System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44467, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44467 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44467
- **State**: PUBLISHED
- **Published Date**: December 21, 2022 at 01:21 UTC
- **Last Updated**: April 23, 2025 at 16:24 UTC
- **Reserved Date**: October 31, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Experience Manager**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4761, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4761
- **State**: PUBLISHED
- **Published Date**: December 16, 2011 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 00:16 UTC
- **Reserved Date**: December 11, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Parallels Plesk Small Business Panel 10.2.0 omits the Content-Type header's charset parameter for certain resources, which might allow remote attackers to have an unspecified impact by leveraging an interpretation conflict involving domains/sitebuilder_edit.php and certain other files. NOTE: it is possible that only clients, not the SmarterStats product, could be affected by this issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ppsbp-sitebuilder-unspecified(72213)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72213)
2. [](http://xss.cx/examples/plesk-reports/plesk-10.2.0.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39157
- **State**: PUBLISHED
- **Published Date**: November 08, 2022 at 00:00 UTC
- **Last Updated**: April 21, 2025 at 13:47 UTC
- **Reserved Date**: September 01, 2022 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.0 (All versions >= V34.0.252 < V34.0.254), Parasolid V34.1 (All versions < V34.1.242), Parasolid V34.1 (All versions >= V34.1.242 < V34.1.244), Parasolid V35.0 (All versions < V35.0.170), Parasolid V35.0 (All versions >= V35.0.170 < V35.0.184), Simcenter Femap (All versions < V2023.1). The affected application contains an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17745)
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Siemens - Parasolid V34.0**
Affected versions:
- All versions < V34.0.252 (Status: affected)
**Siemens - Parasolid V34.0**
Affected versions:
- All versions >= V34.0.252 < V34.0.254 (Status: affected)
**Siemens - Parasolid V34.1**
Affected versions:
- All versions < V34.1.242 (Status: affected)
**Siemens - Parasolid V34.1**
Affected versions:
- All versions >= V34.1.242 < V34.1.244 (Status: affected)
**Siemens - Parasolid V35.0**
Affected versions:
- All versions < V35.0.170 (Status: affected)
**Siemens - Parasolid V35.0**
Affected versions:
- All versions >= V35.0.170 < V35.0.184 (Status: affected)
**Siemens - Simcenter Femap**
Affected versions:
- All versions < V2023.1 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-853037.pdf)
2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-565356.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9992, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9992 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9992
- **State**: PUBLISHED
- **Published Date**: October 16, 2020 at 16:56 UTC
- **Last Updated**: August 04, 2024 at 10:50 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed by encrypting communications over the network to devices running iOS 14, iPadOS 14, tvOS 14, and watchOS 7. This issue is fixed in iOS 14.0 and iPadOS 14.0, Xcode 12.0. An attacker in a privileged network position may be able to execute arbitrary code on a paired device during a debug session over the network.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Xcode**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT211850)
2. [](https://support.apple.com/HT211848)
3. [20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0](http://seclists.org/fulldisclosure/2020/Nov/20) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1601, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1601 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1601
- **State**: PUBLISHED
- **Published Date**: April 29, 2010 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 01:28 UTC
- **Reserved Date**: April 29, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the JA Comment (com_jacomment) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [comjacomment-index-file-inlclude(57848)](https://exchange.xforce.ibmcloud.com/vulnerabilities/57848)
2. [39516](http://www.securityfocus.com/bid/39516)
3. [39472](http://secunia.com/advisories/39472)
4. [63802](http://www.osvdb.org/63802)
5. [12236](http://www.exploit-db.com/exploits/12236)
6. [](http://packetstormsecurity.org/1004-exploits/joomlajacomment-lfi.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28217, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28217
- **State**: PUBLISHED
- **Published Date**: April 11, 2023 at 19:13 UTC
- **Last Updated**: January 23, 2025 at 01:04 UTC
- **Reserved Date**: March 13, 2023 at 22:18 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Network Address Translation (NAT) Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Network Address Translation (NAT) Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28217) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49867, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49867 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49867
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 18:01 UTC
- **Last Updated**: May 04, 2025 at 09:39 UTC
- **Reserved Date**: October 21, 2024 at 12:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
btrfs: wait for fixup workers before stopping cleaner kthread during umount
During unmount, at close_ctree(), we have the following steps in this order:
1) Park the cleaner kthread - this doesn't destroy the kthread, it basically
halts its execution (wake ups against it work but do nothing);
2) We stop the cleaner kthread - this results in freeing the respective
struct task_struct;
3) We call btrfs_stop_all_workers() which waits for any jobs running in all
the work queues and then free the work queues.
Syzbot reported a case where a fixup worker resulted in a crash when doing
a delayed iput on its inode while attempting to wake up the cleaner at
btrfs_add_delayed_iput(), because the task_struct of the cleaner kthread
was already freed. This can happen during unmount because we don't wait
for any fixup workers still running before we call kthread_stop() against
the cleaner kthread, which stops and free all its resources.
Fix this by waiting for any fixup workers at close_ctree() before we call
kthread_stop() against the cleaner and run pending delayed iputs.
The stack traces reported by syzbot were the following:
BUG: KASAN: slab-use-after-free in __lock_acquire+0x77/0x2050 kernel/locking/lockdep.c:5065
Read of size 8 at addr ffff8880272a8a18 by task kworker/u8:3/52
CPU: 1 UID: 0 PID: 52 Comm: kworker/u8:3 Not tainted 6.12.0-rc1-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: btrfs-fixup btrfs_work_helper
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:377 [inline]
print_report+0x169/0x550 mm/kasan/report.c:488
kasan_report+0x143/0x180 mm/kasan/report.c:601
__lock_acquire+0x77/0x2050 kernel/locking/lockdep.c:5065
lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825
__raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
_raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
class_raw_spinlock_irqsave_constructor include/linux/spinlock.h:551 [inline]
try_to_wake_up+0xb0/0x1480 kernel/sched/core.c:4154
btrfs_writepage_fixup_worker+0xc16/0xdf0 fs/btrfs/inode.c:2842
btrfs_work_helper+0x390/0xc50 fs/btrfs/async-thread.c:314
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310
worker_thread+0x870/0xd30 kernel/workqueue.c:3391
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
</TASK>
Allocated by task 2:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
unpoison_slab_object mm/kasan/common.c:319 [inline]
__kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:345
kasan_slab_alloc include/linux/kasan.h:247 [inline]
slab_post_alloc_hook mm/slub.c:4086 [inline]
slab_alloc_node mm/slub.c:4135 [inline]
kmem_cache_alloc_node_noprof+0x16b/0x320 mm/slub.c:4187
alloc_task_struct_node kernel/fork.c:180 [inline]
dup_task_struct+0x57/0x8c0 kernel/fork.c:1107
copy_process+0x5d1/0x3d50 kernel/fork.c:2206
kernel_clone+0x223/0x880 kernel/fork.c:2787
kernel_thread+0x1bc/0x240 kernel/fork.c:2849
create_kthread kernel/kthread.c:412 [inline]
kthreadd+0x60d/0x810 kernel/kthread.c:765
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
Freed by task 61:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579
poison_slab_object mm/kasan/common.c:247 [inline]
__kasan_slab_free+0x59/0x70 mm/kasan/common.c:264
kasan_slab_free include/linux/kasan.h:230 [inline]
slab_free_h
---truncated---
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.19.323 (Status: unaffected)
- 5.4.285 (Status: unaffected)
- 5.10.227 (Status: unaffected)
- 5.15.168 (Status: unaffected)
- 6.1.113 (Status: unaffected)
- 6.6.55 (Status: unaffected)
- 6.10.14 (Status: unaffected)
- 6.11.3 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/cd686dfff63f27d712877aef5b962fbf6b8bc264)
2. [](https://git.kernel.org/stable/c/a71349b692ab34ea197949e13e3cc42570fe73d9)
3. [](https://git.kernel.org/stable/c/70b60c8d9b42763d6629e44f448aa5d8ae477d61)
4. [](https://git.kernel.org/stable/c/4c98fe0dfa2ae83c4631699695506d8941db4bfe)
5. [](https://git.kernel.org/stable/c/9da40aea63f8769f28afb91aea0fac4cf6fbbb65)
6. [](https://git.kernel.org/stable/c/ed87190e9d9c80aad220fb6b0b03a84d22e2c95b)
7. [](https://git.kernel.org/stable/c/bf0de0f9a0544c11f96f93206da04ab87dcea1f4)
8. [](https://git.kernel.org/stable/c/65d11eb276836d49003a8060cf31fa2284ad1047)
9. [](https://git.kernel.org/stable/c/41fd1e94066a815a7ab0a7025359e9b40e4b3576) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11620, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11620 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11620
- **State**: PUBLISHED
- **Published Date**: April 07, 2020 at 22:14 UTC
- **Last Updated**: August 04, 2024 at 11:35 UTC
- **Reserved Date**: April 07, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[debian-lts-announce] 20200417 [SECURITY] [DLA 2179-1] jackson-databind security update](https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html)
2. [](https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062)
3. [](https://www.oracle.com/security-alerts/cpujul2020.html)
4. [](https://security.netapp.com/advisory/ntap-20200511-0004/)
5. [](https://github.com/FasterXML/jackson-databind/issues/2682)
6. [[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12](https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E)
7. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
8. [](https://www.oracle.com/security-alerts/cpujan2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3264
- **State**: PUBLISHED
- **Published Date**: June 27, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 18:23 UTC
- **Reserved Date**: June 27, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in mclient.cgi in Namo DeepSearch 4.5 allows remote attackers to inject arbitrary web script or HTML via the p parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20821](http://secunia.com/advisories/20821)
2. [1016366](http://securitytracker.com/id?1016366)
3. [ADV-2006-2519](http://www.vupen.com/english/advisories/2006/2519)
4. [1156](http://securityreason.com/securityalert/1156)
5. [namo-deepsearch-mclient-xss(27404)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27404)
6. [](http://www.kil13r.info/sa/Kil13r-SA-20060622-2.txt)
7. [20060622 [Kil13r-SA-20060622-2] Namo DeepSearch 4.5 Cross-Site Scripting Vulnerability](http://www.securityfocus.com/archive/1/438240/100/0/threaded)
8. [18589](http://www.securityfocus.com/bid/18589) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53093, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53093 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53093
- **State**: PUBLISHED
- **Published Date**: November 21, 2024 at 18:17 UTC
- **Last Updated**: May 04, 2025 at 09:52 UTC
- **Reserved Date**: November 19, 2024 at 17:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
nvme-multipath: defer partition scanning
We need to suppress the partition scan from occuring within the
controller's scan_work context. If a path error occurs here, the IO will
wait until a path becomes available or all paths are torn down, but that
action also occurs within scan_work, so it would deadlock. Defer the
partion scan to a different context that does not block scan_work.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.1.118 (Status: unaffected)
- 6.6.62 (Status: unaffected)
- 6.11.9 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/60de2e03f984cfbcdc12fa552f95087c35a05a98)
2. [](https://git.kernel.org/stable/c/4a57f42e5ed42cb8f1beb262c4f6d3e698939e4e)
3. [](https://git.kernel.org/stable/c/a91b7eddf45afeeb9c5ece11dddff5de0921b00f)
4. [](https://git.kernel.org/stable/c/1f021341eef41e77a633186e9be5223de2ce5d48) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6304
- **State**: PUBLISHED
- **Published Date**: December 10, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 16:02 UTC
- **Reserved Date**: December 10, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040)
2. [28343](http://secunia.com/advisories/28343)
3. [](http://lists.mysql.com/announce/502)
4. [GLSA-200804-04](http://security.gentoo.org/glsa/glsa-200804-04.xml)
5. [29706](http://secunia.com/advisories/29706)
6. [42609](http://osvdb.org/42609)
7. [MDVSA-2008:028](http://www.mandriva.com/security/advisories?name=MDVSA-2008:028)
8. [MDVSA-2008:017](http://www.mandriva.com/security/advisories?name=MDVSA-2008:017)
9. [](https://issues.rpath.com/browse/RPL-2187)
10. [DSA-1451](http://www.debian.org/security/2008/dsa-1451)
11. [USN-559-1](https://usn.ubuntu.com/559-1/)
12. [](http://bugs.mysql.com/bug.php?id=29801)
13. [](http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html)
14. [ADV-2007-4198](http://www.vupen.com/english/advisories/2007/4198)
15. [](http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html)
16. [28637](http://secunia.com/advisories/28637)
17. [26832](http://www.securityfocus.com/bid/26832)
18. [1019085](http://securitytracker.com/id?1019085)
19. [](http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html)
20. [20080205 rPSA-2008-0040-1 mysql mysql-bench mysql-server](http://www.securityfocus.com/archive/1/487606/100/0/threaded)
21. [mysql-federated-engine-dos(38990)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38990)
22. [28838](http://secunia.com/advisories/28838)
23. [28128](http://secunia.com/advisories/28128)
24. [28063](http://secunia.com/advisories/28063)
25. [SUSE-SR:2008:003](http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html)
26. [28739](http://secunia.com/advisories/28739) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6709, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6709
- **State**: PUBLISHED
- **Published Date**: February 23, 2018 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 20:43 UTC
- **Reserved Date**: February 23, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ELinks 0.12 and Twibright Links 2.3 have Missing SSL Certificate Validation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=881399)
2. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6191, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6191
- **State**: PUBLISHED
- **Published Date**: December 17, 2013 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 17:29 UTC
- **Reserved Date**: October 21, 2013 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in HP Operations Orchestration before 9 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT101342](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04041093)
2. [HPSBGN02951](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04041093)
3. [1029496](http://www.securitytracker.com/id/1029496) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31567
- **State**: PUBLISHED
- **Published Date**: July 11, 2022 at 01:00 UTC
- **Last Updated**: August 03, 2024 at 07:19 UTC
- **Reserved Date**: May 23, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The DSABenchmark/DSAB repository through 2.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/github/securitylab/issues/669#issuecomment-1117265726) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12837
- **State**: PUBLISHED
- **Published Date**: October 12, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 08:45 UTC
- **Reserved Date**: June 25, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier versions (Status: affected)
### References
1. [1041809](http://www.securitytracker.com/id/1041809)
2. [105436](http://www.securityfocus.com/bid/105436)
3. [](https://helpx.adobe.com/security/products/acrobat/apsb18-30.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54756, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54756 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54756
- **State**: PUBLISHED
- **Published Date**: February 20, 2025 at 00:00 UTC
- **Last Updated**: February 21, 2025 at 21:29 UTC
- **Reserved Date**: December 06, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A remote code execution (RCE) vulnerability in the ZScript function of ZDoom Team GZDoom v4.13.1 allows attackers to execute arbitrary code via supplying a crafted PK3 file containing a malicious ZScript source file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Chainmanner/GZDoom-Arbitrary-Code-Execution-via-ZScript-PoC)
2. [](https://seclists.org/fulldisclosure/2025/Feb/11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30516, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30516 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30516
- **State**: PUBLISHED
- **Published Date**: April 14, 2025 at 06:56 UTC
- **Last Updated**: April 14, 2025 at 14:01 UTC
- **Reserved Date**: April 08, 2025 at 07:50 UTC
- **Assigned By**: Mattermost
### Vulnerability Description
Mattermost Mobile Apps versions <=2.25.0 fail to terminate sessions during logout under certain conditions (e.g. poor connectivity), allowing unauthorized users on shared devices to access sensitive notification content via continued mobile notifications
### CVSS Metrics
- **CVSS Base Score**: 2/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-613: Security Weakness
### Affected Products
**Mattermost - Mattermost**
Affected versions:
- 0 (Status: affected)
- 2.26.0 (Status: unaffected)
### References
1. [](https://mattermost.com/security-updates)
### Credits
- Elias Nahum |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5776, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5776 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5776
- **State**: REJECTED
- **Last Updated**: June 12, 2024 at 07:26 UTC
- **Reserved Date**: June 08, 2024 at 12:04 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1259, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1259
- **State**: PUBLISHED
- **Published Date**: March 19, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 17:03 UTC
- **Reserved Date**: March 18, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Maian Support 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) email or (2) pass parameter to admin/index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [maiansupport-adminindex-sql-injection(25300)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25300)
2. [23944](http://www.osvdb.org/23944)
3. [20060328 [eVuln] Maian Support Authentication Bypass](http://www.securityfocus.com/archive/1/429098/100/0/threaded)
4. [645](http://securityreason.com/securityalert/645)
5. [](http://evuln.com/vulns/103/summary.html)
6. [ADV-2006-0992](http://www.vupen.com/english/advisories/2006/0992)
7. [19275](http://secunia.com/advisories/19275) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1654, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1654
- **State**: PUBLISHED
- **Published Date**: March 20, 2013 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 15:13 UTC
- **Reserved Date**: February 11, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, and Puppet Enterprise 2.7.x before 2.7.2, does not properly negotiate the SSL protocol between client and master, which allows remote attackers to conduct SSLv2 downgrade attacks against SSLv3 sessions via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2013:0618](http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html)
2. [RHSA-2013:0710](http://rhn.redhat.com/errata/RHSA-2013-0710.html)
3. [DSA-2643](http://www.debian.org/security/2013/dsa-2643)
4. [52596](http://secunia.com/advisories/52596)
5. [USN-1759-1](http://ubuntu.com/usn/usn-1759-1)
6. [openSUSE-SU-2013:0641](http://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html)
7. [](https://puppetlabs.com/security/cve/cve-2013-1654/)
8. [64758](http://www.securityfocus.com/bid/64758) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0367, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0367 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0367
- **State**: PUBLISHED
- **Published Date**: October 08, 2019 at 19:16 UTC
- **Last Updated**: August 04, 2024 at 17:44 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP NetWeaver Process Integration (B2B Toolkit), before versions 1.0 and 2.0, does not perform necessary authorization checks for an authenticated user, allowing the import of B2B table content that leads to Missing Authorization Check.
### Affected Products
**SAP SE - SAP NetWeaver Process Integration (B2B Toolkit)**
Affected versions:
- < 1.0 (Status: affected)
- < 2.0 (Status: affected)
### References
1. [](https://launchpad.support.sap.com/#/notes/2805777)
2. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8985, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8985 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8985
- **State**: PUBLISHED
- **Published Date**: March 20, 2017 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 08:36 UTC
- **Reserved Date**: February 14, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20170214 Re: Pending CVE requests for glibc](http://www.openwall.com/lists/oss-security/2017/02/14/9)
2. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392)
3. [76916](http://www.securityfocus.com/bid/76916)
4. [GLSA-201908-06](https://security.gentoo.org/glsa/201908-06) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4339
- **State**: PUBLISHED
- **Published Date**: August 14, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in PHPCentral Poll Script 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the _SERVER[DOCUMENT_ROOT] parameter in (1) poll.php and (2) pollarchive.php. NOTE: a reliable third party states that this issue is resultant from a variable extraction error in functions.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070820 Re: PHPCentral Poll Script Remote Command Execution Vulnerability](http://www.securityfocus.com/archive/1/477179/100/0/threaded)
2. [26434](http://secunia.com/advisories/26434)
3. [20070812 PHPCentral Poll Script Remote Command Execution Vulnerability](http://www.securityfocus.com/archive/1/476261/100/0/threaded)
4. [ADV-2007-2878](http://www.vupen.com/english/advisories/2007/2878)
5. [3008](http://securityreason.com/securityalert/3008)
6. [36418](http://osvdb.org/36418)
7. [36419](http://osvdb.org/36419) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43801, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43801 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43801
- **State**: PUBLISHED
- **Published Date**: December 13, 2021 at 19:30 UTC
- **Last Updated**: August 04, 2024 at 04:03 UTC
- **Reserved Date**: November 16, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Mercurius is a GraphQL adapter for Fastify. Any users from Mercurius@8.10.0 to 8.11.1 are subjected to a denial of service attack by sending a malformed JSON to `/graphql` unless they are using a custom error handler. The vulnerability has been fixed in https://github.com/mercurius-js/mercurius/pull/678 and shipped as v8.11.2. As a workaround users may use a custom error handler.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-754: Security Weakness
### Affected Products
**mercurius-js - mercurius**
Affected versions:
- >= 8.10.0, < 8.11.2 (Status: affected)
### References
1. [](https://github.com/mercurius-js/mercurius/security/advisories/GHSA-273r-rm8g-7f3x)
2. [](https://github.com/mercurius-js/mercurius/issues/677)
3. [](https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4734
- **State**: PUBLISHED
- **Published Date**: November 11, 2012 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 20:42 UTC
- **Reserved Date**: August 29, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Request Tracker (RT) 3.8.x before 3.8.15 and 4.0.x before 4.0.8 allows remote attackers to conduct a "confused deputy" attack to bypass the CSRF warning protection mechanism and cause victims to "modify arbitrary state" via unknown vectors related to a crafted link.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [86709](http://osvdb.org/86709)
2. [[rt-announce] 20121025 Security vulnerabilities in RT](http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5207
- **State**: PUBLISHED
- **Published Date**: January 06, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 05:26 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
When using an incomplete variable argument, Irssi before 1.0.6 may access data beyond the end of the string.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-4162](https://www.debian.org/security/2018/dsa-4162)
2. [](https://irssi.org/security/irssi_sa_2018_01.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26553, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26553
- **State**: PUBLISHED
- **Published Date**: November 17, 2020 at 20:59 UTC
- **Last Updated**: August 04, 2024 at 15:56 UTC
- **Reserved Date**: October 04, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Aviatrix Controller before R6.0.2483. Several APIs contain functions that allow arbitrary files to be uploaded to the web tree.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.criticalstart.com/multiple-vulnerabilities-discovered-in-aviatrix/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11718, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11718 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11718
- **State**: PUBLISHED
- **Published Date**: August 30, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 08:17 UTC
- **Reserved Date**: June 04, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Xovis PC2, PC2R, and PC3 devices through 3.6.0 allow CSRF.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://xovis.com/security/xovis-sec-2018-001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7291, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7291
- **State**: PUBLISHED
- **Published Date**: November 07, 2019 at 23:51 UTC
- **Last Updated**: August 07, 2024 at 12:03 UTC
- **Reserved Date**: July 28, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
gri before 2.12.18 generates temporary files in an insecure way.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2008-7291) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32580, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32580
- **State**: PUBLISHED
- **Published Date**: April 18, 2024 at 09:25 UTC
- **Last Updated**: August 02, 2024 at 02:13 UTC
- **Reserved Date**: April 15, 2024 at 10:15 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Averta Master Slider allows Stored XSS.This issue affects Master Slider: from n/a through 3.9.8.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Averta - Master Slider**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/master-slider/wordpress-master-slider-plugin-3-9-8-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34234, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34234 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34234
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 17:06 UTC
- **Last Updated**: February 06, 2025 at 16:55 UTC
- **Reserved Date**: May 31, 2023 at 13:51 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
OpenZeppelin Contracts is a library for smart contract development. By frontrunning the creation of a proposal, an attacker can become the proposer and gain the ability to cancel it. The attacker can do this repeatedly to try to prevent a proposal from being proposed at all. This impacts the `Governor` contract in v4.9.0 only, and the `GovernorCompatibilityBravo` contract since v4.3.0. This problem has been patched in 4.9.1 by introducing opt-in frontrunning protection. Users are advised to upgrade. Users unable to upgrade may submit the proposal creation transaction to an endpoint with frontrunning protection as a workaround.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**OpenZeppelin - openzeppelin-contracts**
Affected versions:
- >=4.3.0, < 4.9.1 (Status: affected)
### References
1. [https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-5h3x-9wvq-w4m2](https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-5h3x-9wvq-w4m2)
2. [https://github.com/OpenZeppelin/openzeppelin-contracts/commit/d9474327a492f9f310f31bc53f38dbea56ed9a57](https://github.com/OpenZeppelin/openzeppelin-contracts/commit/d9474327a492f9f310f31bc53f38dbea56ed9a57) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37278, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37278 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37278
- **State**: PUBLISHED
- **Published Date**: July 22, 2024 at 08:41 UTC
- **Last Updated**: August 02, 2024 at 03:50 UTC
- **Reserved Date**: June 04, 2024 at 19:25 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pratik Chaskar Cards for Beaver Builder.This issue affects Cards for Beaver Builder: from n/a through 1.1.4.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Pratik Chaskar - Cards for Beaver Builder**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/bb-bootstrap-cards/wordpress-cards-for-beaver-builder-plugin-1-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42713, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42713 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42713
- **State**: PUBLISHED
- **Published Date**: February 15, 2022 at 18:38 UTC
- **Last Updated**: August 04, 2024 at 03:38 UTC
- **Reserved Date**: October 19, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Splashtop Remote Client (Personal Edition) through 3.4.6.1 creates a Temporary File in a Directory with Insecure Permissions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.splashtop.com/security)
2. [](https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0006/MNDT-2022-0006.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1904, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1904
- **State**: PUBLISHED
- **Published Date**: March 04, 2025 at 04:31 UTC
- **Last Updated**: March 04, 2025 at 15:13 UTC
- **Reserved Date**: March 03, 2025 at 18:38 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in code-projects Blood Bank System 1.0. Affected by this issue is some unknown functionality of the file /Blood/A+.php. The manipulation of the argument Availibility leads to cross site scripting. The attack may be launched remotely.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**code-projects - Blood Bank System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-298424 | code-projects Blood Bank System A+.php cross site scripting](https://vuldb.com/?id.298424)
2. [VDB-298424 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.298424)
3. [Submit #506868 | code-projects blood-bank-system-in-php v1.0 v1.0 Cross Site Scripting](https://vuldb.com/?submit.506868)
4. [](https://github.com/lokihardk/cve/blob/main/xss-2_25.md)
5. [](https://code-projects.org/)
### Credits
- lokihardk (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0946
- **State**: PUBLISHED
- **Published Date**: May 10, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 14:41 UTC
- **Reserved Date**: January 09, 2013 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Buffer overflow in the Library Control Program (LCP) in EMC AlphaStor 4.0 before build 910 allows remote attackers to execute arbitrary code via crafted commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [59794](http://www.securityfocus.com/bid/59794)
2. [42719](https://www.exploit-db.com/exploits/42719/)
3. [20130509 ESA-2013-037: EMC AlphaStor Buffer Overflow Vulnerability](http://archives.neohapsis.com/archives/bugtraq/2013-05/0035.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7575, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7575
- **State**: PUBLISHED
- **Published Date**: April 14, 2020 at 19:50 UTC
- **Last Updated**: August 04, 2024 at 09:33 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Climatix POL908 (BACnet/IP module) (All versions), Climatix POL909 (AWM module) (All versions < V11.32). A persistent cross-site scripting (XSS) vulnerability exists in the web server access log page of the affected devices that could allow an attacker to inject arbitrary JavaScript code via specially crafted GET requests. The code could be potentially executed later by another (privileged) user. The security vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires no system privileges. An attacker could use the vulnerability to compromise the confidentiality and integrity of other users' web sessions.
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**Siemens - Climatix POL908 (BACnet/IP module)**
Affected versions:
- All versions (Status: affected)
**Siemens - Climatix POL909 (AWM module)**
Affected versions:
- All versions < V11.32 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-886514.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2569, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2569
- **State**: PUBLISHED
- **Published Date**: June 06, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: June 06, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the EasyBook (com_easybook) component 1.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the gbid parameter in a deleteentry action to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5740](https://www.exploit-db.com/exploits/5740)
2. [easybook-gbid-sql-injection(42853)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42853)
3. [30539](http://secunia.com/advisories/30539) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3457
- **State**: PUBLISHED
- **Published Date**: April 24, 2017 at 19:00 UTC
- **Last Updated**: October 07, 2024 at 16:19 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.7.17 and earlier (Status: affected)
### References
1. [1038287](http://www.securitytracker.com/id/1038287)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html)
3. [97845](http://www.securityfocus.com/bid/97845)
4. [RHSA-2017:2886](https://access.redhat.com/errata/RHSA-2017:2886) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2415, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2415 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2415
- **State**: PUBLISHED
- **Published Date**: July 20, 2021 at 22:44 UTC
- **Last Updated**: September 25, 2024 at 19:48 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Time and Labor product of Oracle E-Business Suite (component: Timecard). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Time and Labor. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Time and Labor accessible data as well as unauthorized access to critical data or complete access to all Oracle Time and Labor accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Oracle Corporation - Time and Labor**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
- 12.2.3-12.2.10 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6537
- **State**: PUBLISHED
- **Published Date**: September 19, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 01:36 UTC
- **Reserved Date**: August 03, 2016 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
AVer Information EH6108H+ devices with firmware X9.03.24.00.07l store passwords in a cleartext base64 format and require cleartext credentials in HTTP Cookie headers, which allows context-dependent attacks to obtain sensitive information by reading these strings.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#667480](http://www.kb.cert.org/vuls/id/667480)
2. [92936](http://www.securityfocus.com/bid/92936) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3939
- **State**: PUBLISHED
- **Published Date**: May 22, 2025 at 12:33 UTC
- **Last Updated**: May 22, 2025 at 14:02 UTC
- **Reserved Date**: April 25, 2025 at 15:21 UTC
- **Assigned By**: Honeywell
### Vulnerability Description
Observable Response Discrepancy vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Cryptanalysis. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-204: Improper Input Validation
### Affected Products
**Tridium - Niagara Framework**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
**Tridium - Niagara Enterprise Security**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
### References
1. [](https://honeywell.com/us/en/product-security#security-notices)
2. [](https://docs.niagara-community.com/category/tech_bull)
### Credits
- Andrea Palanca and team at Nozomi Networks |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000107, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000107 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000107
- **State**: PUBLISHED
- **Published Date**: March 13, 2018 at 13:00 UTC
- **Last Updated**: September 17, 2024 at 03:48 UTC
- **Reserved Date**: March 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An improper authorization vulnerability exists in Jenkins Job and Node Ownership Plugin 0.11.0 and earlier in OwnershipDescription.java, JobOwnerJobProperty.java, and OwnerNodeProperty.java that allow an attacker with Job/Configure or Computer/Configure permission and without Ownership related permissions to override ownership metadata.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2018-02-26/#SECURITY-498) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35245, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35245 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35245
- **State**: PUBLISHED
- **Published Date**: November 13, 2024 at 21:10 UTC
- **Last Updated**: November 14, 2024 at 19:42 UTC
- **Reserved Date**: May 23, 2024 at 17:14 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncontrolled search path element in some Intel(R) PROSet/Wireless WiFi software for Windows before version 23.60 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**n/a - Intel(R) PROSet/Wireless WiFi software for Windows**
Affected versions:
- before version 23.60 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01167.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01167.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6859
- **State**: PUBLISHED
- **Published Date**: September 08, 2024 at 06:00 UTC
- **Last Updated**: September 09, 2024 at 19:52 UTC
- **Reserved Date**: July 17, 2024 at 20:28 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP MultiTasking WordPress plugin through 0.1.12 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
### Weakness Classification (CWE)
- CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - WP MultiTasking**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/34ae6121-304f-495b-bcc1-4fbd3d70a9fb/)
### Credits
- Bob Matyas
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1067, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1067
- **State**: PUBLISHED
- **Published Date**: August 31, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:12 UTC
- **Reserved Date**: August 30, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Administrative web interface for IC9 Pocket Print Server Firmware 7.1.30 and 7.1.36f allows remote attackers to cause a denial of service (reboot and reset) via a long password, possibly due to a buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5329](http://www.securityfocus.com/bid/5329)
2. [20020727 0815 ++ */ SEH_Web](http://archives.neohapsis.com/archives/bugtraq/2002-07/0336.html)
3. [seh-ic9-password-bo(9702)](http://www.iss.net/security_center/static/9702.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0554
- **State**: PUBLISHED
- **Published Date**: February 08, 2008 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 07:46 UTC
- **Reserved Date**: February 01, 2008 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Buffer overflow in the readImageData function in giftopnm.c in netpbm before 10.27 in netpbm before 10.27 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-665-1](http://ubuntu.com/usn/usn-665-1)
2. [27682](http://www.securityfocus.com/bid/27682)
3. [RHSA-2008:0131](http://www.redhat.com/support/errata/RHSA-2008-0131.html)
4. [oval:org.mitre.oval:def:10975](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10975)
5. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464056)
6. [29079](http://secunia.com/advisories/29079)
7. [MDVSA-2008:039](http://www.mandriva.com/security/advisories?name=MDVSA-2008:039)
8. [1019358](http://www.securitytracker.com/id?1019358)
9. [32607](http://secunia.com/advisories/32607)
10. [30280](http://secunia.com/advisories/30280)
11. [ADV-2008-0460](http://www.vupen.com/english/advisories/2008/0460)
12. [DSA-1579](http://www.debian.org/security/2008/dsa-1579)
13. [](https://issues.rpath.com/browse/RPL-2216) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5548, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5548 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5548
- **State**: PUBLISHED
- **Published Date**: April 01, 2020 at 11:15 UTC
- **Last Updated**: August 04, 2024 at 08:30 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier) allow remote attackers to cause a denial of service via unspecified vectors.
### Affected Products
**Yamaha Corporation - Yamaha network devices**
Affected versions:
- Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier) (Status: affected)
### References
1. [](http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN38732359.html)
2. [](https://jvn.jp/en/jp/JVN38732359/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10932, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10932 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10932
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 11:21 UTC
- **Reserved Date**: March 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Arm Mbed TLS before 2.16.6 and 2.7.x before 2.7.15. An attacker that can get precise enough side-channel measurements can recover the long-term ECDSA private key by (1) reconstructing the projective coordinate of the result of scalar multiplication by exploiting side channels in the conversion to affine coordinates; (2) using an attack described by Naccache, Smart, and Stern in 2003 to recover a few bits of the ephemeral scalar from those projective coordinates via several measurements; and (3) using a lattice attack to get from there to the long-term ECDSA private key used for the signatures. Typically an attacker would have sufficient access when attacking an SGX enclave and controlling the untrusted OS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://tls.mbed.org/tech-updates/security-advisories)
2. [](https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-04)
3. [](https://tls.mbed.org/tech-updates/releases/mbedtls-2.16.6-and-2.7.15-released)
4. [FEDORA-2020-9a6e8e63e9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCWN5HIF4CJ2LZTOMEBJ7Q4IMMV7ZU2V/)
5. [FEDORA-2020-42564738a1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNOS2IIBH5WNJXZUV546PY7666DE7Y3L/)
6. [[debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update](https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-48775, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-48775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48775
- **State**: PUBLISHED
- **Published Date**: October 11, 2024 at 00:00 UTC
- **Last Updated**: October 15, 2024 at 19:57 UTC
- **Reserved Date**: October 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Plug n Play Camera com.ezset.delaney 1.2.0 allows a remote attacker to obtain sensitive information via the firmware update process.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://plug.com)
2. [](http://comezsetdelaney.com)
3. [](https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.ezset.delaney/com.ezset.delaney.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0428, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0428 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0428
- **State**: PUBLISHED
- **Published Date**: April 13, 2021 at 18:20 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In getSimSerialNumber of TelephonyManager.java, there is a possible way to read a trackable identifier due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-173421434
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-09-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13725
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:14 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for GlobalSuperGameToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/GlobalSuperGameToken) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4392, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4392
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57879, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57879 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57879
- **State**: PUBLISHED
- **Published Date**: January 11, 2025 at 15:05 UTC
- **Last Updated**: May 04, 2025 at 13:01 UTC
- **Reserved Date**: January 11, 2025 at 14:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: iso: Always release hdev at the end of iso_listen_bis
Since hci_get_route holds the device before returning, the hdev
should be released with hci_dev_put at the end of iso_listen_bis
even if the function returns with an error.
### Affected Products
**Linux - Linux**
Affected versions:
- 02171da6e86a73e1b343b36722f5d9d5c04b3539 (Status: affected)
- 02171da6e86a73e1b343b36722f5d9d5c04b3539 (Status: affected)
- a6c3af0a620082d191dabc69c4925b3e6c26dd48 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.9 (Status: affected)
- 0 (Status: unaffected)
- 6.12.6 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/4ca50db1c567d658d173c5ef3ee6c52b0b03603c)
2. [](https://git.kernel.org/stable/c/9c76fff747a73ba01d1d87ed53dd9c00cb40ba05) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14072, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14072 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14072
- **State**: PUBLISHED
- **Published Date**: June 29, 2020 at 16:29 UTC
- **Last Updated**: August 04, 2024 at 12:32 UTC
- **Reserved Date**: June 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in MK-AUTH 19.01. It allows command execution as root via shell metacharacters to /auth admin scripts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://mk-auth.com.br/page/changelog-1)
2. [](https://gist.github.com/merhawi023/a1155913df3cf0c17971b0fb7dcd8f20) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0847
- **State**: PUBLISHED
- **Published Date**: October 09, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:05 UTC
- **Reserved Date**: October 08, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SuSEconfig.susewm in the susewm package on SuSE Linux 8.2Pro allows local users to overwrite arbitrary files via a symlink attack on the susewm.$$ temporary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20031006 Re: Local root exploit in SuSE Linux 8.2Pro](http://marc.info/?l=bugtraq&m=106546531922379&w=2)
2. [20031006 Local root exploit in SuSE Linux 8.2Pro](http://marc.info/?l=bugtraq&m=106545972615578&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2468, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2468 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2468
- **State**: PUBLISHED
- **Published Date**: October 09, 2018 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 04:21 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
Under certain conditions the backup server in SAP Adaptive Server Enterprise (ASE), versions 15.7 and 16.0, allows an attacker to access information which would otherwise be restricted.
### Affected Products
**SAP - SAP Adaptive Server Enterprise (ASE)**
Affected versions:
- 15.7 (Status: affected)
- 16.0 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095)
2. [105527](http://www.securityfocus.com/bid/105527)
3. [](https://launchpad.support.sap.com/#/notes/2678615) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3556, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3556
- **State**: PUBLISHED
- **Published Date**: July 04, 2007 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 14:21 UTC
- **Reserved Date**: July 04, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Liesbeth base CMS stores sensitive information under the web root with insufficient access control, which allows remote attackers to download an include file containing account credentials via a direct request for config.inc.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [liesbethcms-config-information-disclosure(35243)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35243)
2. [45744](http://osvdb.org/45744)
3. [](http://securityvulns.ru/Rdocument392.html)
4. [20070703 Moodle XSS / Liesbeth base CMS sensitive information disclosure](http://www.securityfocus.com/archive/1/472727/100/0/threaded)
5. [2857](http://securityreason.com/securityalert/2857)
6. [24749](http://www.securityfocus.com/bid/24749) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50175
- **State**: PUBLISHED
- **Published Date**: December 26, 2023 at 07:21 UTC
- **Last Updated**: April 23, 2025 at 15:59 UTC
- **Reserved Date**: December 07, 2023 at 02:39 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page, the Markdown Settings (/admin/markdown) page, and the Customize (/admin/customize) page of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
### Affected Products
**WESEEK, Inc. - GROWI**
Affected versions:
- prior to v6.0.0 (Status: affected)
### References
1. [](https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/)
2. [](https://jvn.jp/en/jp/JVN18715935/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2119, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2119 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2119
- **State**: PUBLISHED
- **Published Date**: May 22, 2024 at 07:37 UTC
- **Last Updated**: August 01, 2024 at 19:03 UTC
- **Reserved Date**: March 01, 2024 at 20:47 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The LuckyWP Table of Contents plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the attrs parameter in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**theluckywp - LuckyWP Table of Contents**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5ceb8f67-0c7a-4028-81b9-f2cdbcba1a80?source=cve)
2. [](https://wordpress.org/plugins/luckywp-table-of-contents/)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6436
- **State**: PUBLISHED
- **Published Date**: December 10, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 20:26 UTC
- **Reserved Date**: December 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Network controller in Xerox WorkCentre and WorkCentre Pro before 12.050.03.000, 13.x before 13.050.03.000, and 14.x before 14.050.03.000 allows remote attackers to inject arbitrary web script or HTML via HTTP TRACE messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23265](http://secunia.com/advisories/23265)
2. [](http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53139, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53139
- **State**: PUBLISHED
- **Published Date**: December 04, 2024 at 14:20 UTC
- **Last Updated**: May 04, 2025 at 09:54 UTC
- **Reserved Date**: November 19, 2024 at 17:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
sctp: fix possible UAF in sctp_v6_available()
A lockdep report [1] with CONFIG_PROVE_RCU_LIST=y hints
that sctp_v6_available() is calling dev_get_by_index_rcu()
and ipv6_chk_addr() without holding rcu.
[1]
=============================
WARNING: suspicious RCU usage
6.12.0-rc5-virtme #1216 Tainted: G W
-----------------------------
net/core/dev.c:876 RCU-list traversed in non-reader section!!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 1
1 lock held by sctp_hello/31495:
#0: ffff9f1ebbdb7418 (sk_lock-AF_INET6){+.+.}-{0:0}, at: sctp_bind (./arch/x86/include/asm/jump_label.h:27 net/sctp/socket.c:315) sctp
stack backtrace:
CPU: 7 UID: 0 PID: 31495 Comm: sctp_hello Tainted: G W 6.12.0-rc5-virtme #1216
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
Call Trace:
<TASK>
dump_stack_lvl (lib/dump_stack.c:123)
lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822)
dev_get_by_index_rcu (net/core/dev.c:876 (discriminator 7))
sctp_v6_available (net/sctp/ipv6.c:701) sctp
sctp_do_bind (net/sctp/socket.c:400 (discriminator 1)) sctp
sctp_bind (net/sctp/socket.c:320) sctp
inet6_bind_sk (net/ipv6/af_inet6.c:465)
? security_socket_bind (security/security.c:4581 (discriminator 1))
__sys_bind (net/socket.c:1848 net/socket.c:1869)
? do_user_addr_fault (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 ./include/linux/mm.h:729 arch/x86/mm/fault.c:1340)
? do_user_addr_fault (./arch/x86/include/asm/preempt.h:84 (discriminator 13) ./include/linux/rcupdate.h:98 (discriminator 13) ./include/linux/rcupdate.h:882 (discriminator 13) ./include/linux/mm.h:729 (discriminator 13) arch/x86/mm/fault.c:1340 (discriminator 13))
__x64_sys_bind (net/socket.c:1877 (discriminator 1) net/socket.c:1875 (discriminator 1) net/socket.c:1875 (discriminator 1))
do_syscall_64 (arch/x86/entry/common.c:52 (discriminator 1) arch/x86/entry/common.c:83 (discriminator 1))
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)
RIP: 0033:0x7f59b934a1e7
Code: 44 00 00 48 8b 15 39 8c 0c 00 f7 d8 64 89 02 b8 ff ff ff ff eb bd 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 b8 31 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 09 8c 0c 00 f7 d8 64 89 01 48
All code
========
0: 44 00 00 add %r8b,(%rax)
3: 48 8b 15 39 8c 0c 00 mov 0xc8c39(%rip),%rdx # 0xc8c43
a: f7 d8 neg %eax
c: 64 89 02 mov %eax,%fs:(%rdx)
f: b8 ff ff ff ff mov $0xffffffff,%eax
14: eb bd jmp 0xffffffffffffffd3
16: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1)
1d: 00 00 00
20: 0f 1f 00 nopl (%rax)
23: b8 31 00 00 00 mov $0x31,%eax
28: 0f 05 syscall
2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction
30: 73 01 jae 0x33
32: c3 ret
33: 48 8b 0d 09 8c 0c 00 mov 0xc8c09(%rip),%rcx # 0xc8c43
3a: f7 d8 neg %eax
3c: 64 89 01 mov %eax,%fs:(%rcx)
3f: 48 rex.W
Code starting with the faulting instruction
===========================================
0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax
6: 73 01 jae 0x9
8: c3 ret
9: 48 8b 0d 09 8c 0c 00 mov 0xc8c09(%rip),%rcx # 0xc8c19
10: f7 d8 neg %eax
12: 64 89 01 mov %eax,%fs:(%rcx)
15: 48 rex.W
RSP: 002b:00007ffe2d0ad398 EFLAGS: 00000202 ORIG_RAX: 0000000000000031
RAX: ffffffffffffffda RBX: 00007ffe2d0ad3d0 RCX: 00007f59b934a1e7
RDX: 000000000000001c RSI: 00007ffe2d0ad3d0 RDI: 0000000000000005
RBP: 0000000000000005 R08: 1999999999999999 R09: 0000000000000000
R10: 00007f59b9253298 R11: 000000000000
---truncated---
### Affected Products
**Linux - Linux**
Affected versions:
- 6fe1e52490a91cb23f6b3aafc93e7c5beb99f862 (Status: affected)
- 6fe1e52490a91cb23f6b3aafc93e7c5beb99f862 (Status: affected)
- 6fe1e52490a91cb23f6b3aafc93e7c5beb99f862 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.2 (Status: affected)
- 0 (Status: unaffected)
- 6.6.63 (Status: unaffected)
- 6.11.10 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/ad975697211f4f2c4ce61c3ba524fd14d88ceab8)
2. [](https://git.kernel.org/stable/c/05656a66592759242c74063616291b7274d11b2f)
3. [](https://git.kernel.org/stable/c/eb72e7fcc83987d5d5595b43222f23b295d5de7f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11619, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11619
- **State**: PUBLISHED
- **Published Date**: April 30, 2019 at 19:40 UTC
- **Last Updated**: August 04, 2024 at 22:55 UTC
- **Reserved Date**: April 30, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/configurationRequest.php when action=analytics. A remote background administrator privilege user (or a user with permission to manage configuration analytics) could exploit the vulnerability to obtain database sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/itodaro/doorGets_cve) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2781, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2781 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2781
- **State**: PUBLISHED
- **Published Date**: March 28, 2025 at 22:23 UTC
- **Last Updated**: March 31, 2025 at 14:23 UTC
- **Reserved Date**: March 25, 2025 at 00:12 UTC
- **Assigned By**: WatchGuard
### Vulnerability Description
The WatchGuard Mobile VPN with SSL Client on Windows does not properly configure directory permissions when installed in a non-default directory. This could allow an authenticated local attacker to escalate to SYSTEM privileges on a vulnerable system.
This issue affects Mobile VPN with SSL Client: from 11.0 through 12.11.
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**WatchGuard - Mobile VPN with SSL Client**
Affected versions:
- 11.0 (Status: affected)
### References
1. [](https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00004) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49605, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49605 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49605
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:23 UTC
- **Last Updated**: May 04, 2025 at 08:41 UTC
- **Reserved Date**: February 26, 2025 at 02:21 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
igc: Reinstate IGC_REMOVED logic and implement it properly
The initially merged version of the igc driver code (via commit
146740f9abc4, "igc: Add support for PF") contained the following
IGC_REMOVED checks in the igc_rd32/wr32() MMIO accessors:
u32 igc_rd32(struct igc_hw *hw, u32 reg)
{
u8 __iomem *hw_addr = READ_ONCE(hw->hw_addr);
u32 value = 0;
if (IGC_REMOVED(hw_addr))
return ~value;
value = readl(&hw_addr[reg]);
/* reads should not return all F's */
if (!(~value) && (!reg || !(~readl(hw_addr))))
hw->hw_addr = NULL;
return value;
}
And:
#define wr32(reg, val) \
do { \
u8 __iomem *hw_addr = READ_ONCE((hw)->hw_addr); \
if (!IGC_REMOVED(hw_addr)) \
writel((val), &hw_addr[(reg)]); \
} while (0)
E.g. igb has similar checks in its MMIO accessors, and has a similar
macro E1000_REMOVED, which is implemented as follows:
#define E1000_REMOVED(h) unlikely(!(h))
These checks serve to detect and take note of an 0xffffffff MMIO read
return from the device, which can be caused by a PCIe link flap or some
other kind of PCI bus error, and to avoid performing MMIO reads and
writes from that point onwards.
However, the IGC_REMOVED macro was not originally implemented:
#ifndef IGC_REMOVED
#define IGC_REMOVED(a) (0)
#endif /* IGC_REMOVED */
This led to the IGC_REMOVED logic to be removed entirely in a
subsequent commit (commit 3c215fb18e70, "igc: remove IGC_REMOVED
function"), with the rationale that such checks matter only for
virtualization and that igc does not support virtualization -- but a
PCIe device can become detached even without virtualization being in
use, and without proper checks, a PCIe bus error affecting an igc
adapter will lead to various NULL pointer dereferences, as the first
access after the error will set hw->hw_addr to NULL, and subsequent
accesses will blindly dereference this now-NULL pointer.
This patch reinstates the IGC_REMOVED checks in igc_rd32/wr32(), and
implements IGC_REMOVED the way it is done for igb, by checking for the
unlikely() case of hw_addr being NULL. This change prevents the oopses
seen when a PCIe link flap occurs on an igc adapter.
### Affected Products
**Linux - Linux**
Affected versions:
- 146740f9abc4976e4f0af1aa302efee1c699d2e4 (Status: affected)
- 146740f9abc4976e4f0af1aa302efee1c699d2e4 (Status: affected)
- 146740f9abc4976e4f0af1aa302efee1c699d2e4 (Status: affected)
- 146740f9abc4976e4f0af1aa302efee1c699d2e4 (Status: affected)
- 146740f9abc4976e4f0af1aa302efee1c699d2e4 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.20 (Status: affected)
- 0 (Status: unaffected)
- 5.4.208 (Status: unaffected)
- 5.10.134 (Status: unaffected)
- 5.15.58 (Status: unaffected)
- 5.18.15 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/16cb6717f4f42487ef10583eb8bc98e7d1e33d65)
2. [](https://git.kernel.org/stable/c/77836dbe35382aaf8108489060c5c89530c77494)
3. [](https://git.kernel.org/stable/c/e75b73081f1ec169518773626c2ff3950476660b)
4. [](https://git.kernel.org/stable/c/70965b6e5c03aa70cc754af1226b9f9cde0c4bf3)
5. [](https://git.kernel.org/stable/c/7c1ddcee5311f3315096217881d2dbe47cc683f9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32481
- **State**: PUBLISHED
- **Published Date**: April 09, 2025 at 16:09 UTC
- **Last Updated**: April 09, 2025 at 17:58 UTC
- **Reserved Date**: April 09, 2025 at 11:18 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in ninotheme Nino Social Connect allows Stored XSS. This issue affects Nino Social Connect: from n/a through 2.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**ninotheme - Nino Social Connect**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/nino-social-connect/vulnerability/wordpress-nino-social-connect-plugin-2-0-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- johska (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34335, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34335 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34335
- **State**: PUBLISHED
- **Published Date**: January 11, 2023 at 16:42 UTC
- **Last Updated**: April 08, 2025 at 13:55 UTC
- **Reserved Date**: June 22, 2022 at 19:42 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Sterling Partner Engagement Manager 6.1.2, 6.2.0, and 6.2.1 could allow an authenticated user to exhaust server resources which could lead to a denial of service. IBM X-Force ID: 229705.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**IBM - Sterling Partner Engagement Manager**
Affected versions:
- 6.1.2, 6.2.0, 6.2.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6854331)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/229705) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13624, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13624 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13624
- **State**: PUBLISHED
- **Published Date**: July 17, 2019 at 02:15 UTC
- **Last Updated**: August 04, 2024 at 23:57 UTC
- **Reserved Date**: July 16, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In ONOS 1.15.0, apps/yang/web/src/main/java/org/onosproject/yang/web/YangWebResource.java mishandles backquote characters within strings that can be used in a shell command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gerrit.onosproject.org/#/c/20767/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4293, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4293 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4293
- **State**: PUBLISHED
- **Published Date**: August 09, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 09, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device crash) via (1) "abnormal" MGCP messages, aka CSCsd81407; and (2) a large facsimile packet, aka CSCej20505.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36668](http://osvdb.org/36668)
2. [ADV-2007-2816](http://www.vupen.com/english/advisories/2007/2816)
3. [1018533](http://securitytracker.com/id?1018533)
4. [25239](http://www.securityfocus.com/bid/25239)
5. [26363](http://secunia.com/advisories/26363)
6. [oval:org.mitre.oval:def:5801](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5801)
7. [20070808 Voice Vulnerabilities in Cisco IOS and Cisco Unified Communications Manager](http://www.cisco.com/en/US/products/products_security_advisory09186a0080899653.shtml)
8. [36669](http://osvdb.org/36669)
9. [cisco-ios-facsimile-dos(35907)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35907) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36308, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36308 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36308
- **State**: PUBLISHED
- **Published Date**: August 16, 2022 at 00:32 UTC
- **Last Updated**: August 03, 2024 at 10:00 UTC
- **Reserved Date**: July 19, 2022 at 00:00 UTC
- **Assigned By**: facebook
### Vulnerability Description
Airspan AirVelocity 1500 web management UI displays SNMP credentials in plaintext on software versions older than 15.18.00.2511, and stores SNMPv3 credentials unhashed on the filesystem, enabling anyone with web access to use these credentials to manipulate the eNodeB over SNMP. This issue may affect other AirVelocity and AirSpeed models.
### Weakness Classification (CWE)
- CWE-256: Security Weakness
### Affected Products
**Airspan - AirVelocity**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://helpdesk.airspan.com/browse/TRN3-1692)
2. [](https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-qjgc-rx8m-q58x) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-21204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-21204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-21204
- **State**: PUBLISHED
- **Published Date**: April 28, 2020 at 15:11 UTC
- **Last Updated**: August 05, 2024 at 12:26 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D7800 before 1.0.1.30, R6100 before 1.0.1.20, R7500 before 1.0.0.118, R7500v2 before 1.0.3.24, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.96, WNDR4300 before 1.0.2.98, WNDR4300v2 before 1.0.0.50, and WNDR4500v3 before 1.0.0.50.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000055145/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2569) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1166, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1166 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1166
- **State**: PUBLISHED
- **Published Date**: May 21, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 18:53 UTC
- **Reserved Date**: February 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The default keybindings for wwm in LTSP Display Manager (ldm) 2.2.x before 2.2.7 allow remote attackers to execute arbitrary commands via the KP_RETURN keybinding, which launches a terminal window.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-1398-1](http://www.ubuntu.com/usn/USN-1398-1)
2. [](http://irclogs.ltsp.org/?d=2012-03-12)
3. [](https://bugs.launchpad.net/ubuntu/%2Bsource/ldm/%2Bbug/953340) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0455, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0455
- **State**: PUBLISHED
- **Published Date**: October 05, 2018 at 14:00 UTC
- **Last Updated**: November 26, 2024 at 14:40 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Server Message Block Version 2 (SMBv2) and Version 3 (SMBv3) protocol implementation for the Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause the device to run low on system memory, possibly preventing the device from forwarding traffic. It is also possible that a manual reload of the device may be required to clear the condition. The vulnerability is due to incorrect SMB header validation. An attacker could exploit this vulnerability by sending a custom SMB file transfer through the targeted device. A successful exploit could cause the device to consume an excessive amount of system memory and prevent the SNORT process from forwarding network traffic. This vulnerability can be exploited using either IPv4 or IPv6 in combination with SMBv2 or SMBv3 network traffic.
### Weakness Classification (CWE)
- CWE-19: Security Weakness
### Affected Products
**Cisco - Cisco FireSIGHT System Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20181003 Cisco Firepower System Software Detection Engine Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-fp-smb-snort) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52148, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52148
- **State**: PUBLISHED
- **Published Date**: January 05, 2024 at 11:02 UTC
- **Last Updated**: November 14, 2024 at 18:17 UTC
- **Reserved Date**: December 28, 2023 at 20:16 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in wp.Insider, wpaffiliatemgr Affiliates Manager.This issue affects Affiliates Manager: from n/a through 2.9.30.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**wp.insider, wpaffiliatemgr - Affiliates Manager**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/affiliates-manager/wordpress-affiliates-manager-plugin-2-9-30-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve)
### Credits
- Joshua Chan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4006
- **State**: PUBLISHED
- **Published Date**: November 16, 2013 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 16:30 UTC
- **Reserved Date**: June 07, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere Application Server (WAS) Liberty Profile 8.5 before 8.5.5.1 uses weak permissions for unspecified files, which allows local users to obtain sensitive information via standard filesystem operations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [PM90472](http://www-01.ibm.com/support/docview.wss?uid=swg1PM90472)
2. [](http://www-01.ibm.com/support/docview.wss?&uid=swg21651880)
3. [was-cve20134006-liberty-perm(85273)](https://exchange.xforce.ibmcloud.com/vulnerabilities/85273) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5535, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5535
- **State**: PUBLISHED
- **Published Date**: October 10, 2019 at 16:29 UTC
- **Last Updated**: August 04, 2024 at 20:01 UTC
- **Reserved Date**: January 07, 2019 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
VMware Workstation and Fusion contain a network denial-of-service vulnerability due to improper handling of certain IPv6 packets. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.7.
### Affected Products
**n/a - VMware Workstation and Fusion**
Affected versions:
- VMware Workstation 15.x and Fusion 11.x (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2019-0014.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0124, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0124 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0124
- **State**: PUBLISHED
- **Published Date**: October 03, 2024 at 16:45 UTC
- **Last Updated**: October 03, 2024 at 18:05 UTC
- **Reserved Date**: December 02, 2023 at 00:42 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA CUDA Toolkit for Windows and Linux contains a vulnerability in the nvdisam command line tool, where a user can cause nvdisasm to read freed memory by running it on a malformed ELF file. A successful exploit of this vulnerability might lead to a limited denial of service.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**NVIDIA - CUDA Toolkit**
Affected versions:
- All versions up to and including CUDA Toolkit 12.6U1 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5577) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31466, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31466 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31466
- **State**: PUBLISHED
- **Published Date**: July 26, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 14:53 UTC
- **Reserved Date**: April 28, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An XSS issue was discovered in FSMLabs TimeKeeper 8.0.17. On the "Configuration -> Compliance -> Add a new compliance report" and "Configuration -> Timekeeper Configuration -> Add a new source there" screens, there are entry points to inject JavaScript code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://fsmlabs.com/fsmlabs-cybersecurity/)
2. [](https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-31466.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12936, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12936 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12936
- **State**: PUBLISHED
- **Published Date**: June 23, 2019 at 22:35 UTC
- **Last Updated**: August 04, 2024 at 23:32 UTC
- **Reserved Date**: June 23, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BlueStacks App Player 2, 3, and 4 before 4.90 allows DNS Rebinding for attacks on exposed IPC functions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.bluestacks.com/hc/en-us/articles/360028842471)
2. [](https://support.bluestacks.com/hc/en-us/articles/360021469391-Release-Notes) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28316, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28316 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28316
- **State**: PUBLISHED
- **Published Date**: March 29, 2023 at 00:00 UTC
- **Last Updated**: February 18, 2025 at 16:31 UTC
- **Reserved Date**: March 31, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. Crafted data in an IFC file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16368.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Bentley - MicroStation CONNECT**
Affected versions:
- 10.16.02.34 (Status: affected)
### References
1. [](https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0006)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-607/)
### Credits
- Anonymous |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47141, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47141 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47141
- **State**: PUBLISHED
- **Published Date**: March 25, 2024 at 09:07 UTC
- **Last Updated**: May 04, 2025 at 07:04 UTC
- **Reserved Date**: March 04, 2024 at 18:12 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
gve: Add NULL pointer checks when freeing irqs.
When freeing notification blocks, we index priv->msix_vectors.
If we failed to allocate priv->msix_vectors (see abort_with_msix_vectors)
this could lead to a NULL pointer dereference if the driver is unloaded.
### Affected Products
**Linux - Linux**
Affected versions:
- 893ce44df56580fb878ca5af9c4a5fd87567da50 (Status: affected)
- 893ce44df56580fb878ca5af9c4a5fd87567da50 (Status: affected)
- 893ce44df56580fb878ca5af9c4a5fd87567da50 (Status: affected)
- 893ce44df56580fb878ca5af9c4a5fd87567da50 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.3 (Status: affected)
- 0 (Status: unaffected)
- 5.4.124 (Status: unaffected)
- 5.10.42 (Status: unaffected)
- 5.12.9 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/821149ee88c206fa37e79c1868cc270518484876)
2. [](https://git.kernel.org/stable/c/da21a35c00ff1a1794d4f166d3b3fa8db4d0f6fb)
3. [](https://git.kernel.org/stable/c/5278c75266c5094d3c0958793bf12fc90300e580)
4. [](https://git.kernel.org/stable/c/5218e919c8d06279884aa0baf76778a6817d5b93) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3365, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3365
- **State**: PUBLISHED
- **Published Date**: September 14, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 23:56 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, Excel Automation Services on SharePoint Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3362.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036785](http://www.securitytracker.com/id/1036785)
2. [MS16-107](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-107)
3. [92804](http://www.securityfocus.com/bid/92804) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6205, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6205 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6205
- **State**: PUBLISHED
- **Published Date**: February 23, 2017 at 06:16 UTC
- **Last Updated**: August 05, 2024 at 15:25 UTC
- **Reserved Date**: February 23, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DGS-1510-28, and DGS-1510-20 Websmart devices with firmware before 1.31.B003 allow attackers to conduct Unauthenticated Command Bypass attacks via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10070)
2. [96397](http://www.securityfocus.com/bid/96397) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30417, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30417 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30417
- **State**: PUBLISHED
- **Published Date**: April 07, 2024 at 08:16 UTC
- **Last Updated**: March 29, 2025 at 00:00 UTC
- **Reserved Date**: March 27, 2024 at 03:38 UTC
- **Assigned By**: huawei
### Vulnerability Description
Path traversal vulnerability in the Bluetooth-based sharing module.
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 4.0.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
- 2.1.0 (Status: affected)
- 2.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 13.0.0 (Status: affected)
- 12.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/4/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1358
- **State**: PUBLISHED
- **Published Date**: March 03, 2016 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 22:55 UTC
- **Reserved Date**: January 04, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco Prime Infrastructure 2.2, 3.0, and 3.1(0.0) allows remote authenticated users to read arbitrary files or cause a denial of service via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, aka Bug ID CSCuw81497.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1035181](http://www.securitytracker.com/id/1035181)
2. [20160303 Cisco Prime Infrastructure XML External Entity Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-cpi) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0266, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0266 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0266
- **State**: PUBLISHED
- **Published Date**: January 26, 2009 at 15:05 UTC
- **Last Updated**: September 17, 2024 at 04:04 UTC
- **Reserved Date**: January 26, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in Triologic Media Player 8.0.0.0 allows user-assisted remote attackers to execute arbitrary code via a long string in a .m3l playlist file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33496](http://secunia.com/advisories/33496) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4238, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4238 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4238
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5306, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5306 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5306
- **State**: PUBLISHED
- **Published Date**: December 02, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 10:49 UTC
- **Reserved Date**: December 01, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in admin/index.php in PG Real Estate Solution allows remote attackers to execute arbitrary SQL commands via the login_lg parameter (username). NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32841](http://secunia.com/advisories/32841)
2. [realestatesolution-index-sql-injection(46792)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46792)
3. [7200](https://www.exploit-db.com/exploits/7200)
4. [32429](http://www.securityfocus.com/bid/32429)
5. [4674](http://securityreason.com/securityalert/4674)
6. [ADV-2008-3239](http://www.vupen.com/english/advisories/2008/3239) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10898, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10898
- **State**: PUBLISHED
- **Published Date**: April 22, 2020 at 20:50 UTC
- **Last Updated**: August 04, 2024 at 11:14 UTC
- **Reserved Date**: March 24, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.1.29511. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-10195.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Foxit - PhantomPDF**
Affected versions:
- 9.7.1.29511 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-526/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16177
- **State**: PUBLISHED
- **Published Date**: January 09, 2019 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 30, 2018 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Untrusted search path vulnerability in The installer of Windows 10 Fall Creators Update Modify module for Security Measures tool allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
### Affected Products
**NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION - The installer of Windows10 Fall Creators Update Modify module for Security Measures tool**
Affected versions:
- Windows10 Fall Creators Update Modify module for Security Measures tool (Status: affected)
### References
1. [](https://f-security.jp/v6/support/information/100193.html)
2. [JVN#15709478](https://jvn.jp/en/jp/JVN15709478/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0582, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0582 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0582
- **State**: PUBLISHED
- **Published Date**: August 17, 2021 at 18:28 UTC
- **Last Updated**: August 03, 2024 at 15:47 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In wifi driver, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure to a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-187149601
### Affected Products
**n/a - Android**
Affected versions:
- Android SoC (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-08-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40684, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40684 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40684
- **State**: PUBLISHED
- **Published Date**: September 22, 2021 at 16:35 UTC
- **Last Updated**: August 04, 2024 at 02:51 UTC
- **Reserved Date**: September 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Talend ESB Runtime in all versions from 5.1 to 7.3.1-R2021-09, 7.2.1-R2021-09, 7.1.1-R2021-09, has an unauthenticated Jolokia HTTP endpoint which allows remote access to the JMX of the runtime container, which would allow an attacker the ability to read or modify the container or software running in the container.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://help.talend.com/r/en-US/7.3/release-notes-esb-products)
2. [](https://jira.talendforge.org/browse/SF-141) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3893, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3893
- **State**: PUBLISHED
- **Published Date**: May 23, 2025 at 10:20 UTC
- **Last Updated**: May 23, 2025 at 12:13 UTC
- **Reserved Date**: April 23, 2025 at 09:52 UTC
- **Assigned By**: CERT-PL
### Vulnerability Description
While editing pages managed by MegaBIP a user with high privileges is prompted to give a reasoning for performing this action. Input provided by the the user is not sanitized, leading to SQL Injection vulnerability.
Version 5.20 of MegaBIP fixes this issue.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Jan Syski - MegaBIP**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert.pl/en/posts/2025/05/CVE-2025-3893)
2. [](https://megabip.pl/index.php?id=24,145)
3. [](https://www.gov.pl/web/cyfryzacja/rekomendacja-pelnomocnika-rzadu-ds-cyberbezpieczenstwa-dotyczaca-biuletynow-informacji-publicznej)
### Credits
- Kamil Szczurowski
- Robert Kruczek |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48917, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48917
- **State**: REJECTED
- **Published Date**: August 22, 2024 at 01:32 UTC
- **Last Updated**: May 10, 2025 at 14:08 UTC
- **Reserved Date**: August 21, 2024 at 06:06 UTC
- **Assigned By**: Linux
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38027, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38027 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38027
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 17:03 UTC
- **Last Updated**: May 05, 2025 at 17:01 UTC
- **Reserved Date**: June 11, 2024 at 18:18 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Line Printer Daemon Service Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Line Printer Daemon Service Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38027) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45517, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45517 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45517
- **State**: PUBLISHED
- **Published Date**: November 21, 2024 at 00:00 UTC
- **Last Updated**: November 21, 2024 at 18:11 UTC
- **Reserved Date**: September 01, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Zimbra Collaboration (ZCS) through 10.1. A Cross-Site Scripting (XSS) vulnerability in the /h/rest endpoint of the Zimbra webmail and admin panel interfaces allows attackers to execute arbitrary JavaScript in the victim's session. This issue is caused by improper sanitization of user input, leading to potential compromise of sensitive information. Exploitation requires user interaction to access the malicious URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wiki.zimbra.com/wiki/Security_Center)
2. [](https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy)
3. [](https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes)
4. [](https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes)
5. [](https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P41#Security_Fixes)
6. [](https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P46#Security_Fixes) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13377, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13377 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13377
- **State**: PUBLISHED
- **Published Date**: January 17, 2025 at 09:36 UTC
- **Last Updated**: February 12, 2025 at 18:14 UTC
- **Reserved Date**: January 13, 2025 at 21:31 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘alt’ parameter in all versions up to, and including, 2.9.1.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Gravity Forms - Gravity Forms**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/03623f00-2c3c-4590-92fe-a5eaac15b944?source=cve)
2. [](https://docs.gravityforms.com/gravityforms-change-log/)
### Credits
- Michael Mazzolini |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9768, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9768
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 02, 2016 at 00:00 UTC
- **Assigned By**: rapid7
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13758, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13758 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13758
- **State**: PUBLISHED
- **Published Date**: August 29, 2017 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 19:05 UTC
- **Reserved Date**: August 29, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In ImageMagick 7.0.6-10, there is a heap-based buffer overflow in the TracePoint() function in MagickCore/draw.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-4040](https://www.debian.org/security/2017/dsa-4040)
2. [](https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32583)
3. [USN-3681-1](https://usn.ubuntu.com/3681-1/)
4. [GLSA-201711-07](https://security.gentoo.org/glsa/201711-07)
5. [DSA-4032](https://www.debian.org/security/2017/dsa-4032)
6. [1039246](http://www.securitytracker.com/id/1039246) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2372, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2372 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2372
- **State**: PUBLISHED
- **Published Date**: April 28, 2023 at 14:00 UTC
- **Last Updated**: August 02, 2024 at 06:19 UTC
- **Reserved Date**: April 28, 2023 at 11:19 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in SourceCodester Online DJ Management System 1.0. Affected by this issue is some unknown functionality of the file classes/Master.php?f=save_event. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227648.
### CVSS Metrics
- **CVSS Base Score**: 2.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SourceCodester - Online DJ Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.227648)
2. [](https://vuldb.com/?ctiid.227648)
3. [](https://github.com/yoyoyoyoyohane/bug_report/blob/main/XSS-1.md)
### Credits
- yohane (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21757, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21757
- **State**: REJECTED
- **Published Date**: February 27, 2025 at 02:18 UTC
- **Last Updated**: March 25, 2025 at 01:09 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
No description available |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.