System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8650
- **State**: PUBLISHED
- **Published Date**: December 15, 2019 at 21:38 UTC
- **Last Updated**: August 06, 2024 at 13:26 UTC
- **Reserved Date**: November 06, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
python-requests-Kerberos through 0.5 does not handle mutual authentication
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2014-8650)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8650)
3. [](http://www.securityfocus.com/bid/70909)
4. [](http://www.openwall.com/lists/oss-security/2014/11/07/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10147, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10147
- **State**: REJECTED
- **Published Date**: December 06, 2018 at 14:00 UTC
- **Last Updated**: December 06, 2018 at 13:57 UTC
- **Reserved Date**: April 16, 2018 at 00:00 UTC
- **Assigned By**: palo_alto
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2490, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2490
- **State**: PUBLISHED
- **Published Date**: June 13, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: February 18, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
The NVIDIA camera driver in Android before 2016-06-01 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 27533373.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2016-06-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4791, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4791
- **State**: PUBLISHED
- **Published Date**: April 22, 2010 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 07:17 UTC
- **Reserved Date**: April 22, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Family Connections (aka FCMS) before 1.8.2 allow remote attackers to execute arbitrary SQL commands via the (1) letter parameter to addressbook.php, (2) id parameter to recipes.php, (3) year parameter to register.php, (4) poll_id parameter to home.php, and (5) email parameter to lostpw.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.familycms.com/blog/2009/03/fcms-182-released/)
2. [8319](http://www.exploit-db.com/exploits/8319)
3. [20090330 Family Connections 1.8.1 Multiple Remote Vulnerabilities](http://www.securityfocus.com/archive/1/502272/100/0/threaded)
4. [](http://sourceforge.net/project/shownotes.php?release_id=672266)
5. [](http://sourceforge.net/tracker/?func=detail&aid=2722736&group_id=189733&atid=930513)
6. [34297](http://www.securityfocus.com/bid/34297)
7. [34503](http://secunia.com/advisories/34503) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17378, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17378 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17378
- **State**: PUBLISHED
- **Published Date**: September 28, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 10:47 UTC
- **Reserved Date**: September 23, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL Injection exists in the Penny Auction Factory 2.0.4 component for Joomla! via the filter_order_Dir or filter_order parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45466](https://www.exploit-db.com/exploits/45466/)
2. [](http://packetstormsecurity.com/files/149522/Joomla-Penny-Auction-Factory-2.0.4-SQL-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-28168, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-28168 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-28168
- **State**: PUBLISHED
- **Published Date**: May 05, 2025 at 00:00 UTC
- **Last Updated**: May 08, 2025 at 17:45 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Multiple File Upload add-on component 3.1.0 for OutSystems is vulnerable to Unrestricted File Upload. This occurs because file extension and size validations are enforced solely on the client side. An attacker can intercept the upload request and modify a parameter to bypass extension restrictions and upload arbitrary files. NOTE: this is a third-party component that is not supplied or supported by OutSystems.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-602: Security Weakness
### Affected Products
**Multi Uploaders - Multiple File Upload**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.outsystems.com/forge/component-overview/200/multiple-file-upload-o11)
2. [](https://gist.github.com/IamLeandrooooo/01090be3023f5e7c7397bb9b1f5505b9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32654, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32654
- **State**: PUBLISHED
- **Published Date**: July 28, 2023 at 04:30 UTC
- **Last Updated**: February 13, 2025 at 16:54 UTC
- **Reserved Date**: July 20, 2023 at 15:04 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.5. A user may be able to read information belonging to another user.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213843)
2. [](https://support.apple.com/kb/HT213843) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44373, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44373 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44373
- **State**: PUBLISHED
- **Published Date**: January 28, 2022 at 21:42 UTC
- **Last Updated**: April 15, 2025 at 19:18 UTC
- **Reserved Date**: November 29, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetAutoFocus param is not object. An attacker can send an HTTP request to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2975, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2975 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2975
- **State**: PUBLISHED
- **Published Date**: July 18, 2018 at 13:00 UTC
- **Last Updated**: October 02, 2024 at 20:12 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
### Affected Products
**Oracle Corporation - FLEXCUBE Universal Banking**
Affected versions:
- 11.3.0 (Status: affected)
- 11.4.0 (Status: affected)
- 12.0.1 (Status: affected)
- 12.0.2 (Status: affected)
- 12.0.3 (Status: affected)
- 12.1.0 (Status: affected)
- 12.2.0 (Status: affected)
- 12.3.0 (Status: affected)
- 12.4.0 (Status: affected)
- 14.0.0 (Status: affected)
- 14.1.0 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html)
2. [1041307](http://www.securitytracker.com/id/1041307)
3. [104778](http://www.securityfocus.com/bid/104778) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7815, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7815 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7815
- **State**: PUBLISHED
- **Published Date**: May 24, 2019 at 17:33 UTC
- **Last Updated**: August 04, 2024 at 21:02 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.010.20091 and earlier, 2019.010.20091 and earlier, 2017.011.30120 and earlier version, and 2015.006.30475 and earlier have a data leakage (sensitive) vulnerability. Successful exploitation could lead to information disclosure.
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.010.20091 and earlier, 2019.010.20091 and earlier, 2017.011.30120 and earlier version, and 2015.006.30475 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-13.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39643, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39643 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39643
- **State**: PUBLISHED
- **Published Date**: December 15, 2021 at 18:06 UTC
- **Last Updated**: August 04, 2024 at 02:13 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In ic_startRetrieveEntryValue of acropora/app/identity/ic.c, there is a possible bypass of defense-in-depth due to missing validation of the return value. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-195573629References: N/A
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2021-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5037, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5037 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5037
- **State**: PUBLISHED
- **Published Date**: April 24, 2017 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 14:47 UTC
- **Reserved Date**: January 02, 2017 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory write via a crafted video file, related to ChunkDemuxer.
### Affected Products
**n/a - Google Chrome prior to 57.0.2987.98 for Mac, Windows and Linux, and 57.0.2987.108 for Android**
Affected versions:
- Google Chrome prior to 57.0.2987.98 for Mac, Windows and Linux, and 57.0.2987.108 for Android (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html)
2. [GLSA-201704-02](https://security.gentoo.org/glsa/201704-02)
3. [DSA-3810](http://www.debian.org/security/2017/dsa-3810)
4. [96767](http://www.securityfocus.com/bid/96767)
5. [](https://crbug.com/679640)
6. [RHSA-2017:0499](http://rhn.redhat.com/errata/RHSA-2017-0499.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4109, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4109 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4109
- **State**: PUBLISHED
- **Published Date**: September 17, 2008 at 18:06 UTC
- **Last Updated**: August 07, 2024 at 10:00 UTC
- **Reserved Date**: September 16, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-649-1](http://www.ubuntu.com/usn/usn-649-1)
2. [openssh-signalhandler-dos(45202)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45202)
3. [31885](http://secunia.com/advisories/31885)
4. [1020891](http://www.securitytracker.com/id?1020891)
5. [DSA-1638](http://www.debian.org/security/2008/dsa-1638)
6. [SUSE-SR:2008:020](http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html)
7. [32080](http://secunia.com/advisories/32080)
8. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498678)
9. [32181](http://secunia.com/advisories/32181)
10. [[oss-security] 20240701 CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems](http://www.openwall.com/lists/oss-security/2024/07/01/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12480, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12480 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12480
- **State**: PUBLISHED
- **Published Date**: November 15, 2018 at 13:00 UTC
- **Last Updated**: February 13, 2025 at 16:27 UTC
- **Reserved Date**: June 15, 2018 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
Mitigates an XSS issue in NetIQ Access Manager versions prior to 4.4 SP3.
### Affected Products
**NetIQ eDirectory - NetIQ Access Manager (NAM)**
Affected versions:
- NetIQ Access Manager (Status: affected)
### References
1. [](https://support.microfocus.com/kb/doc.php?id=7023513)
2. [](https://www.netiq.com/documentation/access-manager-44/accessmanager443-release-notes/data/accessmanager443-release-notes.html#b149i4n6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1115, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1115
- **State**: PUBLISHED
- **Published Date**: September 11, 2020 at 17:08 UTC
- **Last Updated**: August 04, 2024 at 06:25 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
<p>An elevation of privilege vulnerability exists when the <a href="https://technet.microsoft.com/library/security/dn848375.aspx#CLFS">Windows Common Log File System (CLFS)</a> driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.</p>
<p>To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system.</p>
<p>The security update addresses the vulnerability by correcting how CLFS handles objects in memory.</p>
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1115) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0157
- **State**: PUBLISHED
- **Published Date**: April 12, 2016 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 22:08 UTC
- **Reserved Date**: December 04, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Edge Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0155 and CVE-2016-0156.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-16-232)
2. [1035522](http://www.securitytracker.com/id/1035522)
3. [MS16-038](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-038) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1069
- **State**: PUBLISHED
- **Published Date**: March 24, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 04:57 UTC
- **Reserved Date**: March 24, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the node edit form feature in Drupal Content Construction Kit (CCK) 6.x before 6.x-2.2, a module for Drupal, allow remote attackers to inject arbitrary web script or HTML via the (1) titles of candidate referenced nodes in the Node reference sub-module and the (2) names of candidate referenced users in the User reference sub-module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [34172](http://www.securityfocus.com/bid/34172)
2. [52784](http://osvdb.org/52784)
3. [cck-node-user-xss(49317)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49317)
4. [](http://drupal.org/node/406520)
5. [52783](http://osvdb.org/52783)
6. [34370](http://secunia.com/advisories/34370) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4075, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4075 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4075
- **State**: PUBLISHED
- **Published Date**: December 06, 2021 at 20:20 UTC
- **Last Updated**: August 03, 2024 at 17:16 UTC
- **Reserved Date**: December 06, 2021 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
snipe-it is vulnerable to Server-Side Request Forgery (SSRF)
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**snipe - snipe/snipe-it**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/4386fd8b-8c80-42bb-87b8-b506c46597de)
2. [](https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1876
- **State**: PUBLISHED
- **Published Date**: May 02, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 13:13 UTC
- **Reserved Date**: April 05, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
VMware Workstation before 5.5.4, when running a 64-bit Windows guest on a 64-bit host, allows local users to "corrupt the virtual machine's register context" by debugging a local program and stepping into a "syscall instruction."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [vmware-windebugging-unspecified(33993)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33993)
2. [23732](http://www.securityfocus.com/bid/23732)
3. [ADV-2007-1592](http://www.vupen.com/english/advisories/2007/1592)
4. [35509](http://osvdb.org/35509)
5. [20070518 VMSA-2007-0004.1 Updated: Multiple Denial-of-Service issues fixed and directory traversal vulnerability](http://www.securityfocus.com/archive/1/469011/30/6510/threaded)
6. [25079](http://secunia.com/advisories/25079)
7. [1018011](http://www.securitytracker.com/id?1018011)
8. [](http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554)
9. [20070507 VMSA-2007-0004 Multiple Denial-of-Service issues fixed](http://www.securityfocus.com/archive/1/467936/30/6690/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33625, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33625 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33625
- **State**: PUBLISHED
- **Published Date**: May 15, 2024 at 19:19 UTC
- **Last Updated**: August 02, 2024 at 02:36 UTC
- **Reserved Date**: April 29, 2024 at 16:47 UTC
- **Assigned By**: icscert
### Vulnerability Description
CyberPower PowerPanel business
application code contains a hard-coded JWT signing key. This could
result in an attacker forging JWT tokens to bypass authentication.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-259: Security Weakness
### Affected Products
**CyberPower - PowerPanel business**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01)
2. [](https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads)
### Credits
- Amir Preminger and Noam Moshe of Claroty Team82 Research reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35191, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35191
- **State**: PUBLISHED
- **Published Date**: March 14, 2024 at 16:45 UTC
- **Last Updated**: February 13, 2025 at 16:55 UTC
- **Reserved Date**: June 17, 2023 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncontrolled resource consumption for some Intel(R) SPS firmware versions may allow a privileged user to potentially enable denial of service via network access.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**n/a - Intel(R) SPS firmware versions**
Affected versions:
- See references (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00923.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00923.html)
2. [](https://security.netapp.com/advisory/ntap-20240405-0005/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4916, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4916 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4916
- **State**: PUBLISHED
- **Published Date**: September 21, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 19:32 UTC
- **Reserved Date**: September 20, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in uye_profil.asp in Tekman Portal (TR) 1.0 allows remote attackers to execute arbitrary SQL commands via the uye_id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2395](https://www.exploit-db.com/exploits/2395)
2. [ADV-2006-3717](http://www.vupen.com/english/advisories/2006/3717)
3. [tekman-profil-sql-injection(29028)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29028)
4. [20102](http://www.securityfocus.com/bid/20102)
5. [22008](http://secunia.com/advisories/22008) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5828, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5828 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5828
- **State**: PUBLISHED
- **Published Date**: June 27, 2019 at 16:13 UTC
- **Last Updated**: August 04, 2024 at 20:09 UTC
- **Reserved Date**: January 09, 2019 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Object lifecycle issue in ServiceWorker in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://crbug.com/956597)
2. [](https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html)
3. [openSUSE-SU-2019:1666](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html)
4. [FEDORA-2019-8fb8240d14](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/)
5. [FEDORA-2019-a1af621faf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/)
6. [DSA-4500](https://www.debian.org/security/2019/dsa-4500)
7. [20190813 [SECURITY] [DSA 4500-1] chromium security update](https://seclists.org/bugtraq/2019/Aug/19)
8. [GLSA-201908-18](https://security.gentoo.org/glsa/201908-18) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29119, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29119 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29119
- **State**: PUBLISHED
- **Published Date**: June 15, 2022 at 21:51 UTC
- **Last Updated**: January 02, 2025 at 19:02 UTC
- **Reserved Date**: April 12, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
HEVC Video Extensions Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - HEVC Video Extension**
Affected versions:
- 1.0.0.0 (Status: affected)
**Microsoft - HEVC Video Extensions**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [HEVC Video Extensions Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29119) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3128, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3128
- **State**: PUBLISHED
- **Published Date**: March 04, 2020 at 18:40 UTC
- **Last Updated**: November 15, 2024 at 17:35 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements within a Webex recording that is stored in either the Advanced Recording Format (ARF) or the Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a malicious ARF or WRF file to a user through a link or email attachment and persuading the user to open the file on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Cisco - Cisco WebEx WRF Player**
Affected versions:
- unspecified (Status: affected)
### References
1. [20200304 Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200304-webex-player) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6134, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6134 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6134
- **State**: PUBLISHED
- **Published Date**: February 14, 2009 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 11:20 UTC
- **Reserved Date**: February 13, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in EveryBlog 5.x and 6.x, a module for Drupal, allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31656](http://www.securityfocus.com/bid/31656)
2. [32194](http://secunia.com/advisories/32194)
3. [](http://drupal.org/node/318746)
4. [everyblog-unspecified-sql-injection(45756)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45756) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3054, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3054 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3054
- **State**: PUBLISHED
- **Published Date**: September 03, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 06:14 UTC
- **Reserved Date**: September 03, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the Artetics.com Art Portal (com_artportal) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the portalid parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [artportal-portalid-sql-injection(52962)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52962)
2. [9563](http://www.exploit-db.com/exploits/9563)
3. [36206](http://www.securityfocus.com/bid/36206) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7692, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7692 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7692
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15345
- **State**: REJECTED
- **Published Date**: February 12, 2019 at 21:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: August 14, 2018 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24972, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24972 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24972
- **State**: PUBLISHED
- **Published Date**: December 13, 2021 at 10:41 UTC
- **Last Updated**: August 03, 2024 at 19:49 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Pixel Cat WordPress plugin before 2.6.3 does not escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Pixel Cat – Conversion Pixel Manager**
Affected versions:
- 2.6.3 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/b960cb36-62de-4b9f-a35d-144a34a4c63d)
### Credits
- JrXnm |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8532, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8532 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8532
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 08, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30669, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30669 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30669
- **State**: PUBLISHED
- **Published Date**: July 06, 2023 at 02:51 UTC
- **Last Updated**: November 20, 2024 at 19:19 UTC
- **Reserved Date**: April 14, 2023 at 01:59 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Out-of-bounds Write in DoOemFactorySendFactoryTestResult of libsec-ril prior to SMR Jul-2023 Release 1 allows local attacker to execute arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- SMR Jul-2023 Release 1 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20198
- **State**: PUBLISHED
- **Published Date**: February 23, 2021 at 17:45 UTC
- **Last Updated**: August 03, 2024 at 17:30 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in the OpenShift Installer before version v0.9.0-master.0.20210125200451-95101da940b0. During installation of OpenShift Container Platform 4 clusters, bootstrap nodes are provisioned with anonymous authentication enabled on kubelet port 10250. A remote attacker able to reach this port during installation can make unauthenticated `/exec` requests to execute arbitrary commands within running containers. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**n/a - openshift/installer**
Affected versions:
- openshift/installer v0.9.0-master.0.20210125200451-95101da940b0 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1920764) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5209, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5209 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5209
- **State**: PUBLISHED
- **Published Date**: August 29, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 17:06 UTC
- **Reserved Date**: August 15, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The sctp_send_initiate_ack function in sys/netinet/sctp_output.c in the SCTP implementation in the kernel in FreeBSD 8.3 through 9.2-PRERELEASE does not properly initialize the state-cookie data structure, which allows remote attackers to obtain sensitive information from kernel stack memory by reading packet data in INIT-ACK chunks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FreeBSD-SA-13:10](http://www.freebsd.org/security/advisories/FreeBSD-SA-13:10.sctp.asc)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=905080)
3. [1028940](http://www.securitytracker.com/id/1028940)
4. [61939](http://www.securityfocus.com/bid/61939)
5. [](http://svnweb.freebsd.org/base?view=revision&revision=254338) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5604, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5604 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5604
- **State**: PUBLISHED
- **Published Date**: October 30, 2006 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 19:55 UTC
- **Reserved Date**: October 30, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in phpcards.header.php in phpCards 1.3 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the CardLanguageFile parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [phpcards-cardlanguage-file-include(29615)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29615)
2. [1017070](http://securitytracker.com/id?1017070) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0369, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0369 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0369
- **State**: PUBLISHED
- **Published Date**: March 01, 2012 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 18:23 UTC
- **Reserved Date**: January 04, 2012 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco Wireless LAN Controller (WLC) devices with software 6.0 and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allow remote attackers to cause a denial of service (device reload) via a sequence of IPv6 packets, aka Bug ID CSCtt07949.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20120229 Multiple Vulnerabilities in Cisco Wireless LAN Controllers](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc)
2. [20120229 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers](http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32937, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32937 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32937
- **State**: PUBLISHED
- **Published Date**: July 03, 2024 at 14:05 UTC
- **Last Updated**: August 02, 2024 at 02:27 UTC
- **Reserved Date**: April 19, 2024 at 20:26 UTC
- **Assigned By**: talos
### Vulnerability Description
An os command injection vulnerability exists in the CWMP SelfDefinedTimeZone functionality of Grandstream GXP2135 1.0.9.129, 1.0.11.74 and 1.0.11.79. A specially crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of malicious packets to trigger this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Grandstream - GXP2135**
Affected versions:
- 1.0.11.74 (Status: affected)
- 1.0.11.79 (Status: affected)
- 1.0.9.129 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-1978](https://talosintelligence.com/vulnerability_reports/TALOS-2024-1978)
### Credits
- Discovered by Matthew Bernath of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0764, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0764
- **State**: PUBLISHED
- **Published Date**: February 06, 2007 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 12:26 UTC
- **Reserved Date**: February 05, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unrestricted file upload vulnerability in F3Site 2.1 and earlier allows remote authenticated administrators to upload and execute arbitrary PHP scripts via GIF86 header in a file in the uplf parameter, which can be later accessed via a relative pathname in the dir parameter in adm.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [34669](http://osvdb.org/34669)
2. [f3site-adm-file-upload(32189)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32189)
3. [3255](https://www.exploit-db.com/exploits/3255) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5491, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5491
- **State**: PUBLISHED
- **Published Date**: September 30, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 21:05 UTC
- **Reserved Date**: October 24, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
z3c.form, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote attackers to obtain the default form field values by leveraging knowledge of the form location and the element id.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt)
2. [[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix](http://www.openwall.com/lists/oss-security/2012/11/10/1)
3. [](https://plone.org/products/plone/security/advisories/20121106/07)
4. [](https://plone.org/products/plone-hotfix/releases/20121106) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25660
- **State**: PUBLISHED
- **Published Date**: May 12, 2021 at 13:18 UTC
- **Last Updated**: August 03, 2024 at 20:11 UTC
- **Reserved Date**: January 21, 2021 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SIMATIC HMI Comfort Outdoor Panels V15 7\" & 15\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Outdoor Panels V16 7\" & 15\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI Comfort Panels V15 4\" - 22\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Panels V16 4\" - 22\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI KTP Mobile Panels V15 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15.1 Update 6), SIMATIC HMI KTP Mobile Panels V16 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V16 Update 4), SIMATIC WinCC Runtime Advanced V15 (All versions < V15.1 Update 6), SIMATIC WinCC Runtime Advanced V16 (All versions < V16 Update 4). SmartVNC has an out-of-bounds memory access vulnerability that could be triggered on the server side when sending data from the client, which could result in a Denial-of-Service condition.
### Weakness Classification (CWE)
- CWE-788: OS Command Injection
### Affected Products
**Siemens - SIMATIC HMI Comfort Outdoor Panels V15 7\" & 15\" (incl. SIPLUS variants)**
Affected versions:
- All versions < V15.1 Update 6 (Status: affected)
**Siemens - SIMATIC HMI Comfort Outdoor Panels V16 7\" & 15\" (incl. SIPLUS variants)
**
Affected versions:
- All versions < V16 Update 4 (Status: affected)
**Siemens - SIMATIC HMI Comfort Panels V15 4\" - 22\" (incl. SIPLUS variants)**
Affected versions:
- All versions < V15.1 Update 6 (Status: affected)
**Siemens - SIMATIC HMI Comfort Panels V16 4\" - 22\" (incl. SIPLUS variants)
**
Affected versions:
- All versions < V16 Update 4 (Status: affected)
**Siemens - SIMATIC HMI KTP Mobile Panels V15 KTP400F, KTP700, KTP700F, KTP900 and KTP900F**
Affected versions:
- All versions < V15.1 Update 6 (Status: affected)
**Siemens - SIMATIC HMI KTP Mobile Panels V16 KTP400F, KTP700, KTP700F, KTP900 and KTP900F
**
Affected versions:
- All versions < V16 Update 4 (Status: affected)
**Siemens - SIMATIC WinCC Runtime Advanced V15**
Affected versions:
- All versions < V15.1 Update 6 (Status: affected)
**Siemens - SIMATIC WinCC Runtime Advanced V16**
Affected versions:
- All versions < V16 Update 4 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-538778.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6980, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6980 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6980
- **State**: PUBLISHED
- **Published Date**: September 26, 2016 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 01:50 UTC
- **Reserved Date**: August 23, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Use-after-free vulnerability in Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4263.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [93179](http://www.securityfocus.com/bid/93179)
2. [1036793](http://www.securitytracker.com/id/1036793)
3. [](https://helpx.adobe.com/security/products/Digital-Editions/apsb16-28.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10416, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10416 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10416
- **State**: PUBLISHED
- **Published Date**: September 25, 2019 at 15:05 UTC
- **Last Updated**: August 04, 2024 at 22:24 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Violation Comments to GitLab Plugin 2.28 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
### Affected Products
**Jenkins project - Jenkins Violation Comments to GitLab Plugin**
Affected versions:
- 2.28 and earlier (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1577)
2. [[oss-security] 20190925 Multiple vulnerabilities in Jenkins and Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/09/25/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33946
- **State**: PUBLISHED
- **Published Date**: May 24, 2023 at 15:28 UTC
- **Last Updated**: October 22, 2024 at 15:51 UTC
- **Reserved Date**: May 24, 2023 at 02:36 UTC
- **Assigned By**: Liferay
### Vulnerability Description
The Object module in Liferay Portal 7.4.3.4 through 7.4.3.48, and Liferay DXP 7.4 before update 49 does properly isolate objects in difference virtual instances, which allows remote authenticated users in one virtual instance to view objects in a different virtual instance via OAuth 2 scope administration page.
### CVSS Metrics
- **CVSS Base Score**: 2.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Liferay - Portal**
Affected versions:
- 7.4.3.4 (Status: affected)
**Liferay - DXP**
Affected versions:
- 7.4.13 (Status: affected)
### References
1. [](https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33946) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52336
- **State**: PUBLISHED
- **Published Date**: November 26, 2024 at 15:21 UTC
- **Last Updated**: May 21, 2025 at 01:04 UTC
- **Reserved Date**: November 08, 2024 at 13:09 UTC
- **Assigned By**: redhat
### Vulnerability Description
A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Unknown - Unknown**
Affected versions:
- 2.23.0 (Status: affected)
**Red Hat - Fast Datapath for Red Hat Enterprise Linux 8**
Affected versions:
- 0:2.24.0-2.1.20240819gitc082797f.el8fdp (Status: unaffected)
**Red Hat - Fast Datapath for Red Hat Enterprise Linux 9**
Affected versions:
- 0:2.24.0-2.1.20240819gitc082797f.el9fdp (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:2.24.0-2.el9_5 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:2.24.0-2.el9_5 (Status: unaffected)
**Red Hat - Fast Datapath for RHEL 7**
**Red Hat - Red Hat Enterprise Linux 10**
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
### References
1. [RHSA-2024:10384](https://access.redhat.com/errata/RHSA-2024:10384)
2. [RHSA-2025:0879](https://access.redhat.com/errata/RHSA-2025:0879)
3. [RHSA-2025:0880](https://access.redhat.com/errata/RHSA-2025:0880)
4. [](https://access.redhat.com/security/cve/CVE-2024-52336)
5. [RHBZ#2324540](https://bugzilla.redhat.com/show_bug.cgi?id=2324540)
6. [](https://security.opensuse.org/2024/11/26/tuned-instance-create.html)
7. [](https://www.openwall.com/lists/oss-security/2024/11/28/1)
### Credits
- Red Hat would like to thank Matthias Gerstner (SUSE Security Team) for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38951, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38951 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38951
- **State**: PUBLISHED
- **Published Date**: December 09, 2021 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 16:47 UTC
- **Reserved Date**: August 16, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to a denial of service, caused by sending a specially-crafted request. A remote attacker could exploit this vulnerability to cause the server to consume all available CPU resources. IBM X-Force ID: 211405.
### Affected Products
**IBM - WebSphere Application Server**
Affected versions:
- 7.0 (Status: affected)
- 8.0 (Status: affected)
- 8.5 (Status: affected)
- 9.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6524674)
2. [ibm-websphere-cve202138951-dos (211405)](https://exchange.xforce.ibmcloud.com/vulnerabilities/211405) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7234, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7234 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7234
- **State**: PUBLISHED
- **Published Date**: April 29, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 18:01 UTC
- **Reserved Date**: December 29, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Simple Machines Forum (SMF) before 1.1.19 and 2.x before 2.0.6 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20131230 CVE request: SMF 1.1.19, 2.0.6](http://www.openwall.com/lists/oss-security/2013/12/30/1)
2. [[oss-security] 20131229 Re: CVE request: SMF 1.1.19, 2.0.6](http://www.openwall.com/lists/oss-security/2013/12/30/3)
3. [20131213 Multiple vulnerabilities in SMF forum software](http://seclists.org/fulldisclosure/2013/Dec/83)
4. [](http://www.jakoblell.com/blog/2013/12/13/multiple-vulnerabilities-in-smf-forum-software/)
5. [](http://download.simplemachines.org/index.php?thanks%3Bfilename=smf_2-0-6_changelog.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6707, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6707 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6707
- **State**: PUBLISHED
- **Published Date**: January 23, 2019 at 19:00 UTC
- **Last Updated**: August 04, 2024 at 20:31 UTC
- **Reserved Date**: January 23, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHPSHE 1.7 has SQL injection via the admin.php?mod=product&act=state product_id[] parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/kk98kk0/exploit/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3316, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3316 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3316
- **State**: PUBLISHED
- **Published Date**: April 04, 2024 at 21:31 UTC
- **Last Updated**: August 01, 2024 at 20:05 UTC
- **Reserved Date**: April 04, 2024 at 16:13 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Computer Laboratory Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/category/view_category.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259387.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Computer Laboratory Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-259387 | SourceCodester Computer Laboratory Management System view_category.php sql injection](https://vuldb.com/?id.259387)
2. [VDB-259387 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.259387)
3. [Submit #309584 | https://www.sourcecodester.com/ Computer Laboratory Management System v1.0 sql injection](https://vuldb.com/?submit.309584)
4. [](https://github.com/adminininin/blob/blob/main/2.md)
### Credits
- k1ngd0m3 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2354, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2354
- **State**: PUBLISHED
- **Published Date**: July 21, 2012 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 19:34 UTC
- **Reserved Date**: April 19, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Moodle 2.1.x before 2.1.6 and 2.2.x before 2.2.3 allows remote authenticated users to bypass the moodle/site:readallmessages capability requirement and read arbitrary messages by using the "Recent conversations" feature with a modified parameter in a URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=48e03792ca8faa2d781f9ef74606f3b3f0d3baec)
2. [[oss-security] 20120523 Moodle security notifications public](http://openwall.com/lists/oss-security/2012/05/23/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3667, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3667 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3667
- **State**: PUBLISHED
- **Published Date**: July 10, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 04:50 UTC
- **Reserved Date**: December 28, 2017 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Installation tool IPDT (Intel Processor Diagnostic Tool) 4.1.0.24 sets permissions of installed files incorrectly, allowing for execution of arbitrary code and potential privilege escalation.
### Affected Products
**Intel Corporation - Intel Processor Diagnostic Tool**
Affected versions:
- 4.1.0.24 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00140.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2759, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2759 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2759
- **State**: PUBLISHED
- **Published Date**: May 18, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 13:49 UTC
- **Reserved Date**: May 18, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in the insert function in the ValuePreference class (grid/ed/ValuePreference.java) in Adempiere before 3.1.6 allow remote attackers to execute arbitrary SQL commands via the (1) m_Attribute or (2) m_Value parameter. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.adempiere.com/wiki/index.php/Release_316)
2. [37956](http://osvdb.org/37956)
3. [adempiere-insert-sql-injection(34325)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34325)
4. [ADV-2007-1842](http://www.vupen.com/english/advisories/2007/1842) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27236
- **State**: PUBLISHED
- **Published Date**: March 11, 2024 at 18:55 UTC
- **Last Updated**: August 27, 2024 at 14:33 UTC
- **Reserved Date**: February 21, 2024 at 15:37 UTC
- **Assigned By**: Google_Devices
### Vulnerability Description
In aoc_unlocked_ioctl of aoc.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2024-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21582, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21582 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21582
- **State**: PUBLISHED
- **Published Date**: April 12, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:10 UTC
- **Reserved Date**: December 01, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Digital Editions version 4.5.11.187303 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Adobe - Digital Editions**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/Digital-Editions/apsb23-04.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0731, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0731 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0731
- **State**: PUBLISHED
- **Published Date**: July 23, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:31 UTC
- **Reserved Date**: July 22, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in index.php in the Search module for Php-Nuke allows remote attackers to inject arbitrary script as other users via the input field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20040716 [waraxe-2004-SA#035 - Multiple security holes in PhpNuke - part 2]](http://marc.info/?l=bugtraq&m=109002107329823&w=2)
2. [](http://www.waraxe.us/index.php?modname=sa&id=35)
3. [phpnuke-search-module-xss(16721)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16721) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46846, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46846 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46846
- **State**: PUBLISHED
- **Published Date**: November 03, 2023 at 07:33 UTC
- **Last Updated**: January 27, 2025 at 07:40 UTC
- **Reserved Date**: October 27, 2023 at 08:36 UTC
- **Assigned By**: redhat
### Vulnerability Description
SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.
### CVSS Metrics
- **CVSS Base Score**: 9.3/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-444: Security Weakness
### Affected Products
**Unknown - Unknown**
Affected versions:
- 2.6 (Status: affected)
**Red Hat - Red Hat Enterprise Linux 7 Extended Lifecycle Support**
Affected versions:
- 7:3.5.20-17.el7_9.13 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8**
Affected versions:
- 8080020231030214932.63b34585 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8**
Affected versions:
- 8090020231030224841.a75119d5 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions**
Affected versions:
- 8010020231101141358.c27ad7f8 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.2 Advanced Update Support**
Affected versions:
- 8020020231101135052.4cda2c84 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.2 Telecommunications Update Service**
Affected versions:
- 8020020231101135052.4cda2c84 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions**
Affected versions:
- 8020020231101135052.4cda2c84 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support**
Affected versions:
- 8040020231101101624.522a0ee4 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.4 Telecommunications Update Service**
Affected versions:
- 8040020231101101624.522a0ee4 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions**
Affected versions:
- 8040020231101101624.522a0ee4 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.6 Extended Update Support**
Affected versions:
- 8060020231031165747.ad008a3a (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 7:5.5-5.el9_2.1 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 7:5.5-6.el9_3.1 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.0 Extended Update Support**
Affected versions:
- 7:5.2-1.el9_0.3 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 6**
### References
1. [RHSA-2023:6266](https://access.redhat.com/errata/RHSA-2023:6266)
2. [RHSA-2023:6267](https://access.redhat.com/errata/RHSA-2023:6267)
3. [RHSA-2023:6268](https://access.redhat.com/errata/RHSA-2023:6268)
4. [RHSA-2023:6748](https://access.redhat.com/errata/RHSA-2023:6748)
5. [RHSA-2023:6801](https://access.redhat.com/errata/RHSA-2023:6801)
6. [RHSA-2023:6803](https://access.redhat.com/errata/RHSA-2023:6803)
7. [RHSA-2023:6804](https://access.redhat.com/errata/RHSA-2023:6804)
8. [RHSA-2023:6810](https://access.redhat.com/errata/RHSA-2023:6810)
9. [RHSA-2023:7213](https://access.redhat.com/errata/RHSA-2023:7213)
10. [RHSA-2024:11049](https://access.redhat.com/errata/RHSA-2024:11049)
11. [](https://access.redhat.com/security/cve/CVE-2023-46846)
12. [RHBZ#2245910](https://bugzilla.redhat.com/show_bug.cgi?id=2245910)
13. [](https://github.com/squid-cache/squid/security/advisories/GHSA-j83v-w3p4-5cqh) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2599, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2599 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2599
- **State**: PUBLISHED
- **Published Date**: January 12, 2011 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 02:39 UTC
- **Reserved Date**: July 01, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Research In Motion (RIM) BlackBerry Device Software before 6.0.0 allows remote attackers to cause a denial of service (browser hang) via a crafted web page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.blackberry.com/btsc/KB24841)
2. [1024952](http://www.securitytracker.com/id?1024952)
3. [45754](http://www.securityfocus.com/bid/45754)
4. [](http://blog.tehtri-security.com/2011/01/blackhat-dc-2011-inglourious-hackerds.html)
5. [70404](http://osvdb.org/70404)
6. [20110121 [TEHTRI-Security] CVE-2010-2599: Update your BlackBerry](http://www.securityfocus.com/archive/1/515860/100/0/threaded)
7. [ADV-2011-0082](http://www.vupen.com/english/advisories/2011/0082)
8. [blackberry-desktop-dos(64622)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64622) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2194, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2194 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2194
- **State**: PUBLISHED
- **Published Date**: August 05, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 22:15 UTC
- **Reserved Date**: July 11, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Apple Mac OS X kernel before 10.4.2 allows remote attackers to cause a denial of service (kernel panic) via a crafted TCP packet, possibly related to source routing or loose source routing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16047](http://secunia.com/advisories/16047)
2. [macos-tcpip-dos(21335)](https://exchange.xforce.ibmcloud.com/vulnerabilities/21335)
3. [14241](http://www.securityfocus.com/bid/14241)
4. [](http://docs.info.apple.com/article.html?artnum=301948)
5. [1014464](http://securitytracker.com/id?1014464)
6. [APPLE-SA-2005-07-12](http://lists.apple.com/archives/Security-announce/2005/Jul/msg00000.html)
7. [17880](http://www.osvdb.org/17880) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1888, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1888 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1888
- **State**: PUBLISHED
- **Published Date**: February 28, 2014 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 09:58 UTC
- **Reserved Date**: February 07, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the BuddyPress plugin before 1.9.2 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the name field to groups/create/step/group-details. NOTE: this can be exploited without authentication by leveraging CVE-2014-1889.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [65555](http://www.securityfocus.com/bid/65555)
2. [buddypress-cve20141888-xss(91175)](https://exchange.xforce.ibmcloud.com/vulnerabilities/91175)
3. [56950](http://secunia.com/advisories/56950)
4. [](http://packetstormsecurity.com/files/125212/WordPress-Buddypress-1.9.1-Cross-Site-Scripting.html)
5. [](http://buddypress.org/2014/02/buddypress-1-9-2)
6. [20140213 Wordpress plugin Buddypress <= 1.9.1 stored xss vulnerability](http://www.securityfocus.com/archive/1/531049/100/0/threaded)
7. [103307](http://osvdb.org/103307) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2301, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2301 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2301
- **State**: PUBLISHED
- **Published Date**: October 18, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 22:53 UTC
- **Reserved Date**: June 02, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Text component in Oracle Database Server 10.1.0.5, 10.2.0.3, 10.2.0.4, and 11.1.0.7 allows remote authenticated users to affect confidentiality, integrity, and availability, related to CTXSYS.DRVDISP.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8809, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8809 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8809
- **State**: PUBLISHED
- **Published Date**: November 22, 2024 at 21:03 UTC
- **Last Updated**: December 03, 2024 at 17:46 UTC
- **Reserved Date**: September 13, 2024 at 18:03 UTC
- **Assigned By**: zdi
### Vulnerability Description
Cohesive Networks VNS3 Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cohesive Networks VNS3. Authentication is required to exploit this vulnerability.
The specific flaw exists within the web service, which listens on TCP port 8000 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24178.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Cohesive Networks - VNS3**
Affected versions:
- 6.2.3-20240417 (Status: affected)
### References
1. [ZDI-24-1233](https://www.zerodayinitiative.com/advisories/ZDI-24-1233/)
2. [vendor-provided URL](https://cohesive.net/support/security-responses/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21529, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21529 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21529
- **State**: PUBLISHED
- **Published Date**: July 19, 2022 at 21:07 UTC
- **Last Updated**: September 24, 2024 at 20:01 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.29 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2022.html)
2. [](https://security.netapp.com/advisory/ntap-20220729-0004/)
3. [FEDORA-2022-9178229cd7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0397, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0397 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0397
- **State**: PUBLISHED
- **Published Date**: May 24, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:21 UTC
- **Reserved Date**: May 24, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Silent Runner Collector (SRC) 1.6.1 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long SMTP HELO command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010329 Silent Runner Collector - HELO buffer overflow vulnerability](http://archives.neohapsis.com/archives/bugtraq/2001-03/0454.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40091, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40091
- **State**: PUBLISHED
- **Published Date**: December 04, 2023 at 22:40 UTC
- **Last Updated**: August 02, 2024 at 18:24 UTC
- **Reserved Date**: August 09, 2023 at 02:29 UTC
- **Assigned By**: google_android
### Vulnerability Description
In onTransact of IncidentService.cpp, there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
- 13 (Status: affected)
- 12L (Status: affected)
- 12 (Status: affected)
- 11 (Status: affected)
### References
1. [](https://android.googlesource.com/platform/frameworks/base/+/0ec7b119d41adcbba23f9349e16de9e7e11683f6)
2. [](https://source.android.com/security/bulletin/2023-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46725
- **State**: PUBLISHED
- **Published Date**: September 18, 2024 at 06:32 UTC
- **Last Updated**: May 04, 2025 at 09:32 UTC
- **Reserved Date**: September 11, 2024 at 15:12 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix out-of-bounds write warning
Check the ring type value to fix the out-of-bounds
write warning
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.10.226 (Status: unaffected)
- 5.15.167 (Status: unaffected)
- 6.1.109 (Status: unaffected)
- 6.6.50 (Status: unaffected)
- 6.10.9 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/c253b87c7c37ec40a2e0c84e4a6b636ba5cd66b2)
2. [](https://git.kernel.org/stable/c/919f9bf9997b8dcdc132485ea96121e7d15555f9)
3. [](https://git.kernel.org/stable/c/cf2db220b38301b6486a0f11da24a0f317de558c)
4. [](https://git.kernel.org/stable/c/a60d1f7ff62e453dde2d3b4907e178954d199844)
5. [](https://git.kernel.org/stable/c/130bee397b9cd52006145c87a456fd8719390cb5)
6. [](https://git.kernel.org/stable/c/be1684930f5262a622d40ce7a6f1423530d87f89) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10145
- **State**: PUBLISHED
- **Published Date**: May 15, 2025 at 20:06 UTC
- **Last Updated**: May 20, 2025 at 15:48 UTC
- **Reserved Date**: October 18, 2024 at 18:25 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Hubbub Lite WordPress plugin before 1.34.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Hubbub Lite**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/b9e2381b-3ea0-48fa-bd9c-4181ddf36389/)
### Credits
- Krugov Artyom
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45769
- **State**: PUBLISHED
- **Published Date**: October 24, 2023 at 12:08 UTC
- **Last Updated**: February 19, 2025 at 21:20 UTC
- **Reserved Date**: October 12, 2023 at 14:57 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Alex Raven WP Report Post plugin <= 2.1.2 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Alex Raven - WP Report Post**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-report-post/wordpress-wp-report-post-plugin-2-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Ivy - TOOR, LISA (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0102, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0102 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0102
- **State**: PUBLISHED
- **Published Date**: February 05, 2020 at 17:23 UTC
- **Last Updated**: August 06, 2024 at 03:55 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Workflow for Bluemix does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
### Affected Products
**IBM - Workflow for Bluemix**
Affected versions:
- unknown (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21694941)
2. [](http://www.securityfocus.com/bid/74220)
3. [](https://www.ibm.com/blogs/psirt/ibm-security-bulletin-authentication-session-cookie-in-ibm-workflow-for-bluemix-was-missing-secure-flag-cve-2015-0102/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38259, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38259
- **State**: PUBLISHED
- **Published Date**: July 27, 2023 at 00:31 UTC
- **Last Updated**: October 23, 2024 at 13:43 UTC
- **Reserved Date**: July 20, 2023 at 15:04 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.6.8, macOS Ventura 13.5, macOS Big Sur 11.7.9. An app may be able to access user-sensitive data.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213843)
2. [](https://support.apple.com/en-us/HT213845)
3. [](https://support.apple.com/en-us/HT213844) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4020
- **State**: PUBLISHED
- **Published Date**: November 28, 2022 at 13:00 UTC
- **Last Updated**: April 14, 2025 at 18:16 UTC
- **Reserved Date**: November 16, 2022 at 12:09 UTC
- **Assigned By**: ESET
### Vulnerability Description
Vulnerability in the HQSwSmiDxe DXE driver on some consumer Acer Notebook devices may allow an attacker with elevated privileges to modify UEFI Secure Boot settings by modifying an NVRAM variable.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:H`
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**Acer - Aspire A315-22**
Affected versions:
- 1.04 (Status: affected)
**Acer - Aspire A115-21**
Affected versions:
- 1.04 (Status: affected)
**Acer - Aspire A315-22G**
Affected versions:
- 1.04 (Status: affected)
**Acer - Extensa EX215-21**
Affected versions:
- 1.04 (Status: affected)
**Acer - Extensa EX215-21G**
Affected versions:
- 1.04 (Status: affected)
### References
1. [](https://community.acer.com/en/kb/articles/15520-security-vulnerability-regarding-vulnerability-that-may-allow-changes-to-secure-boot-settings)
### Credits
- Martin Smolár @ ESET |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1140, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1140
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 14:54 UTC
- **Last Updated**: January 16, 2025 at 21:39 UTC
- **Reserved Date**: March 01, 2023 at 23:24 UTC
- **Assigned By**: icscert
### Vulnerability Description
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability that could allow an attacker to achieve unauthenticated remote code execution in the context of an administrator.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Delta Electronics - InfraSuite Device Master**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22565, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22565 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22565
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:17 UTC
- **Last Updated**: April 17, 2025 at 15:43 UTC
- **Reserved Date**: January 07, 2025 at 10:23 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bill Zimmerman vooPlayer v4 allows Reflected XSS. This issue affects vooPlayer v4: from n/a through 4.0.4.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Bill Zimmerman - vooPlayer v4**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/vooplayer/vulnerability/wordpress-vooplayer-v4-plugin-4-0-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47754, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47754
- **State**: PUBLISHED
- **Published Date**: December 18, 2023 at 23:49 UTC
- **Last Updated**: August 02, 2024 at 21:16 UTC
- **Reserved Date**: November 09, 2023 at 18:57 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Clever plugins Delete Duplicate Posts allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Delete Duplicate Posts: from n/a through 4.8.9.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Clever plugins - Delete Duplicate Posts**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/delete-duplicate-posts/wordpress-delete-duplicate-posts-plugin-4-8-9-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Huynh Tien Si (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1823, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1823 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1823
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:07 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Jelsoft vBulletin 2.0 beta 3 through 3.0 can4 allows remote attackers to inject arbitrary web script or HTML via the (1) page parameter to showthread.php or (2) order parameter to forumdisplay.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [vbulletin-showthread-xss(15495)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15495)
2. [4311](http://www.osvdb.org/4311)
3. [9888](http://www.securityfocus.com/bid/9888)
4. [1009440](http://securitytracker.com/id?1009440)
5. [20040316 JelSoft vBulletin Multiple XSS Vulnerabilities](http://marc.info/?l=bugtraq&m=107945556112453&w=2)
6. [9889](http://www.securityfocus.com/bid/9889)
7. [11142](http://secunia.com/advisories/11142)
8. [4310](http://www.osvdb.org/4310) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28503, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28503 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28503
- **State**: PUBLISHED
- **Published Date**: March 23, 2021 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 03:08 UTC
- **Reserved Date**: November 12, 2020 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O`
### Affected Products
**n/a - copy-props**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870)
2. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047)
3. [](https://github.com/gulpjs/copy-props/pull/7)
### Credits
- zpbrent (zhou.peng@shu) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12557
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 22:45 UTC
- **Reserved Date**: August 05, 2017 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A Remote Code Execution vulnerability in HPE intelligent Management Center (iMC) PLAT version IMC Plat 7.3 E0504P2 and earlier was found.
### Affected Products
**Hewlett Packard Enterprise - intelligent Management Center (iMC) PLAT**
Affected versions:
- IMC Plat 7.3 E0504P2 and earlier (Status: affected)
### References
1. [101152](http://www.securityfocus.com/bid/101152)
2. [1039495](http://www.securitytracker.com/id/1039495)
3. [](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03778en_us)
4. [45952](https://www.exploit-db.com/exploits/45952/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23514, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23514
- **State**: PUBLISHED
- **Published Date**: December 14, 2022 at 13:19 UTC
- **Last Updated**: April 21, 2025 at 14:50 UTC
- **Reserved Date**: January 19, 2022 at 21:23 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah < 2.19.1 contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue is patched in version 2.19.1.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-1333: Security Weakness
### Affected Products
**flavorjones - loofah**
Affected versions:
- < 2.19.1 (Status: affected)
### References
1. [https://github.com/flavorjones/loofah/security/advisories/GHSA-486f-hjj9-9vhh](https://github.com/flavorjones/loofah/security/advisories/GHSA-486f-hjj9-9vhh)
2. [https://hackerone.com/reports/1684163](https://hackerone.com/reports/1684163)
3. [](https://lists.debian.org/debian-lts-announce/2023/09/msg00011.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39228, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39228 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39228
- **State**: PUBLISHED
- **Published Date**: August 06, 2024 at 00:00 UTC
- **Last Updated**: August 15, 2024 at 15:36 UTC
- **Reserved Date**: June 21, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Ovpn%20interface%20shell%20injection.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8567
- **State**: PUBLISHED
- **Published Date**: February 13, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 02:27 UTC
- **Reserved Date**: October 07, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An issue was discovered in Siemens SICAM PAS before 8.00. A factory account with hard-coded passwords is present in the SICAM PAS installations. Attackers might gain privileged access to the database over Port 2638/TCP.
### Affected Products
**n/a - Siemens SICAM PAS before 8.00**
Affected versions:
- Siemens SICAM PAS before 8.00 (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-336-01)
2. [94549](http://www.securityfocus.com/bid/94549) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12178, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12178 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12178
- **State**: PUBLISHED
- **Published Date**: December 17, 2024 at 15:16 UTC
- **Last Updated**: January 29, 2025 at 16:39 UTC
- **Reserved Date**: December 04, 2024 at 16:29 UTC
- **Assigned By**: autodesk
### Vulnerability Description
A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Autodesk - Navisworks Freedom**
Affected versions:
- 2025 (Status: affected)
**Autodesk - Navisworks Simulate**
Affected versions:
- 2025 (Status: affected)
**Autodesk - Navisworks Manage**
Affected versions:
- 2025 (Status: affected)
### References
1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0027) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9525
- **State**: PUBLISHED
- **Published Date**: August 10, 2020 at 15:21 UTC
- **Last Updated**: August 04, 2024 at 10:34 UTC
- **Reserved Date**: March 01, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CS2 Network P2P through 3.x, as used in millions of Internet of Things devices, suffers from an authentication flaw that allows remote attackers to perform a man-in-the-middle attack, as demonstrated by eavesdropping on user video/audio streams, capturing credentials, and compromising devices.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://redprocyon.com)
2. [](https://hacked.camera) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4889, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4889 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4889
- **State**: PUBLISHED
- **Published Date**: January 15, 2023 at 07:23 UTC
- **Last Updated**: August 03, 2024 at 01:55 UTC
- **Reserved Date**: January 14, 2023 at 17:16 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in visegripped Stracker. Affected by this vulnerability is the function getHistory of the file doc_root/public_html/stracker/api.php. The manipulation of the argument symbol/startDate/endDate leads to sql injection. The identifier of the patch is 63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a. It is recommended to apply a patch to fix this issue. The identifier VDB-218377 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**visegripped - Stracker**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.218377)
2. [](https://vuldb.com/?ctiid.218377)
3. [](https://github.com/visegripped/stracker/pull/16)
4. [](https://github.com/visegripped/stracker/commit/63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8349, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8349
- **State**: PUBLISHED
- **Published Date**: May 08, 2019 at 13:24 UTC
- **Last Updated**: August 04, 2024 at 21:17 UTC
- **Reserved Date**: February 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in HTMLy 2.7.4 allow remote attackers to inject arbitrary web script or HTML via the (1) destination parameter to delete feature; the (2) destination parameter to edit feature; (3) content parameter in the profile feature.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/151733/HTMLy-2.7.4-Cross-Site-Scripting.html)
2. [](http://seclists.org/fulldisclosure/2019/Feb/40)
3. [](https://www.netsparker.com/web-applications-advisories/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43874, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43874 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43874
- **State**: PUBLISHED
- **Published Date**: August 21, 2024 at 00:06 UTC
- **Last Updated**: May 04, 2025 at 09:28 UTC
- **Reserved Date**: August 17, 2024 at 09:11 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
crypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked
Fix a null pointer dereference induced by DEBUG_TEST_DRIVER_REMOVE.
Return from __sev_snp_shutdown_locked() if the psp_device or the
sev_device structs are not initialized. Without the fix, the driver will
produce the following splat:
ccp 0000:55:00.5: enabling device (0000 -> 0002)
ccp 0000:55:00.5: sev enabled
ccp 0000:55:00.5: psp enabled
BUG: kernel NULL pointer dereference, address: 00000000000000f0
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC NOPTI
CPU: 262 PID: 1 Comm: swapper/0 Not tainted 6.9.0-rc1+ #29
RIP: 0010:__sev_snp_shutdown_locked+0x2e/0x150
Code: 00 55 48 89 e5 41 57 41 56 41 54 53 48 83 ec 10 41 89 f7 49 89 fe 65 48 8b 04 25 28 00 00 00 48 89 45 d8 48 8b 05 6a 5a 7f 06 <4c> 8b a0 f0 00 00 00 41 0f b6 9c 24 a2 00 00 00 48 83 fb 02 0f 83
RSP: 0018:ffffb2ea4014b7b8 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff9e4acd2e0a28 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffb2ea4014b808
RBP: ffffb2ea4014b7e8 R08: 0000000000000106 R09: 000000000003d9c0
R10: 0000000000000001 R11: ffffffffa39ff070 R12: ffff9e49d40590c8
R13: 0000000000000000 R14: ffffb2ea4014b808 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff9e58b1e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000f0 CR3: 0000000418a3e001 CR4: 0000000000770ef0
PKRU: 55555554
Call Trace:
<TASK>
? __die_body+0x6f/0xb0
? __die+0xcc/0xf0
? page_fault_oops+0x330/0x3a0
? save_trace+0x2a5/0x360
? do_user_addr_fault+0x583/0x630
? exc_page_fault+0x81/0x120
? asm_exc_page_fault+0x2b/0x30
? __sev_snp_shutdown_locked+0x2e/0x150
__sev_firmware_shutdown+0x349/0x5b0
? pm_runtime_barrier+0x66/0xe0
sev_dev_destroy+0x34/0xb0
psp_dev_destroy+0x27/0x60
sp_destroy+0x39/0x90
sp_pci_remove+0x22/0x60
pci_device_remove+0x4e/0x110
really_probe+0x271/0x4e0
__driver_probe_device+0x8f/0x160
driver_probe_device+0x24/0x120
__driver_attach+0xc7/0x280
? driver_attach+0x30/0x30
bus_for_each_dev+0x10d/0x130
driver_attach+0x22/0x30
bus_add_driver+0x171/0x2b0
? unaccepted_memory_init_kdump+0x20/0x20
driver_register+0x67/0x100
__pci_register_driver+0x83/0x90
sp_pci_init+0x22/0x30
sp_mod_init+0x13/0x30
do_one_initcall+0xb8/0x290
? sched_clock_noinstr+0xd/0x10
? local_clock_noinstr+0x3e/0x100
? stack_depot_save_flags+0x21e/0x6a0
? local_clock+0x1c/0x60
? stack_depot_save_flags+0x21e/0x6a0
? sched_clock_noinstr+0xd/0x10
? local_clock_noinstr+0x3e/0x100
? __lock_acquire+0xd90/0xe30
? sched_clock_noinstr+0xd/0x10
? local_clock_noinstr+0x3e/0x100
? __create_object+0x66/0x100
? local_clock+0x1c/0x60
? __create_object+0x66/0x100
? parameq+0x1b/0x90
? parse_one+0x6d/0x1d0
? parse_args+0xd7/0x1f0
? do_initcall_level+0x180/0x180
do_initcall_level+0xb0/0x180
do_initcalls+0x60/0xa0
? kernel_init+0x1f/0x1d0
do_basic_setup+0x41/0x50
kernel_init_freeable+0x1ac/0x230
? rest_init+0x1f0/0x1f0
kernel_init+0x1f/0x1d0
? rest_init+0x1f0/0x1f0
ret_from_fork+0x3d/0x50
? rest_init+0x1f0/0x1f0
ret_from_fork_asm+0x11/0x20
</TASK>
Modules linked in:
CR2: 00000000000000f0
---[ end trace 0000000000000000 ]---
RIP: 0010:__sev_snp_shutdown_locked+0x2e/0x150
Code: 00 55 48 89 e5 41 57 41 56 41 54 53 48 83 ec 10 41 89 f7 49 89 fe 65 48 8b 04 25 28 00 00 00 48 89 45 d8 48 8b 05 6a 5a 7f 06 <4c> 8b a0 f0 00 00 00 41 0f b6 9c 24 a2 00 00 00 48 83 fb 02 0f 83
RSP: 0018:ffffb2ea4014b7b8 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff9e4acd2e0a28 RCX: 0000000000000000
RDX: 0000000
---truncated---
### Affected Products
**Linux - Linux**
Affected versions:
- 1ca5614b84eed5904f65f143e0e7aaab0ac4c6b2 (Status: affected)
- 1ca5614b84eed5904f65f143e0e7aaab0ac4c6b2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.9 (Status: affected)
- 0 (Status: unaffected)
- 6.10.3 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/bbf2c94503f6a421ed9b79e300d8085810da765d)
2. [](https://git.kernel.org/stable/c/468e3295774d0edce15f4ae475913b5076dd4f40) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21248, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21248 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21248
- **State**: PUBLISHED
- **Published Date**: October 15, 2024 at 19:52 UTC
- **Last Updated**: March 13, 2025 at 16:24 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.22 and prior to 7.1.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L).
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L`
### Affected Products
**Oracle Corporation - Oracle VM VirtualBox**
Affected versions:
- * (Status: affected)
- * (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18824, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18824
- **State**: PUBLISHED
- **Published Date**: April 25, 2019 at 19:50 UTC
- **Last Updated**: August 05, 2024 at 11:23 UTC
- **Reserved Date**: October 29, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WolfCMS v0.8.3.1 allows XSS via an SVG file to /?/admin/plugin/file_manager/browse/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.linkedin.com/in/subodh-kumar-8a00b1125/)
2. [](https://twitter.com/Subodhk62060242)
3. [](https://github.com/s-kustm)
4. [](https://github.com/s-kustm/Subodh/blob/master/CVE-2018-18824.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3222, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3222 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3222
- **State**: PUBLISHED
- **Published Date**: October 13, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 03:03 UTC
- **Reserved Date**: September 03, 2010 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Stack-based buffer overflow in the Remote Procedure Call Subsystem (RPCSS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted LPC message that requests an LRPC connection from an LPC server to a client, aka "LPC Message Buffer Overrun Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS10-084](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-084)
2. [oval:org.mitre.oval:def:7175](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7175)
3. [1024553](http://www.securitytracker.com/id?1024553)
4. [TA10-285A](http://www.us-cert.gov/cas/techalerts/TA10-285A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40838
- **State**: PUBLISHED
- **Published Date**: August 30, 2023 at 00:00 UTC
- **Last Updated**: October 01, 2024 at 20:13 UTC
- **Reserved Date**: August 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin function 'sub_3A1D0' contains a command execution vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/cmd/1/1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29213, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29213 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29213
- **State**: PUBLISHED
- **Published Date**: November 01, 2021 at 13:17 UTC
- **Last Updated**: August 03, 2024 at 22:02 UTC
- **Reserved Date**: March 25, 2021 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A potential local bypass of security restrictions vulnerability has been identified in HPE ProLiant DL20 Gen10, HPE ProLiant ML30 Gen10, and HPE ProLiant MicroServer Gen10 Plus server's system ROMs prior to version 2.52. The vulnerability could be locally exploited to cause disclosure of sensitive information, denial of service (DoS), and/or compromise system integrity.
### Affected Products
**n/a - HPE ProLiant ML30 Gen10 Server; HPE ProLiant DL20 Gen10 Server; HPE ProLiant MicroServer Gen10 Plus**
Affected versions:
- Prior to system ROM v2.52 (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04197en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23275, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23275 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23275
- **State**: PUBLISHED
- **Published Date**: March 08, 2024 at 01:36 UTC
- **Last Updated**: March 27, 2025 at 14:29 UTC
- **Reserved Date**: January 12, 2024 at 22:22 UTC
- **Assigned By**: apple
### Vulnerability Description
A race condition was addressed with additional validation. This issue is fixed in macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. An app may be able to access protected user data.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT214083)
2. [](https://support.apple.com/en-us/HT214085)
3. [](https://support.apple.com/en-us/HT214084)
4. [](http://seclists.org/fulldisclosure/2024/Mar/21)
5. [](http://seclists.org/fulldisclosure/2024/Mar/22)
6. [](http://seclists.org/fulldisclosure/2024/Mar/23) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42805, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42805
- **State**: PUBLISHED
- **Published Date**: September 21, 2023 at 16:39 UTC
- **Last Updated**: September 24, 2024 at 15:03 UTC
- **Reserved Date**: September 14, 2023 at 16:13 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
quinn-proto is a state machine for the QUIC transport protocol. Prior to versions 0.9.5 and 0.10.5, receiving unknown QUIC frames in a QUIC packet could result in a panic. The problem has been fixed in 0.9.5 and 0.10.5 maintenance releases.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**quinn-rs - quinn**
Affected versions:
- < 0.9.5 (Status: affected)
- >= 0.10.0, < 0.10.5 (Status: affected)
### References
1. [https://github.com/quinn-rs/quinn/security/advisories/GHSA-q8wc-j5m9-27w3](https://github.com/quinn-rs/quinn/security/advisories/GHSA-q8wc-j5m9-27w3)
2. [https://github.com/quinn-rs/quinn/pull/1667](https://github.com/quinn-rs/quinn/pull/1667)
3. [https://github.com/quinn-rs/quinn/pull/1668](https://github.com/quinn-rs/quinn/pull/1668)
4. [https://github.com/quinn-rs/quinn/pull/1669](https://github.com/quinn-rs/quinn/pull/1669) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1612, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1612 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1612
- **State**: PUBLISHED
- **Published Date**: May 16, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:59 UTC
- **Reserved Date**: May 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in read.php in Open Bulletin Board (OpenBB) 1.0.8 allows remote attackers to execute arbitrary SQL commands via the TID parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [13624](http://www.securityfocus.com/bid/13624)
2. [20050513 OpenBB SQL Injection & Cross-site Scripting Vulnerability](http://marc.info/?l=bugtraq&m=111601780332632&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44079, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44079
- **State**: PUBLISHED
- **Published Date**: October 31, 2022 at 00:00 UTC
- **Last Updated**: May 06, 2025 at 18:49 UTC
- **Reserved Date**: October 30, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
pycdc commit 44a730f3a889503014fec94ae6e62d8401cb75e5 was discovered to contain a stack overflow via the component __sanitizer::StackDepotBase<__sanitizer::StackDepotNode.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/zrax/pycdc/issues/291) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2996, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2996 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2996
- **State**: PUBLISHED
- **Published Date**: June 08, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 05:32 UTC
- **Reserved Date**: April 07, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)](http://seclists.org/fulldisclosure/2015/Jun/8)
2. [20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)](http://www.securityfocus.com/archive/1/535679/100/0/threaded)
3. [](http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html)
4. [75038](http://www.securityfocus.com/bid/75038)
5. [](https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41781, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41781 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41781
- **State**: PUBLISHED
- **Published Date**: November 18, 2022 at 19:00 UTC
- **Last Updated**: February 20, 2025 at 19:52 UTC
- **Reserved Date**: October 19, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Broken Access Control vulnerability in Permalink Manager Lite plugin <= 2.2.20 on WordPress.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**Maciej Bis - Permalink Manager Lite**
Affected versions:
- <= 2.2.20 (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/permalink-manager/wordpress-permalink-manager-lite-plugin-2-2-20-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Vulnerability discovered by Tien Nguyen Anh (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41849, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41849 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41849
- **State**: PUBLISHED
- **Published Date**: August 23, 2024 at 16:53 UTC
- **Last Updated**: October 07, 2024 at 13:59 UTC
- **Reserved Date**: July 22, 2024 at 17:16 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.20 and earlier are affected by an Improper Input Validation vulnerability that could lead to a security feature bypass. An low-privileged attacker could leverage this vulnerability to slightly affect the integrity of the page. Exploitation of this issue requires user interaction and scope is changed.
### CVSS Metrics
- **CVSS Base Score**: 4.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20239, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20239 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20239
- **State**: REJECTED
- **Published Date**: May 22, 2024 at 16:51 UTC
- **Last Updated**: February 13, 2025 at 16:39 UTC
- **Reserved Date**: October 27, 2022 at 18:47 UTC
- **Assigned By**: cisco
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1487, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1487 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1487
- **State**: PUBLISHED
- **Published Date**: April 11, 2011 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 22:28 UTC
- **Reserved Date**: March 21, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=692844)
2. [SUSE-SR:2011:009](http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html)
3. [FEDORA-2011-4610](http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057891.html)
4. [44168](http://secunia.com/advisories/44168)
5. [43921](http://secunia.com/advisories/43921)
6. [DSA-2265](http://www.debian.org/security/2011/dsa-2265)
7. [FEDORA-2011-4631](http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057971.html)
8. [](http://rt.perl.org/rt3/Public/Bug/Display.html?id=87336)
9. [47124](http://www.securityfocus.com/bid/47124)
10. [[oss-security] 20110404 Re: CVE Request -- perl -- lc(), uc() routines are laundering tainted data](http://openwall.com/lists/oss-security/2011/04/04/35)
11. [](http://perl5.git.perl.org/perl.git/commit/539689e74a3bcb04d29e4cd9396de91a81045b99)
12. [](https://bugzilla.redhat.com/show_bug.cgi?id=692898)
13. [MDVSA-2011:091](http://www.mandriva.com/security/advisories?name=MDVSA-2011:091)
14. [perl-laundering-security-bypass(66528)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66528)
15. [[oss-security] 20110401 CVE Request -- perl -- lc(), uc() routines are laundering tainted data](http://openwall.com/lists/oss-security/2011/04/01/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38593, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38593 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38593
- **State**: PUBLISHED
- **Published Date**: June 19, 2024 at 13:45 UTC
- **Last Updated**: May 04, 2025 at 09:14 UTC
- **Reserved Date**: June 18, 2024 at 19:36 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: micrel: Fix receiving the timestamp in the frame for lan8841
The blamed commit started to use the ptp workqueue to get the second
part of the timestamp. And when the port was set down, then this
workqueue is stopped. But if the config option NETWORK_PHY_TIMESTAMPING
is not enabled, then the ptp_clock is not initialized so then it would
crash when it would try to access the delayed work.
So then basically by setting up and then down the port, it would crash.
The fix consists in checking if the ptp_clock is initialized and only
then cancel the delayed work.
### Affected Products
**Linux - Linux**
Affected versions:
- cc75549548482ed653c23f212544e58cb38ea980 (Status: affected)
- cc75549548482ed653c23f212544e58cb38ea980 (Status: affected)
- cc75549548482ed653c23f212544e58cb38ea980 (Status: affected)
- cc75549548482ed653c23f212544e58cb38ea980 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.5 (Status: affected)
- 0 (Status: unaffected)
- 6.6.33 (Status: unaffected)
- 6.8.12 (Status: unaffected)
- 6.9.3 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/3ddf170e4a604f5d4d9459a36993f5e92b53e8b0)
2. [](https://git.kernel.org/stable/c/3fd4282d5f25c3c97fef3ef0b89b82ef4e2bc975)
3. [](https://git.kernel.org/stable/c/64a47cf634ae44e92be24ebc982410841093bd7b)
4. [](https://git.kernel.org/stable/c/aea27a92a41dae14843f92c79e9e42d8f570105c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16514, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16514
- **State**: PUBLISHED
- **Published Date**: January 10, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 20:27 UTC
- **Reserved Date**: November 03, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple persistent stored Cross-Site-Scripting (XSS) vulnerabilities in the files /wb/admin/admintools/tool.php (Droplet Description) and /install/index.php (Site Title) in WebsiteBaker 2.10.0 allow attackers to insert persistent JavaScript code that gets reflected back to users in multiple areas in the application.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/anonymous/13df19c04c7e86c0f5256b91376d593a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0900, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0900
- **State**: PUBLISHED
- **Published Date**: March 29, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:28 UTC
- **Reserved Date**: March 29, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
marks.php in NukeBookmarks 0.6 for PHP-Nuke allows remote attackers to obtain sensitive information via an invalid (1) file or (2) category parameter, which reveal the path in an error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://nukebookmarks.sourceforge.net/)
2. [](http://zone-h.org/advisories/read/id=7356)
3. [20050325 ZH2005-03SA -- multiple vulnerabilities in NukeBookmarks .6](http://marc.info/?l=bugtraq&m=111186145609320&w=2) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.