Gift Registry 1.3.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the message parameter to (1) event.php or (2) index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://sourceforge.net/project/shownotes.php?release_id=288731) 2. [phpgiftregistry-message-xss(18412)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18412) 3. [11879](http://www.securityfocus.com/bid/11879) 4. [](http://cvs.sourceforge.net/viewcvs.py/phpgiftreg/src/event.php?r1=1.4&r2=1.5) 5. [12287](http://www.osvdb.org/12287) 6. [](http://cvs.sourceforge.net/viewcvs.py/phpgiftreg/src/index.php?r1=1.20&r2=1.21) 7. [12286](http://www.osvdb.org/12286) 8. [13414](http://secunia.com/advisories/13414)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2089, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2089 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2089 - **State**: PUBLISHED - **Published Date**: May 13, 2011 at 17:00 UTC - **Last Updated**: August 06, 2024 at 22:46 UTC - **Reserved Date**: May 13, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in the SetActiveXGUID method in the VersionInfo ActiveX control in GenVersion.dll 8.0.138.0 in the WebHMI subsystem in ICONICS BizViz 9.x before 9.22 and GENESIS32 9.x before 9.22 allows remote attackers to execute arbitrary code via a long string in the argument. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.security-assessment.com/files/documents/advisory/ICONICS_WebHMI.pdf) 2. [72135](http://www.osvdb.org/72135) 3. [44417](http://secunia.com/advisories/44417) 4. [](http://www.us-cert.gov/control_systems/pdf/ICSA-11-131-01.pdf) 5. [ADV-2011-1174](http://www.vupen.com/english/advisories/2011/1174) 6. [47704](http://www.securityfocus.com/bid/47704) 7. [17240](http://www.exploit-db.com/exploits/17240) 8. [17269](http://www.exploit-db.com/exploits/17269) 9. [webhmi-activex-bo(67267)](https://exchange.xforce.ibmcloud.com/vulnerabilities/67267)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-23637, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-23637 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-23637 - **State**: PUBLISHED - **Published Date**: January 17, 2023 at 00:00 UTC - **Last Updated**: April 04, 2025 at 17:39 UTC - **Reserved Date**: January 16, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IMPatienT before 1.5.2 allows stored XSS via onmouseover in certain text fields within a PATCH /modify_onto request to the ontology builder. This may allow attackers to steal Protected Health Information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/lambda-science/IMPatienT/compare/v1.5.1...v1.5.2) 2. [](https://github.com/lambda-science/IMPatienT/issues/101) 3. [](https://github.com/lambda-science/IMPatienT/releases/tag/v1.5.2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0221, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0221 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0221 - **State**: PUBLISHED - **Published Date**: February 06, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:05 UTC - **Reserved Date**: February 05, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in login.php in Gallery 2.0 Alpha allows remote attackers to inject arbitrary web script or HTML via the g2_form[subject] field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050117 Gallery v1.3.4-pl1, v1.4.4-pl2, 2.0 Alpha Cross Site Scripting Vulnerability](http://marc.info/?l=bugtraq&m=110608459222364&w=2) 2. [](http://theinsider.deep-ice.com/texts/advisory69.txt) 3. [gallery-g2formsubject-xss(43472)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43472) 4. [gallery-multiple-xss(18938)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18938) 5. [20050117 [VulnWatch] Gallery v1.3.4-pl1, v1.4.4-pl2, 2.0 Alpha Cross Site Scripting Vulnerability](http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0031.html) 6. [](http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=147)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10649, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10649 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10649 - **State**: PUBLISHED - **Published Date**: June 04, 2018 at 16:00 UTC - **Last Updated**: September 16, 2024 at 18:23 UTC - **Reserved Date**: October 29, 2017 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description frames-compiler downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. ### Weakness Classification (CWE) - CWE-311: Security Weakness ### Affected Products **HackerOne - frames-compiler node module** Affected versions: - All versions (Status: affected) ### References 1. [](https://nodesecurity.io/advisories/247)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-22646, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-22646 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-22646 - **State**: PUBLISHED - **Published Date**: January 30, 2024 at 00:00 UTC - **Last Updated**: June 04, 2025 at 21:10 UTC - **Reserved Date**: January 11, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An email address enumeration vulnerability exists in the password reset function of SEO Panel version 4.10.0. This allows an attacker to guess which emails exist on the system. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/cassis-sec/CVE/tree/main/2024/CVE-2024-22646)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36695, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36695 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36695 - **State**: PUBLISHED - **Published Date**: July 18, 2023 at 01:59 UTC - **Last Updated**: October 21, 2024 at 19:04 UTC - **Reserved Date**: June 06, 2023 at 01:32 UTC - **Assigned By**: Hitachi ### Vulnerability Description Incorrect Default Permissions vulnerability in Hitachi Device Manager on Linux (Device Manager Server component), Hitachi Tiered Storage Manager on Linux, Hitachi Replication Manager on Linux, Hitachi Tuning Manager on Linux (Hitachi Tuning Manager server, Hitachi Tuning Manager - Agent for RAID, Hitachi Tuning Manager - Agent for NAS components), Hitachi Compute Systems Manager on Linux allows File Manipulation.This issue affects Hitachi Device Manager: before 8.8.5-02; Hitachi Tiered Storage Manager: before 8.8.5-02; Hitachi Replication Manager: before 8.8.5-02; Hitachi Tuning Manager: before 8.8.5-02; Hitachi Compute Systems Manager: before 8.8.3-08. ### CVSS Metrics - **CVSS Base Score**: 6.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H` ### Weakness Classification (CWE) - CWE-276: Security Weakness ### Affected Products **Hitachi - Hitachi Device Manager** Affected versions: - 0 (Status: affected) **Hitachi - Hitachi Tiered Storage Manager** Affected versions: - 0 (Status: affected) **Hitachi - Hitachi Replication Manager** Affected versions: - 0 (Status: affected) **Hitachi - Hitachi Tuning Manager** Affected versions: - 0 (Status: affected) **Hitachi - Hitachi Compute Systems Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-124/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8077, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8077 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8077 - **State**: PUBLISHED - **Published Date**: April 23, 2017 at 16:00 UTC - **Last Updated**: September 16, 2024 at 21:07 UTC - **Reserved Date**: April 23, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description On the TP-Link TL-SG108E 1.0, there is a hard-coded ciphering key (a long string beginning with Ei2HNryt). This affects the 1.1.2 Build 20141017 Rel.50749 firmware. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://chmod750.com/2017/04/23/vulnerability-disclosure-tp-link/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41368, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41368 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41368 - **State**: PUBLISHED - **Published Date**: August 29, 2024 at 00:00 UTC - **Last Updated**: August 30, 2024 at 14:27 UTC - **Reserved Date**: July 18, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\inc.setWlanIpMail.php ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34603, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34603 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34603 - **State**: REJECTED - **Last Updated**: December 30, 2022 at 00:00 UTC - **Reserved Date**: June 10, 2021 at 00:00 UTC - **Assigned By**: CERTVDE ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20918, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20918 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20918 - **State**: PUBLISHED - **Published Date**: July 12, 2023 at 23:18 UTC - **Last Updated**: November 06, 2024 at 16:52 UTC - **Reserved Date**: November 03, 2022 at 22:37 UTC - **Assigned By**: google_android ### Vulnerability Description In getPendingIntentLaunchFlags of ActivityOptions.java, there is a possible elevation of privilege due to a confused deputy with no additional execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - 13 (Status: affected) - 12L (Status: affected) - 12 (Status: affected) - 11 (Status: affected) ### References 1. [](https://android.googlesource.com/platform/frameworks/base/+/16c604aa7c253ce5cf075368a258c0b21386160d) 2. [](https://android.googlesource.com/platform/frameworks/base/+/8418e3a017428683d173c0c82b0eb02d5b923a4e) 3. [](https://android.googlesource.com/platform/frameworks/base/+/51051de4eb40bb502db448084a83fd6cbfb7d3cf) 4. [](https://source.android.com/security/bulletin/2023-07-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25128, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25128 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25128 - **State**: PUBLISHED - **Published Date**: February 07, 2025 at 10:11 UTC - **Last Updated**: February 12, 2025 at 20:51 UTC - **Reserved Date**: February 03, 2025 at 13:34 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in orlandolac Facilita Form Tracker allows Stored XSS. This issue affects Facilita Form Tracker: from n/a through 1.0. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **orlandolac - Facilita Form Tracker** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/facilita-form-tracker/vulnerability/wordpress-facilita-form-tracker-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve) ### Credits - Abdi Pranata (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17127, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17127 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17127 - **State**: PUBLISHED - **Published Date**: December 04, 2017 at 08:00 UTC - **Last Updated**: August 05, 2024 at 20:43 UTC - **Reserved Date**: December 04, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The vc1_decode_frame function in libavcodec/vc1dec.c in Libav 12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.libav.org/show_bug.cgi?id=1099) 2. [](https://deb.freexian.com/extended-lts/tracker/CVE-2017-17127) 3. [[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update](https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29932, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29932 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29932 - **State**: PUBLISHED - **Published Date**: April 01, 2021 at 04:24 UTC - **Last Updated**: August 03, 2024 at 22:18 UTC - **Reserved Date**: April 01, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the parse_duration crate through 2021-03-18 for Rust. It allows attackers to cause a denial of service (CPU and memory consumption) via a duration string with a large exponent. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rustsec.org/advisories/RUSTSEC-2021-0041.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4530, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4530 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4530 - **State**: PUBLISHED - **Published Date**: October 06, 2023 at 09:16 UTC - **Last Updated**: September 19, 2024 at 18:32 UTC - **Reserved Date**: August 25, 2023 at 06:26 UTC - **Assigned By**: TR-CERT ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Turna Advertising Administration Panel allows SQL Injection.This issue affects Advertising Administration Panel: before 1.1. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Turna - Advertising Administration Panel** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.usom.gov.tr/bildirim/tr-23-0571) ### Credits - Resul Melih MACIT
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0412, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0412 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0412 - **State**: PUBLISHED - **Published Date**: January 15, 2014 at 02:50 UTC - **Last Updated**: August 06, 2024 at 09:13 UTC - **Reserved Date**: December 12, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-2086-1](http://ubuntu.com/usn/usn-2086-1) 2. [102067](http://osvdb.org/102067) 3. [DSA-2845](http://www.debian.org/security/2014/dsa-2845) 4. [56491](http://secunia.com/advisories/56491) 5. [RHSA-2014:0186](http://rhn.redhat.com/errata/RHSA-2014-0186.html) 6. [64880](http://www.securityfocus.com/bid/64880) 7. [56541](http://secunia.com/advisories/56541) 8. [DSA-2848](http://www.debian.org/security/2014/dsa-2848) 9. [56580](http://secunia.com/advisories/56580) 10. [RHSA-2014:0173](http://rhn.redhat.com/errata/RHSA-2014-0173.html) 11. [RHSA-2014:0189](http://rhn.redhat.com/errata/RHSA-2014-0189.html) 12. [RHSA-2014:0164](http://rhn.redhat.com/errata/RHSA-2014-0164.html) 13. [64758](http://www.securityfocus.com/bid/64758) 14. [oracle-cpujan2014-cve20140412(90378)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90378) 15. [](http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html) 16. [GLSA-201409-04](http://security.gentoo.org/glsa/glsa-201409-04.xml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5572, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5572 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5572 - **State**: PUBLISHED - **Published Date**: September 22, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 06:50 UTC - **Reserved Date**: July 17, 2015 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2015:1814](http://rhn.redhat.com/errata/RHSA-2015-1814.html) 2. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680) 3. [openSUSE-SU-2015:1616](http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html) 4. [1033629](http://www.securitytracker.com/id/1033629) 5. [SUSE-SU-2015:1618](http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html) 6. [](https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04939841) 7. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722) 8. [](https://helpx.adobe.com/security/products/flash-player/apsb15-23.html) 9. [SUSE-SU-2015:1614](http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html) 10. [GLSA-201509-07](https://security.gentoo.org/glsa/201509-07) 11. [openSUSE-SU-2015:1781](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html) 12. [76804](http://www.securityfocus.com/bid/76804) 13. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3903, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3903 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3903 - **State**: PUBLISHED - **Published Date**: October 12, 2010 at 21:00 UTC - **Last Updated**: September 17, 2024 at 04:09 UTC - **Reserved Date**: October 12, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in OpenConnect before 2.23 allows remote AnyConnect SSL VPN servers to cause a denial of service (application crash) via a 404 HTTP status code. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.infradead.org/openconnect.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43355, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43355 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43355 - **State**: PUBLISHED - **Published Date**: November 01, 2024 at 14:17 UTC - **Last Updated**: November 04, 2024 at 18:00 UTC - **Reserved Date**: August 09, 2024 at 09:22 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in BearDev JoomSport allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JoomSport: from n/a through 5.3.0. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **BearDev - JoomSport** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/joomsport-sports-league-results-management/wordpress-joomsport-plugin-5-3-0-broken-access-control-vulnerability?_s_id=cve) ### Credits - Trương Hữu Phúc (truonghuuphuc) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0687, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0687 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0687 - **State**: PUBLISHED - **Published Date**: September 21, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:28 UTC - **Reserved Date**: September 19, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Auction Weaver CGI script 1.03 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack in the catdir parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1630](http://www.securityfocus.com/bid/1630) 2. [20000823 Auction WeaverT LITE 1.0](http://archives.neohapsis.com/archives/bugtraq/2000-08/0310.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8868, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8868 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8868 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:43 UTC - **Reserved Date**: February 18, 2019 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24159, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24159 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24159 - **State**: PUBLISHED - **Published Date**: February 04, 2022 at 01:33 UTC - **Last Updated**: August 03, 2024 at 04:07 UTC - **Reserved Date**: January 31, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function formSetPPTPServer. This vulnerability allows attackers to cause a Denial of Service (DoS) via the startIp and endIp parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/pjqwudi/my_vuln/blob/main/Tenda/vuln_28/28.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23366, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23366 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23366 - **State**: PUBLISHED - **Published Date**: January 21, 2022 at 22:08 UTC - **Last Updated**: August 03, 2024 at 03:36 UTC - **Reserved Date**: January 18, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HMS v1.0 was discovered to contain a SQL injection vulnerability via patientlogin.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/kabirkhyrul/HMS/discussions/4) 2. [](http://packetstormsecurity.com/files/165948/Hospital-Management-Startup-1.0-SQL-Injection.html) 3. [](https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-23366) 4. [](https://www.nu11secur1ty.com/2022/02/cve-2022-23366.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3197, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3197 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3197 - **State**: PUBLISHED - **Published Date**: September 26, 2022 at 00:00 UTC - **Last Updated**: May 21, 2025 at 19:39 UTC - **Reserved Date**: September 13, 2022 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High) ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html) 2. [](https://crbug.com/1358075) 3. [](https://security.gentoo.org/glsa/202209-23) 4. [](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8315, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8315 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8315 - **State**: PUBLISHED - **Published Date**: January 27, 2017 at 22:01 UTC - **Last Updated**: October 09, 2024 at 19:59 UTC - **Reserved Date**: September 26, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure Code). Supported versions that are affected are 12.0.1, 12.0.2,12.0.4,12.1.0 and 12.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Investor Servicing accessible data as well as unauthorized access to critical data or complete access to all Oracle FLEXCUBE Investor Servicing accessible data. CVSS v3.0 Base Score 8.1 (Confidentiality and Integrity impacts). ### Affected Products **Oracle - FLEXCUBE Investor Servicing** Affected versions: - 12.0.1 (Status: affected) - 12.0.2 (Status: affected) - 12.0.4 (Status: affected) - 12.1.0 (Status: affected) - 12.3.0 (Status: affected) ### References 1. [95496](http://www.securityfocus.com/bid/95496) 2. [1037636](http://www.securitytracker.com/id/1037636) 3. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31401, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31401 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31401 - **State**: PUBLISHED - **Published Date**: August 19, 2021 at 11:25 UTC - **Last Updated**: August 03, 2024 at 22:55 UTC - **Reserved Date**: April 15, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-789208.pdf) 2. [](https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/) 3. [VU#608209](https://www.kb.cert.org/vuls/id/608209)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41692, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41692 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41692 - **State**: PUBLISHED - **Published Date**: July 26, 2024 at 12:11 UTC - **Last Updated**: August 02, 2024 at 04:46 UTC - **Reserved Date**: July 19, 2024 at 11:24 UTC - **Assigned By**: CERT-In ### Vulnerability Description This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to presence of root terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by accessing the root shell on the vulnerable system. Successful exploitation of this vulnerability could allow the attacker to execute arbitrary commands with root privileges on the targeted system. ### Weakness Classification (CWE) - CWE-1191: Security Weakness ### Affected Products **SyroTech - SyroTech SY-GPON-1110-WDONT router** Affected versions: - 3.1.02-231102 (Status: affected) ### References 1. [](https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225) ### Credits - These vulnerabilities are discovered by Shravan Singh, Rahul Giri, & Karan Patel from Redfox Cyber Security Inc, Toronto, Canada.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-47126, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-47126 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-47126 - **State**: PUBLISHED - **Published Date**: November 14, 2023 at 20:01 UTC - **Last Updated**: August 29, 2024 at 20:34 UTC - **Reserved Date**: October 30, 2023 at 19:57 UTC - **Assigned By**: GitHub_M ### Vulnerability Description TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions the login screen of the standalone install tool discloses the full path of the transient data directory (e.g. /var/www/html/var/transient/). This applies to composer-based scenarios only - “classic” non-composer installations are not affected. This issue has been addressed in version 12.4.8. Users are advised to upgrade. There are no known workarounds for this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 3.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **TYPO3 - typo3** Affected versions: - >= 12.2.0, < 12.4.8 (Status: affected) ### References 1. [https://github.com/TYPO3/typo3/security/advisories/GHSA-p2jh-95jg-2w55](https://github.com/TYPO3/typo3/security/advisories/GHSA-p2jh-95jg-2w55) 2. [https://github.com/TYPO3/typo3/commit/1a735dac01ec7b337ed0d80c738caa8967dea423](https://github.com/TYPO3/typo3/commit/1a735dac01ec7b337ed0d80c738caa8967dea423) 3. [https://typo3.org/security/advisory/typo3-core-sa-2023-005](https://typo3.org/security/advisory/typo3-core-sa-2023-005)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-28371, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-28371 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-28371 - **State**: PUBLISHED - **Published Date**: November 09, 2020 at 21:13 UTC - **Last Updated**: August 04, 2024 at 16:33 UTC - **Reserved Date**: November 09, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in ReadyTalk Avian 1.2.0 before 2020-10-27. The FileOutputStream.write() method in FileOutputStream.java has a boundary check to prevent out-of-bounds memory read/write operations. However, an integer overflow leads to bypassing this check and achieving the out-of-bounds access. NOTE: This vulnerability only affects products that are no longer supported by the maintainer ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ReadyTalk/avian/commit/0871979b298add320ca63f65060acb7532c8a0dd) 2. [](https://github.com/ReadyTalk/avian/pull/572)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19946, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19946 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19946 - **State**: PUBLISHED - **Published Date**: March 16, 2020 at 17:31 UTC - **Last Updated**: August 05, 2024 at 02:32 UTC - **Reserved Date**: December 23, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The API in Dradis Pro 3.4.1 allows any user to extract the content of a project, even if this user is not part of the project team. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://know.bishopfox.com/advisories) 2. [](https://know.bishopfox.com/advisories/dradis-pro-3-4-1)