System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4271, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4271 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4271 - **State**: PUBLISHED - **Published Date**: November 16, 2010 at 23:00 UTC - **Last Updated**: September 17, 2024 at 02:57 UTC - **Reserved Date**: November 16, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in ImpressCMS before 1.2.3 RC2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [42160](http://secunia.com/advisories/42160) 2. [69082](http://osvdb.org/69082) 3. [](http://www.impresscms.org/content.php?page=ImpressCMS_1.2.3) 4. [44745](http://www.securityfocus.com/bid/44745)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1311, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1311 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1311 - **State**: PUBLISHED - **Published Date**: March 08, 2011 at 21:00 UTC - **Last Updated**: September 16, 2024 at 22:55 UTC - **Reserved Date**: March 08, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Security component in IBM WebSphere Application Server (WAS) before 7.0.0.15, when a J2EE 1.4 application is used, determines the security role mapping on the basis of the ibm-application-bnd.xml file instead of the intended ibm-application-bnd.xmi file, which might allow remote authenticated users to gain privileges in opportunistic circumstances by requesting a service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [PM25455](http://www-01.ibm.com/support/docview.wss?uid=swg1PM25455) 2. [](http://www-01.ibm.com/support/docview.wss?uid=swg27014463)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41017, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41017 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41017 - **State**: PUBLISHED - **Published Date**: January 26, 2023 at 21:24 UTC - **Last Updated**: March 28, 2025 at 17:35 UTC - **Reserved Date**: September 19, 2022 at 18:30 UTC - **Assigned By**: talos ### Vulnerability Description Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'vpn basic protocol (l2tp|pptp) name WORD server WORD username WORD passsword WORD firmwall (on|off) defroute (on|off) localip A.B.C.D' command template. ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **Siretta - QUARTZ-GOLD** Affected versions: - G5.0.1.5-210720-141020 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2898, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2898 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2898 - **State**: PUBLISHED - **Published Date**: January 28, 2020 at 15:42 UTC - **Last Updated**: August 06, 2024 at 10:28 UTC - **Reserved Date**: April 18, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description wolfSSL CyaSSL before 2.9.4 allows remote attackers to have unspecified impact via multiple calls to the CyaSSL_read function which triggers an out-of-bounds read when an error occurs, related to not checking the return code and MAC verification failure. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.wolfssl.com/yaSSL/Blog/Entries/2014/4/11_wolfSSL_Security_Advisory__April_9%2C_2014.html) 2. [](http://www.wolfssl.com/yaSSL/Docs-cyassl-changelog.html) 3. [](http://seclists.org/oss-sec/2014/q2/126) 4. [](http://seclists.org/oss-sec/2014/q2/130)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1589, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1589 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1589 - **State**: PUBLISHED - **Published Date**: April 28, 2010 at 23:00 UTC - **Last Updated**: August 07, 2024 at 01:28 UTC - **Reserved Date**: April 28, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in shopsessionsubs.asp in Rocksalt International VP-ASP Shopping Cart 6.50 and earlier might allow remote attackers to determine the existence of arbitrary files via directory traversal sequences in the client's DNS hostname (aka the REMOTE_HOST variable), related to the CookielessGenerateFilename and CookielessReadFile functions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [61891](http://osvdb.org/61891) 2. [shoppingcart-remotehost-dir-traversal(55824)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55824) 3. [20100120 Insufficient User Input Validation in VP-ASP 6.50 Demo Code](http://archives.neohapsis.com/archives/fulldisclosure/2010-01/0400.html) 4. [38283](http://secunia.com/advisories/38283)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1184, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1184 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1184 - **State**: PUBLISHED - **Published Date**: April 19, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:44 UTC - **Reserved Date**: April 19, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The TCP/IP stack in multiple operating systems allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets. NOTE: some followups indicate that this issue could not be replicated. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050416 TCP/IP Stack Vulnerability](http://seclists.org/lists/fulldisclosure/2005/Apr/0358.html) 2. [20050418 Re: TCP/IP Stack Vulnerability](http://seclists.org/lists/fulldisclosure/2005/Apr/0385.html) 3. [13215](http://www.securityfocus.com/bid/13215) 4. [20050418 Re: TCP/IP Stack Vulnerability](http://seclists.org/lists/fulldisclosure/2005/Apr/0383.html) 5. [multiple-tcpip-dos(40502)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40502)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29585, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29585 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29585 - **State**: PUBLISHED - **Published Date**: May 14, 2021 at 19:35 UTC - **Last Updated**: August 03, 2024 at 22:11 UTC - **Reserved Date**: March 30, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description TensorFlow is an end-to-end open source platform for machine learning. The TFLite computation for size of output after padding, `ComputeOutSize`(https://github.com/tensorflow/tensorflow/blob/0c9692ae7b1671c983569e5d3de5565843d500cf/tensorflow/lite/kernels/padding.h#L43-L55), does not check that the `stride` argument is not 0 before doing the division. Users can craft special models such that `ComputeOutSize` is called with `stride` set to 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### CVSS Metrics - **CVSS Base Score**: 2.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-369: Security Weakness ### Affected Products **tensorflow - tensorflow** Affected versions: - < 2.1.4 (Status: affected) - >= 2.2.0, < 2.2.3 (Status: affected) - >= 2.3.0, < 2.3.3 (Status: affected) - >= 2.4.0, < 2.4.2 (Status: affected) ### References 1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv78-g7wq-mhp4) 2. [](https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4987, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4987 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4987 - **State**: PUBLISHED - **Published Date**: September 15, 2023 at 14:31 UTC - **Last Updated**: September 25, 2024 at 15:14 UTC - **Reserved Date**: September 15, 2023 at 06:23 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in infinitietech taskhub 2.8.7. Affected by this issue is some unknown functionality of the file /home/get_tasks_list of the component GET Parameter Handler. The manipulation of the argument project/status/user_id/sort/search leads to sql injection. VDB-239798 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **infinitietech - taskhub** Affected versions: - 2.8.7 (Status: affected) ### References 1. [](https://vuldb.com/?id.239798) 2. [](https://vuldb.com/?ctiid.239798) 3. [](http://packetstormsecurity.com/files/174760/Taskhub-2.8.7-SQL-Injection.html) ### Credits - skalvin (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8736, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8736 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8736 - **State**: PUBLISHED - **Published Date**: March 20, 2025 at 10:11 UTC - **Last Updated**: April 04, 2025 at 08:45 UTC - **Reserved Date**: September 11, 2024 at 20:57 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description A Denial of Service (DoS) vulnerability exists in multiple file upload endpoints of parisneo/lollms-webui version V12 (Strawberry). The vulnerability can be exploited remotely via Cross-Site Request Forgery (CSRF). Despite CSRF protection preventing file uploads, the application still processes multipart boundaries, leading to resource exhaustion. By appending additional characters to the multipart boundary, an attacker can cause the server to parse each byte of the boundary, ultimately leading to service unavailability. This vulnerability is present in the `/upload_avatar`, `/upload_app`, and `/upload_logo` endpoints. ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **parisneo - parisneo/lollms-webui** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/935dbc03-1b43-4dbb-b6cd-1aa95a789d4f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8247, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8247 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8247 - **State**: PUBLISHED - **Published Date**: June 14, 2018 at 12:00 UTC - **Last Updated**: August 05, 2024 at 06:46 UTC - **Reserved Date**: March 14, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An elevation of privilege vulnerability exists when Office Web Apps Server 2013 and Office Online Server fail to properly handle web requests, aka "Microsoft Office Elevation of Privilege Vulnerability." This affects Microsoft Office, Microsoft Office Online Server. This CVE ID is unique from CVE-2018-8245. ### Affected Products **Microsoft - Microsoft Office** Affected versions: - Web Apps Server 2013 Service Pack 1 (Status: affected) **Microsoft - Microsoft Office Online Server** Affected versions: - 2016 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8247) 2. [1041104](http://www.securitytracker.com/id/1041104) 3. [104319](http://www.securityfocus.com/bid/104319)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45856, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45856 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45856 - **State**: PUBLISHED - **Published Date**: October 14, 2023 at 00:00 UTC - **Last Updated**: September 17, 2024 at 13:37 UTC - **Reserved Date**: October 14, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description qdPM 9.2 allows remote code execution by using the Add Attachments feature of Edit Project to upload a .php file to the /uploads URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://qdpm.net) 2. [](https://github.com/SunshineOtaku/Report-CVE/blob/main/qdPM/9.2/RCE.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22592, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22592 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22592 - **State**: PUBLISHED - **Published Date**: January 18, 2023 at 18:33 UTC - **Last Updated**: April 03, 2025 at 13:00 UTC - **Reserved Date**: January 03, 2023 at 19:19 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Robotic Process Automation for Cloud Pak 21.0.1 through 21.0.4 could allow a local user to perform unauthorized actions due to insufficient permission settings. IBM X-Force ID: 244073. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N` ### Affected Products **IBM - Robotic Process Automation for Cloud Pak** Affected versions: - 21.0.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6855839) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/244073)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1344, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1344 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1344 - **State**: PUBLISHED - **Published Date**: August 06, 2012 at 18:00 UTC - **Last Updated**: August 06, 2024 at 18:53 UTC - **Reserved Date**: February 27, 2012 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco IOS 15.1 and 15.2, when a clientless SSL VPN is configured, allows remote authenticated users to cause a denial of service (device reload) by using a web browser to refresh the SSL VPN portal page, as demonstrated by the Android browser, aka Bug ID CSCtr86328. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html) 2. [1027371](http://www.securitytracker.com/id?1027371)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0677, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0677 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0677 - **State**: PUBLISHED - **Published Date**: January 09, 2019 at 22:00 UTC - **Last Updated**: August 05, 2024 at 03:35 UTC - **Reserved Date**: November 27, 2017 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description BN-SDWBP3 firmware version 1.0.9 and earlier allows attacker with administrator rights on the same network segment to execute arbitrary OS commands via unspecified vectors. ### Affected Products **Panasonic Corporation - BN-SDWBP3** Affected versions: - firmware version 1.0.9 and earlier (Status: affected) ### References 1. [JVN#65082538](https://jvn.jp/en/jp/JVN65082538/index.html) 2. [](https://p3.support.panasonic.com/faq/show/5017?&site_domain=p3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1749, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1749 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1749 - **State**: PUBLISHED - **Published Date**: August 14, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 13:06 UTC - **Reserved Date**: March 29, 2007 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Integer underflow in the CDownloadSink class code in the Vector Markup Language (VML) component (VGX.DLL), as used in Internet Explorer 5.01, 6, and 7 allows remote attackers to execute arbitrary code via compressed content with an invalid buffer size, which triggers a heap-based buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [25310](http://www.securityfocus.com/bid/25310) 2. [26409](http://secunia.com/advisories/26409) 3. [](http://research.eeye.com/html/advisories/published/AD20070814a.html) 4. [TA07-226A](http://www.us-cert.gov/cas/techalerts/TA07-226A.html) 5. [1018568](http://www.securitytracker.com/id?1018568) 6. [MS07-050](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-050) 7. [oval:org.mitre.oval:def:1784](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1784) 8. [ADV-2007-2874](http://www.vupen.com/english/advisories/2007/2874) 9. [3020](http://securityreason.com/securityalert/3020) 10. [20070814 EEYE: VGX.DLL Compressed Content Heap Overflow Vulnerability](http://www.securityfocus.com/archive/1/476498/100/0/threaded) 11. [VU#468800](http://www.kb.cert.org/vuls/id/468800)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5266, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5266 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5266 - **State**: PUBLISHED - **Published Date**: May 27, 2025 at 12:29 UTC - **Last Updated**: May 27, 2025 at 17:46 UTC - **Reserved Date**: May 27, 2025 at 12:29 UTC - **Assigned By**: mozilla ### Vulnerability Description Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. This vulnerability affects Firefox < 139 and Firefox ESR < 128.11. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) **Mozilla - Firefox ESR** Affected versions: - unspecified (Status: affected) ### References 1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1965628) 2. [](https://www.mozilla.org/security/advisories/mfsa2025-42/) 3. [](https://www.mozilla.org/security/advisories/mfsa2025-44/) ### Credits - Jakub Szymsza
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4224, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4224 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4224 - **State**: REJECTED - **Published Date**: November 25, 2019 at 16:32 UTC - **Last Updated**: November 25, 2019 at 16:32 UTC - **Reserved Date**: June 12, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5717, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5717 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5717 - **State**: PUBLISHED - **Published Date**: January 08, 2019 at 23:00 UTC - **Last Updated**: August 04, 2024 at 20:01 UTC - **Reserved Date**: January 08, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the P_MUL dissector could crash. This was addressed in epan/dissectors/packet-p_mul.c by rejecting the invalid sequence number of zero. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15337) 2. [](https://www.wireshark.org/security/wnpa-sec-2019-02.html) 3. [[debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update](https://lists.debian.org/debian-lts-announce/2019/01/msg00022.html) 4. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bf9272a92f3df1e4ccfaad434e123222ae5313f7) 5. [106482](http://www.securityfocus.com/bid/106482) 6. [DSA-4416](https://www.debian.org/security/2019/dsa-4416) 7. [20190324 [SECURITY] [DSA 4416-1] wireshark security update](https://seclists.org/bugtraq/2019/Mar/35) 8. [openSUSE-SU-2020:0362](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4629 - **State**: PUBLISHED - **Published Date**: September 08, 2006 at 20:00 UTC - **Last Updated**: August 07, 2024 at 19:14 UTC - **Reserved Date**: September 08, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in affichage/commentaires.php in C-News.fr C-News 1.0.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [28552](http://www.osvdb.org/28552) 2. [21758](http://secunia.com/advisories/21758) 3. [19861](http://www.securityfocus.com/bid/19861) 4. [2308](https://www.exploit-db.com/exploits/2308) 5. [ADV-2006-3471](http://www.vupen.com/english/advisories/2006/3471) 6. [cnews-path-file-include(28766)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28766)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0306, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0306 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0306 - **State**: PUBLISHED - **Published Date**: January 08, 2024 at 09:00 UTC - **Last Updated**: August 01, 2024 at 18:04 UTC - **Reserved Date**: January 07, 2024 at 20:07 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Kashipara Dynamic Lab Management System up to 1.0. It has been classified as critical. This affects an unknown part of the file /admin/admin_login_process.php. The manipulation of the argument admin_password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249873 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Kashipara - Dynamic Lab Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.249873) 2. [](https://vuldb.com/?ctiid.249873) 3. [](https://github.com/E1CHO/cve_hub/blob/main/Dynamic%20Lab%20Management%20System%20-%20vuln%201.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-21026, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-21026 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-21026 - **State**: PUBLISHED - **Published Date**: November 12, 2019 at 17:42 UTC - **Last Updated**: August 05, 2024 at 12:19 UTC - **Reserved Date**: October 08, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A vulnerability in Hitachi Command Suite 7.x and 8.x before 8.6.5-00 allows an unauthenticated remote user to read internal information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/index.html) 2. [](https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2019-124/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13595, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13595 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13595 - **State**: PUBLISHED - **Published Date**: August 31, 2020 at 14:59 UTC - **Last Updated**: August 04, 2024 at 12:25 UTC - **Reserved Date**: May 26, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Bluetooth Low Energy (BLE) controller implementation in Espressif ESP-IDF 4.0 through 4.2 (for ESP32 devices) returns the wrong number of completed BLE packets and triggers a reachable assertion on the host stack when receiving a packet with an MIC failure. An attacker within radio range can silently trigger the assertion (which disables the target's BLE stack) by sending a crafted sequence of BLE packets. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://asset-group.github.io/disclosures/sweyntooth/) 2. [](https://asset-group.github.io/cves.html) 3. [](https://github.com/espressif/esp32-bt-lib)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51326, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51326 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51326 - **State**: PUBLISHED - **Published Date**: November 04, 2024 at 00:00 UTC - **Last Updated**: November 05, 2024 at 17:41 UTC - **Reserved Date**: October 28, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL Injection vulnerability in projectworlds Travel management System v.1.0 allows a remote attacker to execute arbitrary code via the 't2' parameter in deletesubcategory.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://projectworlds.in/) 2. [](https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51326%20-%20Union%20SQLi)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-13406, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-13406 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-13406 - **State**: PUBLISHED - **Published Date**: August 29, 2019 at 00:19 UTC - **Last Updated**: September 16, 2024 at 23:16 UTC - **Reserved Date**: July 08, 2019 at 00:00 UTC - **Assigned By**: twcert ### Vulnerability Description A broken access control vulnerability found in Advan VD-1 firmware versions up to 230. An attacker can send a POST request to cgibin/ApkUpload.cgi to install arbitrary APK without any authentication. ### Affected Products **AndroVideo - Advan VD-1 firmware** Affected versions: - up to 230 (Status: affected) ### References 1. [](https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md) 2. [](https://tvn.twcert.org.tw/taiwanvn/TVN-201906007) 3. [](http://surl.twcert.org.tw/hVut7) ### Credits - Keniver Wang (CHT Security)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30956, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30956 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30956 - **State**: PUBLISHED - **Published Date**: July 10, 2023 at 21:07 UTC - **Last Updated**: October 23, 2024 at 17:30 UTC - **Reserved Date**: April 21, 2023 at 11:25 UTC - **Assigned By**: Palantir ### Vulnerability Description A security defect was identified in Foundry Comments that enabled a user to discover the contents of an attachment submitted to another comment if they knew the internal UUID of the target attachment. This defect was resolved with the release of Foundry Comments 2.267.0. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **Palantir - com.palantir.comments:comments** Affected versions: - * (Status: affected) ### References 1. [](https://palantir.safebase.us/?tcuUid=40367943-738c-4e69-b852-4a503c77478a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5990, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5990 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5990 - **State**: PUBLISHED - **Published Date**: February 01, 2017 at 20:00 UTC - **Last Updated**: August 06, 2024 at 01:15 UTC - **Reserved Date**: June 29, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Privileged Identity Manager Virtual Appliance allows an authenticated user to upload malicious files that would be automatically executed by the server. ### Affected Products **IBM Corporation - Privileged Identity Manager** Affected versions: - 1.0.1 (Status: affected) - 1.0.1.1 (Status: affected) - 2.0.0 (Status: affected) - 2.0.1 (Status: affected) - 2.0.2 (Status: affected) - 2.1.0 (Status: affected) ### References 1. [](http://www.ibm.com/support/docview.wss?uid=swg21996614) 2. [95199](http://www.securityfocus.com/bid/95199)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-6481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-6481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-6481 - **State**: REJECTED - **Published Date**: July 10, 2020 at 14:17 UTC - **Last Updated**: July 10, 2020 at 14:17 UTC - **Reserved Date**: January 02, 2013 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49427, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49427 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49427 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 02:12 UTC - **Last Updated**: May 04, 2025 at 12:44 UTC - **Reserved Date**: February 26, 2025 at 02:08 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: Remove clk_disable in mtk_iommu_remove After the commit b34ea31fe013 ("iommu/mediatek: Always enable the clk on resume"), the iommu clock is controlled by the runtime callback. thus remove the clk control in the mtk_iommu_remove. Otherwise, it will warning like: echo 14018000.iommu > /sys/bus/platform/drivers/mtk-iommu/unbind [ 51.413044] ------------[ cut here ]------------ [ 51.413648] vpp0_smi_iommu already disabled [ 51.414233] WARNING: CPU: 2 PID: 157 at */v5.15-rc1/kernel/mediatek/ drivers/clk/clk.c:952 clk_core_disable+0xb0/0xb8 [ 51.417174] Hardware name: MT8195V/C(ENG) (DT) [ 51.418635] pc : clk_core_disable+0xb0/0xb8 [ 51.419177] lr : clk_core_disable+0xb0/0xb8 ... [ 51.429375] Call trace: [ 51.429694] clk_core_disable+0xb0/0xb8 [ 51.430193] clk_core_disable_lock+0x24/0x40 [ 51.430745] clk_disable+0x20/0x30 [ 51.431189] mtk_iommu_remove+0x58/0x118 [ 51.431705] platform_remove+0x28/0x60 [ 51.432197] device_release_driver_internal+0x110/0x1f0 [ 51.432873] device_driver_detach+0x18/0x28 [ 51.433418] unbind_store+0xd4/0x108 [ 51.433886] drv_attr_store+0x24/0x38 [ 51.434363] sysfs_kf_write+0x40/0x58 [ 51.434843] kernfs_fop_write_iter+0x164/0x1e0 ### Affected Products **Linux - Linux** Affected versions: - b34ea31fe013569d42b7e8681ef3f717f77c5b72 (Status: affected) - b34ea31fe013569d42b7e8681ef3f717f77c5b72 (Status: affected) - b34ea31fe013569d42b7e8681ef3f717f77c5b72 (Status: affected) - b34ea31fe013569d42b7e8681ef3f717f77c5b72 (Status: affected) - 5cad9e2caa9613fdcd246bd4ebf0ffbec1cba2ca (Status: affected) **Linux - Linux** Affected versions: - 5.13 (Status: affected) - 0 (Status: unaffected) - 5.15.46 (Status: unaffected) - 5.17.14 (Status: unaffected) - 5.18.3 (Status: unaffected) - 5.19 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/053465ab20dcd324a43a1811ee98e5721e6a3e65) 2. [](https://git.kernel.org/stable/c/9b3bd97acb4f8954b8a43a5d63ed9050d463b4e1) 3. [](https://git.kernel.org/stable/c/6eaa046c696c83542c56765cdde564d9818ff1fb) 4. [](https://git.kernel.org/stable/c/98df772bdd1c4ce717a26289efea15cbbe4b64ed)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3379, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3379 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3379 - **State**: REJECTED - **Published Date**: August 31, 2012 at 18:00 UTC - **Last Updated**: September 16, 2024 at 17:28 UTC - **Reserved Date**: June 14, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31927, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31927 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31927 - **State**: PUBLISHED - **Published Date**: April 11, 2024 at 12:38 UTC - **Last Updated**: August 02, 2024 at 01:59 UTC - **Reserved Date**: April 07, 2024 at 18:10 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aminur Islam WP Login and Logout Redirect allows Stored XSS.This issue affects WP Login and Logout Redirect: from n/a through 1.2. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Aminur Islam - WP Login and Logout Redirect** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-login-and-logout-redirect/wordpress-wp-login-and-logout-redirect-plugin-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Dhabaleshwar Das (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3774, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3774 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3774 - **State**: PUBLISHED - **Published Date**: July 15, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 14:28 UTC - **Reserved Date**: July 15, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Dvbbs 7.1.0 SP1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for Data/Dvbbs7.mdb. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [39747](http://osvdb.org/39747) 2. [2886](http://securityreason.com/securityalert/2886) 3. [20070711 Powered By Dvbbs Version 7.1.0 Sp1 By Pass](http://www.securityfocus.com/archive/1/473374/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23188, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23188 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23188 - **State**: PUBLISHED - **Published Date**: August 18, 2022 at 19:43 UTC - **Last Updated**: May 05, 2025 at 16:54 UTC - **Reserved Date**: December 09, 2021 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an authenticated user to potentially enable information disclosure via local access. ### Affected Products **n/a - Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products** Affected versions: - See references (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-50357, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-50357 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-50357 - **State**: PUBLISHED - **Published Date**: January 31, 2024 at 10:16 UTC - **Last Updated**: August 23, 2024 at 18:19 UTC - **Reserved Date**: December 07, 2023 at 06:35 UTC - **Assigned By**: CERTVDE ### Vulnerability Description A cross site scripting vulnerability in the AREAL SAS Websrv1 ASP website allows a remote low-privileged attacker to gain escalated privileges of other non-admin users. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **AREAL SAS - Webserv1** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.areal-topkapi.com/en/services/security-bulletins)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6219, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6219 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6219 - **State**: PUBLISHED - **Published Date**: April 19, 2014 at 21:00 UTC - **Last Updated**: August 06, 2024 at 17:29 UTC - **Reserved Date**: October 21, 2013 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Unspecified vulnerability in HP HP-UX Whitelisting (aka WLI) before A.01.02.02 on HP-UX B.11.31 allows local users to bypass intended access restrictions via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SSRT101382](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04227671) 2. [HPSBUX03001](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04227671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6614, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6614 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6614 - **State**: PUBLISHED - **Published Date**: December 18, 2006 at 02:00 UTC - **Last Updated**: August 07, 2024 at 20:33 UTC - **Reserved Date**: December 17, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The save_log_local function in Fully Automatic Installation (FAI) 2.10.1, and possibly 3.1.2, when verbose mode is enabled, stores the root password hash in /var/log/fai/current/fai.log, whose file permissions allow it to be copied to other hosts when fai-savelog is called and allows attackers to obtain the hash. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [23330](http://secunia.com/advisories/23330) 2. [fai-log-file-info-disclosure(30892)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30892) 3. [ADV-2006-4995](http://www.vupen.com/english/advisories/2006/4995) 4. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=402644) 5. [21579](http://www.securityfocus.com/bid/21579)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27962, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27962 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27962 - **State**: PUBLISHED - **Published Date**: March 22, 2021 at 13:55 UTC - **Last Updated**: August 03, 2024 at 21:33 UTC - **Reserved Date**: March 05, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Grafana Enterprise 7.2.x and 7.3.x before 7.3.10 and 7.4.x before 7.4.5 allows a dashboard editor to bypass a permission check concerning a data source they should not be able to access. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://community.grafana.com/t/release-notes-v6-7-x/27119) 2. [](https://community.grafana.com) 3. [](http://www.openwall.com/lists/oss-security/2021/03/19/5) 4. [](https://grafana.com/blog/2021/03/18/grafana-6.7.6-7.3.10-and-7.4.5-released-with-important-security-fixes-for-grafana-enterprise/) 5. [](https://community.grafana.com/t/grafana-enterprise-6-7-6-7-3-10-and-7-4-5-security-update/44724) 6. [](https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-5/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4682, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4682 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4682 - **State**: PUBLISHED - **Published Date**: February 20, 2017 at 08:35 UTC - **Last Updated**: August 06, 2024 at 00:39 UTC - **Reserved Date**: May 11, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An issue was discovered in certain Apple products. macOS before 10.12 is affected. macOS before 10.12.1 is affected. The issue involves the "ImageIO" component. It allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted SGI file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1037086](http://www.securitytracker.com/id/1037086) 2. [93852](http://www.securityfocus.com/bid/93852) 3. [](https://support.apple.com/HT207275) 4. [](https://support.apple.com/HT207170)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1577, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1577 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1577 - **State**: PUBLISHED - **Published Date**: February 05, 2010 at 22:13 UTC - **Last Updated**: August 08, 2024 at 02:35 UTC - **Reserved Date**: February 05, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Sun ONE (aka iPlanet) Web Server 4.1 through SP12 and 6.0 through SP5, when DNS resolution is enabled for client IP addresses, allows remote attackers to inject arbitrary text into log files, and conduct cross-site scripting (XSS) attacks involving the iPlanet Log Analyzer, via an HTTP request in conjunction with a crafted DNS response, related to an "Inverse Lookup Log Corruption (ILLC)" issue, a different vulnerability than CVE-2002-1315 and CVE-2002-1316. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [201453](http://sunsolve.sun.com/search/document.do?assetkey=1-66-201453-1) 2. [sunone-iplanetlog-xss(56632)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56632) 3. [20030304 Log corruption on multiple webservers, log analyzers,...](http://www.securityfocus.com/archive/1/313867)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0138, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0138 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0138 - **State**: PUBLISHED - **Published Date**: June 11, 2020 at 14:43 UTC - **Last Updated**: August 04, 2024 at 05:47 UTC - **Reserved Date**: October 17, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In get_element_attr_rsp of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if bluetoothtbd were used, which it isn't in typical Android platforms, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142878416 ### Affected Products **n/a - Android** Affected versions: - Android-10 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2020-06-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5124, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5124 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5124 - **State**: PUBLISHED - **Published Date**: November 18, 2008 at 00:00 UTC - **Last Updated**: August 07, 2024 at 10:40 UTC - **Reserved Date**: November 17, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description JSCAPE Secure FTP Applet 4.8.0 and earlier does not ask the user to verify a new or mismatched SSH host key, which makes it easier for remote attackers to perform man-in-the-middle attacks. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20080623 n.runs-SA-2008.001 - Jscape Secure FTP Applet](http://www.securityfocus.com/archive/1/493569/100/0/threaded) 2. [30822](http://secunia.com/advisories/30822) 3. [29882](http://www.securityfocus.com/bid/29882) 4. [ADV-2008-1919](http://www.vupen.com/english/advisories/2008/1919/references) 5. [jscape-certificate-spoofing(43300)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43300) 6. [1020346](http://www.securitytracker.com/id?1020346) 7. [](http://www.jscape.com/sftpapplet/docs/HTML/index.html?introhistory.html) 8. [20080625 ERRATA - n.runs-SA-2008.001 - Jscape Secure FTP Applet](http://www.securityfocus.com/archive/1/493652/100/0/threaded) 9. [4606](http://securityreason.com/securityalert/4606)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-6838, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-6838 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-6838 - **State**: PUBLISHED - **Published Date**: September 17, 2019 at 19:16 UTC - **Last Updated**: August 04, 2024 at 20:31 UTC - **Reserved Date**: January 25, 2019 at 00:00 UTC - **Assigned By**: schneider ### Vulnerability Description A CWE-863: Incorrect Authorization vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could allow a user with low privileges to delete a critical file. ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **n/a - U.motion Servers (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, and MEG6260-0415 - U.motion KNX Server Plus, Touch 1)** Affected versions: - U.motion Servers (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, and MEG6260-0415 - U.motion KNX Server Plus, Touch 1) (Status: affected) ### References 1. [](https://www.se.com/ww/en/download/document/SEVD-2019-253-01/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2866, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2866 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2866 - **State**: PUBLISHED - **Published Date**: May 25, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 13:57 UTC - **Reserved Date**: May 25, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in modules/admin/modules/gallery.php in PHPEcho CMS 2.0-rc1 and earlier allow remote attackers to execute arbitrary SQL commands via the id parameter and possibly other parameters. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2007-1937](http://www.vupen.com/english/advisories/2007/1937) 2. [](http://sourceforge.net/project/shownotes.php?release_id=495821&group_id=186100) 3. [38053](http://osvdb.org/38053)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30635, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30635 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30635 - **State**: PUBLISHED - **Published Date**: March 29, 2024 at 00:00 UTC - **Last Updated**: March 25, 2025 at 14:42 UTC - **Reserved Date**: March 27, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability located in the funcpara1 parameter in the formSetCfm function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formSetCfm.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-3958, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-3958 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-3958 - **State**: PUBLISHED - **Published Date**: October 02, 2018 at 21:00 UTC - **Last Updated**: September 17, 2024 at 03:55 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A use-after-free condition can occur when accessing the Subject property of the this.info object. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. ### Affected Products **Foxit - Foxit PDF Reader** Affected versions: - Foxit Software Foxit PDF Reader 9.1.0.5096. (Status: affected) ### References 1. [1041769](http://www.securitytracker.com/id/1041769) 2. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3147, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3147 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3147 - **State**: PUBLISHED - **Published Date**: January 23, 2017 at 21:00 UTC - **Last Updated**: August 05, 2024 at 23:47 UTC - **Reserved Date**: March 14, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the collector.exe listener of the Landesk Management Suite 10.0.0.271 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [93565](http://www.securityfocus.com/bid/93565) 2. [](https://www.securifera.com/advisories/cve-2016-3147/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2079, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2079 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2079 - **State**: PUBLISHED - **Published Date**: June 16, 2009 at 19:00 UTC - **Last Updated**: September 17, 2024 at 03:43 UTC - **Reserved Date**: June 16, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the administrative page interface in Taxonomy manager 5.x before 5.x-1.2 and 6.x before 6.x-1.1, a module for Drupal, allows remote authenticated users, with administer taxonomy privileges or the ability to use free tagging to add taxonomy terms, to inject arbitrary web script or HTML via (1) vocabulary names, (2) synonyms, and (3) term names. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://drupal.org/node/487602) 2. [](http://lampsecurity.org/drupal-6-taxonomy-manager-xss-vulnerability) 3. [](http://drupal.org/node/487620) 4. [35391](http://secunia.com/advisories/35391) 5. [35286](http://www.securityfocus.com/bid/35286) 6. [](http://drupal.org/node/487818)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6027, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6027 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6027 - **State**: PUBLISHED - **Published Date**: May 19, 2017 at 02:43 UTC - **Last Updated**: August 05, 2024 at 15:18 UTC - **Reserved Date**: February 16, 2017 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description An Arbitrary File Upload issue was discovered in 3S-Smart Software Solutions GmbH CODESYS Web Server. The following versions of CODESYS Web Server, part of the CODESYS WebVisu web browser visualization software, are affected: CODESYS Web Server Versions 2.3 and prior. A specially crafted web server request may allow the upload of arbitrary files (with a dangerous type) to the CODESYS Web Server without authorization which may allow remote code execution. ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **n/a - 3S-Smart Software Solutions GmbH CODESYS Web Server** Affected versions: - 3S-Smart Software Solutions GmbH CODESYS Web Server (Status: affected) ### References 1. [97174](http://www.securityfocus.com/bid/97174) 2. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-087-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-7119, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-7119 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-7119 - **State**: PUBLISHED - **Published Date**: August 28, 2009 at 15:00 UTC - **Last Updated**: August 07, 2024 at 11:56 UTC - **Reserved Date**: August 28, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in item.php in WeBid auction script 0.5.4 allows remote attackers to execute arbitrary SQL commands via the id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [webid-item-admin-sql-injection(44817)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44817) 2. [30945](http://www.securityfocus.com/bid/30945) 3. [6341](https://www.exploit-db.com/exploits/6341)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11490, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11490 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11490 - **State**: PUBLISHED - **Published Date**: May 26, 2018 at 00:00 UTC - **Last Updated**: August 05, 2024 at 08:10 UTC - **Reserved Date**: May 26, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain "Private->RunningCode - 2" array index is not checked. This will lead to a denial of service or possibly unspecified other impact. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [104327](http://www.securityfocus.com/bid/104327) 2. [](https://github.com/pts/sam2p/issues/38) 3. [USN-4107-1](https://usn.ubuntu.com/4107-1/) 4. [[debian-lts-announce] 20221205 [SECURITY] [DLA 3223-1] giflib security update](https://lists.debian.org/debian-lts-announce/2022/12/msg00008.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2105, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2105 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2105 - **State**: PUBLISHED - **Published Date**: January 29, 2020 at 15:15 UTC - **Last Updated**: August 04, 2024 at 07:01 UTC - **Reserved Date**: December 05, 2019 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description REST API endpoints in Jenkins 2.218 and earlier, LTS 2.204.1 and earlier were vulnerable to clickjacking attacks. ### Affected Products **Jenkins project - Jenkins** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://jenkins.io/security/advisory/2020-01-29/#SECURITY-1704) 2. [[oss-security] 20200129 Multiple vulnerabilities in Jenkins and Jenkins plugins](http://www.openwall.com/lists/oss-security/2020/01/29/1) 3. [RHSA-2020:0681](https://access.redhat.com/errata/RHSA-2020:0681) 4. [RHSA-2020:0683](https://access.redhat.com/errata/RHSA-2020:0683) 5. [RHBA-2020:0402](https://access.redhat.com/errata/RHBA-2020:0402) 6. [RHBA-2020:0675](https://access.redhat.com/errata/RHBA-2020:0675)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9387, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9387 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9387 - **State**: PUBLISHED - **Published Date**: December 17, 2014 at 19:00 UTC - **Last Updated**: August 06, 2024 at 13:40 UTC - **Reserved Date**: December 17, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SAP BusinessObjects Edge 4.1 allows remote attackers to obtain the SI_PLATFORM_SEARCH_SERVER_LOGON_TOKEN token and gain privileges via a crafted CORBA call, aka SAP Note 2039905. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.onapsis.com/research/security-advisories/sap-business-objects-search-token-privilege-escalation-via-corba) 2. [20141216 [Onapsis Security Advisory 2014-034] SAP Business Objects Search Token Privilege Escalation via CORBA](http://seclists.org/fulldisclosure/2014/Dec/60) 3. [20141216 [Onapsis Security Advisory 2014-034] SAP Business Objects Search Token Privilege Escalation via CORBA](http://www.securityfocus.com/archive/1/534249/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4805, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4805 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4805 - **State**: REJECTED - **Published Date**: December 30, 2019 at 16:19 UTC - **Last Updated**: December 30, 2019 at 16:19 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28134, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28134 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28134 - **State**: PUBLISHED - **Published Date**: March 29, 2022 at 12:30 UTC - **Last Updated**: August 03, 2024 at 05:48 UTC - **Reserved Date**: March 29, 2022 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to create, view, and delete BitBucket Server consumers. ### Affected Products **Jenkins project - Jenkins Bitbucket Server Integration Plugin** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2640) 2. [[oss-security] 20220329 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/03/29/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-47363, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-47363 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-47363 - **State**: PUBLISHED - **Published Date**: May 21, 2024 at 15:03 UTC - **Last Updated**: May 04, 2025 at 07:09 UTC - **Reserved Date**: May 21, 2024 at 14:58 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: nexthop: Fix division by zero while replacing a resilient group The resilient nexthop group torture tests in fib_nexthop.sh exposed a possible division by zero while replacing a resilient group [1]. The division by zero occurs when the data path sees a resilient nexthop group with zero buckets. The tests replace a resilient nexthop group in a loop while traffic is forwarded through it. The tests do not specify the number of buckets while performing the replacement, resulting in the kernel allocating a stub resilient table (i.e, 'struct nh_res_table') with zero buckets. This table should never be visible to the data path, but the old nexthop group (i.e., 'oldg') might still be used by the data path when the stub table is assigned to it. Fix this by only assigning the stub table to the old nexthop group after making sure the group is no longer used by the data path. Tested with fib_nexthops.sh: Tests passed: 222 Tests failed: 0 [1] divide error: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 1850 Comm: ping Not tainted 5.14.0-custom-10271-ga86eb53057fe #1107 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014 RIP: 0010:nexthop_select_path+0x2d2/0x1a80 [...] Call Trace: fib_select_multipath+0x79b/0x1530 fib_select_path+0x8fb/0x1c10 ip_route_output_key_hash_rcu+0x1198/0x2da0 ip_route_output_key_hash+0x190/0x340 ip_route_output_flow+0x21/0x120 raw_sendmsg+0x91d/0x2e10 inet_sendmsg+0x9e/0xe0 __sys_sendto+0x23d/0x360 __x64_sys_sendto+0xe1/0x1b0 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae ### Affected Products **Linux - Linux** Affected versions: - 283a72a5599e80750699d2021830a294ed9ab3f3 (Status: affected) - 283a72a5599e80750699d2021830a294ed9ab3f3 (Status: affected) **Linux - Linux** Affected versions: - 5.13 (Status: affected) - 0 (Status: unaffected) - 5.14.9 (Status: unaffected) - 5.15 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/e9d32ec26e7f01d1af13bdc687f586362546aa25) 2. [](https://git.kernel.org/stable/c/563f23b002534176f49524b5ca0e1d94d8906c40)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-32608, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-32608 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-32608 - **State**: PUBLISHED - **Published Date**: October 09, 2024 at 00:00 UTC - **Last Updated**: March 25, 2025 at 16:10 UTC - **Reserved Date**: April 16, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HDF5 library through 1.14.3 has memory corruption in H5A__close resulting in the corruption of the instruction pointer and causing denial of service or potential code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1000011, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1000011 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1000011 - **State**: PUBLISHED - **Published Date**: October 06, 2016 at 14:00 UTC - **Last Updated**: August 06, 2024 at 08:58 UTC - **Reserved Date**: June 07, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Blind SQL Injection in wordpress plugin dukapress v2.5.9 ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.vapidlabs.com/advisory.php?v=152) 2. [94567](http://www.securityfocus.com/bid/94567)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14368, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14368 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14368 - **State**: PUBLISHED - **Published Date**: July 19, 2018 at 02:00 UTC - **Last Updated**: August 05, 2024 at 09:29 UTC - **Reserved Date**: July 17, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.wireshark.org/security/wnpa-sec-2018-40.html) 2. [1041608](http://www.securitytracker.com/id/1041608) 3. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6c44312f465014eb409d766a9828b7f101f6251c) 4. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14841) 5. [[debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00045.html) 6. [104847](http://www.securityfocus.com/bid/104847) 7. [openSUSE-SU-2020:0362](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1480, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1480 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1480 - **State**: PUBLISHED - **Published Date**: October 28, 2016 at 10:00 UTC - **Last Updated**: August 05, 2024 at 22:55 UTC - **Reserved Date**: January 04, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. Affected Products: all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA, both virtual and hardware appliances, if the software is configured with message or content filters to scan incoming email attachments. More Information: CSCuw03606, CSCux59734. Known Affected Releases: 8.0.0-000 8.5.6-106 9.0.0-000 9.1.0-032 9.6.0-042 9.5.0-444 WSA10.0.0-000. Known Fixed Releases: 9.1.1-038 9.7.1-066. ### Affected Products **n/a - Cisco AsyncOS through WSA10.0.0-000** Affected versions: - Cisco AsyncOS through WSA10.0.0-000 (Status: affected) ### References 1. [1037117](http://www.securitytracker.com/id/1037117) 2. [1037116](http://www.securitytracker.com/id/1037116) 3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa1) 4. [93914](http://www.securityfocus.com/bid/93914)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38394, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38394 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38394 - **State**: PUBLISHED - **Published Date**: October 04, 2021 at 17:34 UTC - **Last Updated**: September 16, 2024 at 18:59 UTC - **Reserved Date**: August 10, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description An attacker with physical access to the device can extract the binary that checks for the hardware key and reverse engineer it, which could be used to create a physical duplicate of a valid hardware key. The hardware key allows access to special settings when inserted. ### CVSS Metrics - **CVSS Base Score**: 6.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L` ### Weakness Classification (CWE) - CWE-1278: Security Weakness ### Affected Products **Boston Scientific - ZOOM LATITUDE** Affected versions: - Model 3120 (Status: affected) ### References 1. [](https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01) ### Credits - Endres Puschner - Max Planck Institute for Security and Privacy, Bochum, Christoph Saatjohann - FH Münster University of Applied Sciences, Christian Dresen - FH Münster University of Applied Sciences, and Markus Willing - University of Muenster, discovered these issues as part of broader academic research of cardiac devices and reported them to Boston Scientific.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13157, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13157 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13157 - **State**: PUBLISHED - **Published Date**: July 05, 2018 at 02:00 UTC - **Last Updated**: August 05, 2024 at 08:52 UTC - **Reserved Date**: July 04, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The mintToken function of a smart contract implementation for CryptonitexCoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md) 2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/CryptonitexCoin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2991, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2991 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2991 - **State**: PUBLISHED - **Published Date**: September 19, 2012 at 19:00 UTC - **Last Updated**: August 06, 2024 at 19:50 UTC - **Reserved Date**: May 30, 2012 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The PayPal (aka MODULE_PAYMENT_PAYPAL_STANDARD) module before 1.1 in osCommerce Online Merchant before 2.3.4 allows remote attackers to set the payment recipient via a modified value of the merchant's e-mail address, as demonstrated by setting the recipient to one's self. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#459446](http://www.kb.cert.org/vuls/id/459446) 2. [50640](http://secunia.com/advisories/50640)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33383, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33383 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33383 - **State**: PUBLISHED - **Published Date**: August 02, 2023 at 00:00 UTC - **Last Updated**: October 17, 2024 at 18:24 UTC - **Reserved Date**: May 22, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Shelly 4PM Pro four-channel smart switch 0.11.0 allows an attacker to trigger a BLE out of bounds read fault condition that results in a device reload. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.exploitsecurity.io/post/cve-2023-33383-authentication-bypass-via-an-out-of-bounds-read-vulnerability) 2. [](http://packetstormsecurity.com/files/173954/Shelly-PRO-4PM-0.11.0-Authentication-Bypass.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1218, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1218 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1218 - **State**: PUBLISHED - **Published Date**: July 19, 2017 at 20:00 UTC - **Last Updated**: September 16, 2024 at 19:39 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Tivoli Endpoint Manager is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 123858. ### Affected Products **IBM - BigFix family** Affected versions: - 9.2 (Status: affected) - 9.5 (Status: affected) ### References 1. [99916](http://www.securityfocus.com/bid/99916) 2. [101571](http://www.securityfocus.com/bid/101571) 3. [](http://www.ibm.com/support/docview.wss?uid=swg22005246) 4. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/123858)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48107, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48107 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48107 - **State**: PUBLISHED - **Published Date**: October 28, 2024 at 00:00 UTC - **Last Updated**: October 30, 2024 at 16:59 UTC - **Reserved Date**: October 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SparkShop <=1.1.7 is vulnerable to server-side request forgery (SSRF). This vulnerability allows attacks to scan ports on the Intranet or local network where the server resides, attack applications running on the Intranet or local network, or read metadata on the cloud server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitee.com/sparkshop/sparkshop) 2. [](https://gist.github.com/RMAX2000/ebb654016e5b8a5b55aa6d8a7f2f321a#file-cve-2024-48107)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1615, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1615 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1615 - **State**: PUBLISHED - **Published Date**: March 25, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 03:34 UTC - **Reserved Date**: March 25, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to execute arbitrary code via (1) msgchk or (2) .upd..loader. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SSRT2275](http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11) 2. [VU#506441](http://www.kb.cert.org/vuls/id/506441) 3. [tru64-multiple-binaries-bo(10016)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10016)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0326, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0326 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0326 - **State**: PUBLISHED - **Published Date**: January 17, 2008 at 21:07 UTC - **Last Updated**: August 07, 2024 at 07:39 UTC - **Reserved Date**: January 17, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in class/show.php in FaScript FaPersianHack 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter to show.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [28565](http://secunia.com/advisories/28565) 2. [27302](http://www.securityfocus.com/bid/27302) 3. [4917](https://www.exploit-db.com/exploits/4917) 4. [fascriptfapersianhack-show-sql-injection(39717)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39717)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4378, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4378 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4378 - **State**: PUBLISHED - **Published Date**: August 26, 2016 at 19:00 UTC - **Last Updated**: August 06, 2024 at 00:25 UTC - **Reserved Date**: April 29, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The (1) Device Manager, (2) Tiered Storage Manager, (3) Replication Manager, (4) Replication Monitor, and (5) Hitachi Automation Director (HAD) components in HPE XP P9000 Command View Advanced Edition Software before 8.4.1-00 and XP7 Command View Advanced Edition Suite before 8.4.1-00 allow remote attackers to obtain sensitive information via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05241355) 2. [1036686](http://www.securitytracker.com/id/1036686) 3. [92649](http://www.securityfocus.com/bid/92649)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3225, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3225 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3225 - **State**: PUBLISHED - **Published Date**: July 24, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 14:16 UTC - **Reserved Date**: December 05, 2016 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. For devices utilizing this environment encryption mode, U-Boot's use of a zero initialization vector may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data. Das U-Boot's AES-CBC encryption feature uses a zero (0) initialization vector. This allows an attacker to perform dictionary attacks on encrypted data produced by Das U-Boot to learn information about the encrypted data. ### Weakness Classification (CWE) - CWE-329: Security Weakness ### Affected Products **Das - U-Boot** Affected versions: - 2017.09 (Status: affected) ### References 1. [100675](http://www.securityfocus.com/bid/100675) 2. [VU#166743](https://www.kb.cert.org/vuls/id/166743)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7307, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7307 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7307 - **State**: PUBLISHED - **Published Date**: August 13, 2020 at 03:20 UTC - **Last Updated**: August 04, 2024 at 09:25 UTC - **Reserved Date**: January 21, 2020 at 00:00 UTC - **Assigned By**: trellix ### Vulnerability Description Unprotected Storage of Credentials vulnerability in McAfee Data Loss Prevention (DLP) for Mac prior to 11.5.2 allows local users to gain access to the RiskDB username and password via unprotected log files containing plain text credentials. ### CVSS Metrics - **CVSS Base Score**: 5.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-522: Security Weakness ### Affected Products **McAfee - Data Loss Prevention(DLP)** Affected versions: - 11.3 (Status: affected) - 11.4 (Status: affected) - 11.5 (Status: affected) ### References 1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10326)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6345, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6345 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6345 - **State**: PUBLISHED - **Published Date**: September 07, 2016 at 18:00 UTC - **Last Updated**: August 06, 2024 at 01:29 UTC - **Reserved Date**: July 26, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description RESTEasy allows remote authenticated users to obtain sensitive information by leveraging "insufficient use of random values" in async jobs. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1372117) 2. [92746](http://www.securityfocus.com/bid/92746)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2267, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2267 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2267 - **State**: PUBLISHED - **Published Date**: April 22, 2021 at 21:53 UTC - **Last Updated**: September 26, 2024 at 14:57 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Labor Distribution product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Labor Distribution. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Labor Distribution accessible data as well as unauthorized access to critical data or complete access to all Oracle Labor Distribution accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N` ### Affected Products **Oracle Corporation - Labor Distribution** Affected versions: - 12.1.1-12.1.3 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26321, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26321 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26321 - **State**: REJECTED - **Last Updated**: December 02, 2022 at 00:00 UTC - **Reserved Date**: October 01, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2583, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2583 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2583 - **State**: PUBLISHED - **Published Date**: July 23, 2009 at 20:00 UTC - **Last Updated**: August 07, 2024 at 05:59 UTC - **Reserved Date**: July 23, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple session fixation vulnerabilities in IBM Tivoli Identity Manager (ITIM) 5.0.0.6 allow remote attackers to hijack web sessions via unspecified vectors involving the (1) console and (2) self service interfaces. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [35779](http://www.securityfocus.com/bid/35779) 2. [IZ55659](http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55659) 3. [35931](http://secunia.com/advisories/35931) 4. [ADV-2009-1990](http://www.vupen.com/english/advisories/2009/1990) 5. [1022597](http://www.securitytracker.com/id?1022597) 6. [](http://www-01.ibm.com/support/docview.wss?uid=swg24023826)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-49176, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-49176 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-49176 - **State**: PUBLISHED - **Published Date**: December 15, 2023 at 14:20 UTC - **Last Updated**: August 02, 2024 at 21:53 UTC - **Reserved Date**: November 22, 2023 at 23:36 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeRevolution WP Pocket URLs allows Reflected XSS.This issue affects WP Pocket URLs: from n/a through 1.0.2. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **CodeRevolution - WP Pocket URLs** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-pocket-urls/wordpress-wp-pocket-urls-plugin-1-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SeungYongLee (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34446, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34446 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34446 - **State**: PUBLISHED - **Published Date**: October 25, 2023 at 15:35 UTC - **Last Updated**: September 10, 2024 at 20:42 UTC - **Reserved Date**: June 06, 2023 at 16:16 UTC - **Assigned By**: GitHub_M ### Vulnerability Description iTop is an open source, web-based IT service management platform. Prior to versions 3.0.4 and 3.1.0, when displaying `pages/preferences.php`, cross site scripting is possible. This issue is fixed in versions 3.0.4 and 3.1.0. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Combodo - iTop** Affected versions: - < 3.0.4 (Status: affected) ### References 1. [https://github.com/Combodo/iTop/security/advisories/GHSA-q4pp-j46r-gm68](https://github.com/Combodo/iTop/security/advisories/GHSA-q4pp-j46r-gm68) 2. [https://github.com/Combodo/iTop/commit/e3ba826e5dfd3b724f1ee97bebfd20ded3c70b10](https://github.com/Combodo/iTop/commit/e3ba826e5dfd3b724f1ee97bebfd20ded3c70b10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15980, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15980 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15980 - **State**: PUBLISHED - **Published Date**: November 29, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 10:10 UTC - **Reserved Date**: August 28, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Photoshop CC versions 19.1.6 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. ### Affected Products **Adobe - Adobe Photoshop CC** Affected versions: - 19.1.6 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/photoshop/apsb18-43.html) 2. [1042097](http://www.securitytracker.com/id/1042097) 3. [105905](http://www.securityfocus.com/bid/105905)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30364, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30364 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30364 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 16:27 UTC - **Last Updated**: March 27, 2025 at 18:44 UTC - **Reserved Date**: March 21, 2025 at 14:12 UTC - **Assigned By**: GitHub_M ### Vulnerability Description WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was identified in versions prior to 3.2.8 in the endpoint /WeGIA/html/funcionario/remuneracao.php, in the id_funcionario parameter. This vulnerability allows the execution of arbitrary SQL commands, which can compromise the confidentiality, integrity, and availability of stored data. Version 3.2.8 fixes the issue. ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **LabRedesCefetRJ - WeGIA** Affected versions: - < 3.2.8 (Status: affected) ### References 1. [https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x3ff-5qp7-43qv](https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x3ff-5qp7-43qv)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1026, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1026 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1026 - **State**: PUBLISHED - **Published Date**: September 16, 2013 at 01:00 UTC - **Last Updated**: August 06, 2024 at 14:49 UTC - **Reserved Date**: January 10, 2013 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Buffer overflow in ImageIO in Apple Mac OS X before 10.8.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted JPEG2000 data in a PDF document. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [54886](http://secunia.com/advisories/54886) 2. [](http://support.apple.com/kb/HT5934) 3. [APPLE-SA-2013-09-12-1](http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html) 4. [](http://support.apple.com/kb/HT5880) 5. [APPLE-SA-2013-09-18-2](http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5104, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5104 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5104 - **State**: PUBLISHED - **Published Date**: May 19, 2024 at 22:00 UTC - **Last Updated**: August 01, 2024 at 21:03 UTC - **Reserved Date**: May 19, 2024 at 04:56 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /view/student_grade_wise.php. The manipulation of the argument grade leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-265094 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Campcodes - Complete Web-Based School Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-265094 | Campcodes Complete Web-Based School Management System student_grade_wise.php sql injection](https://vuldb.com/?id.265094) 2. [VDB-265094 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.265094) 3. [Submit #338507 | Campcodes Complete Web-Based School Management System ≤1.0 SQL Injection](https://vuldb.com/?submit.338507) 4. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%209.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4146, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4146 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4146 - **State**: PUBLISHED - **Published Date**: August 06, 2012 at 16:00 UTC - **Last Updated**: September 16, 2024 at 20:11 UTC - **Reserved Date**: August 06, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Opera before 12.01 allows remote attackers to cause a denial of service (application crash) via a crafted web site, as demonstrated by the Lenovo "Shop now" page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.opera.com/docs/changelogs/windows/1201/) 2. [](http://www.opera.com/docs/changelogs/mac/1201/) 3. [](http://www.opera.com/docs/changelogs/unix/1201/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5475, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5475 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5475 - **State**: PUBLISHED - **Published Date**: February 19, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 05:40 UTC - **Reserved Date**: January 12, 2018 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description A Stack-based Buffer Overflow issue was discovered in GE D60 Line Distance Relay devices running firmware Version 7.11 and prior. Multiple stack-based buffer overflow vulnerabilities have been identified, which may allow remote code execution. ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **n/a - GE D60 Line Distance Relay** Affected versions: - GE D60 Line Distance Relay (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-046-02) 2. [103054](http://www.securityfocus.com/bid/103054)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0064, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0064 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0064 - **State**: PUBLISHED - **Published Date**: February 11, 2025 at 00:33 UTC - **Last Updated**: February 18, 2025 at 18:07 UTC - **Reserved Date**: December 05, 2024 at 21:53 UTC - **Assigned By**: sap ### Vulnerability Description Under specific conditions, the Central Management Console of the SAP BusinessObjects Business Intelligence platform allows an attacker with admin rights to generate or retrieve a secret passphrase, enabling them to impersonate any user in the system. This results in a high impact on confidentiality and integrity, with no impact on availability. ### CVSS Metrics - **CVSS Base Score**: 8.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-732: Security Weakness ### Affected Products **SAP_SE - SAP BusinessObjects Business Intelligence platform (Central Management Console)** Affected versions: - ENTERPRISE 430 (Status: affected) - 2025 (Status: affected) ### References 1. [](https://me.sap.com/notes/3525794) 2. [](https://url.sap/sapsecuritypatchday)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54124, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54124 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54124 - **State**: PUBLISHED - **Published Date**: November 29, 2024 at 00:00 UTC - **Last Updated**: November 29, 2024 at 18:20 UTC - **Reserved Date**: November 29, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Click Studios Passwordstate before build 9920, there is a potential permission escalation on the edit folder screen. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.clickstudios.com.au/passwordstate-changelog.aspx) 2. [](https://www.clickstudios.com.au/security/advisories/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52690, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52690 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52690 - **State**: PUBLISHED - **Published Date**: May 17, 2024 at 14:24 UTC - **Last Updated**: May 04, 2025 at 07:41 UTC - **Reserved Date**: March 07, 2024 at 14:49 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null pointer check to scom_debug_init_one() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Add a null pointer check, and release 'ent' to avoid memory leaks. ### Affected Products **Linux - Linux** Affected versions: - bfd2f0d49aef8abfe6bf58f12719f39912993cc6 (Status: affected) - bfd2f0d49aef8abfe6bf58f12719f39912993cc6 (Status: affected) - bfd2f0d49aef8abfe6bf58f12719f39912993cc6 (Status: affected) - bfd2f0d49aef8abfe6bf58f12719f39912993cc6 (Status: affected) - bfd2f0d49aef8abfe6bf58f12719f39912993cc6 (Status: affected) - bfd2f0d49aef8abfe6bf58f12719f39912993cc6 (Status: affected) - bfd2f0d49aef8abfe6bf58f12719f39912993cc6 (Status: affected) **Linux - Linux** Affected versions: - 5.4 (Status: affected) - 0 (Status: unaffected) - 5.4.268 (Status: unaffected) - 5.10.209 (Status: unaffected) - 5.15.148 (Status: unaffected) - 6.1.75 (Status: unaffected) - 6.6.14 (Status: unaffected) - 6.7.2 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/f84c1446daa552e9699da8d1f8375eac0f65edc7) 2. [](https://git.kernel.org/stable/c/1eefa93faf69188540b08b024794fa90b1d82e8b) 3. [](https://git.kernel.org/stable/c/2a82c4439b903639e0a1f21990cd399fb0a49c19) 4. [](https://git.kernel.org/stable/c/ed8d023cfa97b559db58c0e1afdd2eec7a83d8f2) 5. [](https://git.kernel.org/stable/c/dd8422ff271c22058560832fc3006324ded895a9) 6. [](https://git.kernel.org/stable/c/a9c05cbb6644a2103c75b6906e9dafb9981ebd13) 7. [](https://git.kernel.org/stable/c/9a260f2dd827bbc82cc60eb4f4d8c22707d80742)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16797 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:51 UTC - **Last Updated**: December 20, 2021 at 22:51 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-33328, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-33328 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-33328 - **State**: PUBLISHED - **Published Date**: June 30, 2022 at 19:05 UTC - **Last Updated**: April 15, 2025 at 18:59 UTC - **Reserved Date**: June 14, 2022 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/remove/` API is affected by a command injection vulnerability. ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Robustel - R1510** Affected versions: - 3.3.0 (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14639, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14639 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14639 - **State**: REJECTED - **Last Updated**: February 28, 2023 at 00:00 UTC - **Reserved Date**: August 03, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3683, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3683 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3683 - **State**: PUBLISHED - **Published Date**: July 25, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 20:13 UTC - **Reserved Date**: June 19, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT5485) 2. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html) 3. [](http://support.apple.com/kb/HT5503) 4. [APPLE-SA-2012-09-12-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html) 5. [APPLE-SA-2012-07-25-1](http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html) 6. [](http://support.apple.com/kb/HT5400)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23472, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23472 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23472 - **State**: PUBLISHED - **Published Date**: November 03, 2021 at 17:25 UTC - **Last Updated**: September 17, 2024 at 02:56 UTC - **Reserved Date**: January 08, 2021 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set. ### CVSS Metrics - **CVSS Base Score**: 3.1/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N` ### Affected Products **n/a - bootstrap-table** Affected versions: - <1.19.1 (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597) 2. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687) 3. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688) 4. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689) 5. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690) 6. [](https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218) 7. [](https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597) ### Credits - Alessio Della Libera of Snyk Research Team
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28465, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28465 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28465 - **State**: PUBLISHED - **Published Date**: December 12, 2023 at 00:00 UTC - **Last Updated**: May 27, 2025 at 14:31 UTC - **Reserved Date**: March 15, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The package-decompression feature in HL7 (Health Level 7) FHIR Core Libraries before 5.6.106 allows attackers to copy arbitrary files to certain directories via directory traversal, if an allowed directory name is a substring of the directory name chosen by the attacker. NOTE: this issue exists because of an incomplete fix for CVE-2023-24057. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.smilecdr.com/our-blog/statement-on-cve-2023-24057-smile-digital-health) 2. [](https://www.smilecdr.com/our-blog) 3. [](https://github.com/advisories/GHSA-9654-pr4f-gh6m)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11052 - **State**: PUBLISHED - **Published Date**: May 07, 2020 at 20:25 UTC - **Last Updated**: August 04, 2024 at 11:21 UTC - **Reserved Date**: March 30, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In Sorcery before 0.15.0, there is a brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired, protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout. This has been patched in 0.15.0. ### CVSS Metrics - **CVSS Base Score**: 8.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-307: Security Weakness ### Affected Products **Sorcery - Sorcery** Affected versions: - < 0.15.0 (Status: affected) ### References 1. [](https://github.com/Sorcery/sorcery/security/advisories/GHSA-jc8m-cxhj-668x) 2. [](https://github.com/Sorcery/sorcery/issues/231) 3. [](https://github.com/Sorcery/sorcery/pull/235) 4. [](https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0907, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0907 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0907 - **State**: PUBLISHED - **Published Date**: August 31, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:03 UTC - **Reserved Date**: August 16, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in SHOUTcast 1.8.9 and other versions before 1.8.12 allows a remote authenticated DJ to execute arbitrary code on the server via a long value in a header whose name begins with "icy-". ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [shoutcast-icy-remote-bo(9251)](http://www.iss.net/security_center/static/9251.php) 2. [4934](http://www.securityfocus.com/bid/4934) 3. [20020604 SHOUTcast 1.8.9 bufferoverflow](http://archives.neohapsis.com/archives/bugtraq/2002-06/0016.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32359, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32359 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32359 - **State**: PUBLISHED - **Published Date**: April 05, 2025 at 00:00 UTC - **Last Updated**: April 07, 2025 at 16:12 UTC - **Reserved Date**: April 05, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Zammad 6.4.x before 6.4.2, there is client-side enforcement of server-side security. When changing their two factor authentication configuration, users need to re-authenticate with their current password first. However, this change was enforced in Zammad only on the front end level, and not when using the API directly. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-602: Security Weakness ### Affected Products **Zammad - Zammad** Affected versions: - 6.4 (Status: affected) ### References 1. [](https://zammad.com/en/advisories/zaa-2025-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2528, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2528 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2528 - **State**: PUBLISHED - **Published Date**: January 16, 2019 at 19:00 UTC - **Last Updated**: October 02, 2024 at 16:03 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Partition). Supported versions that are affected are 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 5.7.24 and prior (Status: affected) - 8.0.13 and prior (Status: affected) ### References 1. [106627](http://www.securityfocus.com/bid/106627) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html) 3. [USN-3867-1](https://usn.ubuntu.com/3867-1/) 4. [](https://security.netapp.com/advisory/ntap-20190118-0002/) 5. [RHSA-2019:2484](https://access.redhat.com/errata/RHSA-2019:2484) 6. [RHSA-2019:2511](https://access.redhat.com/errata/RHSA-2019:2511)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3416, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3416 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3416 - **State**: PUBLISHED - **Published Date**: July 07, 2006 at 00:00 UTC - **Last Updated**: September 17, 2024 at 04:18 UTC - **Reserved Date**: July 06, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes network circuits to be disbanded. NOTE: while this item is listed under the "Security fixes" section of the developer changelog, the developer clarified on 20060707 that this is only a self-DoS. Therefore this issue should not be included in CVE ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20514](http://secunia.com/advisories/20514) 2. [GLSA-200606-04](http://security.gentoo.org/glsa/glsa-200606-04.xml) 3. [](http://tor.eff.org/cvs/tor/ChangeLog)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7139, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7139 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7139 - **State**: PUBLISHED - **Published Date**: December 19, 2024 at 19:24 UTC - **Last Updated**: May 28, 2025 at 13:20 UTC - **Reserved Date**: July 26, 2024 at 18:12 UTC - **Assigned By**: Silabs ### Vulnerability Description Due to an unchecked buffer length, a specially crafted L2CAP packet can cause a buffer overflow. This buffer overflow triggers an assert, which results in a temporary denial of service.  If a watchdog timer is not enabled, a hard reset is required to recover the device. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write - CWE-617: Security Weakness ### Affected Products **silabs.com - RS9116 Bluetooth SDK** Affected versions: - 0 (Status: affected) ### References 1. [](https://community.silabs.com/068Vm00000I5mjD)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7448, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7448 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7448 - **State**: PUBLISHED - **Published Date**: February 26, 2018 at 17:00 UTC - **Last Updated**: August 05, 2024 at 06:24 UTC - **Reserved Date**: February 23, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Remote code execution vulnerability in /cmsms-2.1.6-install.php/index.php in CMS Made Simple version 2.1.6 allows remote attackers to inject arbitrary PHP code via the "timezone" parameter in step 4 of a fresh installation procedure. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [44192](https://www.exploit-db.com/exploits/44192/) 2. [](https://packetstormsecurity.com/files/146568/CMS-Made-Simple-2.1.6-Remote-Code-Execution.html) 3. [](http://dev.cmsmadesimple.org/project/changelog/5471)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6576, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6576 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6576 - **State**: PUBLISHED - **Published Date**: December 28, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 16:11 UTC - **Reserved Date**: December 28, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in Adult Script 1.6.5 and earlier allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) videolink_count.php or (2) links.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [adultscript-id-sql-injection(39229)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39229) 2. [39621](http://osvdb.org/39621) 3. [39622](http://osvdb.org/39622) 4. [26996](http://www.securityfocus.com/bid/26996) 5. [28165](http://secunia.com/advisories/28165) 6. [](http://www.inj3ct-it.org/exploit/adultscript.txt) 7. [4775](https://www.exploit-db.com/exploits/4775)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2059, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2059 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2059 - **State**: PUBLISHED - **Published Date**: March 07, 2025 at 02:00 UTC - **Last Updated**: March 10, 2025 at 19:49 UTC - **Reserved Date**: March 06, 2025 at 15:39 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/booking-details.php. The manipulation of the argument ambulanceregnum leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **PHPGurukul - Emergency Ambulance Hiring Portal** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-298814 | PHPGurukul Emergency Ambulance Hiring Portal booking-details.php sql injection](https://vuldb.com/?id.298814) 2. [VDB-298814 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.298814) 3. [Submit #514522 | PHPGurukul Emergency Ambulance Hiring Portal V1.0 SQL Injection](https://vuldb.com/?submit.514522) 4. [](https://github.com/siznwaa/CVE/issues/4) 5. [](https://phpgurukul.com/) ### Credits - siznwaa (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-44215, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-44215 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-44215 - **State**: PUBLISHED - **Published Date**: August 22, 2023 at 00:00 UTC - **Last Updated**: October 03, 2024 at 14:33 UTC - **Reserved Date**: October 30, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description There is an open redirect vulnerability in Titan FTP server 19.0 and below. Users are redirected to any target URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://drive.google.com/file/d/1oLJaqs5RRNQLT1Hyy-tgEzzhGLB0506J/view?usp=sharing) 2. [](https://github.com/JBalanza/CVE-2022-44215)