System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4652, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4652 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4652
- **State**: PUBLISHED
- **Published Date**: March 13, 2023 at 16:03 UTC
- **Last Updated**: February 27, 2025 at 20:37 UTC
- **Reserved Date**: December 22, 2022 at 09:23 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Video Background WordPress plugin before 2.7.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Video Background**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/ebf3df99-6939-4ae9-ad55-004f33c1cfbc)
### Credits
- Lana Codes
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0770, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0770
- **State**: PUBLISHED
- **Published Date**: June 07, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 04:17 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
CRLF injection vulnerability in Cisco TelePresence TC 6.x before 6.3.4 and 7.x before 7.3.3 on Integrator C SX20 devices allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL, aka Bug ID CSCut79341.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032511](http://www.securitytracker.com/id/1032511)
2. [20150605 Cisco TelePresence SX20 HTTP Response Splitting Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=39210) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43967
- **State**: PUBLISHED
- **Published Date**: November 14, 2022 at 00:00 UTC
- **Last Updated**: May 13, 2025 at 19:25 UTC
- **Reserved Date**: October 27, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Reflected XSS in the multilingual report due to un-sanitized output. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/concretecms/concretecms/releases/9.1.3)
2. [](https://github.com/concretecms/concretecms/releases/8.5.10)
3. [](https://documentation.concretecms.org/developers/introduction/version-history/913-release-notes)
4. [](https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes)
5. [](https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2022-10-31) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1732
- **State**: PUBLISHED
- **Published Date**: May 10, 2023 at 11:41 UTC
- **Last Updated**: January 27, 2025 at 18:32 UTC
- **Reserved Date**: March 30, 2023 at 15:16 UTC
- **Assigned By**: cloudflare
### Vulnerability Description
When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.
The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
- CWE-755: Security Weakness
### Affected Products
**Cloudflare - CIRCL**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/cloudflare/circl/security/advisories/GHSA-2q89-485c-9j2x)
### Credits
- Tom Thorogood |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22317, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22317
- **State**: PUBLISHED
- **Published Date**: January 15, 2025 at 15:23 UTC
- **Last Updated**: January 15, 2025 at 16:01 UTC
- **Reserved Date**: January 03, 2025 at 13:16 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in galleryape Photo Gallery – Image Gallery by Ape allows Reflected XSS.This issue affects Photo Gallery – Image Gallery by Ape: from n/a through 2.2.8.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**galleryape - Photo Gallery – Image Gallery by Ape**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/gallery-images-ape/vulnerability/wordpress-gallery-images-ape-plugin-2-2-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Le Ngoc Anh (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5610, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5610 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5610
- **State**: PUBLISHED
- **Published Date**: September 09, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 11:48 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The ce4arab market (aka com.dreamstep.wce4arabmarket) application 0.12.13093.40460 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#525561](http://www.kb.cert.org/vuls/id/525561)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10318, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10318
- **State**: PUBLISHED
- **Published Date**: October 19, 2017 at 17:00 UTC
- **Last Updated**: October 04, 2024 at 16:52 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality Suite8 component of Oracle Hospitality Applications (subcomponent: WebConnect). Supported versions that are affected are 8.10.1 and 8.10.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Suite8. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Hospitality Suite8, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Hospitality Suite8 accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N).
### Affected Products
**Oracle Corporation - Hospitality Suite8**
Affected versions:
- 8.10.1 (Status: affected)
- 8.10.2 (Status: affected)
### References
1. [101343](http://www.securityfocus.com/bid/101343)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5088, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5088 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5088
- **State**: PUBLISHED
- **Published Date**: July 15, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 06:32 UTC
- **Reserved Date**: June 26, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2014-8450, CVE-2015-4449, CVE-2015-4450, CVE-2015-5089, and CVE-2015-5092.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032892](http://www.securitytracker.com/id/1032892)
2. [](https://helpx.adobe.com/security/products/reader/apsb15-15.html)
3. [75742](http://www.securityfocus.com/bid/75742) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10737
- **State**: PUBLISHED
- **Published Date**: November 03, 2024 at 15:00 UTC
- **Last Updated**: November 05, 2024 at 14:44 UTC
- **Reserved Date**: November 02, 2024 at 18:13 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in Codezips Free Exam Hall Seating Management System 1.0. Affected is an unknown function of the file /teacher.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Codezips - Free Exam Hall Seating Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-282906 | Codezips Free Exam Hall Seating Management System teacher.php sql injection](https://vuldb.com/?id.282906)
2. [VDB-282906 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.282906)
3. [Submit #435487 | Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 SQL Injection](https://vuldb.com/?submit.435487)
4. [](https://github.com/Scholar-XD/CVE/issues/1)
### Credits
- 2436038564XD (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0820, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0820
- **State**: PUBLISHED
- **Published Date**: April 03, 2023 at 14:38 UTC
- **Last Updated**: February 14, 2025 at 16:53 UTC
- **Reserved Date**: February 13, 2023 at 21:06 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The User Role by BestWebSoft WordPress plugin before 1.6.7 does not protect against CSRF in requests to update role capabilities, leading to arbitrary privilege escalation of any role.
### Weakness Classification (CWE)
- CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - User Role by BestWebSoft**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/b93d9f9d-0fd9-49b8-b465-d32b95351912)
### Credits
- dc11
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9280, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9280
- **State**: PUBLISHED
- **Published Date**: September 27, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 21:46 UTC
- **Reserved Date**: February 28, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In keyguard, there is a possible escalation of privilege due to improper permission checks. This could lead to a local bypass of the keyguard under limited circumstances, with User execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-119322269
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1862, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1862 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1862
- **State**: PUBLISHED
- **Published Date**: February 09, 2018 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 04:54 UTC
- **Reserved Date**: February 17, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The crash reporting feature in Abrt allows local users to gain privileges by leveraging an execve by root after a chroot into a user-specified directory in a namedspaced environment.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1211223)
2. [[oss-security] 20150414 Problems in automatic crash analysis frameworks](http://www.openwall.com/lists/oss-security/2015/04/14/4)
3. [](http://packetstormsecurity.com/files/131422/Fedora-abrt-Race-Condition.html)
4. [36746](https://www.exploit-db.com/exploits/36746/)
5. [](http://packetstormsecurity.com/files/131429/Abrt-Apport-Race-Condition-Symlink.html)
6. [74263](http://www.securityfocus.com/bid/74263)
7. [36747](https://www.exploit-db.com/exploits/36747/)
8. [](https://github.com/abrt/abrt/pull/810)
9. [](http://packetstormsecurity.com/files/131423/Linux-Apport-Abrt-Local-Root-Exploit.html)
10. [20150414 Problems in automatic crash analysis frameworks](http://seclists.org/fulldisclosure/2015/Apr/34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11825, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11825
- **State**: PUBLISHED
- **Published Date**: January 25, 2025 at 07:24 UTC
- **Last Updated**: January 27, 2025 at 14:53 UTC
- **Reserved Date**: November 26, 2024 at 18:01 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Broadstreet plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘zone’ parameter in all versions up to, and including, 1.50.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**broadstreetads - Broadstreet**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/aeda43bc-eeee-463d-80b7-dec7975b4d19?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/broadstreet/tags/1.50.1/Broadstreet/Utility.php#L199)
3. [](https://wordpress.org/plugins/broadstreet/#developers)
### Credits
- Peter Thaleikis |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26435, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26435
- **State**: PUBLISHED
- **Published Date**: June 20, 2023 at 07:51 UTC
- **Last Updated**: August 02, 2024 at 11:46 UTC
- **Reserved Date**: February 22, 2023 at 20:42 UTC
- **Assigned By**: OX
### Vulnerability Description
It was possible to call filesystem and network references using the local LibreOffice instance using manipulated ODT documents. Attackers could discover restricted network topology and services as well as including local files with read permissions of the open-xchange system user. This was limited to specific file-types, like images. We have improved existing content filters and validators to avoid including any local resources. No publicly available exploits are known.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**OX Software GmbH - OX App Suite**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6219_7.10.6_2023-03-20.pdf)
2. [](https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0002.json)
3. [](http://seclists.org/fulldisclosure/2023/Jun/8)
4. [](http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20381, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20381
- **State**: PUBLISHED
- **Published Date**: September 11, 2024 at 16:38 UTC
- **Last Updated**: September 27, 2024 at 13:58 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) and ConfD that is used by the web-based management interfaces of Cisco Optical Site Manager and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device.
This vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or device could exploit this vulnerability by sending malicious requests to the JSON-RPC API. A successful exploit could allow the attacker to make unauthorized modifications to the configuration of the affected application or device, including creating new user accounts or elevating their own privileges on an affected system.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Cisco - Cisco IOS XR Software**
Affected versions:
- 6.5.3 (Status: affected)
- 6.5.29 (Status: affected)
- 6.5.1 (Status: affected)
- 6.6.1 (Status: affected)
- 6.5.2 (Status: affected)
- 6.5.92 (Status: affected)
- 6.5.15 (Status: affected)
- 6.6.2 (Status: affected)
- 7.0.1 (Status: affected)
- 6.6.25 (Status: affected)
- 6.5.26 (Status: affected)
- 6.6.11 (Status: affected)
- 6.5.25 (Status: affected)
- 6.5.28 (Status: affected)
- 6.5.93 (Status: affected)
- 6.6.12 (Status: affected)
- 6.5.90 (Status: affected)
- 7.0.0 (Status: affected)
- 7.1.1 (Status: affected)
- 7.0.90 (Status: affected)
- 6.6.3 (Status: affected)
- 6.7.1 (Status: affected)
- 7.0.2 (Status: affected)
- 7.1.15 (Status: affected)
- 7.2.0 (Status: affected)
- 7.2.1 (Status: affected)
- 7.1.2 (Status: affected)
- 6.7.2 (Status: affected)
- 7.0.11 (Status: affected)
- 7.0.12 (Status: affected)
- 7.0.14 (Status: affected)
- 7.1.25 (Status: affected)
- 6.6.4 (Status: affected)
- 7.2.12 (Status: affected)
- 7.3.1 (Status: affected)
- 7.1.3 (Status: affected)
- 6.7.3 (Status: affected)
- 7.4.1 (Status: affected)
- 7.2.2 (Status: affected)
- 6.7.4 (Status: affected)
- 6.5.31 (Status: affected)
- 7.3.15 (Status: affected)
- 7.3.16 (Status: affected)
- 6.8.1 (Status: affected)
- 7.4.15 (Status: affected)
- 6.5.32 (Status: affected)
- 7.3.2 (Status: affected)
- 7.5.1 (Status: affected)
- 7.4.16 (Status: affected)
- 7.3.27 (Status: affected)
- 7.6.1 (Status: affected)
- 7.5.2 (Status: affected)
- 7.8.1 (Status: affected)
- 7.6.15 (Status: affected)
- 7.5.12 (Status: affected)
- 7.8.12 (Status: affected)
- 7.3.3 (Status: affected)
- 7.7.1 (Status: affected)
- 6.8.2 (Status: affected)
- 7.3.4 (Status: affected)
- 7.4.2 (Status: affected)
- 6.7.35 (Status: affected)
- 6.9.1 (Status: affected)
- 7.6.2 (Status: affected)
- 7.5.3 (Status: affected)
- 7.7.2 (Status: affected)
- 6.9.2 (Status: affected)
- 7.9.1 (Status: affected)
- 7.10.1 (Status: affected)
- 7.8.2 (Status: affected)
- 7.5.4 (Status: affected)
- 6.5.33 (Status: affected)
- 7.8.22 (Status: affected)
- 7.7.21 (Status: affected)
- 7.9.2 (Status: affected)
- 7.3.5 (Status: affected)
- 7.5.5 (Status: affected)
- 7.11.1 (Status: affected)
- 7.9.21 (Status: affected)
- 7.10.2 (Status: affected)
- 24.1.1 (Status: affected)
- 7.6.3 (Status: affected)
- 7.3.6 (Status: affected)
- 7.5.52 (Status: affected)
- 7.11.2 (Status: affected)
- 24.2.1 (Status: affected)
- 24.1.2 (Status: affected)
- 24.2.11 (Status: affected)
**Cisco - Cisco Network Services Orchestrator**
Affected versions:
- 5.4.1 (Status: affected)
- 5.3.1 (Status: affected)
- 4.4.1 (Status: affected)
- 5.2.1.1 (Status: affected)
- 5.4.0.1 (Status: affected)
- 4.7.1 (Status: affected)
- 5.2.0.3 (Status: affected)
- 5.2.1 (Status: affected)
- 5.1.2 (Status: affected)
- 5.4 (Status: affected)
- 4.5.1 (Status: affected)
- 5.4.0.2 (Status: affected)
- 4.7.3 (Status: affected)
- 5.2.0.4 (Status: affected)
- 5.1.1.1 (Status: affected)
- 5.1.1.3 (Status: affected)
- 5.2.3.2 (Status: affected)
- 5.4.1.1 (Status: affected)
- 5.5 (Status: affected)
- 5.4.2 (Status: affected)
- 5.5.1 (Status: affected)
- 5.4.3 (Status: affected)
- 5.4.3.1 (Status: affected)
- 5.5.2 (Status: affected)
- 5.3.4.3 (Status: affected)
- 5.5.2.1 (Status: affected)
- 5.5.2.2 (Status: affected)
- 5.4.3.2 (Status: affected)
- 5.5.2.3 (Status: affected)
- 5.4.4 (Status: affected)
- 5.4.4.1 (Status: affected)
- 5.5.2.4 (Status: affected)
- 5.5.2.5 (Status: affected)
- 5.5.2.6 (Status: affected)
- 5.4.4.2 (Status: affected)
- 5.4.3.3 (Status: affected)
- 5.5.2.7 (Status: affected)
- 5.5.2.8 (Status: affected)
- 5.4.3.4 (Status: affected)
- 5.4.4.3 (Status: affected)
- 5.6 (Status: affected)
- 5.5.2.9 (Status: affected)
- 5.5.3 (Status: affected)
- 5.5.2.10 (Status: affected)
- 5.6.1 (Status: affected)
- 5.5.2.11 (Status: affected)
- 5.6.2 (Status: affected)
- 5.5.3.1 (Status: affected)
- 5.4.5 (Status: affected)
- 5.4.5.1 (Status: affected)
- 5.5.4 (Status: affected)
- 5.6.3 (Status: affected)
- 5.5.4.1 (Status: affected)
- 5.7 (Status: affected)
- 5.5.2.12 (Status: affected)
- 5.4.2.1 (Status: affected)
- 5.6.3.1 (Status: affected)
- 5.4.5.2 (Status: affected)
- 5.7.1 (Status: affected)
- 5.7.1.1 (Status: affected)
- 5.6.4 (Status: affected)
- 5.4.2.2 (Status: affected)
- 5.4.6 (Status: affected)
- 5.7.2 (Status: affected)
- 5.7.2.1 (Status: affected)
- 5.6.5 (Status: affected)
- 5.5.5 (Status: affected)
- 5.7.3 (Status: affected)
- 5.8 (Status: affected)
- 5.6.6.1 (Status: affected)
- 5.7.5.1 (Status: affected)
- 5.6.7.1 (Status: affected)
- 5.6.7 (Status: affected)
- 5.5.6.1 (Status: affected)
- 5.8.1 (Status: affected)
- 5.6.6 (Status: affected)
- 5.4.7 (Status: affected)
- 5.8.2.1 (Status: affected)
- 5.7.5 (Status: affected)
- 5.7.4 (Status: affected)
- 5.8.2 (Status: affected)
- 5.5.6 (Status: affected)
- 5.6.7.2 (Status: affected)
- 5.7.6 (Status: affected)
- 5.7.6.1 (Status: affected)
- 5.8.3 (Status: affected)
- 5.6.8 (Status: affected)
- 5.7.6.2 (Status: affected)
- 5.8.4 (Status: affected)
- 5.5.7 (Status: affected)
- 5.7.7 (Status: affected)
- 5.6.9 (Status: affected)
- 5.6.8.1 (Status: affected)
- 5.8.5 (Status: affected)
- 5.5.8 (Status: affected)
- 5.7.8 (Status: affected)
- 5.4.7.1 (Status: affected)
- 6.0 (Status: affected)
- 5.7.8.1 (Status: affected)
- 6.0.1 (Status: affected)
- 5.6.10 (Status: affected)
- 5.8.6 (Status: affected)
- 6.0.1.1 (Status: affected)
- 6.0.2 (Status: affected)
- 5.7.9 (Status: affected)
- 5.5.9 (Status: affected)
- 5.6.11 (Status: affected)
- 5.8.7 (Status: affected)
- 6.0.3 (Status: affected)
- 5.7.10 (Status: affected)
- 5.6.12 (Status: affected)
- 5.8.8 (Status: affected)
- 6.0.4 (Status: affected)
- 5.5.10 (Status: affected)
- 5.7.10.1 (Status: affected)
- 6.1 (Status: affected)
- 5.7.6.3 (Status: affected)
- 5.7.11 (Status: affected)
- 6.0.5 (Status: affected)
- 5.6.13 (Status: affected)
- 5.8.9 (Status: affected)
- 6.1.1 (Status: affected)
- 5.7.10.2 (Status: affected)
- 6.0.6 (Status: affected)
- 5.7.12 (Status: affected)
- 6.1.2 (Status: affected)
- 5.6.14 (Status: affected)
- 6.1.2.1 (Status: affected)
- 5.8.10 (Status: affected)
- 6.0.7 (Status: affected)
- 6.1.3 (Status: affected)
- 5.7.13 (Status: affected)
- 5.8.11 (Status: affected)
- 6.1.3.1 (Status: affected)
- 6.0.8 (Status: affected)
- 6.1.4 (Status: affected)
- 5.6.14.1 (Status: affected)
- 5.8.12 (Status: affected)
- 6.0.9 (Status: affected)
- 6.1.5 (Status: affected)
- 6.2 (Status: affected)
- 5.8.13 (Status: affected)
- 5.7.14 (Status: affected)
- 6.0.10 (Status: affected)
- 6.1.6 (Status: affected)
- 6.1.6.1 (Status: affected)
- 6.0.11 (Status: affected)
- 6.1.7 (Status: affected)
- 6.2.2 (Status: affected)
- 5.7.15 (Status: affected)
- 6.1.3.2 (Status: affected)
- 6.1.7.1 (Status: affected)
- 6.0.12 (Status: affected)
- 6.1.8 (Status: affected)
- 5.7.9.1 (Status: affected)
- 5.7.15.1 (Status: affected)
- 6.1.10 (Status: affected)
- 6.1.11 (Status: affected)
- 5.1.4.3 (Status: affected)
- 6.1.11.1 (Status: affected)
- 6.1.11.2 (Status: affected)
- 5.7.17 (Status: affected)
- 6.1.12 (Status: affected)
**Cisco - Cisco Small Business RV Series Router Firmware**
Affected versions:
- 1.0.01.17 (Status: affected)
- 1.0.03.17 (Status: affected)
- 1.0.01.16 (Status: affected)
- 1.0.01.18 (Status: affected)
- 1.0.00.29 (Status: affected)
- 1.0.03.16 (Status: affected)
- 1.0.03.15 (Status: affected)
- 1.0.02.16 (Status: affected)
- 1.0.01.20 (Status: affected)
- 1.0.00.33 (Status: affected)
- 1.0.03.18 (Status: affected)
- 1.0.03.19 (Status: affected)
- 1.0.03.20 (Status: affected)
- 1.0.03.21 (Status: affected)
- 1.0.03.22 (Status: affected)
- 1.0.03.24 (Status: affected)
- 1.0.03.26 (Status: affected)
- 1.0.03.27 (Status: affected)
- 1.0.03.28 (Status: affected)
- 1.0.03.29 (Status: affected)
### References
1. [cisco-sa-nso-auth-bypass-QnTEesp](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-auth-bypass-QnTEesp) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9418, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9418
- **State**: PUBLISHED
- **Published Date**: December 02, 2024 at 21:23 UTC
- **Last Updated**: December 03, 2024 at 15:12 UTC
- **Reserved Date**: April 05, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In handle_app_cur_val_response of dtif_rc.cc, there is a possible stack buffer overflow due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 7 (Status: affected)
- 7.1.1 (Status: affected)
- 7.1.2 (Status: affected)
- 8 (Status: affected)
- 8.1 (Status: affected)
### References
1. [](https://source.android.com/docs/security/bulletin/pixel/2018-07-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9169
- **State**: PUBLISHED
- **Published Date**: September 25, 2024 at 08:31 UTC
- **Last Updated**: September 25, 2024 at 13:21 UTC
- **Reserved Date**: September 24, 2024 at 19:58 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The LiteSpeed Cache plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin debug settings in all versions up to, and including, 6.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**litespeedtech - LiteSpeed Cache**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/051a987a-944a-4898-872b-0456f0f59b27?source=cve)
2. [](https://www.litespeedtech.com/products/cache-plugins/wordpress-acceleration)
### Credits
- Islam Rafei |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13818, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13818
- **State**: PUBLISHED
- **Published Date**: February 21, 2025 at 03:21 UTC
- **Last Updated**: February 21, 2025 at 21:28 UTC
- **Reserved Date**: January 31, 2025 at 17:45 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Registration Forms – User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.8.3.9 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information about users contained in the exposed log files.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-532: Security Weakness
### Affected Products
**genetechproducts - Registration Forms – User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/768730c1-a70e-432d-a234-4ce2b8aec424?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/pie-register/trunk/classes/base_variables.php#L68)
### Credits
- wesley |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24408, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24408
- **State**: PUBLISHED
- **Published Date**: May 08, 2023 at 14:36 UTC
- **Last Updated**: January 09, 2025 at 15:24 UTC
- **Reserved Date**: January 23, 2023 at 18:16 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Ecwid Ecommerce Ecwid Ecommerce Shopping Cart plugin <= 6.11.4 versions.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Ecwid Ecommerce - Ecwid Ecommerce Shopping Cart**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/ecwid-shopping-cart/wordpress-ecwid-ecommerce-shopping-cart-plugin-6-11-5-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Lana Codes (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40648, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40648
- **State**: PUBLISHED
- **Published Date**: September 15, 2022 at 15:26 UTC
- **Last Updated**: August 03, 2024 at 12:21 UTC
- **Reserved Date**: September 13, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ansys SpaceClaim 2022 R1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of X_B files. The issue results from the lack of proper validation of user-supplied data, which can result in a write before the start of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17563.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Ansys - SpaceClaim**
Affected versions:
- 2022 R1 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1204/)
### Credits
- Anonymous |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18654, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18654
- **State**: PUBLISHED
- **Published Date**: November 01, 2019 at 18:25 UTC
- **Last Updated**: August 05, 2024 at 01:54 UTC
- **Reserved Date**: October 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Cross Site Scripting (XSS) issue exists in AVG AntiVirus (Internet Security Edition) 19.3.3084 build 19.3.4241.440 in the Network Notification Popup, allowing an attacker to execute JavaScript code via an SSID Name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/%40YoKoKho/5-000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop-1e99375f0968)
2. [](http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0143, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0143
- **State**: PUBLISHED
- **Published Date**: February 14, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:10 UTC
- **Reserved Date**: February 12, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple vulnerabilities in Nokia 6310(i) Mobile phones allow remote attackers to cause a denial of service (reset) via malformed Bluetooth OBject EXchange (OBEX) messages, probably triggering buffer overflows.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.pentest.co.uk/documents/ptl-2004-01.html)
2. [9603](http://www.securityfocus.com/bid/9603)
3. [20040209 ptl-2004-01: Multiple vulnerabilities in Nokia phones](http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0034.html)
4. [20040209 ptl-2004-01: Multiple vulnerabilities in Nokia phones](http://marc.info/?l=bugtraq&m=107634788029065&w=2)
5. [nokia-obex-dos(15107)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15107) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27444, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27444
- **State**: PUBLISHED
- **Published Date**: February 26, 2024 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 15:13 UTC
- **Reserved Date**: February 26, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
langchain_experimental (aka LangChain Experimental) in LangChain before 0.1.8 allows an attacker to bypass the CVE-2023-44467 fix and execute arbitrary code via the __import__, __subclasses__, __builtins__, __globals__, __getattribute__, __bases__, __mro__, or __base__ attribute in Python code. These are not prohibited by pal_chain/base.py.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/langchain-ai/langchain/commit/de9a6cdf163ed00adaf2e559203ed0a9ca2f1de7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40980, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40980 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40980
- **State**: PUBLISHED
- **Published Date**: July 12, 2024 at 12:32 UTC
- **Last Updated**: May 21, 2025 at 09:12 UTC
- **Reserved Date**: July 12, 2024 at 12:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drop_monitor: replace spin_lock by raw_spin_lock
trace_drop_common() is called with preemption disabled, and it acquires
a spin_lock. This is problematic for RT kernels because spin_locks are
sleeping locks in this configuration, which causes the following splat:
BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 449, name: rcuc/47
preempt_count: 1, expected: 0
RCU nest depth: 2, expected: 2
5 locks held by rcuc/47/449:
#0: ff1100086ec30a60 ((softirq_ctrl.lock)){+.+.}-{2:2}, at: __local_bh_disable_ip+0x105/0x210
#1: ffffffffb394a280 (rcu_read_lock){....}-{1:2}, at: rt_spin_lock+0xbf/0x130
#2: ffffffffb394a280 (rcu_read_lock){....}-{1:2}, at: __local_bh_disable_ip+0x11c/0x210
#3: ffffffffb394a160 (rcu_callback){....}-{0:0}, at: rcu_do_batch+0x360/0xc70
#4: ff1100086ee07520 (&data->lock){+.+.}-{2:2}, at: trace_drop_common.constprop.0+0xb5/0x290
irq event stamp: 139909
hardirqs last enabled at (139908): [<ffffffffb1df2b33>] _raw_spin_unlock_irqrestore+0x63/0x80
hardirqs last disabled at (139909): [<ffffffffb19bd03d>] trace_drop_common.constprop.0+0x26d/0x290
softirqs last enabled at (139892): [<ffffffffb07a1083>] __local_bh_enable_ip+0x103/0x170
softirqs last disabled at (139898): [<ffffffffb0909b33>] rcu_cpu_kthread+0x93/0x1f0
Preemption disabled at:
[<ffffffffb1de786b>] rt_mutex_slowunlock+0xab/0x2e0
CPU: 47 PID: 449 Comm: rcuc/47 Not tainted 6.9.0-rc2-rt1+ #7
Hardware name: Dell Inc. PowerEdge R650/0Y2G81, BIOS 1.6.5 04/15/2022
Call Trace:
<TASK>
dump_stack_lvl+0x8c/0xd0
dump_stack+0x14/0x20
__might_resched+0x21e/0x2f0
rt_spin_lock+0x5e/0x130
? trace_drop_common.constprop.0+0xb5/0x290
? skb_queue_purge_reason.part.0+0x1bf/0x230
trace_drop_common.constprop.0+0xb5/0x290
? preempt_count_sub+0x1c/0xd0
? _raw_spin_unlock_irqrestore+0x4a/0x80
? __pfx_trace_drop_common.constprop.0+0x10/0x10
? rt_mutex_slowunlock+0x26a/0x2e0
? skb_queue_purge_reason.part.0+0x1bf/0x230
? __pfx_rt_mutex_slowunlock+0x10/0x10
? skb_queue_purge_reason.part.0+0x1bf/0x230
trace_kfree_skb_hit+0x15/0x20
trace_kfree_skb+0xe9/0x150
kfree_skb_reason+0x7b/0x110
skb_queue_purge_reason.part.0+0x1bf/0x230
? __pfx_skb_queue_purge_reason.part.0+0x10/0x10
? mark_lock.part.0+0x8a/0x520
...
trace_drop_common() also disables interrupts, but this is a minor issue
because we could easily replace it with a local_lock.
Replace the spin_lock with raw_spin_lock to avoid sleeping in atomic
context.
### Affected Products
**Linux - Linux**
Affected versions:
- 4ea7e38696c7e798c47ebbecadfd392f23f814f9 (Status: affected)
- 4ea7e38696c7e798c47ebbecadfd392f23f814f9 (Status: affected)
- 4ea7e38696c7e798c47ebbecadfd392f23f814f9 (Status: affected)
- 4ea7e38696c7e798c47ebbecadfd392f23f814f9 (Status: affected)
- 4ea7e38696c7e798c47ebbecadfd392f23f814f9 (Status: affected)
- 4ea7e38696c7e798c47ebbecadfd392f23f814f9 (Status: affected)
- 4ea7e38696c7e798c47ebbecadfd392f23f814f9 (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.31 (Status: affected)
- 0 (Status: unaffected)
- 5.4.279 (Status: unaffected)
- 5.10.221 (Status: unaffected)
- 5.15.162 (Status: unaffected)
- 6.1.96 (Status: unaffected)
- 6.6.36 (Status: unaffected)
- 6.9.7 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/594e47957f3fe034645e6885393ce96c12286334)
2. [](https://git.kernel.org/stable/c/96941f29ebcc1e9cbf570dc903f30374909562f5)
3. [](https://git.kernel.org/stable/c/b3722fb69468693555f531cddda5c30444726dac)
4. [](https://git.kernel.org/stable/c/f251ccef1d864790e5253386e95544420b7cd8f3)
5. [](https://git.kernel.org/stable/c/76ce2f9125244e1708d29c1d3f9d1d50b347bda0)
6. [](https://git.kernel.org/stable/c/07ea878684dfb78a9d4f564c39d07e855a9e242e)
7. [](https://git.kernel.org/stable/c/f1e197a665c2148ebc25fe09c53689e60afea195) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1837
- **State**: PUBLISHED
- **Published Date**: May 20, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 23:10 UTC
- **Reserved Date**: January 13, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html)
2. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10170)
3. [RHSA-2016:1292](https://access.redhat.com/errata/RHSA-2016:1292)
4. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html)
5. [](https://support.apple.com/HT206567)
6. [90691](http://www.securityfocus.com/bid/90691)
7. [DSA-3593](https://www.debian.org/security/2016/dsa-3593)
8. [](http://xmlsoft.org/news.html)
9. [APPLE-SA-2016-05-16-4](http://lists.apple.com/archives/security-announce/2016/May/msg00004.html)
10. [USN-2994-1](http://www.ubuntu.com/usn/USN-2994-1)
11. [](https://support.apple.com/HT206566)
12. [](http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html)
13. [](https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852)
14. [](https://www.tenable.com/security/tns-2016-18)
15. [APPLE-SA-2016-05-16-3](http://lists.apple.com/archives/security-announce/2016/May/msg00003.html)
16. [](https://support.apple.com/HT206564)
17. [RHSA-2016:2957](http://rhn.redhat.com/errata/RHSA-2016-2957.html)
18. [1035890](http://www.securitytracker.com/id/1035890)
19. [APPLE-SA-2016-05-16-2](http://lists.apple.com/archives/security-announce/2016/May/msg00002.html)
20. [](https://support.apple.com/HT206568)
21. [](https://bugzilla.gnome.org/show_bug.cgi?id=760263)
22. [APPLE-SA-2016-05-16-1](http://lists.apple.com/archives/security-announce/2016/May/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0909, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0909
- **State**: PUBLISHED
- **Published Date**: April 06, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 04:57 UTC
- **Reserved Date**: March 14, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the VNnc Codec in VMware Workstation 6.5.x before 6.5.2 build 156735, VMware Player 2.5.x before 2.5.2 build 156735, VMware ACE 2.5.x before 2.5.2 build 156735, and VMware Server 2.0.x before 2.0.1 build 156745 allows remote attackers to execute arbitrary code via a crafted web page or video file, aka ZDI-CAN-435.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201209-25](http://security.gentoo.org/glsa/glsa-201209-25.xml)
2. [20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues](http://seclists.org/fulldisclosure/2009/Apr/0036.html)
3. [34373](http://www.securityfocus.com/bid/34373)
4. [ADV-2009-0944](http://www.vupen.com/english/advisories/2009/0944)
5. [[security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues](http://lists.vmware.com/pipermail/security-announce/2009/000054.html)
6. [](http://www.vmware.com/security/advisories/VMSA-2009-0005.html)
7. [1021974](http://www.securitytracker.com/id?1021974)
8. [oval:org.mitre.oval:def:6251](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6251) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4957, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4957
- **State**: REJECTED
- **Published Date**: January 03, 2018 at 15:00 UTC
- **Last Updated**: January 03, 2018 at 14:57 UTC
- **Reserved Date**: December 29, 2016 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0875
- **State**: PUBLISHED
- **Published Date**: September 11, 2020 at 17:08 UTC
- **Last Updated**: August 04, 2024 at 06:18 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
<p>An information disclosure vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system (low-integrity to medium-integrity).</p>
<p>This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated privileges when code execution is attempted.</p>
<p>The security update addresses the vulnerability by ensuring splwow64.exe properly handles these calls.</p>
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0875) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5869, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5869
- **State**: PUBLISHED
- **Published Date**: January 08, 2009 at 18:13 UTC
- **Last Updated**: August 07, 2024 at 11:13 UTC
- **Reserved Date**: January 08, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Proxim Wireless Tsunami MP.11 2411 with firmware 3.0.3 allows remote authenticated users to inject arbitrary web script or HTML via the system.sysName.0 SNMP OID.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [tsunamimp11-systemsysname0-xss(45797)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45797)
2. [31666](http://www.securityfocus.com/bid/31666)
3. [](http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-24)
4. [20081009 PR08-24: Proxim Tsunami MP.11 2411 vulnerable to SNMP Injection](http://www.securityfocus.com/archive/1/497182/100/0/threaded)
5. [4884](http://securityreason.com/securityalert/4884) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3564, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3564
- **State**: PUBLISHED
- **Published Date**: June 01, 2024 at 03:31 UTC
- **Last Updated**: August 01, 2024 at 20:12 UTC
- **Reserved Date**: April 09, 2024 at 23:52 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Content Blocks (Custom Post Widget) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.0 via the plugin's 'content_block' shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**vanderwijk - Content Blocks (Custom Post Widget)**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c5a0b8fe-d284-4780-84b5-2e97fa96c99a?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078739%40custom-post-widget&new=3078739%40custom-post-widget&sfp_email=&sfph_mail=)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51508
- **State**: PUBLISHED
- **Published Date**: January 08, 2024 at 20:12 UTC
- **Last Updated**: August 26, 2024 at 18:44 UTC
- **Reserved Date**: December 20, 2023 at 15:33 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Jordy Meow Database Cleaner: Clean, Optimize & Repair.This issue affects Database Cleaner: Clean, Optimize & Repair: from n/a through 0.9.8.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-532: Security Weakness
### Affected Products
**Jordy Meow - Database Cleaner: Clean, Optimize & Repair**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/database-cleaner/wordpress-database-cleaner-plugin-0-9-8-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve)
### Credits
- Joshua Chan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7446, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7446
- **State**: PUBLISHED
- **Published Date**: December 28, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 18:09 UTC
- **Reserved Date**: November 18, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2016:0750](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html)
2. [](https://groups.google.com/forum/#%21topic/syzkaller/3twDUI4Cpm8)
3. [1034557](http://www.securitytracker.com/id/1034557)
4. [SUSE-SU-2016:2010](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html)
5. [SUSE-SU-2016:2011](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html)
6. [SUSE-SU-2016:2003](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html)
7. [SUSE-SU-2016:0751](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html)
8. [SUSE-SU-2016:0747](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html)
9. [SUSE-SU-2016:0755](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html)
10. [SUSE-SU-2016:1994](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html)
11. [USN-2887-2](http://www.ubuntu.com/usn/USN-2887-2)
12. [](https://forums.grsecurity.net/viewtopic.php?f=3&t=4150)
13. [SUSE-SU-2016:0757](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html)
14. [SUSE-SU-2016:1961](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html)
15. [SUSE-SU-2016:2001](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html)
16. [[netdev] 20150304 [PATCH net] af_unix: don't poll dead peers](http://www.spinics.net/lists/netdev/msg318826.html)
17. [SUSE-SU-2016:0753](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html)
18. [USN-2886-1](http://www.ubuntu.com/usn/USN-2886-1)
19. [USN-2887-1](http://www.ubuntu.com/usn/USN-2887-1)
20. [USN-2890-3](http://www.ubuntu.com/usn/USN-2890-3)
21. [SUSE-SU-2016:2006](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html)
22. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c)
23. [USN-2889-1](http://www.ubuntu.com/usn/USN-2889-1)
24. [SUSE-SU-2016:2014](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html)
25. [openSUSE-SU-2016:1641](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html)
26. [USN-2889-2](http://www.ubuntu.com/usn/USN-2889-2)
27. [SUSE-SU-2016:0746](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html)
28. [[linux-kernel] 20150913 List corruption on epoll_ctl(EPOLL_CTL_DEL) an AF_UNIX socket](https://lkml.org/lkml/2015/9/13/195)
29. [SUSE-SU-2016:0749](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00037.html)
30. [SUSE-SU-2016:1102](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html)
31. [](http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3)
32. [77638](http://www.securityfocus.com/bid/77638)
33. [SUSE-SU-2016:2009](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html)
34. [SUSE-SU-2016:2005](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html)
35. [[linux-kernel] 20140515 eventpoll __list_del_entry corruption (was: perf: use after free in perf_remove_from_context)](https://lkml.org/lkml/2014/5/15/532)
36. [SUSE-SU-2016:2007](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html)
37. [SUSE-SU-2016:2074](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html)
38. [USN-2890-2](http://www.ubuntu.com/usn/USN-2890-2)
39. [](https://bugzilla.redhat.com/show_bug.cgi?id=1282688)
40. [SUSE-SU-2016:2000](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html)
41. [SUSE-SU-2016:0745](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html)
42. [DSA-3426](http://www.debian.org/security/2015/dsa-3426)
43. [SUSE-SU-2016:1995](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html)
44. [[oss-security] 20151118 Re: CVE request - Linux kernel - Unix sockets use after free - peer_wait_queue prematurely freed](http://www.openwall.com/lists/oss-security/2015/11/18/16)
45. [SUSE-SU-2016:2002](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html)
46. [[linux-kernel] 20131014 Re: epoll oops.](https://lkml.org/lkml/2013/10/14/424)
47. [SUSE-SU-2016:0756](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html)
48. [](https://github.com/torvalds/linux/commit/7d267278a9ece963d77eefec61630223fce08c6c)
49. [USN-2890-1](http://www.ubuntu.com/usn/USN-2890-1)
50. [SUSE-SU-2016:0754](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00042.html)
51. [SUSE-SU-2016:0752](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html)
52. [USN-2888-1](http://www.ubuntu.com/usn/USN-2888-1)
53. [SUSE-SU-2016:0911](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6175
- **State**: PUBLISHED
- **Published Date**: September 26, 2019 at 15:22 UTC
- **Last Updated**: August 04, 2024 at 20:16 UTC
- **Reserved Date**: January 11, 2019 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
A denial of service vulnerability was reported in Lenovo System Update versions prior to 5.07.0088 that could allow configuration files to be written to non-standard locations.
### Affected Products
**Lenovo - System Update**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.lenovo.com/solutions/LEN-28093)
### Credits
- Lenovo would like to thank Eran Shimony at CyberArk Labs for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2526
- **State**: PUBLISHED
- **Published Date**: August 15, 2012 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 19:34 UTC
- **Reserved Date**: May 09, 2012 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP3 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to a deleted object, aka "Remote Desktop Protocol Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS12-053](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-053)
2. [oval:org.mitre.oval:def:15650](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15650)
3. [TA12-227A](http://www.us-cert.gov/cas/techalerts/TA12-227A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3015
- **State**: PUBLISHED
- **Published Date**: July 18, 2018 at 13:00 UTC
- **Last Updated**: October 02, 2024 at 20:06 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
### Affected Products
**Oracle Corporation - FLEXCUBE Universal Banking**
Affected versions:
- 11.3.0 (Status: affected)
- 11.4.0 (Status: affected)
- 12.0.1 (Status: affected)
- 12.0.2 (Status: affected)
- 12.0.3 (Status: affected)
- 12.1.0 (Status: affected)
- 12.2.0 (Status: affected)
- 12.3.0 (Status: affected)
- 12.4.0 (Status: affected)
- 14.0.0 (Status: affected)
- 14.1.0 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html)
2. [1041307](http://www.securitytracker.com/id/1041307)
3. [104778](http://www.securityfocus.com/bid/104778) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35880, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35880 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35880
- **State**: PUBLISHED
- **Published Date**: May 19, 2024 at 08:34 UTC
- **Last Updated**: May 04, 2025 at 09:07 UTC
- **Reserved Date**: May 17, 2024 at 13:50 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
io_uring/kbuf: hold io_buffer_list reference over mmap
If we look up the kbuf, ensure that it doesn't get unregistered until
after we're done with it. Since we're inside mmap, we cannot safely use
the io_uring lock. Rely on the fact that we can lookup the buffer list
under RCU now and grab a reference to it, preventing it from being
unregistered until we're done with it. The lookup returns the
io_buffer_list directly with it referenced.
### Affected Products
**Linux - Linux**
Affected versions:
- 09f7520048eaaee9709091cd2787966f807da7c5 (Status: affected)
- 5cf4f52e6d8aa2d3b7728f568abbf9d42a3af252 (Status: affected)
- 5cf4f52e6d8aa2d3b7728f568abbf9d42a3af252 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.7 (Status: affected)
- 0 (Status: unaffected)
- 6.6.26 (Status: unaffected)
- 6.8.5 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66)
2. [](https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9)
3. [](https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10264
- **State**: PUBLISHED
- **Published Date**: July 26, 2019 at 20:46 UTC
- **Last Updated**: August 04, 2024 at 22:17 UTC
- **Reserved Date**: March 28, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Ahsay Cloud Backup Suite before 8.1.1.50. With a valid administrator account, the "Move / Import / Export Users" screen has an Import Users option. This option accepts a ZIP archive containing a users.xml file that can trigger XXE.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.wbsec.nl/ahsay/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29808, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29808 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29808
- **State**: PUBLISHED
- **Published Date**: April 08, 2025 at 17:24 UTC
- **Last Updated**: June 04, 2025 at 17:53 UTC
- **Reserved Date**: March 11, 2025 at 18:19 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-1240: Security Weakness
### Affected Products
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
### References
1. [Windows Cryptographic Services Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29808) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52544, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52544 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52544
- **State**: PUBLISHED
- **Published Date**: December 03, 2024 at 17:18 UTC
- **Last Updated**: December 03, 2024 at 21:01 UTC
- **Reserved Date**: November 12, 2024 at 13:42 UTC
- **Assigned By**: rapid7
### Vulnerability Description
An unauthenticated attacker can trigger a stack based buffer overflow in the DP Service (TCP port 3500). This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Lorex - 2K Indoor Wi-Fi Security Camera**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/sfewer-r7/LorexExploit)
2. [](https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35748
- **State**: PUBLISHED
- **Published Date**: May 31, 2023 at 18:07 UTC
- **Last Updated**: January 02, 2025 at 19:33 UTC
- **Reserved Date**: July 13, 2022 at 18:19 UTC
- **Assigned By**: microsoft
### Vulnerability Description
HTTP.sys Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [HTTP.sys Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35748) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12259, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12259
- **State**: PUBLISHED
- **Published Date**: August 09, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 23:17 UTC
- **Reserved Date**: May 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and vx7 has an array index error in the IGMPv3 client component. There is an IPNET security vulnerability: DoS via NULL dereference in IGMP parsing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support2.windriver.com/index.php?page=security-notices)
2. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009)
3. [](https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf)
4. [](https://security.netapp.com/advisory/ntap-20190802-0001/)
5. [](https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/)
6. [](https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12259)
7. [](https://support.f5.com/csp/article/K41190253)
8. [](https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf)
9. [](https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25012, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25012
- **State**: PUBLISHED
- **Published Date**: March 28, 2022 at 17:21 UTC
- **Last Updated**: August 03, 2024 at 19:49 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Pz-LinkCard WordPress plugin through 2.4.4.4 does not sanitise and escape multiple parameters before outputting them back in admin dashboard pages, leading to Reflected Cross-Site Scripting issues
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Pz-LinkCard**
Affected versions:
- 2.4.4.4 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/b126d2fc-6cc7-4c18-b95e-d32c2effcc4f)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50579
- **State**: PUBLISHED
- **Published Date**: October 28, 2024 at 12:55 UTC
- **Last Updated**: October 28, 2024 at 13:33 UTC
- **Reserved Date**: October 24, 2024 at 15:56 UTC
- **Assigned By**: JetBrains
### Vulnerability Description
In JetBrains YouTrack before 2024.3.47707 reflected XSS due to insecure link sanitization was possible
### CVSS Metrics
- **CVSS Base Score**: 4.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N`
### Affected Products
**JetBrains - YouTrack**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.jetbrains.com/privacy-security/issues-fixed/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0383, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0383
- **State**: PUBLISHED
- **Published Date**: January 17, 2013 at 01:30 UTC
- **Last Updated**: August 06, 2024 at 14:25 UTC
- **Reserved Date**: December 07, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote attackers to affect availability via unknown vectors related to Server Locking.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:16758](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16758)
2. [USN-1703-1](http://www.ubuntu.com/usn/USN-1703-1)
3. [53372](http://secunia.com/advisories/53372)
4. [](http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html)
5. [GLSA-201308-06](http://security.gentoo.org/glsa/glsa-201308-06.xml)
6. [RHSA-2013:0219](http://rhn.redhat.com/errata/RHSA-2013-0219.html)
7. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37775, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37775
- **State**: PUBLISHED
- **Published Date**: September 16, 2022 at 16:11 UTC
- **Last Updated**: August 03, 2024 at 10:37 UTC
- **Reserved Date**: August 08, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Genesys PureConnect Interaction Web Tools Chat Service (up to at least 26- September- 2019) allows XSS within the Printable Chat History via the participant -> name JSON POST parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://genesys.com)
2. [](https://help.genesys.com/pureconnect/mergedprojects/wh_tr/desktop/pdfs/web_tools_dg.pdf)
3. [](https://cxsecurity.com/issue/WLB-2022090038)
4. [](http://packetstormsecurity.com/files/168410/Genesys-PureConnect-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2934, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2934 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2934
- **State**: PUBLISHED
- **Published Date**: August 21, 2009 at 20:21 UTC
- **Last Updated**: August 07, 2024 at 06:07 UTC
- **Reserved Date**: August 21, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple stack-based buffer overflows in xaudio.dll in Programmed Integration PIPL 2.5.0 and 2.5.0D allow remote attackers to execute arbitrary code via a long string in a (1) .pls or (2) .pl playlist file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [9428](http://www.exploit-db.com/exploits/9428)
2. [pipl-pls-bo(52440)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52440)
3. [56996](http://osvdb.org/56996)
4. [36297](http://secunia.com/advisories/36297) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20679, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20679 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20679
- **State**: PUBLISHED
- **Published Date**: January 09, 2019 at 16:00 UTC
- **Last Updated**: June 09, 2025 at 15:26 UTC
- **Reserved Date**: January 09, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c)
2. [](https://busybox.net/news.html)
3. [](https://bugs.busybox.net/show_bug.cgi?id=11506)
4. [USN-3935-1](https://usn.ubuntu.com/3935-1/)
5. [20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X](http://seclists.org/fulldisclosure/2019/Sep/7)
6. [20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X](https://seclists.org/bugtraq/2019/Sep/7)
7. [](http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-17432, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-17432 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-17432
- **State**: PUBLISHED
- **Published Date**: February 09, 2021 at 15:46 UTC
- **Last Updated**: August 04, 2024 at 13:53 UTC
- **Reserved Date**: August 07, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.922. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CR2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-11335.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Foxit - Studio Photo**
Affected versions:
- 3.6.6.922 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.html)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1343/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2848
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 13:29 UTC
- **Last Updated**: September 27, 2024 at 19:04 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Depot Repair product of Oracle E-Business Suite (component: Estimate and Actual Charges). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Depot Repair. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Depot Repair, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Depot Repair accessible data as well as unauthorized update, insert or delete access to some of Oracle Depot Repair accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### Affected Products
**Oracle Corporation - Depot Repair**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1559
- **State**: PUBLISHED
- **Published Date**: February 20, 2024 at 03:20 UTC
- **Last Updated**: April 24, 2025 at 15:05 UTC
- **Reserved Date**: February 15, 2024 at 18:59 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'll_reciprocal' parameter in all versions up to, and including, 7.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Affected Products
**jackdewey - Link Library**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/407a5c69-cce0-4868-aef0-ffc88981e256?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3037265%40link-library&new=3037265%40link-library&sfp_email=&sfph_mail=)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5076
- **State**: PUBLISHED
- **Published Date**: September 29, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 19:41 UTC
- **Reserved Date**: September 28, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in OpenConcept Back-End 0.4.5 allow remote attackers to execute arbitrary PHP code via a URL in the includes_path parameter in (1) admin/index.php, (2) Facts.php, or (3) search.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20207](http://www.securityfocus.com/bid/20207)
2. [20061015 Back-end ( File Include Vulnerability Exploit )](http://www.securityfocus.com/archive/1/448776/100/0/threaded)
3. [backend-index-file-include(29605)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29605)
4. [back-end-includes-file-include(29172)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29172)
5. [20061028 Back-end => 0.4.5 Remote File Include Vulnerability Exploit](http://www.securityfocus.com/archive/1/450031/100/200/threaded)
6. [20060925 Back-end => 0.4.5 Remote File Include Vulnerabilities](http://www.securityfocus.com/archive/1/447005/100/0/threaded)
7. [1650](http://securityreason.com/securityalert/1650) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4148, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4148
- **State**: PUBLISHED
- **Published Date**: April 25, 2019 at 14:36 UTC
- **Last Updated**: September 16, 2024 at 19:40 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 and 6.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158414.
### Affected Products
**IBM - Sterling B2B Integrator**
Affected versions:
- 6.0.0.0 (Status: affected)
- 6.0.0.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/docview.wss?uid=ibm10880591)
2. [ibm-sterling-cve20194148-xss (158414)](https://exchange.xforce.ibmcloud.com/vulnerabilities/158414) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28879, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28879 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28879
- **State**: PUBLISHED
- **Published Date**: July 22, 2022 at 15:27 UTC
- **Last Updated**: August 03, 2024 at 06:03 UTC
- **Reserved Date**: April 08, 2022 at 00:00 UTC
- **Assigned By**: F-SecureUS
### Vulnerability Description
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aepack.dll component can crash the scanning engine.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L`
### Affected Products
**F-Secure - All F-Secure and WithSecure Endpoint Protection products for Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection**
Affected versions:
- All Version (Status: affected)
### References
1. [](https://www.f-secure.com/en/business/support-and-downloads/security-advisories)
2. [](https://www.withsecure.com/en/support/security-advisories) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0116, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0116 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0116
- **State**: PUBLISHED
- **Published Date**: January 09, 2007 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 12:03 UTC
- **Reserved Date**: January 08, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Digger Solutions Intranet Open Source (IOS) stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing passwords via a direct request for data/intranet.mdb.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://aria-security.com/forum/showthread.php?goto=newpost&t=88)
2. [33379](http://osvdb.org/33379)
3. [2109](http://securityreason.com/securityalert/2109)
4. [intranet-intranet-info-disclosure(31308)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31308)
5. [20070105 Intranet Open Source Remote Password Disclosure "intranet.mdb"](http://www.securityfocus.com/archive/1/456047/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-49209, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-49209 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-49209
- **State**: REJECTED
- **Last Updated**: June 04, 2025 at 02:55 UTC
- **Reserved Date**: June 03, 2025 at 07:46 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1028
- **State**: PUBLISHED
- **Published Date**: April 12, 2018 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 03:44 UTC
- **Reserved Date**: December 01, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists when the Office graphics component improperly handles specially crafted embedded fonts, aka "Microsoft Office Graphics Remote Code Execution Vulnerability." This affects Word, Microsoft Office, Microsoft SharePoint, Excel, Microsoft SharePoint Server.
### Affected Products
**Microsoft - Word**
Affected versions:
- Automation Services on Microsoft SharePoint Server 2010 Service Pack 2 (Status: affected)
- Automation Services on Microsoft SharePoint Server 2013 Service Pack 1 (Status: affected)
**Microsoft - Microsoft Office**
Affected versions:
- 2010 Service Pack 2 (32-bit editions) (Status: affected)
- 2010 Service Pack 2 (64-bit editions) (Status: affected)
- 2013 RT Service Pack 1 (Status: affected)
- 2013 Service Pack 1 (32-bit editions) (Status: affected)
- 2013 Service Pack 1 (64-bit editions) (Status: affected)
- 2016 (32-bit edition) (Status: affected)
- 2016 (64-bit edition) (Status: affected)
- Web Apps 2010 Service Pack 2 (Status: affected)
- Web Apps Server 2013 Service Pack 1 (Status: affected)
**Microsoft - Microsoft SharePoint**
Affected versions:
- Enterprise Server 2016 (Status: affected)
**Microsoft - Excel**
Affected versions:
- Services on Microsoft SharePoint Enterprise Server 2013 Service Pack 1 (Status: affected)
**Microsoft - Microsoft SharePoint Server**
Affected versions:
- 2013 Service Pack 1 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1028)
2. [1040654](http://www.securitytracker.com/id/1040654)
3. [103641](http://www.securityfocus.com/bid/103641) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15537
- **State**: PUBLISHED
- **Published Date**: November 29, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 09:54 UTC
- **Reserved Date**: August 19, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unrestricted file upload (with remote code execution) in OCS Inventory NG ocsreports allows a privileged user to gain access to the server via crafted HTTP requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/150330/OCS-Inventory-NG-ocsreports-Shell-Upload.html)
2. [20181113 OCS Inventory NG ocsreports Authenticated RCE via Shell Upload (CVE-2018-15537)](http://seclists.org/fulldisclosure/2018/Nov/40) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36867, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36867 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36867
- **State**: PUBLISHED
- **Published Date**: September 09, 2022 at 14:40 UTC
- **Last Updated**: August 03, 2024 at 10:14 UTC
- **Reserved Date**: July 27, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper access control vulnerability in Editor Lite prior to version 4.0.40.14 allows attackers to access sensitive information.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Samsung Mobile - Editor Lite**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=09) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2180, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2180
- **State**: PUBLISHED
- **Published Date**: June 09, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 13:48 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Hands-on Vulnerability Learning Tool "AppGoat" for Web Application V3.0.2 and earlier allow remote attackers to obtain local files via unspecified vectors.
### Affected Products
**INFORMATION-TECHNOLOGY PROMOTION AGENCY, JAPAN (IPA) - Hands-on Vulnerability Learning Tool "AppGoat" for Web Application**
Affected versions:
- V3.0.2 and earlier (Status: affected)
### References
1. [JVN#32120290](http://jvn.jp/en/jp/JVN32120290/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18728, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18728 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18728
- **State**: PUBLISHED
- **Published Date**: April 24, 2020 at 13:01 UTC
- **Last Updated**: August 05, 2024 at 21:37 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6200 before 1.1.00.24, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000051527/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Routers-PSV-2017-2136) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8340, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8340
- **State**: PUBLISHED
- **Published Date**: December 17, 2015 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 08:13 UTC
- **Reserved Date**: November 25, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-3519](http://www.debian.org/security/2016/dsa-3519)
2. [](http://xenbits.xen.org/xsa/advisory-159.html)
3. [1034391](http://www.securitytracker.com/id/1034391)
4. [](http://support.citrix.com/article/CTX203451)
5. [GLSA-201604-03](https://security.gentoo.org/glsa/201604-03)
6. [79038](http://www.securityfocus.com/bid/79038) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33057, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33057
- **State**: PUBLISHED
- **Published Date**: September 02, 2024 at 10:22 UTC
- **Last Updated**: September 03, 2024 at 13:23 UTC
- **Reserved Date**: April 23, 2024 at 04:42 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Transient DOS while parsing the multi-link element Control field when common information length check is missing before updating the location.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AR8035 (Status: affected)
- CSR8811 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Flight RB5 5G Platform (Status: affected)
- Immersive Home 214 Platform (Status: affected)
- Immersive Home 216 Platform (Status: affected)
- Immersive Home 316 Platform (Status: affected)
- Immersive Home 318 Platform (Status: affected)
- Immersive Home 3210 Platform (Status: affected)
- Immersive Home 326 Platform (Status: affected)
- IPQ5010 (Status: affected)
- IPQ5028 (Status: affected)
- IPQ5300 (Status: affected)
- IPQ5302 (Status: affected)
- IPQ5312 (Status: affected)
- IPQ5332 (Status: affected)
- IPQ6000 (Status: affected)
- IPQ6010 (Status: affected)
- IPQ6018 (Status: affected)
- IPQ6028 (Status: affected)
- IPQ8070A (Status: affected)
- IPQ8071A (Status: affected)
- IPQ8072A (Status: affected)
- IPQ8074A (Status: affected)
- IPQ8076 (Status: affected)
- IPQ8076A (Status: affected)
- IPQ8078 (Status: affected)
- IPQ8078A (Status: affected)
- IPQ8173 (Status: affected)
- IPQ8174 (Status: affected)
- IPQ9008 (Status: affected)
- IPQ9554 (Status: affected)
- IPQ9570 (Status: affected)
- IPQ9574 (Status: affected)
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QAM8620P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QAMSRV1H (Status: affected)
- QAMSRV1M (Status: affected)
- QCA0000 (Status: affected)
- QCA4024 (Status: affected)
- QCA6391 (Status: affected)
- QCA6554A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6678AQ (Status: affected)
- QCA6688AQ (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6777AQ (Status: affected)
- QCA6787AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA8075 (Status: affected)
- QCA8081 (Status: affected)
- QCA8082 (Status: affected)
- QCA8084 (Status: affected)
- QCA8085 (Status: affected)
- QCA8337 (Status: affected)
- QCA8386 (Status: affected)
- QCA9888 (Status: affected)
- QCA9889 (Status: affected)
- QCC2073 (Status: affected)
- QCC2076 (Status: affected)
- QCC710 (Status: affected)
- QCF8000 (Status: affected)
- QCF8001 (Status: affected)
- QCM5430 (Status: affected)
- QCM6490 (Status: affected)
- QCM8550 (Status: affected)
- QCN5022 (Status: affected)
- QCN5024 (Status: affected)
- QCN5052 (Status: affected)
- QCN5122 (Status: affected)
- QCN5124 (Status: affected)
- QCN5152 (Status: affected)
- QCN5154 (Status: affected)
- QCN5164 (Status: affected)
- QCN6023 (Status: affected)
- QCN6024 (Status: affected)
- QCN6112 (Status: affected)
- QCN6122 (Status: affected)
- QCN6132 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QCN6402 (Status: affected)
- QCN6412 (Status: affected)
- QCN6422 (Status: affected)
- QCN6432 (Status: affected)
- QCN9000 (Status: affected)
- QCN9022 (Status: affected)
- QCN9024 (Status: affected)
- QCN9070 (Status: affected)
- QCN9072 (Status: affected)
- QCN9074 (Status: affected)
- QCN9100 (Status: affected)
- QCN9160 (Status: affected)
- QCN9274 (Status: affected)
- QCS5430 (Status: affected)
- QCS6490 (Status: affected)
- QCS7230 (Status: affected)
- QCS8250 (Status: affected)
- QCS8550 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- QRB5165N (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- Qualcomm Video Collaboration VC5 Platform (Status: affected)
- QXM8083 (Status: affected)
- Robotics RB5 Platform (Status: affected)
- SA6155P (Status: affected)
- SA7255P (Status: affected)
- SA7775P (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SA8530P (Status: affected)
- SA8540P (Status: affected)
- SA8620P (Status: affected)
- SA8650P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SDX55 (Status: affected)
- SDX65M (Status: affected)
- SG8275P (Status: affected)
- SM8550P (Status: affected)
- SM8635 (Status: affected)
- Snapdragon 8 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 3 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 2 Mobile Platform (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon X72 5G Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- SRV1H (Status: affected)
- SRV1L (Status: affected)
- SRV1M (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SXR1230P (Status: affected)
- SXR2230P (Status: affected)
- SXR2250P (Status: affected)
- Vision Intelligence 400 Platform (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WCN3990 (Status: affected)
- WCN6755 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6746, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6746 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6746
- **State**: PUBLISHED
- **Published Date**: April 23, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 11:41 UTC
- **Reserved Date**: April 23, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the contact display view in Turba Contact Manager H3 before 2.2.1 allows remote attackers to inject arbitrary web script or HTML via the contact name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://cvs.horde.org/diff.php/turba/docs/CHANGES?r1=1.181.2.165&r2=1.181.2.170&ty=h)
2. [30704](http://secunia.com/advisories/30704)
3. [[announce] 20080613 Turba H3 (2.2.1) (final)](http://lists.horde.org/archives/announce/2008/000414.html)
4. [turba-contactview-xss(43098)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43098)
5. [29743](http://www.securityfocus.com/bid/29743) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7678, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7678 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7678
- **State**: PUBLISHED
- **Published Date**: July 12, 2017 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 16:12 UTC
- **Reserved Date**: April 11, 2017 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[dev] 20170712 CVE-2017-7678 Apache Spark XSS web UI MHTML vulnerability](http://apache-spark-developers-list.1001551.n3.nabble.com/CVE-2017-7678-Apache-Spark-XSS-web-UI-MHTML-vulnerability-td21947.html)
2. [99603](http://www.securityfocus.com/bid/99603) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3626, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3626 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3626
- **State**: PUBLISHED
- **Published Date**: October 29, 2009 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 06:38 UTC
- **Reserved Date**: October 09, 2009 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Perl 5.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a UTF-8 character with a large, invalid codepoint, which is not properly handled during a regular-expression match.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2009-3023](http://www.vupen.com/english/advisories/2009/3023)
2. [[oss-security] 20091023 CVE-2009-3626 assigment notification - Perl - perl-5.10.1](http://www.openwall.com/lists/oss-security/2009/10/23/8)
3. [59283](http://www.osvdb.org/59283)
4. [perl-utf8-expressions-dos(53939)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53939)
5. [](http://rt.perl.org/rt3/Ticket/Attachment/617489/295383/)
6. [](https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6225)
7. [](http://rt.perl.org/rt3/Public/Bug/Display.html?id=69973)
8. [37144](http://secunia.com/advisories/37144)
9. [](http://perl5.git.perl.org/perl.git/commit/0abd0d78a73da1c4d13b1c700526b7e5d03b32d4)
10. [36812](http://www.securityfocus.com/bid/36812)
11. [1023077](http://securitytracker.com/id?1023077) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2718, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2718 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2718
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: February 26, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44501, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44501 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44501
- **State**: PUBLISHED
- **Published Date**: April 15, 2022 at 17:49 UTC
- **Last Updated**: August 04, 2024 at 04:25 UTC
- **Reserved Date**: December 01, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause calls to ZRead to crash due to a NULL pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/projects/fis-gtm/files/)
2. [](https://gitlab.com/YottaDB/DB/YDB/-/issues/828)
3. [](http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1767
- **State**: PUBLISHED
- **Published Date**: January 10, 2020 at 15:09 UTC
- **Last Updated**: September 16, 2024 at 16:33 UTC
- **Reserved Date**: November 29, 2019 at 00:00 UTC
- **Assigned By**: OTRS
### Vulnerability Description
Agent A is able to save a draft (i.e. for customer reply). Then Agent B can open the draft, change the text completely and send it in the name of Agent A. For the customer it will not be visible that the message was sent by another agent. This issue affects: ((OTRS)) Community Edition 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Affected Products
**OTRS AG - ((OTRS)) Community Edition**
Affected versions:
- 6.0.x version 6.0.24 and prior versions (Status: affected)
**OTRS AG - OTRS**
Affected versions:
- 7.0.x version 7.0.13 and prior versions (Status: affected)
### References
1. [](https://otrs.com/release-notes/otrs-security-advisory-2020-03/)
2. [[debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update](https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html)
3. [[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update](https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39031, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39031
- **State**: PUBLISHED
- **Published Date**: January 25, 2022 at 16:25 UTC
- **Last Updated**: September 16, 2024 at 18:28 UTC
- **Reserved Date**: August 16, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere Application Server - Liberty 17.0.0.3 through 22.0.0.1 could allow a remote authenticated attacker to conduct an LDAP injection. By using a specially crafted request, an attacker could exploit this vulnerability and could result in in granting permission to unauthorized resources. IBM X-Force ID: 213875.
### Affected Products
**IBM - WebSphere Application Server Liberty**
Affected versions:
- 17.0.0.3 (Status: affected)
- 22.0.0.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6550488)
2. [ibm-websphere-cve202139031-ldap-injection (213875)](https://exchange.xforce.ibmcloud.com/vulnerabilities/213875) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37816
- **State**: PUBLISHED
- **Published Date**: May 08, 2025 at 06:26 UTC
- **Last Updated**: May 26, 2025 at 05:21 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
mei: vsc: Fix fortify-panic caused by invalid counted_by() use
gcc 15 honors the __counted_by(len) attribute on vsc_tp_packet.buf[]
and the vsc-tp.c code is using this in a wrong way. len does not contain
the available size in the buffer, it contains the actual packet length
*without* the crc. So as soon as vsc_tp_xfer() tries to add the crc to
buf[] the fortify-panic handler gets triggered:
[ 80.842193] memcpy: detected buffer overflow: 4 byte write of buffer size 0
[ 80.842243] WARNING: CPU: 4 PID: 272 at lib/string_helpers.c:1032 __fortify_report+0x45/0x50
...
[ 80.843175] __fortify_panic+0x9/0xb
[ 80.843186] vsc_tp_xfer.cold+0x67/0x67 [mei_vsc_hw]
[ 80.843210] ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90
[ 80.843229] ? lockdep_hardirqs_on+0x7c/0x110
[ 80.843250] mei_vsc_hw_start+0x98/0x120 [mei_vsc]
[ 80.843270] mei_reset+0x11d/0x420 [mei]
The easiest fix would be to just drop the counted-by but with the exception
of the ack buffer in vsc_tp_xfer_helper() which only contains enough room
for the packet-header, all other uses of vsc_tp_packet always use a buffer
of VSC_TP_MAX_XFER_SIZE bytes for the packet.
Instead of just dropping the counted-by, split the vsc_tp_packet struct
definition into a header and a full-packet definition and use a fixed
size buf[] in the packet definition, this way fortify-source buffer
overrun checking still works when enabled.
### Affected Products
**Linux - Linux**
Affected versions:
- 566f5ca9768075e453b7b51a397733968df4287d (Status: affected)
- 566f5ca9768075e453b7b51a397733968df4287d (Status: affected)
- 566f5ca9768075e453b7b51a397733968df4287d (Status: affected)
**Linux - Linux**
Affected versions:
- 6.8 (Status: affected)
- 0 (Status: unaffected)
- 6.12.26 (Status: unaffected)
- 6.14.5 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/3e243378f27cc7d11682a3ad720228b0723affa5)
2. [](https://git.kernel.org/stable/c/ac04663c67f244810b3492e9ecd9f7cdbefeca2d)
3. [](https://git.kernel.org/stable/c/00f1cc14da0f06d2897b8c528df7c7dcf1b8da50) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5645, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5645 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5645
- **State**: PUBLISHED
- **Published Date**: April 17, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 15:11 UTC
- **Reserved Date**: January 29, 2017 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
### Affected Products
**Apache Software Foundation - Apache Log4j**
Affected versions:
- All versions between 2.0-alpha1 and 2.8.1 (Status: affected)
### References
1. [RHSA-2017:2888](https://access.redhat.com/errata/RHSA-2017:2888)
2. [RHSA-2017:2809](https://access.redhat.com/errata/RHSA-2017:2809)
3. [97702](http://www.securityfocus.com/bid/97702)
4. [1041294](http://www.securitytracker.com/id/1041294)
5. [RHSA-2017:2810](https://access.redhat.com/errata/RHSA-2017:2810)
6. [RHSA-2017:1801](https://access.redhat.com/errata/RHSA-2017:1801)
7. [RHSA-2017:2889](https://access.redhat.com/errata/RHSA-2017:2889)
8. [RHSA-2017:2635](https://access.redhat.com/errata/RHSA-2017:2635)
9. [RHSA-2017:2638](https://access.redhat.com/errata/RHSA-2017:2638)
10. [RHSA-2017:1417](https://access.redhat.com/errata/RHSA-2017:1417)
11. [RHSA-2017:2423](https://access.redhat.com/errata/RHSA-2017:2423)
12. [RHSA-2017:2808](https://access.redhat.com/errata/RHSA-2017:2808)
13. [1040200](http://www.securitytracker.com/id/1040200)
14. [RHSA-2017:2636](https://access.redhat.com/errata/RHSA-2017:2636)
15. [RHSA-2017:3399](https://access.redhat.com/errata/RHSA-2017:3399)
16. [RHSA-2017:2637](https://access.redhat.com/errata/RHSA-2017:2637)
17. [RHSA-2017:3244](https://access.redhat.com/errata/RHSA-2017:3244)
18. [RHSA-2017:3400](https://access.redhat.com/errata/RHSA-2017:3400)
19. [RHSA-2017:2633](https://access.redhat.com/errata/RHSA-2017:2633)
20. [RHSA-2017:2811](https://access.redhat.com/errata/RHSA-2017:2811)
21. [RHSA-2017:1802](https://access.redhat.com/errata/RHSA-2017:1802)
22. [RHSA-2019:1545](https://access.redhat.com/errata/RHSA-2019:1545)
23. [[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities](https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E)
24. [[logging-dev] 20191215 Re: Is there any chance that there will be a security fix for log4j-v1.2.17?](https://lists.apache.org/thread.html/e8fb7d76a244ee997ba4b217d6171227f7c2521af8c7c5b16cba27bc%40%3Cdev.logging.apache.org%3E)
25. [[logging-dev] 20191218 [CVE-2019-17571] Apache Log4j 1.2 deserialization of untrusted data in SocketServer](https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E)
26. [[oss-security] 20191218 [CVE-2019-17571] Apache Log4j 1.2 deserialization of untrusted data in SocketServer](http://www.openwall.com/lists/oss-security/2019/12/19/2)
27. [[announce] 20191218 [CVE-2019-17571] Apache Log4j 1.2 deserialization of untrusted data in SocketServer](https://lists.apache.org/thread.html/84cc4266238e057b95eb95dfd8b29d46a2592e7672c12c92f68b2917%40%3Cannounce.apache.org%3E)
28. [[logging-dev] 20191219 Re: [CVE-2019-17571] Apache Log4j 1.2 deserialization of untrusted data in SocketServer](https://lists.apache.org/thread.html/0dcca05274d20ef2d72584edcf8c917bbb13dbbd7eb35cae909d02e9%40%3Cdev.logging.apache.org%3E)
29. [[activemq-issues] 20191226 [jira] [Created] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571](https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac%40%3Cissues.activemq.apache.org%3E)
30. [[tika-dev] 20191226 [jira] [Created] (TIKA-3018) log4j 1.2 version used by Apache Tika 1.23 is vulnerable to CVE-2019-17571](https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c%40%3Cdev.tika.apache.org%3E)
31. [[tika-dev] 20191226 [jira] [Commented] (TIKA-3018) log4j 1.2 version used by Apache Tika 1.23 is vulnerable to CVE-2019-17571](https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1%40%3Cdev.tika.apache.org%3E)
32. [[tika-dev] 20191230 [jira] [Created] (TIKA-3019) [9.8] [CVE-2019-17571] [tika-app] [1.23]](https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6%40%3Cdev.tika.apache.org%3E)
33. [[activemq-issues] 20191230 [jira] [Created] (AMQ-7372) [9.8] [CVE-2019-17571] [activemq-all] [5.15.10]](https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c%40%3Cissues.activemq.apache.org%3E)
34. [[tika-dev] 20200106 [jira] [Commented] (TIKA-3019) [9.8] [CVE-2019-17571] [tika-app] [1.23]](https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f%40%3Cdev.tika.apache.org%3E)
35. [[tika-dev] 20200107 [jira] [Commented] (TIKA-3019) [9.8] [CVE-2019-17571] [tika-app] [1.23]](https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8%40%3Cdev.tika.apache.org%3E)
36. [[tika-dev] 20200108 [jira] [Commented] (TIKA-3019) [9.8] [CVE-2019-17571] [tika-app] [1.23]](https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7%40%3Cdev.tika.apache.org%3E)
37. [[tika-dev] 20200110 [jira] [Commented] (TIKA-3019) [9.8] [CVE-2019-17571] [tika-app] [1.23]](https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1%40%3Cdev.tika.apache.org%3E)
38. [[tika-dev] 20200111 Re: [jira] [Commented] (TIKA-3018) log4j 1.2 version used by Apache Tika 1.23 is vulnerable to CVE-2019-17571](https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60%40%3Cdev.tika.apache.org%3E)
39. [[tika-dev] 20200111 [jira] [Closed] (TIKA-3018) log4j 1.2 version used by Apache Tika 1.23 is vulnerable to CVE-2019-17571](https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5%40%3Cdev.tika.apache.org%3E)
40. [[tika-dev] 20200111 [jira] [Resolved] (TIKA-3018) log4j 1.2 version used by Apache Tika 1.23 is vulnerable to CVE-2019-17571](https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26%40%3Cdev.tika.apache.org%3E)
41. [[tika-dev] 20200114 [jira] [Commented] (TIKA-3019) [9.8] [CVE-2019-17571] [tika-app] [1.23]](https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2%40%3Cdev.tika.apache.org%3E)
42. [[tika-dev] 20200115 [jira] [Commented] (TIKA-3019) [9.8] [CVE-2019-17571] [tika-app] [1.23]](https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad%40%3Cdev.tika.apache.org%3E)
43. [[activemq-issues] 20200122 [jira] [Updated] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571](https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e%40%3Cissues.activemq.apache.org%3E)
44. [[activemq-issues] 20200122 [jira] [Assigned] (AMQ-7372) [9.8] [CVE-2019-17571] [activemq-all] [5.15.10]](https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826%40%3Cissues.activemq.apache.org%3E)
45. [[activemq-issues] 20200122 [jira] [Updated] (AMQ-7372) [9.8] [CVE-2019-17571] [activemq-all] [5.15.10]](https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead%40%3Cissues.activemq.apache.org%3E)
46. [[activemq-issues] 20200122 [jira] [Assigned] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571](https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211%40%3Cissues.activemq.apache.org%3E)
47. [[activemq-issues] 20200122 [jira] [Resolved] (AMQ-7372) [9.8] [CVE-2019-17571] [activemq-all] [5.15.10]](https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919%40%3Cissues.activemq.apache.org%3E)
48. [[activemq-issues] 20200127 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571](https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78%40%3Cissues.activemq.apache.org%3E)
49. [[activemq-issues] 20200208 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571](https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3%40%3Cissues.activemq.apache.org%3E)
50. [[activemq-issues] 20200228 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571](https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374%40%3Cissues.activemq.apache.org%3E)
51. [[activemq-issues] 20200228 [jira] [Resolved] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571](https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf%40%3Cissues.activemq.apache.org%3E)
52. [[activemq-issues] 20200228 [jira] [Updated] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571](https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c%40%3Cissues.activemq.apache.org%3E)
53. [[logging-commits] 20200425 svn commit: r1059809 - /websites/production/logging/content/log4j/2.13.2/security.html](https://lists.apache.org/thread.html/ra9a682bc0a8dff1c5cefdef31c7c25f096d9121207cf2d74e2fc563d%40%3Ccommits.logging.apache.org%3E)
54. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
55. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html)
56. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html)
57. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html)
58. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html)
59. [](https://www.oracle.com/security-alerts/cpujul2020.html)
60. [](https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html)
61. [](https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html)
62. [](https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html)
63. [](https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html)
64. [](https://www.oracle.com/security-alerts/cpujan2020.html)
65. [](https://security.netapp.com/advisory/ntap-20181107-0002/)
66. [](https://security.netapp.com/advisory/ntap-20180726-0002/)
67. [](https://issues.apache.org/jira/browse/LOG4J2-1863)
68. [[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image](https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E)
69. [[activemq-issues] 20200730 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571](https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397%40%3Cissues.activemq.apache.org%3E)
70. [[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12](https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E)
71. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
72. [](https://www.oracle.com/security-alerts/cpujan2021.html)
73. [[doris-commits] 20210402 [GitHub] [incubator-doris] zh0122 opened a new pull request #5594: [FE][Bug]Update log4j-web to fix a security issue](https://lists.apache.org/thread.html/rcbb79023a7c8494cb389cd3d95420fa9e0d531ece0b780b8c1f99422%40%3Ccommits.doris.apache.org%3E)
74. [[beam-issues] 20210528 [jira] [Created] (BEAM-12422) Vendored gRPC 1.36.0 is using a log4j version with security issues](https://lists.apache.org/thread.html/r0831e2e52a390758ce39a6193f82c11c295175adce6e6307de28c287%40%3Cissues.beam.apache.org%3E)
75. [](https://www.oracle.com/security-alerts/cpuApr2021.html)
76. [[beam-github] 20210701 [GitHub] [beam] lukecwik commented on pull request #15113: [BEAM-12422] Upgrade log4j version not affected by CVE-2017-5645](https://lists.apache.org/thread.html/rbfa7a0742be4981a3f9356a23d0e1a5f2e1eabde32a1a3d8e41420f8%40%3Cgithub.beam.apache.org%3E)
77. [[beam-github] 20210701 [GitHub] [beam] lukecwik opened a new pull request #15113: [BEAM-12422] Upgrade log4j version not affected by CVE-2017-5645](https://lists.apache.org/thread.html/r23369fd603eb6d62d3b883a0a28d12052dcbd1d6d531137124cd7f83%40%3Cgithub.beam.apache.org%3E)
78. [[beam-github] 20210701 [GitHub] [beam] codecov[bot] commented on pull request #15113: [BEAM-12422] Upgrade log4j version not affected by CVE-2017-5645](https://lists.apache.org/thread.html/r9d5c1b558a15d374bd5abd2d3ae3ca7e50e796a0efdcf91e9c5b4cdd%40%3Cgithub.beam.apache.org%3E)
79. [[beam-github] 20210701 [GitHub] [beam] codecov[bot] edited a comment on pull request #15113: [BEAM-12422] Upgrade log4j version not affected by CVE-2017-5645](https://lists.apache.org/thread.html/r94b5aae09c4bcff5d06cf641be17b00bd83ba7e10cad737bf16a1b8f%40%3Cgithub.beam.apache.org%3E)
80. [[beam-github] 20210701 [GitHub] [beam] suztomo commented on pull request #15113: [BEAM-12422] Upgrade log4j version not affected by CVE-2017-5645](https://lists.apache.org/thread.html/rdbd579dc223f06af826d7de340218ee2f80d8b43fa7e4decb2a63f44%40%3Cgithub.beam.apache.org%3E)
81. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
82. [](https://www.oracle.com/security-alerts/cpujan2022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0328, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0328
- **State**: PUBLISHED
- **Published Date**: May 22, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:50 UTC
- **Reserved Date**: May 20, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
EPIC IRC Client (EPIC4) pre2.002, pre2.003, and possibly later versions, allows remote malicious IRC servers to cause a denial of service (crash) and possibly execute arbitrary code via a CTCP request from a large nickname, which causes an incorrect length calculation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-399](http://www.debian.org/security/2003/dsa-399)
2. [](ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)
3. [DSA-306](http://www.debian.org/security/2003/dsa-306)
4. [RHSA-2003:342](http://www.redhat.com/support/errata/RHSA-2003-342.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0725
- **State**: PUBLISHED
- **Published Date**: February 22, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 22:30 UTC
- **Reserved Date**: December 16, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the search_pagination function in course/classes/management_renderer.php in Moodle 2.8.x before 2.8.10, 2.9.x before 2.9.4, and 3.0.x before 3.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted search string.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1034694](http://www.securitytracker.com/id/1034694)
2. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-52552)
3. [](https://moodle.org/mod/forum/discuss.php?d=326206)
4. [[oss-security] 20160118 [vs] moodle security release](http://www.openwall.com/lists/oss-security/2016/01/18/1)
5. [FEDORA-2016-fb2597f4eb](http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176502.html)
6. [FEDORA-2016-1c10ab3c35](http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176436.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-20741, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-20741 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-20741
- **State**: PUBLISHED
- **Published Date**: July 23, 2021 at 19:25 UTC
- **Last Updated**: August 04, 2024 at 14:22 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Incorrect Access Control in Beckhoff Automation GmbH & Co. KG CX9020 with firmware version CX9020_CB3011_WEC7_HPS_v602_TC31_B4016.6 allows remote attackers to bypass authentication via the "CE Remote Display Tool" as it does not close the incoming connection on the Windows CE side if the credentials are incorrect.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://download.beckhoff.com/download/Document/product-security/Advisories/advisory-2019-006.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1083
- **State**: PUBLISHED
- **Published Date**: April 08, 2008 at 23:00 UTC
- **Last Updated**: October 15, 2024 at 14:22 UTC
- **Reserved Date**: February 28, 2008 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Heap-based buffer overflow in the CreateDIBPatternBrushPt function in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF or WMF image file with a malformed header that triggers an integer overflow, aka "GDI Heap Overflow Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30933](http://www.securityfocus.com/bid/30933)
2. [TA08-099A](http://www.us-cert.gov/cas/techalerts/TA08-099A.html)
3. [44213](http://www.osvdb.org/44213)
4. [SSRT080048](http://marc.info/?l=bugtraq&m=120845064910729&w=2)
5. [ADV-2008-1145](http://www.vupen.com/english/advisories/2008/1145/references)
6. [948590](http://support.microsoft.com/kb/948590)
7. [20080408 ZDI-08-020: Microsoft GDI WMF Parsing Heap Overflow Vulnerability](http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0168.html)
8. [20080408 Microsoft Windows Graphics Rendering Engine Integer Overflow Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=681)
9. [MS08-021](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-021)
10. [HPSBST02329](http://marc.info/?l=bugtraq&m=120845064910729&w=2)
11. [44214](http://www.osvdb.org/44214)
12. [](http://www.zerodayinitiative.com/advisories/ZDI-08-020/)
13. [VU#632963](http://www.kb.cert.org/vuls/id/632963)
14. [20080408 ZDI-08-020: Microsoft GDI WMF Parsing Heap Overflow Vulnerability](http://www.securityfocus.com/archive/1/490584/100/0/threaded)
15. [5442](https://www.exploit-db.com/exploits/5442)
16. [6330](https://www.exploit-db.com/exploits/6330)
17. [win-emf-wmf-header-bo(41471)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41471)
18. [1019798](http://www.securitytracker.com/id?1019798)
19. [oval:org.mitre.oval:def:5441](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5441)
20. [28571](http://www.securityfocus.com/bid/28571)
21. [29704](http://secunia.com/advisories/29704) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32026, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32026 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32026
- **State**: PUBLISHED
- **Published Date**: June 16, 2023 at 00:44 UTC
- **Last Updated**: February 28, 2025 at 21:08 UTC
- **Reserved Date**: May 01, 2023 at 15:34 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Microsoft - Microsoft ODBC Driver 17 for SQL Server on MacOS**
Affected versions:
- 17.0.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 17 for SQL Server on Linux**
Affected versions:
- 17.0.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 18 for SQL Server on Linux**
Affected versions:
- 18.0.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 18 for SQL Server on Windows**
Affected versions:
- 18.0.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 18 for SQL Server on MacOS**
Affected versions:
- 18.0.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 17 for SQL Server on Windows**
Affected versions:
- 17.0.0.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)**
Affected versions:
- 16.11.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.2**
Affected versions:
- 17.2.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.4**
Affected versions:
- 17.4.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.6**
Affected versions:
- 17.6.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.8**
Affected versions:
- 17.8.0 (Status: affected)
### References
1. [Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32026) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34792
- **State**: PUBLISHED
- **Published Date**: June 04, 2024 at 13:27 UTC
- **Last Updated**: August 02, 2024 at 02:59 UTC
- **Reserved Date**: May 09, 2024 at 12:14 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in dexta Dextaz Ping allows Command Injection.This issue affects Dextaz Ping: from n/a through 0.65.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**dexta - Dextaz Ping**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/dextaz-ping/wordpress-dextaz-ping-plugin-0-65-remote-code-execution-rce-vulnerability?_s_id=cve)
### Credits
- younsoung kim (Patchstack Alliance)
- SeoHyeon Lee (Patchstack Alliance)
- MyungJu Kim (Patchstack Alliance)
- SeoHee Kang (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3256, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3256 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3256
- **State**: PUBLISHED
- **Published Date**: April 04, 2025 at 16:31 UTC
- **Last Updated**: April 04, 2025 at 17:38 UTC
- **Reserved Date**: April 04, 2025 at 07:34 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in xujiangfei admintwo 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /user/updateSet. The manipulation of the argument email leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
- CWE-266: Security Weakness
### Affected Products
**xujiangfei - admintwo**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-303326 | xujiangfei admintwo updateSet access control](https://vuldb.com/?id.303326)
2. [VDB-303326 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.303326)
3. [Submit #549009 | https://gitee.com/xujiangfei/admintwo admintwo 1.0 Horizontal privilege escalation vulnerability](https://vuldb.com/?submit.549009)
4. [](https://github.com/caigo8/CVE-md/blob/main/admintwo/%E6%B0%B4%E5%B9%B3%E8%B6%8A%E6%9D%83.md)
### Credits
- Caigo (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27185, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27185 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27185
- **State**: PUBLISHED
- **Published Date**: February 10, 2021 at 21:04 UTC
- **Last Updated**: August 03, 2024 at 20:40 UTC
- **Reserved Date**: February 10, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The samba-client package before 4.0.0 for Node.js allows command injection because of the use of process.exec.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/eflexsystems/node-samba-client/releases/tag/4.0.0)
2. [](https://github.com/eflexsystems/node-samba-client/commit/5bc3bbad9b8d02243bc861a11ec73f788fbb1235)
3. [](https://www.npmjs.com/package/samba-client)
4. [](https://security.netapp.com/advisory/ntap-20210319-0002/)
5. [](https://advisory.checkmarx.net/advisory/CX-2021-4302) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2214
- **State**: PUBLISHED
- **Published Date**: February 10, 2014 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 15:27 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
status.cgi in Nagios 4.0 before 4.0 beta4 and 3.x before 3.5.1 does not properly restrict access to certain users that are a contact for a service, which allows remote authenticated users to obtain sensitive information about hostnames via the servicegroup (1) overview, (2) summary, or (3) grid style in status.cgi. NOTE: this behavior is by design in most 3.x versions, but the upstream vendor "decided to change it for Nagios 4" and 3.5.1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20130626 Re: CVE request: unauthorized host/service views displayed in servicegroup view](http://seclists.org/oss-sec/2013/q2/622)
2. [openSUSE-SU-2013:1158](http://lists.opensuse.org/opensuse-updates/2013-07/msg00029.html)
3. [[oss-security] 20130626 CVE request: unauthorized host/service views displayed in servicegroup view](http://seclists.org/oss-sec/2013/q2/619)
4. [openSUSE-SU-2013:1160](http://lists.opensuse.org/opensuse-updates/2013-07/msg00031.html)
5. [](http://tracker.nagios.org/view.php?id=456) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3727, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3727 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3727
- **State**: PUBLISHED
- **Published Date**: May 15, 2019 at 15:45 UTC
- **Last Updated**: September 17, 2024 at 03:42 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell EMC RecoverPoint versions prior to 5.1.3 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an OS command injection vulnerability in the installation feature of Boxmgmt CLI. A malicious boxmgmt user may potentially be able to execute arbitrary commands as root.
### Affected Products
**Dell EMC - RecoverPoint**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/security/us/en/04/details/533842/DSA-2019-078-Dell-EMC-RecoverPoint-OS-Command-Injection-Vulnerability)
2. [108411](http://www.securityfocus.com/bid/108411)
### Credits
- Dell EMC would like to thank Paul Taylor (@bao7uo) for reporting these vulnerabilities. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6336
- **State**: PUBLISHED
- **Published Date**: July 16, 2024 at 21:27 UTC
- **Last Updated**: August 01, 2024 at 21:33 UTC
- **Reserved Date**: June 25, 2024 at 20:18 UTC
- **Assigned By**: GitHub_P
### Vulnerability Description
A Security Misconfiguration vulnerability in GitHub Enterprise Server allowed sensitive information disclosure to unauthorized users in GitHub Enterprise Server by exploiting organization ruleset feature. This attack required an organization member to explicitly change the visibility of a dependent repository from private to public. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.1, 3.12.6, 3.11.12, 3.10.14, and 3.9.17. This vulnerability was reported via the GitHub Bug Bounty program.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**GitHub - GitHub Enterprise Server**
Affected versions:
- 3.10.0 (Status: affected)
- 3.11.0 (Status: affected)
- 3.12.0 (Status: affected)
- 3.13 (Status: affected)
- 3.9.0 (Status: affected)
### References
1. [](https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.15)
2. [](https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.12)
3. [](https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.6)
4. [](https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.1)
5. [](https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.17)
### Credits
- Omar El Latif
- Giovanni Guido
- Antonio Francesco Sardella
- Andrea Valenza |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15436
- **State**: PUBLISHED
- **Published Date**: November 14, 2019 at 16:26 UTC
- **Last Updated**: August 05, 2024 at 00:49 UTC
- **Reserved Date**: August 22, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Samsung A8+ Android device with a build fingerprint of samsung/jackpot2ltexx/jackpot2lte:8.0.0/R16NW/A730FXXS4BSC2:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000000, versionName=7.0.0.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.kryptowire.com/android-firmware-2019/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2081, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2081
- **State**: PUBLISHED
- **Published Date**: April 18, 2007 at 02:20 UTC
- **Last Updated**: August 07, 2024 at 13:23 UTC
- **Reserved Date**: April 17, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MyBlog 0.9.8 and earlier allows remote attackers to bypass authentication requirements via the admin cookie parameter to certain admin files, as demonstrated by admin/settings.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070415 MyBlog <= 0.9.8 Remote Command Execution Exploit](http://www.securityfocus.com/archive/1/465873/100/0/threaded)
2. [41593](http://osvdb.org/41593)
3. [23521](http://www.securityfocus.com/bid/23521)
4. [2581](http://securityreason.com/securityalert/2581)
5. [myblog-admin-cookie-authentication-bypass(34025)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34025) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20640, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20640
- **State**: PUBLISHED
- **Published Date**: February 12, 2021 at 06:15 UTC
- **Last Updated**: August 03, 2024 at 17:45 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Buffer overflow vulnerability in LOGITEC LAN-W300N/PGRB allows an attacker with administrative privilege to execute an arbitrary OS command via unspecified vectors.
### Affected Products
**LOGITEC CORPORATION - LAN-W300N/PGRB**
Affected versions:
- LAN-W300N/PGRB (Status: affected)
### References
1. [](https://www.elecom.co.jp/news/security/20210126-01/)
2. [](https://jvn.jp/en/jp/JVN96783542/index.html)
3. [[tomcat-dev] 20210712 svn commit: r1891484 - in /tomcat/site/trunk: docs/security-10.html docs/security-7.html docs/security-8.html docs/security-9.html xdocs/security-10.xml xdocs/security-7.xml xdocs/security-8.xml xdocs/security-9.xml](https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c%40%3Cdev.tomcat.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1182
- **State**: PUBLISHED
- **Published Date**: March 08, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 03:51 UTC
- **Reserved Date**: December 06, 2017 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
An issue was discovered in EMC RSA Identity Governance and Lifecycle versions 7.0.1, 7.0.2, all patch levels (hardware appliance and software bundle deployments only); RSA Via Lifecycle and Governance version 7.0, all patch levels (hardware appliance and software bundle deployments only); RSA Identity Management & Governance (RSA IMG) versions 6.9.0, 6.9.1, all patch levels (hardware appliance and software bundle deployments only). It allows certain OS level users to execute arbitrary scripts with root level privileges.
### Affected Products
**n/a - EMC RSA Identity Governance and Lifecycle versions 7.0.1, 7.0.2, all patch levels (hardware appliance and software bundle deployments only); RSA Via Lifecycle and Governance version 7.0, all patch levels (hardware appliance and software bundle deployments only); RSA Identity Management & Governance (RSA IMG) versions 6.9.0, 6.9.1, all patch levels (hardware appliance and software bundle deployments only)**
Affected versions:
- EMC RSA Identity Governance and Lifecycle versions 7.0.1, 7.0.2, all patch levels (hardware appliance and software bundle deployments only); RSA Via Lifecycle and Governance version 7.0, all patch levels (hardware appliance and software bundle deployments only); RSA Identity Management & Governance (RSA IMG) versions 6.9.0, 6.9.1, all patch levels (hardware appliance and software bundle deployments only) (Status: affected)
### References
1. [1040458](http://www.securitytracker.com/id/1040458)
2. [103317](http://www.securityfocus.com/bid/103317)
3. [](http://seclists.org/fulldisclosure/2018/Mar/16) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32127, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32127 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32127
- **State**: PUBLISHED
- **Published Date**: June 22, 2022 at 18:42 UTC
- **Last Updated**: August 03, 2024 at 07:32 UTC
- **Reserved Date**: May 31, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/view_be_browsed/total.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/PAINCLOWN/74cmsSE-Arbitrary-File-Reading/issues/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5349, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5349
- **State**: PUBLISHED
- **Published Date**: October 09, 2012 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 21:05 UTC
- **Reserved Date**: October 09, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in pay.php in the Pay With Tweet plugin before 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) link, (2) title, or (3) dl parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [paywithtweet-pay-xss(72166)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72166)
2. [51308](http://www.securityfocus.com/bid/51308)
3. [18330](http://www.exploit-db.com/exploits/18330)
4. [78205](http://www.osvdb.org/78205)
5. [47475](http://secunia.com/advisories/47475)
6. [](http://wordpress.org/extend/plugins/pay-with-tweet/changelog/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37917, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37917
- **State**: PUBLISHED
- **Published Date**: April 02, 2025 at 00:00 UTC
- **Last Updated**: April 03, 2025 at 15:22 UTC
- **Reserved Date**: June 10, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pexip Infinity before 35.0 has improper input validation that allows remote attackers to trigger a denial of service (software abort) via a crafted signalling message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.pexip.com/admin/security_bulletins.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0229
- **State**: PUBLISHED
- **Published Date**: January 31, 2013 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 14:18 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The ProcessSSDPRequest function in minissdp.c in the SSDP handler in MiniUPnP MiniUPnPd before 1.4 allows remote attackers to cause a denial of service (service crash) via a crafted request that triggers a buffer over-read.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf)
2. [](https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb)
3. [](https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0624, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0624 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0624
- **State**: PUBLISHED
- **Published Date**: February 09, 2006 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 16:41 UTC
- **Reserved Date**: February 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in check.asp in Whomp Real Estate Manager XP 2005 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22969](http://www.osvdb.org/22969)
2. [18780](http://secunia.com/advisories/18780)
3. [ADV-2006-0489](http://www.vupen.com/english/advisories/2006/0489)
4. [418](http://securityreason.com/securityalert/418)
5. [20060208 Whomp Real Estate Manager XP 2005 Sql Injection](http://www.securityfocus.com/archive/1/424389/100/0/threaded)
6. [16544](http://www.securityfocus.com/bid/16544)
7. [whomp-login-sql-injection(24592)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24592) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48379, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48379 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48379
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 08:05 UTC
- **Last Updated**: August 02, 2024 at 21:30 UTC
- **Reserved Date**: November 16, 2023 at 03:49 UTC
- **Assigned By**: twcert
### Vulnerability Description
Softnext Mail SQR Expert is an email management platform, it has inadequate filtering for a specific URL parameter within a specific function. An unauthenticated remote attacker can perform Blind SSRF attack to discover internal network topology base on URL error response.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**Softnext - Mail SQR Expert **
Affected versions:
- (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-7597-fff54-1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10365, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10365
- **State**: PUBLISHED
- **Published Date**: May 01, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 07:39 UTC
- **Reserved Date**: April 25, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An XSS issue was discovered in the Threads to Link plugin 1.3 for MyBB. When editing a thread, the user is given the option to convert the thread to a link. The thread link input box is not properly sanitized.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44547](https://www.exploit-db.com/exploits/44547/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29909, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29909
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 06:57 UTC
- **Last Updated**: August 06, 2024 at 16:26 UTC
- **Reserved Date**: March 21, 2024 at 15:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Camille Verrier Travelers' Map allows Stored XSS.This issue affects Travelers' Map: from n/a through 2.2.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Camille Verrier - Travelers' Map**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/travelers-map/wordpress-travelers-map-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35649, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35649
- **State**: PUBLISHED
- **Published Date**: October 11, 2023 at 19:20 UTC
- **Last Updated**: September 18, 2024 at 16:00 UTC
- **Reserved Date**: June 15, 2023 at 02:50 UTC
- **Assigned By**: google_android
### Vulnerability Description
In several functions of Exynos modem files, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2023-10-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46496, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46496 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46496
- **State**: PUBLISHED
- **Published Date**: January 27, 2022 at 20:21 UTC
- **Last Updated**: August 04, 2024 at 05:10 UTC
- **Reserved Date**: January 24, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_ObjFree in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/pcmacdon/jsish/issues/83) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8472, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8472 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8472
- **State**: PUBLISHED
- **Published Date**: November 04, 2014 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 13:18 UTC
- **Reserved Date**: October 24, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CA Cloud Service Management (CSM) before Summer 2014 does not properly verify authentication tokens from an Identity Provider, which allows user-assisted remote attackers to bypass intended access restrictions via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [70923](http://www.securityfocus.com/bid/70923)
2. [ca-cloud-cve20148472-sec-bypass(98535)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98535)
3. [](http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141103-01-security-notice-for-ca-cloud-service-management.aspx)
4. [1031214](http://www.securitytracker.com/id/1031214) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21952, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21952 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21952
- **State**: PUBLISHED
- **Published Date**: December 22, 2021 at 18:07 UTC
- **Last Updated**: August 03, 2024 at 18:30 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An authentication bypass vulnerability exists in the CMD_DEVICE_GET_RSA_KEY_REQUEST functionality of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted set of network packets can lead to increased privileges.
### Weakness Classification (CWE)
- CWE-288: Security Weakness
### Affected Products
**n/a - Anker"**
Affected versions:
- Anker Eufy Homebase 2 2.1.6.9h (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1379) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18682, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18682
- **State**: PUBLISHED
- **Published Date**: April 07, 2020 at 14:24 UTC
- **Last Updated**: August 05, 2024 at 21:28 UTC
- **Reserved Date**: April 07, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), M(6.0), and N(7.0) software. Because of incorrect exception handling and an unprotected intent, AudioService can cause a system crash, The Samsung IDs are SVE-2017-8114, SVE-2017-8116, and SVE-2017-8117 (March 2017).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1936, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1936 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1936
- **State**: PUBLISHED
- **Published Date**: April 25, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:27 UTC
- **Reserved Date**: April 20, 2006 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Buffer overflow in Ethereal 0.8.5 up to 0.10.14 allows remote attackers to execute arbitrary code via the telnet dissector.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19828](http://secunia.com/advisories/19828)
2. [19839](http://secunia.com/advisories/19839)
3. [20210](http://secunia.com/advisories/20210)
4. [FEDORA-2006-456](http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00194.html)
5. [MDKSA-2006:077](http://www.mandriva.com/security/advisories?name=MDKSA-2006:077)
6. [](http://www.ethereal.com/appnotes/enpa-sa-00023.html)
7. [19769](http://secunia.com/advisories/19769)
8. [19962](http://secunia.com/advisories/19962)
9. [FEDORA-2006-461](http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00195.html)
10. [1015985](http://securitytracker.com/id?1015985)
11. [GLSA-200604-17](http://www.gentoo.org/security/en/glsa/glsa-200604-17.xml)
12. [ADV-2006-1501](http://www.vupen.com/english/advisories/2006/1501)
13. [DSA-1049](http://www.debian.org/security/2006/dsa-1049)
14. [oval:org.mitre.oval:def:10341](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10341)
15. [19805](http://secunia.com/advisories/19805)
16. [](http://support.avaya.com/elmodocs2/security/ASA-2006-128.htm)
17. [ethereal-telnet-dissector-bo(26029)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26029)
18. [20060501-01-U](ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc)
19. [SUSE-SR:2006:010](http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html)
20. [20117](http://secunia.com/advisories/20117)
21. [17682](http://www.securityfocus.com/bid/17682)
22. [20944](http://secunia.com/advisories/20944)
23. [RHSA-2006:0420](http://www.redhat.com/support/errata/RHSA-2006-0420.html)
24. [19958](http://secunia.com/advisories/19958) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.