System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13203, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13203 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13203 - **State**: PUBLISHED - **Published Date**: January 12, 2018 at 23:00 UTC - **Last Updated**: September 16, 2024 at 20:17 UTC - **Reserved Date**: August 23, 2017 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description An information disclosure vulnerability in the Android media framework (libavc). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-63122634. ### Affected Products **Google Inc. - Android** Affected versions: - 7.0 (Status: affected) - 7.1.1 (Status: affected) - 7.1.2 (Status: affected) - 8.0 (Status: affected) - 8.1 (Status: affected) ### References 1. [](https://android.googlesource.com/platform/external/libavc/+/e86d3cfd2bc28dac421092106751e5638d54a848) 2. [](https://source.android.com/security/bulletin/pixel/2018-01-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2629 - **State**: PUBLISHED - **Published Date**: May 10, 2023 at 00:00 UTC - **Last Updated**: January 27, 2025 at 19:40 UTC - **Reserved Date**: May 10, 2023 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Improper Neutralization of Formula Elements in a CSV File in GitHub repository pimcore/customer-data-framework prior to 3.3.9. ### Weakness Classification (CWE) - CWE-1236: Security Weakness ### Affected Products **pimcore - pimcore/customer-data-framework** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/821ff465-4754-42d1-9376-813c17f16a01) 2. [](https://github.com/pimcore/customer-data-framework/commit/4e0105c3a78d20686a0c010faef27d2297b98803)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18860, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18860 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18860 - **State**: PUBLISHED - **Published Date**: March 20, 2020 at 20:32 UTC - **Last Updated**: August 05, 2024 at 02:02 UTC - **Reserved Date**: November 11, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Squid before 4.9, when certain web browsers are used, mishandles HTML in the host (aka hostname) parameter to cachemgr.cgi. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/squid-cache/squid/pull/504) 2. [](https://github.com/squid-cache/squid/pull/505) 3. [openSUSE-SU-2020:0623](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html) 4. [USN-4356-1](https://usn.ubuntu.com/4356-1/) 5. [[debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update](https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html) 6. [DSA-4732](https://www.debian.org/security/2020/dsa-4732)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6193, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6193 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6193 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: August 14, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22240, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22240 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22240 - **State**: PUBLISHED - **Published Date**: October 18, 2022 at 02:46 UTC - **Last Updated**: May 09, 2025 at 15:37 UTC - **Reserved Date**: December 21, 2021 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description An Allocation of Resources Without Limits or Throttling and a Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated low privileged attacker to cause a Denial of Sevice (DoS). In a high-scaled BGP routing environment with rib-sharding enabled, two issues may occur when executing a specific CLI command. One is a memory leak issue with rpd where the leak rate is not constant, and the other is a temporary spike in rpd memory usage during command execution. This issue affects: Juniper Networks Junos OS 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R1-S2, 21.2R2-S1, 21.2R3; 21.3 versions prior to 21.3R2. Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S1-EVO; 21.1-EVO version 21.1R1-EVO and later versions; 21.2-EVO versions prior to 21.2R1-S2-EVO, 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO. This issue does not affect Juniper Networks Junos OS versions prior to 19.2R1. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-770: Security Weakness - CWE-401: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - unspecified (Status: unaffected) - 19.4 (Status: affected) - 20.2 (Status: affected) - 20.3 (Status: affected) - 20.4 (Status: affected) - 21.1 (Status: affected) - 21.2 (Status: affected) - 21.3 (Status: affected) **Juniper Networks - Junos OS Evolved** Affected versions: - unspecified (Status: affected) - 21.1R1-EVO (Status: affected) - 21.2-EVO (Status: affected) - 21.3-EVO (Status: affected) ### References 1. [](https://kb.juniper.net/JSA69896)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30527, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30527 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30527 - **State**: PUBLISHED - **Published Date**: June 07, 2021 at 19:25 UTC - **Last Updated**: August 03, 2024 at 22:32 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in WebUI in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html) 2. [](https://crbug.com/1199198) 3. [GLSA-202107-06](https://security.gentoo.org/glsa/202107-06) 4. [FEDORA-2021-f94dadff78](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/) 5. [FEDORA-2021-ca58c57bdf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8271, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8271 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8271 - **State**: PUBLISHED - **Published Date**: November 16, 2020 at 00:32 UTC - **Last Updated**: August 04, 2024 at 09:56 UTC - **Reserved Date**: January 28, 2020 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description Unauthenticated remote code execution with root privileges in Citrix SD-WAN Center versions before 11.2.2, 11.1.2b and 10.2.8 ### Weakness Classification (CWE) - CWE-23: Security Weakness ### Affected Products **n/a - Citrix SD-WAN Center** Affected versions: - Fixed in 11.2.2, 11.1.2b and 10.2.8 (Status: affected) ### References 1. [](https://support.citrix.com/article/CTX285061)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9233, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9233 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9233 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 06, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-23803, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-23803 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-23803 - **State**: PUBLISHED - **Published Date**: July 11, 2023 at 06:49 UTC - **Last Updated**: October 07, 2024 at 18:57 UTC - **Reserved Date**: January 18, 2023 at 09:27 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in HasThemes JustTables plugin <= 1.4.9 versions. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **HasThemes - JustTables** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/just-tables/wordpress-justtables-woocommerce-product-table-plugin-1-4-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Lana Codes (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37718, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37718 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37718 - **State**: PUBLISHED - **Published Date**: September 07, 2021 at 12:32 UTC - **Last Updated**: August 04, 2024 at 01:23 UTC - **Reserved Date**: July 29, 2021 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A remote arbitrary command execution vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.4-2.2.0.6; Prior to 8.7.1.4, 8.6.0.7, 8.5.0.12, 8.3.0.16. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability. ### Affected Products **n/a - Aruba SD-WAN Software and Gateways; Aruba Operating System Software** Affected versions: - Prior to 8.6.0.4-2.2.0.6 (Status: affected) - Prior to 8.7.1.4, 8.6.0.7, 8.5.0.12, 8.3.0.16 (Status: affected) ### References 1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt) 2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-280624.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42273 - **State**: PUBLISHED - **Published Date**: August 17, 2024 at 08:54 UTC - **Last Updated**: May 04, 2025 at 12:57 UTC - **Reserved Date**: July 30, 2024 at 07:40 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: f2fs: assign CURSEG_ALL_DATA_ATGC if blkaddr is valid mkdir /mnt/test/comp f2fs_io setflags compression /mnt/test/comp dd if=/dev/zero of=/mnt/test/comp/testfile bs=16k count=1 truncate --size 13 /mnt/test/comp/testfile In the above scenario, we can get a BUG_ON. kernel BUG at fs/f2fs/segment.c:3589! Call Trace: do_write_page+0x78/0x390 [f2fs] f2fs_outplace_write_data+0x62/0xb0 [f2fs] f2fs_do_write_data_page+0x275/0x740 [f2fs] f2fs_write_single_data_page+0x1dc/0x8f0 [f2fs] f2fs_write_multi_pages+0x1e5/0xae0 [f2fs] f2fs_write_cache_pages+0xab1/0xc60 [f2fs] f2fs_write_data_pages+0x2d8/0x330 [f2fs] do_writepages+0xcf/0x270 __writeback_single_inode+0x44/0x350 writeback_sb_inodes+0x242/0x530 __writeback_inodes_wb+0x54/0xf0 wb_writeback+0x192/0x310 wb_workfn+0x30d/0x400 The reason is we gave CURSEG_ALL_DATA_ATGC to COMPR_ADDR where the page was set the gcing flag by set_cluster_dirty(). ### Affected Products **Linux - Linux** Affected versions: - 7c972c89457511007dfc933814c06786905e515c (Status: affected) - 417b8a91f4e8831cadaf85c3f15c6991c1f54dde (Status: affected) - 4961acdd65c956e97c1a000c82d91a8c1cdbe44b (Status: affected) - 4961acdd65c956e97c1a000c82d91a8c1cdbe44b (Status: affected) - 7ea0f29d9fd84905051be020c0df7d557e286136 (Status: affected) - b8094c0f1aae329b1c60a275a780d6c2c9ff7aa3 (Status: affected) **Linux - Linux** Affected versions: - 6.8 (Status: affected) - 0 (Status: unaffected) - 6.1.104 (Status: unaffected) - 6.6.45 (Status: unaffected) - 6.10.4 (Status: unaffected) - 6.11 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/5fd057160ab240dd816ae09b625395d54c297de1) 2. [](https://git.kernel.org/stable/c/4239571c5db46a42f723b8fa8394039187c34439) 3. [](https://git.kernel.org/stable/c/0cd106612396656d6f1ca17ef192c6759bb60791) 4. [](https://git.kernel.org/stable/c/8cb1f4080dd91c6e6b01dbea013a3f42341cb6a1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4454, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4454 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4454 - **State**: PUBLISHED - **Published Date**: June 17, 2015 at 18:00 UTC - **Last Updated**: August 06, 2024 at 06:18 UTC - **Reserved Date**: June 09, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the get_hash_graph_template function in lib/functions.php in Cacti before 0.8.8d allows remote attackers to execute arbitrary SQL commands via the graph_template_id parameter to graph_templates.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2016-a8e2be0fe6](http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183449.html) 2. [](http://www.cacti.net/release_notes_0_8_8d.php) 3. [](http://bugs.cacti.net/view.php?id=2572) 4. [FEDORA-2016-852a39e085](http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183919.html) 5. [75270](http://www.securityfocus.com/bid/75270) 6. [DSA-3295](http://www.debian.org/security/2015/dsa-3295) 7. [FEDORA-2016-4a5ce6a6c0](http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183454.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0576, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0576 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0576 - **State**: PUBLISHED - **Published Date**: February 13, 2022 at 23:40 UTC - **Last Updated**: August 02, 2024 at 23:32 UTC - **Reserved Date**: February 12, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **librenms - librenms/librenms** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/114ba055-a2f0-4db9-aafb-95df944ba177) 2. [](https://github.com/librenms/librenms/commit/135717a9a05c5bf8921f1389cbb469dcbf300bfd) 3. [](https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-1534, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-1534 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-1534 - **State**: PUBLISHED - **Published Date**: June 11, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 09:42 UTC - **Reserved Date**: January 16, 2014 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [59229](http://secunia.com/advisories/59229) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1000960) 3. [openSUSE-SU-2014:0819](http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html) 4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1000598) 5. [SUSE-SU-2014:0824](http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html) 6. [59387](http://secunia.com/advisories/59387) 7. [](http://www.mozilla.org/security/announce/2014/mfsa2014-48.html) 8. [](https://bugzilla.mozilla.org/show_bug.cgi?id=996536) 9. [1030388](http://www.securitytracker.com/id/1030388) 10. [](https://bugzilla.mozilla.org/show_bug.cgi?id=973874) 11. [59052](http://secunia.com/advisories/59052) 12. [openSUSE-SU-2014:0855](http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html) 13. [openSUSE-SU-2014:0797](http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html) 14. [GLSA-201504-01](https://security.gentoo.org/glsa/201504-01) 15. [59866](http://secunia.com/advisories/59866) 16. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html) 17. [openSUSE-SU-2014:0858](http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html) 18. [](https://bugzilla.mozilla.org/show_bug.cgi?id=995817) 19. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1007223) 20. [59377](http://secunia.com/advisories/59377) 21. [USN-2243-1](http://www.ubuntu.com/usn/USN-2243-1) 22. [](https://bugzilla.mozilla.org/show_bug.cgi?id=995816) 23. [1030386](http://www.securitytracker.com/id/1030386) 24. [](https://bugzilla.mozilla.org/show_bug.cgi?id=990868) 25. [](https://bugzilla.mozilla.org/show_bug.cgi?id=969549) 26. [59425](http://secunia.com/advisories/59425) 27. [](https://bugzilla.mozilla.org/show_bug.cgi?id=978652) 28. [59171](http://secunia.com/advisories/59171) 29. [](https://bugzilla.mozilla.org/show_bug.cgi?id=969517) 30. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1005578) 31. [59486](http://secunia.com/advisories/59486) 32. [67964](http://www.securityfocus.com/bid/67964) 33. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1002340)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0613, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0613 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0613 - **State**: PUBLISHED - **Published Date**: February 04, 2000 at 05:00 UTC - **Last Updated**: August 01, 2024 at 16:41 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The rpc.sprayd service is running. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.cve.org/CVERecord?id=CVE-1999-0613)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-28814, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-28814 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-28814 - **State**: PUBLISHED - **Published Date**: June 11, 2021 at 06:35 UTC - **Last Updated**: September 17, 2024 at 03:58 UTC - **Reserved Date**: March 18, 2021 at 00:00 UTC - **Assigned By**: qnap ### Vulnerability Description An improper access control vulnerability has been reported to affect QNAP NAS. If exploited, this vulnerability allows remote attackers to compromise the security of the software. This issue affects: QNAP Systems Inc. Helpdesk versions prior to 3.0.4. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **QNAP Systems Inc. - Helpdesk** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.qnap.com/zh-tw/security-advisory/qsa-21-25) ### Credits - Thomas FADY
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5416, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5416 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5416 - **State**: PUBLISHED - **Published Date**: November 22, 2023 at 15:33 UTC - **Last Updated**: October 11, 2024 at 18:05 UTC - **Reserved Date**: October 04, 2023 at 20:35 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_delete_category function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete categories. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Affected Products **funnelforms - Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/992fc98f-4b23-4596-81fb-5543d82fd615?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/2986938/funnelforms-free) ### Credits - Alex Thomas
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20787, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20787 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20787 - **State**: PUBLISHED - **Published Date**: April 21, 2022 at 18:50 UTC - **Last Updated**: November 06, 2024 at 16:22 UTC - **Reserved Date**: November 02, 2021 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) Software and Cisco Unified CM Session Management Edition (SME) Software could allow an authenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. ### CVSS Metrics - **CVSS Base Score**: 5.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Cisco - Cisco Unified Communications Manager** Affected versions: - n/a (Status: affected) ### References 1. [20220420 Cisco Unified Communications Products Cross-Site Request Forgery Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-csrf-jrKP4eNT)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-1139, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-1139 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-1139 - **State**: PUBLISHED - **Published Date**: March 15, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:44 UTC - **Reserved Date**: March 15, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in ASCII NT WinWrapper Professional allows remote attackers to read arbitrary files via a .. (dot dot) in the server request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [3219](http://www.securityfocus.com/bid/3219) 2. [winwrapper-dot-directory-traversal(7015)](http://www.iss.net/security_center/static/7015.php) 3. [20010822 [SNS Advisory No.39] WinWrapper Professional 2.0 Remote Arbitrary File Disclosure Vulnerability](http://www.securityfocus.com/archive/1/209414) 4. [](http://www.tsc.ant.co.jp/products/download.htm)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2825, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2825 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2825 - **State**: PUBLISHED - **Published Date**: August 13, 2010 at 20:00 UTC - **Last Updated**: September 17, 2024 at 00:15 UTC - **Reserved Date**: July 23, 2010 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Unspecified vulnerability in the SIP inspection feature on the Cisco Application Control Engine (ACE) Module with software A2(1.x) before A2(1.6), A2(2.x) before A2(2.3), and A2(3.x) before A2(3.1) for Catalyst 6500 series switches and 7600 series routers, and the Cisco Application Control Engine (ACE) 4710 appliance with software before A3(2.4), allows remote attackers to cause a denial of service (device reload) via crafted SIP packets over (1) TCP or (2) UDP, aka Bug IDs CSCta65603 and CSCta71569. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20100811 Multiple Vulnerabilities in the Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine](http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4091d.shtml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19223, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19223 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19223 - **State**: PUBLISHED - **Published Date**: November 12, 2018 at 20:00 UTC - **Last Updated**: September 16, 2024 at 23:31 UTC - **Reserved Date**: November 12, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in LAOBANCMS 2.0. It allows XSS via the first input field to the admin/type.php?id=1 URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/AvaterXXX/laobanCMS/blob/master/1.md#xss2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38086, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38086 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38086 - **State**: PUBLISHED - **Published Date**: July 09, 2024 at 17:02 UTC - **Last Updated**: May 05, 2025 at 17:01 UTC - **Reserved Date**: June 11, 2024 at 22:36 UTC - **Assigned By**: microsoft ### Vulnerability Description Azure Kinect SDK Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-197: Security Weakness ### Affected Products **Microsoft - Azure Kinect SDK** Affected versions: - 1.0.0 (Status: affected) ### References 1. [Azure Kinect SDK Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38086)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6469, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6469 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6469 - **State**: PUBLISHED - **Published Date**: September 25, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 07:22 UTC - **Reserved Date**: August 17, 2015 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description The interpreter in IBC Solar ServeMaster TLP+ and Danfoss TLX Pro+ allows remote attackers to discover script source code via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-15-265-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3509, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3509 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3509 - **State**: PUBLISHED - **Published Date**: August 13, 2014 at 23:00 UTC - **Last Updated**: August 06, 2024 at 10:43 UTC - **Reserved Date**: May 14, 2014 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openSUSE-SU-2014:1052](http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1127498) 3. [](http://linux.oracle.com/errata/ELSA-2014-1052.html) 4. [60221](http://secunia.com/advisories/60221) 5. [](http://www-01.ibm.com/support/docview.wss?uid=swg21682293) 6. [61184](http://secunia.com/advisories/61184) 7. [SSRT101846](http://marc.info/?l=bugtraq&m=142660345230545&w=2) 8. [60022](http://secunia.com/advisories/60022) 9. [](https://www.openssl.org/news/secadv_20140806.txt) 10. [61017](http://secunia.com/advisories/61017) 11. [RHSA-2015:0197](http://rhn.redhat.com/errata/RHSA-2015-0197.html) 12. [SSRT101818](http://marc.info/?l=bugtraq&m=142350350616251&w=2) 13. [](http://www-01.ibm.com/support/docview.wss?uid=swg21683389) 14. [HPSBMU03304](http://marc.info/?l=bugtraq&m=142791032306609&w=2) 15. [](http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm) 16. [69084](http://www.securityfocus.com/bid/69084) 17. [](https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=fb0bc2b273bcc2d5401dd883fe869af4fc74bb21) 18. [GLSA-201412-39](http://security.gentoo.org/glsa/glsa-201412-39.xml) 19. [HPSBHF03293](http://marc.info/?l=bugtraq&m=142660345230545&w=2) 20. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888) 21. [HPSBMU03260](http://marc.info/?l=bugtraq&m=142495837901899&w=2) 22. [60803](http://secunia.com/advisories/60803) 23. [59700](http://secunia.com/advisories/59700) 24. [FEDORA-2014-9308](http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html) 25. [1030693](http://www.securitytracker.com/id/1030693) 26. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380) 27. [60917](http://secunia.com/advisories/60917) 28. [HPSBMU03216](http://marc.info/?l=bugtraq&m=142350350616251&w=2) 29. [NetBSD-SA2014-008](ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc) 30. [60493](http://secunia.com/advisories/60493) 31. [59710](http://secunia.com/advisories/59710) 32. [60921](http://secunia.com/advisories/60921) 33. [](http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240) 34. [61100](http://secunia.com/advisories/61100) 35. [FreeBSD-SA-14:18](https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc) 36. [61775](http://secunia.com/advisories/61775) 37. [SSRT101894](http://marc.info/?l=bugtraq&m=142495837901899&w=2) 38. [DSA-2998](http://www.debian.org/security/2014/dsa-2998) 39. [HPSBMU03263](http://marc.info/?l=bugtraq&m=143290437727362&w=2) 40. [FEDORA-2014-9301](http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html) 41. [openssl-cve20143509-dos(95159)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95159) 42. [61959](http://secunia.com/advisories/61959) 43. [59756](http://secunia.com/advisories/59756) 44. [HPSBMU03267](http://marc.info/?l=bugtraq&m=142624590206005&w=2) 45. [HPSBMU03261](http://marc.info/?l=bugtraq&m=143290522027658&w=2) 46. [](http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc) 47. [58962](http://secunia.com/advisories/58962) 48. [60938](http://secunia.com/advisories/60938) 49. [60684](http://secunia.com/advisories/60684) 50. [](https://support.citrix.com/article/CTX216642) 51. [[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released](https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html) 52. [](https://techzone.ergon.ch/CVE-2014-3511) 53. [MDVSA-2014:158](http://www.mandriva.com/security/advisories?name=MDVSA-2014:158) 54. [](http://www-01.ibm.com/support/docview.wss?uid=swg21686997) 55. [61139](http://secunia.com/advisories/61139)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16001, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16001 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16001 - **State**: PUBLISHED - **Published Date**: November 06, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 20:13 UTC - **Reserved Date**: October 29, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 5.0.1, a local attacker or malware can silently subvert the plugin update process in order to escalate to root privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [43220](https://www.exploit-db.com/exploits/43220/) 2. [](https://m4.rkw.io/blog/cve201716001-local-root-privesc-in-hashicorp-vagrantvmwarefusion-501.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43202, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43202 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43202 - **State**: PUBLISHED - **Published Date**: September 20, 2023 at 00:00 UTC - **Last Updated**: September 24, 2024 at 18:08 UTC - **Reserved Date**: September 18, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description D-LINK DWL-6610 FW_v_4.3.0.8B003C was discovered to contain a command injection vulnerability in the function pcap_download_handler. This vulnerability allows attackers to execute arbitrary commands via the update.device.packet-capture.tftp-file-name parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Archerber/bug_submit/blob/main/D-Link/DWL-6610/bug4.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0818, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0818 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0818 - **State**: PUBLISHED - **Published Date**: September 15, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 00:59 UTC - **Reserved Date**: March 02, 2010 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The MPEG-4 codec in the Windows Media codecs in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 does not properly handle crafted media content with MPEG-4 video encoding, which allows remote attackers to execute arbitrary code via a file in an unspecified "supported format," aka "MPEG-4 Codec Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:7318](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7318) 2. [MS10-062](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-062)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9151, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9151 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9151 - **State**: PUBLISHED - **Published Date**: May 23, 2017 at 03:56 UTC - **Last Updated**: September 16, 2024 at 19:30 UTC - **Reserved Date**: May 22, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description libautotrace.a in AutoTrace 0.31.1 has a heap-based buffer overflow in the pnm_load_ascii function in input-pnm.c:303:12. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3391, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3391 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3391 - **State**: PUBLISHED - **Published Date**: April 21, 2015 at 18:00 UTC - **Last Updated**: August 06, 2024 at 05:47 UTC - **Reserved Date**: April 21, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Path Breadcrumbs module before 7.x-3.2 for Drupal allows remote attackers to bypass intended access restrictions and obtain sensitive node titles by reading a 403 Not Found page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [72569](http://www.securityfocus.com/bid/72569) 2. [](https://www.drupal.org/node/2420139) 3. [pathbreadcrum-drupal-node-sec-bypass(100672)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100672) 4. [[oss-security] 20150205 CVE requests for Drupal contributed modules](http://www.openwall.com/lists/oss-security/2015/02/05/16) 5. [](https://www.drupal.org/node/2420121)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23760, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23760 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23760 - **State**: PUBLISHED - **Published Date**: February 12, 2024 at 00:00 UTC - **Last Updated**: March 28, 2025 at 23:12 UTC - **Reserved Date**: January 22, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cleartext Storage of Sensitive Information in Gambio 4.9.2.0 allows attackers to obtain sensitive information via error-handler.log.json and legacy-error-handler.log.txt under the webroot. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://herolab.usd.de/security-advisories/usd-2023-0050/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9899, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9899 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9899 - **State**: PUBLISHED - **Published Date**: October 22, 2020 at 17:59 UTC - **Last Updated**: August 04, 2024 at 10:43 UTC - **Reserved Date**: March 02, 2020 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6. An application may be able to execute arbitrary code with kernel privileges. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/kb/HT211289)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1307, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1307 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1307 - **State**: PUBLISHED - **Published Date**: May 17, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:44 UTC - **Reserved Date**: April 27, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The (1) stopserver.sh and (2) startserver.sh scripts in Adobe Version Cue on Mac OS X uses the current working directory to find and execute the productname.sh script, which allows local users to execute arbitrary code by copying and calling the scripts from a user-controlled directory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [13399](http://secunia.com/advisories/13399) 2. [](http://www.adobe.com/support/techdocs/331621.html) 3. [12297](http://www.osvdb.org/12297) 4. [20041206 Local root exploit on Mac OS X with Adobe Version Cue](http://archives.neohapsis.com/archives/bugtraq/2004-12/0040.html) 5. [1012446](http://securitytracker.com/id?1012446) 6. [11833](http://www.securityfocus.com/bid/11833) 7. [](http://www.securiteam.com/exploits/5EP0D20FQC.html) 8. [12298](http://www.osvdb.org/12298) 9. [20050516 Mac OS X - Adobe Version Cue local root exploit [c version exploit]](http://marc.info/?l=bugtraq&m=111627622403544&w=2) 10. [version-cue-gain-privileges(18445)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18445)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19288, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19288 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19288 - **State**: PUBLISHED - **Published Date**: December 14, 2020 at 21:05 UTC - **Last Updated**: August 05, 2024 at 02:09 UTC - **Reserved Date**: November 26, 2019 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in XHQ (All Versions < 6.1). The web interface could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Siemens - XHQ** Affected versions: - All Versions < 6.1 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-712690.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41294, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41294 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41294 - **State**: PUBLISHED - **Published Date**: October 06, 2022 at 17:15 UTC - **Last Updated**: September 16, 2024 at 16:13 UTC - **Reserved Date**: September 21, 2022 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Robotic Process Automation 21.0.0, 21.0.1, 21.0.2, 21.0.3, and 21.0.4 is vulnerable to cross origin resource sharing using the bot api. IBM X-Force ID: 236807. ### Affected Products **IBM - Robotic Process Automation** Affected versions: - 21.0.0 (Status: affected) - 21.0.1 (Status: affected) - 21.0.2 (Status: affected) - 21.0.3 (Status: affected) - 21.0.4 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6825985) 2. [ibm-rpa-cve202241294-cors (236807)](https://exchange.xforce.ibmcloud.com/vulnerabilities/236807)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-47520, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-47520 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-47520 - **State**: PUBLISHED - **Published Date**: May 07, 2025 at 14:20 UTC - **Last Updated**: May 07, 2025 at 18:19 UTC - **Reserved Date**: May 07, 2025 at 09:39 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Syed Balkhi Charitable allows Stored XSS. This issue affects Charitable: from n/a through 1.8.5.1. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Syed Balkhi - Charitable** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/charitable/vulnerability/wordpress-charitable-1-8-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Nabil Irawan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34837, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34837 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34837 - **State**: PUBLISHED - **Published Date**: August 04, 2021 at 15:16 UTC - **Last Updated**: August 04, 2024 at 00:26 UTC - **Reserved Date**: June 17, 2021 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14018. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Foxit - PDF Reader** Affected versions: - 11.0.0.49893 (Status: affected) ### References 1. [](https://www.foxit.com/support/security-bulletins.html) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-919/) ### Credits - Mat Powell of Trend Micro Zero Day Initiative
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1192, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1192 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1192 - **State**: PUBLISHED - **Published Date**: March 11, 2011 at 01:00 UTC - **Last Updated**: August 06, 2024 at 22:21 UTC - **Reserved Date**: March 03, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Google Chrome before 10.0.648.127 on Linux does not properly handle Unicode ranges, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [46785](http://www.securityfocus.com/bid/46785) 2. [](https://docs.google.com/a/google.com/document/d/1YoJbpG0uTz0TI3VhRPLQxGP6hkOYwpv4t7ZJDofBC-A/edit?hl=en&authkey=CPWzgZAG) 3. [google-unicode-unspecified(65956)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65956) 4. [oval:org.mitre.oval:def:13990](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13990) 5. [](http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html) 6. [](http://code.google.com/p/chromium/issues/detail?id=70779) 7. [ADV-2011-0628](http://www.vupen.com/english/advisories/2011/0628)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26098, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26098 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26098 - **State**: PUBLISHED - **Published Date**: April 10, 2024 at 08:51 UTC - **Last Updated**: October 07, 2024 at 13:20 UTC - **Reserved Date**: February 14, 2024 at 17:37 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22711, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22711 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22711 - **State**: PUBLISHED - **Published Date**: May 10, 2023 at 07:47 UTC - **Last Updated**: January 09, 2025 at 15:20 UTC - **Reserved Date**: January 06, 2023 at 12:03 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Agent Evolution IMPress Listings plugin <= 2.6.2 versions. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Agent Evolution - IMPress Listings** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-listings/wordpress-impress-listings-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Lana Codes (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3737, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3737 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3737 - **State**: PUBLISHED - **Published Date**: October 05, 2010 at 17:00 UTC - **Last Updated**: August 07, 2024 at 03:18 UTC - **Reserved Date**: October 05, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Memory leak in the Relational Data Services component in IBM DB2 UDB 9.5 before FP6a allows remote authenticated users to cause a denial of service (heap memory consumption) by executing a (1) user-defined function (UDF) or (2) stored procedure while using a different code page than the database server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](ftp://public.dhe.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT) 2. [oval:org.mitre.oval:def:14567](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14567) 3. [LI75022](http://www-01.ibm.com/support/docview.wss?uid=swg1LI75022)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21895, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21895 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21895 - **State**: PUBLISHED - **Published Date**: January 11, 2022 at 20:22 UTC - **Last Updated**: January 02, 2025 at 18:22 UTC - **Reserved Date**: December 14, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows User Profile Service Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H1** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows User Profile Service Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21895)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29706, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29706 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29706 - **State**: PUBLISHED - **Published Date**: June 17, 2021 at 15:30 UTC - **Last Updated**: September 17, 2024 at 00:26 UTC - **Reserved Date**: March 31, 2021 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM AIX 7.1 could allow a non-privileged local user to exploit a vulnerability in the trace facility to expose sensitive information or cause a denial of service. IBM X-Force ID: 200663. ### Affected Products **IBM - AIX** Affected versions: - 7.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6464369) 2. [ibm-aix-cve202129706-dos (200663)](https://exchange.xforce.ibmcloud.com/vulnerabilities/200663)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-46551, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-46551 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-46551 - **State**: PUBLISHED - **Published Date**: December 20, 2022 at 00:00 UTC - **Last Updated**: April 16, 2025 at 17:39 UTC - **Reserved Date**: December 05, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the time parameter at /goform/saveParentControlInfo. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_time/saveParentControlInfo_time.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1352, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1352 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1352 - **State**: PUBLISHED - **Published Date**: March 22, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 17:12 UTC - **Reserved Date**: March 21, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and WebLogic Server 6.1 SP7 and earlier allow remote attackers to cause a denial of service (memory exhaustion) via crafted non-canonicalized XML documents. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [BEA06-123.00](http://dev2dev.bea.com/pub/advisory/183) 2. [17167](http://www.securityfocus.com/bid/17167) 3. [weblogic-xml-parser-dos(25348)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25348) 4. [1015790](http://securitytracker.com/id?1015790) 5. [19310](http://secunia.com/advisories/19310) 6. [ADV-2006-1021](http://www.vupen.com/english/advisories/2006/1021)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-10375, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-10375 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-10375 - **State**: PUBLISHED - **Published Date**: August 14, 2019 at 04:46 UTC - **Last Updated**: August 06, 2024 at 14:02 UTC - **Reserved Date**: August 14, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-13685, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-13685 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-13685 - **State**: PUBLISHED - **Published Date**: November 25, 2019 at 14:22 UTC - **Last Updated**: August 04, 2024 at 23:57 UTC - **Reserved Date**: July 18, 2019 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in sharing view in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://crbug.com/1000934) 2. [](https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4232, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4232 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4232 - **State**: PUBLISHED - **Published Date**: August 08, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 14:46 UTC - **Reserved Date**: August 08, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in admin/inc/change_action.php in Andreas Robertz PHPNews 0.93 allows remote attackers to execute arbitrary PHP code via a URL in the format_menue parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2007-2810](http://www.vupen.com/english/advisories/2007/2810) 2. [25223](http://www.securityfocus.com/bid/25223) 3. [4268](https://www.exploit-db.com/exploits/4268) 4. [phpnews-changeaction-file-include(35835)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35835)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13716, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13716 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13716 - **State**: REJECTED - **Published Date**: January 14, 2022 at 17:27 UTC - **Last Updated**: January 14, 2022 at 17:27 UTC - **Reserved Date**: June 01, 2020 at 00:00 UTC - **Assigned By**: SWI ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10901, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10901 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10901 - **State**: PUBLISHED - **Published Date**: July 26, 2018 at 17:00 UTC - **Last Updated**: August 05, 2024 at 07:54 UTC - **Reserved Date**: May 09, 2018 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges. ### Weakness Classification (CWE) - CWE-665: Security Weakness ### Affected Products **[UNKNOWN] - kernel:** Affected versions: - n/a (Status: affected) ### References 1. [104905](http://www.securityfocus.com/bid/104905) 2. [RHSA-2018:2393](https://access.redhat.com/errata/RHSA-2018:2393) 3. [RHSA-2018:2390](https://access.redhat.com/errata/RHSA-2018:2390) 4. [RHSA-2018:2391](https://access.redhat.com/errata/RHSA-2018:2391) 5. [RHSA-2018:2392](https://access.redhat.com/errata/RHSA-2018:2392) 6. [RHSA-2018:2394](https://access.redhat.com/errata/RHSA-2018:2394) 7. [](https://www.oracle.com/security-alerts/cpujul2020.html) 8. [](https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html) 9. [](https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0) 10. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3444d7da1839b851eefedd372978d8a982316c36) 11. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10901)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5594, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5594 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5594 - **State**: PUBLISHED - **Published Date**: August 23, 2019 at 20:10 UTC - **Last Updated**: October 25, 2024 at 14:05 UTC - **Reserved Date**: January 07, 2019 at 00:00 UTC - **Assigned By**: fortinet ### Vulnerability Description An Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in Fortinet FortiNAC 8.3.0 to 8.3.6 and 8.5.0 admin webUI may allow an unauthenticated attacker to perform a reflected XSS attack via the search field in the webUI. ### Affected Products **n/a - Fortinet FortiNAC** Affected versions: - FortiNAC 8.3.0 to 8.3.6 and 8.5.0 (Status: affected) ### References 1. [](https://fortiguard.com/advisory/FG-IR-19-140)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21336, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21336 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21336 - **State**: PUBLISHED - **Published Date**: March 08, 2021 at 20:40 UTC - **Last Updated**: August 03, 2024 at 18:09 UTC - **Reserved Date**: December 22, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Products.PluggableAuthService is a pluggable Zope authentication and authorization framework. In Products.PluggableAuthService before version 2.6.0 there is an information disclosure vulnerability - everyone can list the names of roles defined in the ZODB Role Manager plugin if the site uses this plugin. The problem has been fixed in version 2.6.0. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to 2.6.0 and re-run the buildout, or if you used pip simply do `pip install "Products.PluggableAuthService>=2.6.0"`. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **zopefoundation - Products.PluggableAuthService** Affected versions: - < 2.6.0 (Status: affected) ### References 1. [](https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p75f-g7gx-2r7p) 2. [](https://pypi.org/project/Products.PluggableAuthService/) 3. [](https://github.com/zopefoundation/Products.PluggableAuthService/commit/2dad81128250cb2e5d950cddc9d3c0314a80b4bb) 4. [[oss-security] 20210521 Plone security hotfix 20210518](http://www.openwall.com/lists/oss-security/2021/05/21/1) 5. [[oss-security] 20210522 Re: Plone security hotfix 20210518](http://www.openwall.com/lists/oss-security/2021/05/22/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0185, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0185 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0185 - **State**: PUBLISHED - **Published Date**: January 02, 2024 at 00:00 UTC - **Last Updated**: November 14, 2024 at 19:32 UTC - **Reserved Date**: January 01, 2024 at 15:37 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboard_teacher.php of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249443. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **RRJ - Nueva Ecija Engineer Online Portal** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.249443) 2. [](https://vuldb.com/?ctiid.249443) 3. [](https://mega.nz/file/PBd13AoR#G3fYWB82wGCa7sD22JP3_twtbw3B0qSJ-4eMMrYR5cE) ### Credits - ahmed8199 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14140, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14140 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14140 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:43 UTC - **Last Updated**: December 20, 2021 at 22:43 UTC - **Reserved Date**: July 19, 2019 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-56660, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-56660 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-56660 - **State**: PUBLISHED - **Published Date**: December 27, 2024 at 15:06 UTC - **Last Updated**: May 04, 2025 at 10:01 UTC - **Reserved Date**: December 27, 2024 at 15:00 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: net/mlx5: DR, prevent potential error pointer dereference The dr_domain_add_vport_cap() function generally returns NULL on error but sometimes we want it to return ERR_PTR(-EBUSY) so the caller can retry. The problem here is that "ret" can be either -EBUSY or -ENOMEM and if it's and -ENOMEM then the error pointer is propogated back and eventually dereferenced in dr_ste_v0_build_src_gvmi_qpn_tag(). ### Affected Products **Linux - Linux** Affected versions: - 11a45def2e197532c46aa908dedd52bc1ee378a2 (Status: affected) - 11a45def2e197532c46aa908dedd52bc1ee378a2 (Status: affected) - 11a45def2e197532c46aa908dedd52bc1ee378a2 (Status: affected) - 11a45def2e197532c46aa908dedd52bc1ee378a2 (Status: affected) **Linux - Linux** Affected versions: - 5.16 (Status: affected) - 0 (Status: unaffected) - 6.1.121 (Status: unaffected) - 6.6.67 (Status: unaffected) - 6.12.6 (Status: unaffected) - 6.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/61f720e801443d4e2a3c0261eda4ad8431458dca) 2. [](https://git.kernel.org/stable/c/325cf73a1b449fea3158ab99d03a7a717aad1618) 3. [](https://git.kernel.org/stable/c/a59c61a1869ceefc65ef02886f91e8cd0062211f) 4. [](https://git.kernel.org/stable/c/11776cff0b563c8b8a4fa76cab620bfb633a8cb8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6497, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6497 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6497 - **State**: PUBLISHED - **Published Date**: December 20, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 20:26 UTC - **Reserved Date**: December 13, 2006 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple unspecified vulnerabilities in the layout engine for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#606260](http://www.kb.cert.org/vuls/id/606260) 2. [21668](http://www.securityfocus.com/bid/21668) 3. [23433](http://secunia.com/advisories/23433) 4. [102885](http://sunsolve.sun.com/search/document.do?assetkey=1-26-102885-1) 5. [MDKSA-2007:010](http://www.mandriva.com/security/advisories?name=MDKSA-2007:010) 6. [24948](http://secunia.com/advisories/24948) 7. [23439](http://secunia.com/advisories/23439) 8. [23672](http://secunia.com/advisories/23672) 9. [ADV-2006-5068](http://www.vupen.com/english/advisories/2006/5068) 10. [23468](http://secunia.com/advisories/23468) 11. [oval:org.mitre.oval:def:11691](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11691) 12. [23598](http://secunia.com/advisories/23598) 13. [RHSA-2006:0758](http://rhn.redhat.com/errata/RHSA-2006-0758.html) 14. [1017398](http://securitytracker.com/id?1017398) 15. [DSA-1265](http://www.debian.org/security/2007/dsa-1265) 16. [24078](http://secunia.com/advisories/24078) 17. [23692](http://secunia.com/advisories/23692) 18. [USN-398-2](http://www.ubuntu.com/usn/usn-398-2) 19. [GLSA-200701-04](http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml) 20. [23282](http://secunia.com/advisories/23282) 21. [24390](http://secunia.com/advisories/24390) 22. [](http://www.mozilla.org/security/announce/2006/mfsa2006-68.html) 23. [FEDORA-2006-1491](http://fedoranews.org/cms/node/2297) 24. [23422](http://secunia.com/advisories/23422) 25. [HPSBUX02153](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742) 26. [23591](http://secunia.com/advisories/23591) 27. [1017405](http://securitytracker.com/id?1017405) 28. [23614](http://secunia.com/advisories/23614) 29. [1017406](http://securitytracker.com/id?1017406) 30. [RHSA-2006:0759](http://rhn.redhat.com/errata/RHSA-2006-0759.html) 31. [USN-398-1](http://www.ubuntu.com/usn/usn-398-1) 32. [ADV-2008-0083](http://www.vupen.com/english/advisories/2008/0083) 33. [FEDORA-2007-004](http://fedoranews.org/cms/node/2338) 34. [23420](http://secunia.com/advisories/23420) 35. [20061202-01-P](ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc) 36. [23440](http://secunia.com/advisories/23440) 37. [SUSE-SA:2006:080](http://www.novell.com/linux/security/advisories/2006_80_mozilla.html) 38. [20061222 rPSA-2006-0234-1 firefox](http://www.securityfocus.com/archive/1/455145/100/0/threaded) 39. [VU#427972](http://www.kb.cert.org/vuls/id/427972) 40. [23545](http://secunia.com/advisories/23545) 41. [23618](http://secunia.com/advisories/23618) 42. [GLSA-200701-03](http://www.gentoo.org/security/en/glsa/glsa-200701-03.xml) 43. [TA06-354A](http://www.us-cert.gov/cas/techalerts/TA06-354A.html) 44. [23589](http://secunia.com/advisories/23589) 45. [DSA-1253](http://www.debian.org/security/2007/dsa-1253) 46. [DSA-1258](http://www.debian.org/security/2007/dsa-1258) 47. [SSRT061181](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742) 48. [](https://issues.rpath.com/browse/RPL-883) 49. [20070102 rPSA-2006-0234-2 firefox thunderbird](http://www.securityfocus.com/archive/1/455728/100/200/threaded) 50. [SUSE-SA:2007:006](http://www.novell.com/linux/security/advisories/2007_06_mozilla.html) 51. [23601](http://secunia.com/advisories/23601) 52. [23988](http://secunia.com/advisories/23988) 53. [MDKSA-2007:011](http://www.mandriva.com/security/advisories?name=MDKSA-2007:011) 54. [ADV-2007-1463](http://www.vupen.com/english/advisories/2007/1463) 55. [23514](http://secunia.com/advisories/23514) 56. [GLSA-200701-02](http://security.gentoo.org/glsa/glsa-200701-02.xml) 57. [RHSA-2006:0760](http://rhn.redhat.com/errata/RHSA-2006-0760.html) 58. [USN-400-1](http://www.ubuntu.com/usn/usn-400-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53198 - **State**: PUBLISHED - **Published Date**: December 27, 2024 at 13:49 UTC - **Last Updated**: May 04, 2025 at 09:55 UTC - **Reserved Date**: November 19, 2024 at 17:17 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() This patch fixes an issue in the function xenbus_dev_probe(). In the xenbus_dev_probe() function, within the if (err) branch at line 313, the program incorrectly returns err directly without releasing the resources allocated by err = drv->probe(dev, id). As the return value is non-zero, the upper layers assume the processing logic has failed. However, the probe operation was performed earlier without a corresponding remove operation. Since the probe actually allocates resources, failing to perform the remove operation could lead to problems. To fix this issue, we followed the resource release logic of the xenbus_dev_remove() function by adding a new block fail_remove before the fail_put block. After entering the branch if (err) at line 313, the function will use a goto statement to jump to the fail_remove block, ensuring that the previously acquired resources are correctly released, thus preventing the reference count leak. This bug was identified by an experimental static analysis tool developed by our team. The tool specializes in analyzing reference count operations and detecting potential issues where resources are not properly managed. In this case, the tool flagged the missing release operation as a potential problem, which led to the development of this patch. ### Affected Products **Linux - Linux** Affected versions: - 4bac07c993d03434ea902d3d4290d9e45944b66c (Status: affected) - 4bac07c993d03434ea902d3d4290d9e45944b66c (Status: affected) - 4bac07c993d03434ea902d3d4290d9e45944b66c (Status: affected) - 4bac07c993d03434ea902d3d4290d9e45944b66c (Status: affected) - 4bac07c993d03434ea902d3d4290d9e45944b66c (Status: affected) - 4bac07c993d03434ea902d3d4290d9e45944b66c (Status: affected) - 4bac07c993d03434ea902d3d4290d9e45944b66c (Status: affected) - 4bac07c993d03434ea902d3d4290d9e45944b66c (Status: affected) **Linux - Linux** Affected versions: - 2.6.23 (Status: affected) - 0 (Status: unaffected) - 5.4.287 (Status: unaffected) - 5.10.231 (Status: unaffected) - 5.15.174 (Status: unaffected) - 6.1.120 (Status: unaffected) - 6.6.64 (Status: unaffected) - 6.11.11 (Status: unaffected) - 6.12.2 (Status: unaffected) - 6.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/87106169b4ce26f85561f953d13d1fd86d99b612) 2. [](https://git.kernel.org/stable/c/0aa9e30b5b4af5dd504801689d6d84c584290a45) 3. [](https://git.kernel.org/stable/c/e8823e6ff313465910edea07581627d85e68d9fd) 4. [](https://git.kernel.org/stable/c/3fc0996d2fefe61219375fd650601724b8cf2d30) 5. [](https://git.kernel.org/stable/c/804b96f8d0a02fa10b92f28b2e042f9128ed3ffc) 6. [](https://git.kernel.org/stable/c/217bdce88b104269b73603b84d0ab4dd04f481bc) 7. [](https://git.kernel.org/stable/c/2f977a4c82d35d063f5fe198bbc501c4b1c5ea0e) 8. [](https://git.kernel.org/stable/c/afc545da381ba0c651b2658966ac737032676f01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3762, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3762 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3762 - **State**: PUBLISHED - **Published Date**: October 16, 2013 at 15:00 UTC - **Last Updated**: September 16, 2024 at 20:02 UTC - **Reserved Date**: June 03, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control EM Base Platform 10.2.0.5 and 11.1.0.1; EM DB Control 11.1.0.7, 11.2.0.2, and 11.2.0.3; and EM Plugin for DB 12.1.0.2, 12.1.0.3, and 12.1.0.4 allows remote attackers to affect integrity via unknown vectors related to Schema Management. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [55322](http://secunia.com/advisories/55322) 2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2251, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2251 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2251 - **State**: PUBLISHED - **Published Date**: November 21, 2019 at 14:38 UTC - **Last Updated**: August 04, 2024 at 18:42 UTC - **Reserved Date**: December 10, 2018 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description If a bitmap file is loaded from any un-authenticated source, there is a possibility that the bitmap can potentially cause stack buffer overflow. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8016, APQ8096AU, APQ8098, MDM9205, MSM8996AU, MSM8998, Nicobar, QCS405, QCS605, SA6155P, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music** Affected versions: - APQ8016, APQ8096AU, APQ8098, MDM9205, MSM8996AU, MSM8998, Nicobar, QCS405, QCS605, SA6155P, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7640, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7640 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7640 - **State**: PUBLISHED - **Published Date**: August 09, 2024 at 14:00 UTC - **Last Updated**: August 09, 2024 at 15:01 UTC - **Reserved Date**: August 09, 2024 at 06:16 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0. This issue affects some unknown processing of the file delete_register.php. The manipulation of the argument case_register_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Kortex Lite Advocate Office Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-274061 | SourceCodester Kortex Lite Advocate Office Management System delete_register.php sql injection](https://vuldb.com/?id.274061) 2. [VDB-274061 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.274061) 3. [Submit #387272 | SourceCodester Kortex Lite Advocate Office Management System 1.0 SQL Injection](https://vuldb.com/?submit.387272) 4. [](https://github.com/samwbs/kortexcve/blob/main/sqli_delete_register/sqli_delete_register.md) ### Credits - samwbs (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-6602, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-6602 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-6602 - **State**: PUBLISHED - **Published Date**: August 31, 2013 at 17:00 UTC - **Last Updated**: August 06, 2024 at 21:36 UTC - **Reserved Date**: August 31, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The device-management command-line interface in Palo Alto Networks PAN-OS before 3.1.10 and 4.0.x before 4.0.4 allows remote authenticated users to execute arbitrary commands via unspecified vectors, aka Ref ID 30122. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://security.paloaltonetworks.com/CVE-2012-6602)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7331, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7331 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7331 - **State**: PUBLISHED - **Published Date**: February 23, 2018 at 22:00 UTC - **Last Updated**: August 05, 2024 at 06:24 UTC - **Reserved Date**: February 22, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=157712b2f5f89b19ef2497ea89c5938eb29529da) 2. [](https://www.wireshark.org/security/wnpa-sec-2018-06.html) 3. [103158](http://www.securityfocus.com/bid/103158) 4. [[debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update](https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html) 5. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14444)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2720, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2720 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2720 - **State**: REJECTED - **Published Date**: March 24, 2025 at 23:31 UTC - **Last Updated**: March 27, 2025 at 06:03 UTC - **Reserved Date**: March 24, 2025 at 12:46 UTC - **Assigned By**: VulDB ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34394, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34394 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34394 - **State**: PUBLISHED - **Published Date**: September 28, 2022 at 20:30 UTC - **Last Updated**: May 20, 2025 at 20:30 UTC - **Reserved Date**: June 23, 2022 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell OS10, version 10.5.3.4, contains an Improper Certificate Validation vulnerability in Support Assist. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to unauthorized access to limited switch configuration data. The vulnerability could be leveraged by attackers to conduct man-in-the-middle attacks to gain access to the Support Assist information. ### CVSS Metrics - **CVSS Base Score**: 3.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-295: Security Weakness ### Affected Products **Dell - Dell Networking OS10** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000202974/dsa-2022-293-dell-networking-os10-security-update-for-a-support-assist-vulnerability)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-57972, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-57972 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-57972 - **State**: PUBLISHED - **Published Date**: March 06, 2025 at 00:00 UTC - **Last Updated**: March 07, 2025 at 18:01 UTC - **Reserved Date**: February 20, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The pairing API request handler in Microsoft HoloLens 1 (Windows Holographic) through 10.0.17763.3046 and HoloLens 2 (Windows Holographic) through 10.0.22621.1244 allows remote attackers to cause a Denial of Service (resource consumption and device unusability) by sending many requests through the Device Portal framework. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-770: Security Weakness ### Affected Products **Microsoft - HoloLens** Affected versions: - 10 (Status: affected) **Microsoft - HoloLens** Affected versions: - 10 (Status: affected) ### References 1. [](https://github.com/tania-silva/Hololens)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-24465, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-24465 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-24465 - **State**: REJECTED - **Last Updated**: March 22, 2023 at 00:00 UTC - **Reserved Date**: August 19, 2020 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4299, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4299 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4299 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1561, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1561 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1561 - **State**: PUBLISHED - **Published Date**: July 03, 2018 at 19:00 UTC - **Last Updated**: September 17, 2024 at 03:02 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 131760. ### Affected Products **IBM - Rational Quality Manager** Affected versions: - 5.0 (Status: affected) - 5.0.1 (Status: affected) - 5.0.2 (Status: affected) - 6.0 (Status: affected) - 6.0.1 (Status: affected) - 6.0.2 (Status: affected) - 6.0.3 (Status: affected) - 6.0.4 (Status: affected) - 6.0.5 (Status: affected) **IBM - Rational Collaborative Lifecycle Management** Affected versions: - 5.0 (Status: affected) - 5.0.1 (Status: affected) - 5.0.2 (Status: affected) - 6.0 (Status: affected) - 6.0.1 (Status: affected) - 6.0.2 (Status: affected) - 6.0.3 (Status: affected) - 6.0.4 (Status: affected) - 6.0.5 (Status: affected) ### References 1. [ibm-rqm-cve20171561-xss(131760)](https://exchange.xforce.ibmcloud.com/vulnerabilities/131760) 2. [](https://www-prd-trops.events.ibm.com/node/715749)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5443, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5443 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5443 - **State**: REJECTED - **Published Date**: January 25, 2021 at 17:53 UTC - **Last Updated**: January 25, 2021 at 17:53 UTC - **Reserved Date**: January 03, 2020 at 00:00 UTC - **Assigned By**: pivotal ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10839, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10839 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10839 - **State**: PUBLISHED - **Published Date**: March 24, 2020 at 17:21 UTC - **Last Updated**: August 04, 2024 at 11:14 UTC - **Reserved Date**: March 23, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. Attackers can bypass Factory Reset Protection (FRP) via a SIM card. The Samsung ID is SVE-2019-16193 (February 2020). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4401, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4401 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4401 - **State**: PUBLISHED - **Published Date**: November 06, 2019 at 14:32 UTC - **Last Updated**: August 06, 2024 at 00:25 UTC - **Reserved Date**: April 29, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Aruba ClearPass Policy Manager before 6.5.7 and 6.6.x before 6.6.2 allows attackers to obtain database credentials. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2016-010.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-0523, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-0523 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-0523 - **State**: PUBLISHED - **Published Date**: June 21, 2021 at 16:01 UTC - **Last Updated**: August 03, 2024 at 15:40 UTC - **Reserved Date**: November 06, 2020 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In onCreate of WifiScanModeActivity.java, there is a possible way to enable Wi-Fi scanning without user consent due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-174047492 ### Affected Products **n/a - Android** Affected versions: - Android-10 Android-11 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2021-06-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3832, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3832 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3832 - **State**: PUBLISHED - **Published Date**: April 24, 2025 at 08:23 UTC - **Last Updated**: April 24, 2025 at 13:53 UTC - **Reserved Date**: April 20, 2025 at 15:13 UTC - **Assigned By**: Wordfence ### Vulnerability Description The FuseDesk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘successredirect’ parameter in all versions up to, and including, 6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **jeremyshapiro - FuseDesk** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/baf12413-eb45-44c3-a6c9-f5a048d6500d?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/fusedesk/trunk/fusedesk.php#L516) 3. [](https://wordpress.org/plugins/fusedesk/#developers) ### Credits - Peter Thaleikis
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6952, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6952 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6952 - **State**: PUBLISHED - **Published Date**: July 21, 2024 at 11:31 UTC - **Last Updated**: August 01, 2024 at 21:45 UTC - **Reserved Date**: July 20, 2024 at 14:14 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in itsourcecode University Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /view_single_result.php?vr=123321&vn=mirage. The manipulation of the argument seme leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-272074 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **itsourcecode - University Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-272074 | itsourcecode University Management System sql injection](https://vuldb.com/?id.272074) 2. [VDB-272074 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.272074) 3. [Submit #376865 | itsourcecode University Management System 1.0 SQLi](https://vuldb.com/?submit.376865) 4. [](https://github.com/DeepMountains/Mirage/blob/main/CVE6-1.md) ### Credits - Dee.Mirage (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2870, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2870 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2870 - **State**: PUBLISHED - **Published Date**: July 10, 2013 at 10:00 UTC - **Last Updated**: August 06, 2024 at 15:52 UTC - **Reserved Date**: April 11, 2013 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote servers to execute arbitrary code via crafted response traffic after a URL request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba=commit%3Bh=2b0ff6d8a832f4fe5c187b17342b56675fbf7b96) 2. [](https://code.google.com/p/chromium/issues/detail?id=244746) 3. [](http://git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba=commit%3Bh=5449227016f44d7c023b28a697ada40064c681a6) 4. [oval:org.mitre.oval:def:16723](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16723) 5. [DSA-2724](http://www.debian.org/security/2013/dsa-2724) 6. [](https://code.google.com/p/chromium/issues/detail?id=242762) 7. [](http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-2462, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-2462 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-2462 - **State**: PUBLISHED - **Published Date**: June 30, 2008 at 22:00 UTC - **Last Updated**: August 07, 2024 at 09:05 UTC - **Reserved Date**: May 28, 2008 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the viewfile documentation command in Caucho Resin before 3.0.25, and 3.1.x before 3.1.4, allows remote attackers to inject arbitrary web script or HTML via the file parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-1930](http://www.vupen.com/english/advisories/2008/1930/references) 2. [VU#305208](http://www.kb.cert.org/vuls/id/305208) 3. [1020372](http://www.securitytracker.com/id?1020372) 4. [caucho-resin-file-xss(43367)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43367) 5. [29948](http://www.securityfocus.com/bid/29948) 6. [30845](http://secunia.com/advisories/30845) 7. [](http://www.caucho.com/resin/changes/changes-31.xtp#3.1.4%20-%20Dec%205%2C%202007)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37373, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37373 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37373 - **State**: PUBLISHED - **Published Date**: August 14, 2024 at 02:38 UTC - **Last Updated**: August 16, 2024 at 04:01 UTC - **Reserved Date**: June 07, 2024 at 01:04 UTC - **Assigned By**: hackerone ### Vulnerability Description Improper input validation in the Central Filestore in Ivanti Avalanche 6.3.1 allows a remote authenticated attacker with admin rights to achieve RCE. ### Affected Products **Ivanti - Avalanche** Affected versions: - 6.4.4 (Status: affected) ### References 1. [](https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12997, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12997 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12997 - **State**: PUBLISHED - **Published Date**: June 28, 2019 at 10:28 UTC - **Last Updated**: August 04, 2024 at 23:41 UTC - **Reserved Date**: June 28, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Loopchain through 2.2.1.3, an attacker can escalate privileges from a low-privilege shell by changing the environment (aka injection in the DEFAULT_SCORE_HOST environment variable). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/icon-project/loopchain/issues/231)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9104, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9104 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9104 - **State**: PUBLISHED - **Published Date**: November 26, 2014 at 15:00 UTC - **Last Updated**: August 06, 2024 at 13:33 UTC - **Reserved Date**: November 26, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site request forgery (CSRF) vulnerabilities in the XML-RPC API in the Desktop Client in OpenVPN Access Server 1.5.6 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) disconnecting established VPN sessions, (2) connect to arbitrary VPN servers, or (3) create VPN profiles and execute arbitrary commands via crafted API requests. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20140716 SEC Consult SA-20140716-1 :: Remote Code Execution via CSRF in OpenVPN Access Server "Desktop Client"](http://www.securityfocus.com/archive/1/532795/100/0/threaded) 2. [20140716 SEC Consult SA-20140716-1 :: Remote Code Execution via CSRF in OpenVPN Access Server "Desktop Client"](http://seclists.org/fulldisclosure/2014/Jul/76) 3. [](https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140716-1_OpenVPN_Access_Server_Desktop_Client_Remote_Code_Execution_via_CSRF_v10.txt) 4. [](http://openvpn.net/index.php/access-server/security-advisories.html) 5. [](https://www.youtube.com/watch?v=qhgysgfvQh8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10103, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10103 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10103 - **State**: PUBLISHED - **Published Date**: July 03, 2019 at 00:00 UTC - **Last Updated**: August 04, 2024 at 22:10 UTC - **Reserved Date**: March 26, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description JetBrains IntelliJ IDEA projects created using the Kotlin (JS Client/JVM Server) IDE Template were resolving Gradle artifacts using an http connection, potentially allowing an MITM attack. This issue, which was fixed in Kotlin plugin version 1.3.30, is similar to CVE-2019-10101. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.jetbrains.com/blog/2019/06/19/jetbrains-security-bulletin-q1-2019/) 2. [](https://security.netapp.com/advisory/ntap-20230818-0012/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10090, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10090 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10090 - **State**: PUBLISHED - **Published Date**: March 13, 2020 at 16:24 UTC - **Last Updated**: August 04, 2024 at 10:50 UTC - **Reserved Date**: March 04, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GitLab 11.7 through 12.8.1 allows Information Disclosure. Under certain group conditions, group epic information was unintentionally being disclosed. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://about.gitlab.com/releases/2020/03/04/gitlab-12-dot-8-dot-2-released/) 2. [](https://about.gitlab.com/releases/2020/03/04/gitlab-12-dot-8-dot-2-released/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15768 - **State**: PUBLISHED - **Published Date**: September 18, 2020 at 13:12 UTC - **Last Updated**: August 04, 2024 at 13:22 UTC - **Reserved Date**: July 15, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Gradle Enterprise 2017.3 - 2020.2.4 and Gradle Enterprise Build Cache Node 1.0 - 9.2. Unrestricted HTTP header reflection in Gradle Enterprise allows remote attackers to obtain authentication cookies, if they are able to discover a separate XSS vulnerability. This potentially allows an attacker to impersonate another user. Gradle Enterprise affected application request paths:/info/headers, /cache-info/headers, /admin-info/headers, /distribution-broker-info/headers. Gradle Enterprise Build Cache Node affected application request paths:/cache-node-info/headers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gradle/gradle/security/advisories) 2. [](https://security.gradle.com/advisory/CVE-2020-15768)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-6212, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-6212 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-6212 - **State**: PUBLISHED - **Published Date**: March 05, 2019 at 16:00 UTC - **Last Updated**: August 04, 2024 at 20:16 UTC - **Reserved Date**: January 11, 2019 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution. ### Affected Products **Apple - iOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - Safari** Affected versions: - unspecified (Status: affected) **Apple - iTunes for Windows** Affected versions: - unspecified (Status: affected) **Apple - iCloud for Windows** Affected versions: - unspecified (Status: affected) ### References 1. [106691](http://www.securityfocus.com/bid/106691) 2. [GLSA-201903-12](https://security.gentoo.org/glsa/201903-12) 3. [](https://support.apple.com/HT209443) 4. [](https://support.apple.com/HT209451) 5. [](https://support.apple.com/HT209449) 6. [](https://support.apple.com/HT209450) 7. [USN-3889-1](https://usn.ubuntu.com/3889-1/) 8. [](https://support.apple.com/HT209447)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3603, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3603 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3603 - **State**: PUBLISHED - **Published Date**: July 09, 2024 at 08:33 UTC - **Last Updated**: August 01, 2024 at 20:12 UTC - **Reserved Date**: April 10, 2024 at 16:40 UTC - **Assigned By**: Wordfence ### Vulnerability Description The OSM – OpenStreetMap plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'osm_map' shortcode in all versions up to, and including, 6.0.2 due to insufficient input sanitization and output escaping on user supplied attributes such as 'theme'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **photoweblog - OSM – OpenStreetMap** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/845cea77-ea74-4459-817b-cfbdb877b75a?source=cve) 2. [](https://wordpress.org/plugins/osm/) ### Credits - Krzysztof Zając
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2641, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2641 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2641 - **State**: PUBLISHED - **Published Date**: July 05, 2012 at 17:00 UTC - **Last Updated**: September 16, 2024 at 19:25 UTC - **Reserved Date**: May 14, 2012 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Zenphoto before 1.4.3 allows remote attackers to inject arbitrary web script or HTML by triggering improper interaction with an unspecified library. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.zenphoto.org/news/zenphoto-1.4.3) 2. [JVNDB-2012-000065](http://jvndb.jvn.jp/jvndb/JVNDB-2012-000065) 3. [JVN#59842447](http://jvn.jp/en/jp/JVN59842447/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5311, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5311 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5311 - **State**: PUBLISHED - **Published Date**: October 17, 2006 at 16:00 UTC - **Last Updated**: August 07, 2024 at 19:48 UTC - **Reserved Date**: October 17, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in includes/archive/archive_topic.php in Buzlas 2006-1 Full allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20511](http://www.securityfocus.com/bid/20511) 2. [20061012 Buzlas <= v2006-1 Full Remote File Include Vulnerability](http://www.securityfocus.com/archive/1/448577/100/0/threaded) 3. [1730](http://securityreason.com/securityalert/1730)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0271, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0271 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0271 - **State**: PUBLISHED - **Published Date**: January 17, 2007 at 02:00 UTC - **Last Updated**: August 07, 2024 at 12:12 UTC - **Reserved Date**: January 16, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Oracle Database 9.0.1.5 and 9.2.0.7 has unknown impact and attack vectors related to the Log Miner component and sys.dbms_log_mnr privileges, aka DB04. NOTE: Oracle has not disputed a reliable researcher claim that this is a buffer overflow in the ADD_LOGFILE procedure for the SYS.DBMS_LOGMNR package that allows code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20070129 Re: Re: Oracle Buffer Overflows in DBMS_CAPTURE_ADM_INTERNAL](http://www.securityfocus.com/archive/1/458475/100/100/threaded) 2. [23794](http://secunia.com/advisories/23794) 3. [22083](http://www.securityfocus.com/bid/22083) 4. [](http://www.appsecinc.com/resources/alerts/oracle/2007-01.shtml) 5. [](http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html) 6. [32910](http://osvdb.org/32910) 7. [TA07-017A](http://www.us-cert.gov/cas/techalerts/TA07-017A.html) 8. [20070124 Oracle Buffer Overflow in DBMS_LOGMNR.ADD_LOGFILE](http://www.securityfocus.com/archive/1/458006/100/0/threaded) 9. [oracle-cpu-jan2007(31541)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31541) 10. [1017522](http://securitytracker.com/id?1017522)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5184, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5184 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5184 - **State**: PUBLISHED - **Published Date**: January 19, 2013 at 20:00 UTC - **Last Updated**: September 16, 2024 at 23:42 UTC - **Reserved Date**: September 26, 2012 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Olive Toast Documents Pro File Viewer (formerly Files HD) app before 1.11.1 for iOS allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://itunes.apple.com/us/app/documents-pro/id374142847) 2. [JVN#91881278](http://jvn.jp/en/jp/JVN91881278/index.html) 3. [JVNDB-2013-000001](http://jvndb.jvn.jp/jvndb/JVNDB-2013-000001)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5589, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5589 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5589 - **State**: PUBLISHED - **Published Date**: October 19, 2007 at 23:00 UTC - **Last Updated**: August 07, 2024 at 15:39 UTC - **Reserved Date**: October 19, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.11.1.2 allow remote attackers to inject arbitrary web script or HTML via certain input available in (1) PHP_SELF in (a) server_status.php, and (b) grab_globals.lib.php, (c) display_change_password.lib.php, and (d) common.lib.php in libraries/; and certain input available in PHP_SELF and (2) PATH_INFO in libraries/common.inc.php. NOTE: there might also be other vectors related to (3) REQUEST_URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2007-3535](http://www.vupen.com/english/advisories/2007/3535) 2. [](http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_2_11_1/phpMyAdmin/ChangeLog?r1=10796&r2=10795&pathrev=10796) 3. [27246](http://secunia.com/advisories/27246) 4. [](http://www.digitrustgroup.com/advisories/TDG-advisory071015a.html) 5. [](http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2007-6) 6. [](http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin?view=rev&revision=10796) 7. [FEDORA-2007-2738](https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00040.html) 8. [phpmyadmin-serverstatus-xss(37292)](https://exchange.xforce.ibmcloud.com/vulnerabilities/37292) 9. [27506](http://secunia.com/advisories/27506) 10. [26301](http://www.securityfocus.com/bid/26301) 11. [DSA-1403](http://www.debian.org/security/2007/dsa-1403) 12. [SUSE-SR:2008:006](http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html) 13. [37939](http://osvdb.org/37939) 14. [MDKSA-2007:199](http://www.mandriva.com/security/advisories?name=MDKSA-2007:199) 15. [27595](http://secunia.com/advisories/27595) 16. [](https://bugzilla.redhat.com/show_bug.cgi?id=333661) 17. [29323](http://secunia.com/advisories/29323)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25375, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25375 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25375 - **State**: PUBLISHED - **Published Date**: April 09, 2021 at 17:38 UTC - **Last Updated**: August 03, 2024 at 20:03 UTC - **Reserved Date**: January 19, 2021 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Using predictable index for attachments in Samsung Email prior to version 6.1.41.0 allows remote attackers to get attachments of another emails when users open the malicious attachment. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **Samsung Mobile - Samsung Email** Affected versions: - unspecified (Status: affected) ### References 1. [](https://security.samsungmobile.com/) 2. [](https://security.samsungmobile.com/serviceWeb.smsb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14942, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14942 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14942 - **State**: PUBLISHED - **Published Date**: August 05, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 09:46 UTC - **Reserved Date**: August 05, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Harmonic NSG 9000 devices allow remote authenticated users to conduct directory traversal attacks, as demonstrated by "POST /PY/EMULATION_GET_FILE" or "POST /PY/EMULATION_EXPORT" with FileName=../../../passwd in the POST data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/pudding2/NSG9000/blob/master/exp.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-37412, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-37412 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-37412 - **State**: PUBLISHED - **Published Date**: September 09, 2022 at 14:39 UTC - **Last Updated**: February 20, 2025 at 20:06 UTC - **Reserved Date**: August 09, 2022 at 00:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Authenticated (admin+) Reflected Cross-Site Scripting (XSS) vulnerability in Galerio & Urda's Better Delete Revision plugin <= 1.6.1 at WordPress. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Galerio & Urda - Better Delete Revision (WordPress plugin)** Affected versions: - <= 1.6.1 (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/better-delete-revision/wordpress-better-delete-revision-plugin-1-6-1-authenticated-reflected-cross-site-scripting-xss-vulnerability/_s_id=cve) 2. [](https://wordpress.org/plugins/better-delete-revision/) ### Credits - Vulnerability discovered by Lana Codes (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52940, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52940 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52940 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 16:37 UTC - **Last Updated**: May 04, 2025 at 07:46 UTC - **Reserved Date**: August 21, 2024 at 06:07 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: mm: multi-gen LRU: fix crash during cgroup migration lru_gen_migrate_mm() assumes lru_gen_add_mm() runs prior to itself. This isn't true for the following scenario: CPU 1 CPU 2 clone() cgroup_can_fork() cgroup_procs_write() cgroup_post_fork() task_lock() lru_gen_migrate_mm() task_unlock() task_lock() lru_gen_add_mm() task_unlock() And when the above happens, kernel crashes because of linked list corruption (mm_struct->lru_gen.list). ### Affected Products **Linux - Linux** Affected versions: - bd74fdaea146029e4fa12c6de89adbe0779348a9 (Status: affected) - bd74fdaea146029e4fa12c6de89adbe0779348a9 (Status: affected) **Linux - Linux** Affected versions: - 6.1 (Status: affected) - 0 (Status: unaffected) - 6.1.11 (Status: unaffected) - 6.2 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/04448022311cebd30969d3aebdde765f1258b360) 2. [](https://git.kernel.org/stable/c/de08eaa6156405f2e9369f06ba5afae0e4ab3b62)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6421, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6421 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6421 - **State**: PUBLISHED - **Published Date**: March 06, 2009 at 18:00 UTC - **Last Updated**: August 07, 2024 at 11:27 UTC - **Reserved Date**: March 06, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in social_game_play.php in Social Site Generator (SSG) 2.0 allows remote attackers to execute arbitrary PHP code via a URL in the path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [45865](http://osvdb.org/45865) 2. [socialsitegenerator-path-file-include(42780)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42780) 3. [29462](http://www.securityfocus.com/bid/29462) 4. [5707](https://www.exploit-db.com/exploits/5707) 5. [30462](http://secunia.com/advisories/30462)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-125027, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-125027 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-125027 - **State**: PUBLISHED - **Published Date**: December 31, 2022 at 15:12 UTC - **Last Updated**: April 11, 2025 at 14:45 UTC - **Reserved Date**: December 31, 2022 at 15:10 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in Yuna Scatari TBDev up to 2.1.17 and classified as problematic. Affected by this vulnerability is the function get_user_icons of the file usersearch.php. The manipulation of the argument n/r/r2/em/ip/co/ma/d/d2/ul/ul2/ls/ls2/dl/dl2 leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.1.18 is able to address this issue. The patch is named 0ba3fd4be29dd48fa4455c236a9403b3149a4fd4. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217147. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Yuna Scatari - TBDev** Affected versions: - 2.1.0 (Status: affected) - 2.1.1 (Status: affected) - 2.1.2 (Status: affected) - 2.1.3 (Status: affected) - 2.1.4 (Status: affected) - 2.1.5 (Status: affected) - 2.1.6 (Status: affected) - 2.1.7 (Status: affected) - 2.1.8 (Status: affected) - 2.1.9 (Status: affected) - 2.1.10 (Status: affected) - 2.1.11 (Status: affected) - 2.1.12 (Status: affected) - 2.1.13 (Status: affected) - 2.1.14 (Status: affected) - 2.1.15 (Status: affected) - 2.1.16 (Status: affected) - 2.1.17 (Status: affected) ### References 1. [](https://vuldb.com/?id.217147) 2. [](https://vuldb.com/?ctiid.217147) 3. [](https://github.com/yunasc/tbdev/commit/0ba3fd4be29dd48fa4455c236a9403b3149a4fd4) 4. [](https://github.com/yunasc/tbdev/releases/tag/v2.1.18) ### Credits - VulDB GitHub Commit Analyzer
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16847, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16847 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16847 - **State**: PUBLISHED - **Published Date**: August 04, 2020 at 20:15 UTC - **Last Updated**: August 04, 2024 at 13:45 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Extreme Analytics in Extreme Management Center before 8.5.0.169 allows unauthenticated reflected XSS via a parameter in a GET request, aka CFD-4887. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gtacknowledge.extremenetworks.com/articles/Solution/000051136) 2. [](https://documentation.extremenetworks.com/release_notes/netsight/XMC_8.5.0_Release_Notes.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3541, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3541 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3541 - **State**: PUBLISHED - **Published Date**: October 02, 2009 at 19:00 UTC - **Last Updated**: August 07, 2024 at 06:31 UTC - **Reserved Date**: October 02, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in CoupleDB.php in PHPGenealogy 2.0 allows remote attackers to execute arbitrary PHP code via a URL in the DataDirectory parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [phpgenealogy-datadirectory-file-include(51728)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51728) 2. [9155](http://www.exploit-db.com/exploits/9155)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7387, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7387 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7387 - **State**: PUBLISHED - **Published Date**: November 08, 2016 at 20:37 UTC - **Last Updated**: August 06, 2024 at 01:57 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: nvidia ### Vulnerability Description For the NVIDIA Quadro, NVS, and GeForce products, NVIDIA Windows GPU Display Driver R340 before 342.00 and R375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape ID 0x600000D where a value passed from a user to the driver is used without validation as the index to an internal array, leading to denial of service or potential escalation of privileges. ### Affected Products **n/a - Quadro, NVS, and GeForce (all versions)** Affected versions: - Quadro, NVS, and GeForce (all versions) (Status: affected) ### References 1. [40659](https://www.exploit-db.com/exploits/40659/) 2. [](https://support.lenovo.com/us/en/solutions/LEN-10822) 3. [93985](http://www.securityfocus.com/bid/93985) 4. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4247)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15650, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15650 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15650 - **State**: REJECTED - **Last Updated**: May 12, 2023 at 00:00 UTC - **Reserved Date**: August 21, 2018 at 00:00 UTC - **Assigned By**: odoo ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8027, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8027 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8027 - **State**: PUBLISHED - **Published Date**: January 02, 2016 at 21:00 UTC - **Last Updated**: August 06, 2024 at 08:06 UTC - **Reserved Date**: October 29, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Node.js 0.12.x before 0.12.9, 4.x before 4.2.3, and 5.x before 5.1.1 does not ensure the availability of a parser for each HTTP socket, which allows remote attackers to cause a denial of service (uncaughtException and service outage) via a pipelined HTTP request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [IV79524](http://www-01.ibm.com/support/docview.wss?uid=swg1IV79524) 2. [78207](http://www.securityfocus.com/bid/78207) 3. [openSUSE-SU-2016:0138](http://lists.opensuse.org/opensuse-updates/2016-01/msg00045.html) 4. [](https://nodejs.org/en/blog/vulnerability/cve-2015-8027_cve-2015-6764/) 5. [](https://nodejs.org/en/blog/vulnerability/december-2015-security-releases/) 6. [](http://www-01.ibm.com/support/docview.wss?uid=swg21972419) 7. [GLSA-201612-43](https://security.gentoo.org/glsa/201612-43)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1298, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1298 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1298 - **State**: PUBLISHED - **Published Date**: January 20, 2021 at 19:55 UTC - **Last Updated**: November 12, 2024 at 20:26 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Cisco - Cisco SD-WAN Solution** Affected versions: - n/a (Status: affected) ### References 1. [20210120 Cisco SD-WAN Command Injection Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn)