System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4113, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4113 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4113 - **State**: PUBLISHED - **Published Date**: February 17, 2012 at 23:00 UTC - **Last Updated**: August 07, 2024 at 00:01 UTC - **Reserved Date**: October 18, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description SQL injection vulnerability in the Views module before 6.x-2.13 for Drupal allows remote attackers to execute arbitrary SQL commands via vectors related to "filters/arguments on certain types of views with specific configurations of arguments." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20111104 Re: CVE Request -- Drupal (v6.x based) Views module - SQL injection due improper escaping of database parameters for certain filters / arguments (SA-CONTRIB-2011-052)](http://www.openwall.com/lists/oss-security/2011/11/04/3) 2. [views-filters-sql-injection(71124)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71124) 3. [50500](http://www.securityfocus.com/bid/50500) 4. [FEDORA-2011-15399](http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069499.html) 5. [](http://drupal.org/node/1329898) 6. [](http://drupal.org/node/1329842) 7. [76809](http://www.osvdb.org/76809) 8. [46680](http://secunia.com/advisories/46680) 9. [46962](http://secunia.com/advisories/46962)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-11016, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-11016 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-11016 - **State**: PUBLISHED - **Published Date**: October 16, 2019 at 00:25 UTC - **Last Updated**: August 06, 2024 at 03:47 UTC - **Reserved Date**: October 16, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description NETGEAR JNR1010 devices before 1.0.0.32 allow webproc?getpage= XSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://lists.openwall.net/full-disclosure/2016/01/11/1) 2. [](https://github.com/cybersecurityworks/Disclosed/issues/12) 3. [](https://packetstormsecurity.com/files/135194/Netgear-1.0.0.24-Cross-Site-Scripting.html) 4. [](http://007software.net/multiple-cross-site-scripting-in-netgear-router-version1-0-0-24/) 5. [](https://khalil-shreateh.com/khalil.shtml/it-highlights/592-Netgear-1.0.0.24-Cross-Site-Request-Forgery--.html) 6. [](https://cybersecurityworks.com/zerodays/cve-2016-11016-netgear.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1073, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1073 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1073 - **State**: PUBLISHED - **Published Date**: March 23, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 01:14 UTC - **Reserved Date**: March 23, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the jEmbed-Embed Anything (com_jembed) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a summary action to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [38112](http://secunia.com/advisories/38112) 2. [11026](http://www.exploit-db.com/exploits/11026) 3. [ADV-2010-0047](http://www.vupen.com/english/advisories/2010/0047) 4. [61510](http://osvdb.org/61510) 5. [jembed-index-sql-injection(55443)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55443)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4386, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4386 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4386 - **State**: PUBLISHED - **Published Date**: December 20, 2005 at 02:00 UTC - **Last Updated**: August 07, 2024 at 23:46 UTC - **Reserved Date**: December 20, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Colony CMS 2.75 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified search parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://pridels0.blogspot.com/2005/12/colony-cms-xss-vuln.html) 2. [21853](http://www.osvdb.org/21853) 3. [ADV-2005-2978](http://www.vupen.com/english/advisories/2005/2978) 4. [15941](http://www.securityfocus.com/bid/15941)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20055, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20055 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20055 - **State**: PUBLISHED - **Published Date**: March 23, 2023 at 00:00 UTC - **Last Updated**: October 28, 2024 at 16:32 UTC - **Reserved Date**: October 27, 2022 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the management API of Cisco DNA Center could allow an authenticated, remote attacker to elevate privileges in the context of the web-based management interface on an affected device. This vulnerability is due to the unintended exposure of sensitive information. An attacker could exploit this vulnerability by inspecting the responses from the API. Under certain circumstances, a successful exploit could allow the attacker to access the API with the privileges of a higher-level user account. To successfully exploit this vulnerability, the attacker would need at least valid Observer credentials. ### CVSS Metrics - **CVSS Base Score**: 8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **Cisco - Cisco Digital Network Architecture Center (DNA Center) ** Affected versions: - n/a (Status: affected) ### References 1. [20230322 Cisco DNA Center Privilege Escalation Vulnerability](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-privesc-QFXe74RS)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26829, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26829 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26829 - **State**: PUBLISHED - **Published Date**: April 15, 2022 at 19:05 UTC - **Last Updated**: January 02, 2025 at 18:52 UTC - **Reserved Date**: March 09, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows DNS Server Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 6.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Affected Products **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows DNS Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26829)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22068, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22068 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22068 - **State**: PUBLISHED - **Published Date**: October 17, 2023 at 21:02 UTC - **Last Updated**: February 13, 2025 at 16:43 UTC - **Reserved Date**: December 17, 2022 at 19:26 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - * (Status: affected) - 8.1.0 (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2023.html) 2. [](https://security.netapp.com/advisory/ntap-20231027-0009/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8125, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8125 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8125 - **State**: PUBLISHED - **Published Date**: November 05, 2019 at 22:51 UTC - **Last Updated**: August 04, 2024 at 21:10 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description A remote code execution vulnerability exists in Magento 1 prior to 1.9.x and 1.14.x. An authenticated admin user can modify configuration parameters via crafted support configuration. The modification can lead to remote code execution. ### Affected Products **Adobe Systems Incorporated - Magento 1** Affected versions: - Magento Open Source prior to 1.9.4.3, and Magento Commerce prior to 1.14.4.3. (Status: affected) ### References 1. [](https://magento.com/security/patches/supee-11219)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24814, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24814 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24814 - **State**: PUBLISHED - **Published Date**: April 04, 2022 at 17:50 UTC - **Last Updated**: April 23, 2025 at 18:41 UTC - **Reserved Date**: February 10, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 9.7.0, unauthorized JavaScript (JS) can be executed by inserting an iframe into the rich text html interface that links to a file uploaded HTML file that loads another uploaded JS file in its script tag. This satisfies the regular content security policy header, which in turn allows the file to run any arbitrary JS. This issue was resolved in version 9.7.0. As a workaround, disable the live embed in the what-you-see-is-what-you-get by adding `{ "media_live_embeds": false }` to the _Options Overrides_ option of the Rich Text HTML interface. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **directus - directus** Affected versions: - < 9.7.0 (Status: affected) ### References 1. [](https://github.com/directus/directus/security/advisories/GHSA-xmjj-3c76-5w84) 2. [](https://github.com/directus/directus/pull/12020) 3. [](https://github.com/directus/directus/releases/tag/v9.7.0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0952, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0952 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0952 - **State**: PUBLISHED - **Published Date**: February 02, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:37 UTC - **Reserved Date**: January 31, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description THQ Volition Red Faction Game allows remote attackers to cause a denial of service (hang) of a client or server via packets to UDP port 7755. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20011207 Red Faction Server/Client DOS](http://marc.info/?l=bugtraq&m=100774266027774&w=2) 2. [3651](http://www.securityfocus.com/bid/3651) 3. [red-faction-udp-dos(7672)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7672)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15857, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15857 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15857 - **State**: PUBLISHED - **Published Date**: June 12, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 20:04 UTC - **Reserved Date**: October 24, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In the camera driver, an out-of-bounds access can occur due to an error in copying region params from user space in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.codeaurora.org/security-bulletin/2018/05/11/may-2018-code-aurora-security-bulletin-2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-46228, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-46228 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-46228 - **State**: REJECTED - **Last Updated**: January 27, 2023 at 00:00 UTC - **Reserved Date**: November 28, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21024, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21024 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21024 - **State**: PUBLISHED - **Published Date**: April 16, 2024 at 21:26 UTC - **Last Updated**: November 05, 2024 at 19:30 UTC - **Reserved Date**: December 07, 2023 at 22:28 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **Oracle Corporation - Complex Maintenance, Repair, and Overhaul** Affected versions: - 12.2.3 (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2024.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3443, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3443 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3443 - **State**: PUBLISHED - **Published Date**: November 02, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:10 UTC - **Reserved Date**: November 02, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the Spatial component in Oracle Database Server from 9i up to 10.1.0.3 has unknown impact and attack vectors, aka Oracle Vuln# DB17. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2005-090497.html) 2. [TA05-292A](http://www.us-cert.gov/cas/techalerts/TA05-292A.html) 3. [15134](http://www.securityfocus.com/bid/15134) 4. [VU#210524](http://www.kb.cert.org/vuls/id/210524) 5. [17250](http://secunia.com/advisories/17250)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25706, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25706 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25706 - **State**: PUBLISHED - **Published Date**: September 16, 2022 at 05:26 UTC - **Last Updated**: August 03, 2024 at 04:49 UTC - **Reserved Date**: February 22, 2022 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Information disclosure in Bluetooth driver due to buffer over-read while reading l2cap length in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L` ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables** Affected versions: - APQ8009W, APQ8017, APQ8053, APQ8096AU, AQT1000, MSM8909W, MSM8917, MSM8953, MSM8996AU, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6426, QCA6430, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCM2290, QCM4290, QCM6490, QCS2290, QCS4290, QCS603, QCS605, QCS610, QCS6490, Qualcomm215, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SA8195P, SD 636, SD 675, SD 8 Gen1 5G, SD429, SD439, SD450, SD460, SD480, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD680, SD690 5G, SD695, SD710, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD835, SD845, SD855, SD865 5G, SD870, SD888, SD888 5G, SDM429W, SDM630, SDW2500, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM7450, SM8475, SM8475P, SW5100, SW5100P, WCD9326, WCD9335, WCD9340, WCD9341, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN67 ...[truncated*] (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/september-2022-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0497, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0497 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0497 - **State**: PUBLISHED - **Published Date**: March 27, 2023 at 15:37 UTC - **Last Updated**: February 26, 2025 at 19:06 UTC - **Reserved Date**: January 25, 2023 at 10:07 UTC - **Assigned By**: WPScan ### Vulnerability Description The HT Portfolio WordPress plugin before 1.1.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack ### Weakness Classification (CWE) - CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF) ### Affected Products **Unknown - HT Portfolio** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/ae5b7776-9d0d-4db8-81c3-237b16cd9c62) ### Credits - Lana Codes - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37061, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37061 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37061 - **State**: PUBLISHED - **Published Date**: December 07, 2021 at 16:02 UTC - **Last Updated**: August 04, 2024 at 01:09 UTC - **Reserved Date**: July 20, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description There is a Uncontrolled Resource Consumption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Screen projection application denial of service. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) ### References 1. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11492, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11492 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11492 - **State**: PUBLISHED - **Published Date**: November 20, 2024 at 17:31 UTC - **Last Updated**: November 20, 2024 at 21:06 UTC - **Reserved Date**: November 20, 2024 at 08:26 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic has been found in 115cms up to 20240807. This affects an unknown part of the file /index.php/admin/web/appurladd.html. The manipulation of the argument tid leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-94: Code Injection ### Affected Products **n/a - 115cms** Affected versions: - 20240807 (Status: affected) ### References 1. [VDB-285507 | 115cms appurladd.html cross site scripting](https://vuldb.com/?id.285507) 2. [VDB-285507 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.285507) 3. [](https://github.com/Hebing123/cve/issues/70)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14745, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14745 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14745 - **State**: PUBLISHED - **Published Date**: September 26, 2017 at 16:00 UTC - **Last Updated**: September 16, 2024 at 20:01 UTC - **Reserved Date**: September 26, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, interpret a -1 value as a sorting count instead of an error flag, which allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=22148)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6310, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6310 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6310 - **State**: PUBLISHED - **Published Date**: October 08, 2015 at 20:00 UTC - **Last Updated**: August 06, 2024 at 07:15 UTC - **Reserved Date**: August 17, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The REST interface in Cisco Unified Communications Manager IM and Presence Service 11.5(1) allows remote attackers to cause a denial of service (SIP proxy service restart) via a crafted HTTP request, aka Bug ID CSCuw31632. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033732](http://www.securitytracker.com/id/1033732) 2. [20151002 Cisco Unified Communications Manager IM and Presence Service REST API Denial of Service Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=41242)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2232, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2232 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2232 - **State**: PUBLISHED - **Published Date**: November 14, 2024 at 14:51 UTC - **Last Updated**: November 14, 2024 at 17:06 UTC - **Reserved Date**: June 27, 2022 at 19:32 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in the Keycloak package. This flaw allows an attacker to utilize an LDAP injection to bypass the username lookup or potentially perform other malicious actions. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Red Hat - Red Hat Single Sign-On 7** **Red Hat - Red Hat Single Sign-On 7** **Red Hat - Red Hat Single Sign-On 7** **Red Hat - Red Hat Single Sign-On 7** ### References 1. [RHSA-2024:0094](https://access.redhat.com/errata/RHSA-2024:0094) 2. [RHSA-2024:0095](https://access.redhat.com/errata/RHSA-2024:0095) 3. [RHSA-2024:0096](https://access.redhat.com/errata/RHSA-2024:0096) 4. [](https://access.redhat.com/security/cve/CVE-2022-2232) 5. [RHBZ#2096994](https://bugzilla.redhat.com/show_bug.cgi?id=2096994) ### Credits - Red Hat would like to thank Konstantin Goldenberg (VHV) for reporting this issue.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3270, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3270 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3270 - **State**: PUBLISHED - **Published Date**: May 20, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 10:35 UTC - **Reserved Date**: May 07, 2014 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The DHCPv6 implementation in Cisco IOS XR allows remote attackers to cause a denial of service (process hang) via a malformed packet, aka Bug ID CSCul80924. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20140519 Cisco IOS XR Software DHCP Version 6 Process Hang Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3270) 2. [1030259](http://www.securitytracker.com/id/1030259)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16778, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16778 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16778 - **State**: PUBLISHED - **Published Date**: December 24, 2019 at 13:54 UTC - **Last Updated**: August 05, 2024 at 20:35 UTC - **Reserved Date**: November 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An access control weakness in the DTMF tone receiver of Fermax Outdoor Panel allows physical attackers to inject a Dual-Tone-Multi-Frequency (DTMF) tone to invoke an access grant that would allow physical access to a restricted floor/level. By design, only a residential unit owner may allow such an access grant. However, due to incorrect access control, an attacker could inject it via the speaker unit to perform an access grant to gain unauthorized access, as demonstrated by a loud DTMF tone representing '1' and a long '#' (697 Hz and 1209 Hz, followed by 941 Hz and 1477 Hz). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/breaktoprotect/CVE-2017-16778-Intercom-DTMF-Injection)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6588, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6588 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6588 - **State**: PUBLISHED - **Published Date**: January 21, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 12:17 UTC - **Reserved Date**: September 17, 2014 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6589, CVE-2014-6590, CVE-2014-6595, and CVE-2015-0427. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201612-27](https://security.gentoo.org/glsa/201612-27) 2. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html) 3. [openSUSE-SU-2015:0229](http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13080, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13080 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13080 - **State**: PUBLISHED - **Published Date**: October 17, 2017 at 13:00 UTC - **Last Updated**: August 05, 2024 at 18:58 UTC - **Reserved Date**: August 22, 2017 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients. ### Weakness Classification (CWE) - CWE-323: Security Weakness ### Affected Products **Wi-Fi Alliance - Wi-Fi Protected Access (WPA and WPA2)** Affected versions: - WPA (Status: affected) - WPA2 (Status: affected) ### References 1. [1039581](http://www.securitytracker.com/id/1039581) 2. [](https://support.apple.com/HT208221) 3. [101274](http://www.securityfocus.com/bid/101274) 4. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html) 5. [SUSE-SU-2017:2745](http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html) 6. [[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update](https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html) 7. [DSA-3999](http://www.debian.org/security/2017/dsa-3999) 8. [](https://support.apple.com/HT208327) 9. [1039578](http://www.securitytracker.com/id/1039578) 10. [](https://support.apple.com/HT208325) 11. [](https://access.redhat.com/security/vulnerabilities/kracks) 12. [20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa) 13. [RHSA-2017:2911](https://access.redhat.com/errata/RHSA-2017:2911) 14. [](https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt) 15. [](http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt) 16. [1039577](http://www.securitytracker.com/id/1039577) 17. [1039572](http://www.securitytracker.com/id/1039572) 18. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us) 19. [openSUSE-SU-2017:2755](http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html) 20. [](https://support.apple.com/HT208222) 21. [](https://support.apple.com/HT208334) 22. [](https://source.android.com/security/bulletin/2017-11-01) 23. [GLSA-201711-03](https://security.gentoo.org/glsa/201711-03) 24. [RHSA-2017:2907](https://access.redhat.com/errata/RHSA-2017:2907) 25. [](https://support.lenovo.com/us/en/product_security/LEN-17420) 26. [FreeBSD-SA-17:07](https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc) 27. [](https://www.krackattacks.com/) 28. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html) 29. [1039573](http://www.securitytracker.com/id/1039573) 30. [SUSE-SU-2017:2752](http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html) 31. [1039576](http://www.securitytracker.com/id/1039576) 32. [](https://cert.vde.com/en-us/advisories/vde-2017-003) 33. [1039585](http://www.securitytracker.com/id/1039585) 34. [VU#228519](http://www.kb.cert.org/vuls/id/228519) 35. [](https://support.apple.com/HT208220) 36. [](https://support.apple.com/HT208219) 37. [[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html) 38. [](https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf) 39. [](https://cert.vde.com/en-us/advisories/vde-2017-005) 40. [1039703](http://www.securitytracker.com/id/1039703) 41. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080) 42. [USN-3455-1](http://www.ubuntu.com/usn/USN-3455-1) 43. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9628, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9628 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9628 - **State**: PUBLISHED - **Published Date**: October 04, 2017 at 07:00 UTC - **Last Updated**: August 05, 2024 at 17:11 UTC - **Reserved Date**: June 14, 2017 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description An Information Exposure issue was discovered in Saia Burgess Controls PCD Controllers with PCD firmware versions prior to 1.28.16 or 1.24.69. In certain circumstances, the device pads Ethernet frames with memory contents. ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **n/a - Saia Burgess Controls PCD Controllers** Affected versions: - Saia Burgess Controls PCD Controllers (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-234-05) 2. [100949](http://www.securityfocus.com/bid/100949)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46283, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46283 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46283 - **State**: PUBLISHED - **Published Date**: December 12, 2023 at 11:27 UTC - **Last Updated**: January 14, 2025 at 10:29 UTC - **Reserved Date**: October 20, 2023 at 10:29 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in Opcenter Execution Foundation (All versions < V2407), Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions < V17 Update 8), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). The affected application contains an out of bounds write past the end of an allocated buffer when handling specific requests on port 4002/tcp. This could allow an attacker to crash the application. The corresponding service is auto-restarted after the crash. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **Siemens - Opcenter Execution Foundation** Affected versions: - 0 (Status: affected) **Siemens - Opcenter Quality** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC PCS neo** Affected versions: - 0 (Status: affected) **Siemens - SINEC NMS** Affected versions: - 0 (Status: affected) **Siemens - Totally Integrated Automation Portal (TIA Portal) V14** Affected versions: - 0 (Status: affected) **Siemens - Totally Integrated Automation Portal (TIA Portal) V15.1** Affected versions: - 0 (Status: affected) **Siemens - Totally Integrated Automation Portal (TIA Portal) V16** Affected versions: - 0 (Status: affected) **Siemens - Totally Integrated Automation Portal (TIA Portal) V17** Affected versions: - 0 (Status: affected) **Siemens - Totally Integrated Automation Portal (TIA Portal) V18** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-999588.pdf) 2. [](https://cert-portal.siemens.com/productcert/html/ssa-999588.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9006 - **State**: PUBLISHED - **Published Date**: March 25, 2018 at 03:00 UTC - **Last Updated**: August 05, 2024 at 07:10 UTC - **Reserved Date**: March 24, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Advanced SystemCare Ultimate 11.0.1.58, the driver file (Monitor_win7_x64.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c402004. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x64.sys-0x9c402004)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47593, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47593 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47593 - **State**: PUBLISHED - **Published Date**: June 22, 2023 at 12:45 UTC - **Last Updated**: October 17, 2024 at 20:53 UTC - **Reserved Date**: December 20, 2022 at 08:12 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (subscriber+) SQL Injection (SQLi) vulnerability in RapidLoad RapidLoad Power-Up for Autoptimize plugin <= 1.6.35 versions. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **RapidLoad - RapidLoad Power-Up for Autoptimize** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/unusedcss/wordpress-rapidload-power-up-for-autoptimize-plugin-1-6-35-sql-injection?_s_id=cve) ### Credits - Le Ngoc Anh (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-41227, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-41227 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-41227 - **State**: PUBLISHED - **Published Date**: May 20, 2025 at 14:24 UTC - **Last Updated**: May 20, 2025 at 16:00 UTC - **Reserved Date**: April 16, 2025 at 09:29 UTC - **Assigned By**: vmware ### Vulnerability Description VMware ESXi, Workstation, and Fusion contain a denial-of-service vulnerability due to certain guest options. A malicious actor with non-administrative privileges within a guest operating system may be able to exploit this issue by exhausting memory of the host process leading to a denial-of-service condition. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **n/a - VMware ESXi** Affected versions: - 8.0 (Status: affected) - 7.0 (Status: affected) **n/a - VMware Cloud Foundation** Affected versions: - 5.x, 4.5.x (Status: affected) **n/a - VMware Telco Cloud Platform** Affected versions: - 5.x, 4.x, 3.x, 2.x (Status: affected) **n/a - VMware Telco Cloud Infrastructure** Affected versions: - 3.x, 2.x (Status: affected) **n/a - VMware Workstation** Affected versions: - 17.x (Status: affected) **n/a - VMware Fusion** Affected versions: - 13.x (Status: affected) ### References 1. [](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25717)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20857, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20857 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20857 - **State**: PUBLISHED - **Published Date**: July 21, 2022 at 03:45 UTC - **Last Updated**: November 01, 2024 at 18:59 UTC - **Reserved Date**: November 02, 2021 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to execute arbitrary commands, read or upload container image files, or perform a cross-site request forgery attack. For more information about these vulnerabilities, see the Details section of this advisory. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **Cisco - Cisco Nexus Dashboard** Affected versions: - n/a (Status: affected) ### References 1. [20220720 Cisco Nexus Dashboard Unauthorized Access Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mhcvuln-vpsBPJ9y)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2560, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2560 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2560 - **State**: PUBLISHED - **Published Date**: November 22, 2005 at 02:00 UTC - **Last Updated**: August 08, 2024 at 01:29 UTC - **Reserved Date**: November 22, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description DokuWiki before 2004-10-19, when used on a web server that permits execution based on file extension, allows remote attackers to execute arbitrary code by uploading a file with an appropriate extension such as ".php" or ".cgi". ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [dokuwiki-file-upload(17899)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17899) 2. [11084](http://www.osvdb.org/11084) 3. [](http://wiki.splitbrain.org/wiki:old_changes) 4. [11486](http://www.securityfocus.com/bid/11486)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11814, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11814 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11814 - **State**: PUBLISHED - **Published Date**: October 13, 2017 at 13:00 UTC - **Last Updated**: September 16, 2024 at 20:06 UTC - **Reserved Date**: July 31, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11765, CVE-2017-11784, and CVE-2017-11785. ### Affected Products **Microsoft Corporation - Windows Kernel** Affected versions: - Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 (Status: affected) ### References 1. [1039526](http://www.securitytracker.com/id/1039526) 2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11814) 3. [101093](http://www.securityfocus.com/bid/101093)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0150, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0150 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0150 - **State**: PUBLISHED - **Published Date**: March 03, 2011 at 19:00 UTC - **Last Updated**: August 06, 2024 at 21:43 UTC - **Reserved Date**: December 23, 2010 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT4564) 2. [](http://support.apple.com/kb/HT4566) 3. [APPLE-SA-2011-03-02-1](http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html) 4. [APPLE-SA-2011-03-09-1](http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html) 5. [](http://support.apple.com/kb/HT4554) 6. [APPLE-SA-2011-03-09-2](http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html) 7. [oval:org.mitre.oval:def:17339](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17339)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-5030, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-5030 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-5030 - **State**: PUBLISHED - **Published Date**: November 02, 2011 at 21:00 UTC - **Last Updated**: August 07, 2024 at 04:09 UTC - **Reserved Date**: November 02, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in index.php in Ecomat CMS 5.0 allows remote attackers to inject arbitrary web script or HTML via the lang parameter in a web action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [8517](http://securityreason.com/securityalert/8517) 2. [40013](http://secunia.com/advisories/40013) 3. [](http://packetstormsecurity.org/1006-exploits/ecomatcms-xss.txt) 4. [40491](http://www.securityfocus.com/bid/40491) 5. [](http://www.htbridge.ch/advisory/xss_vulnerability_in_ecomat_cms.html) 6. [20100601 XSS vulnerability in Ecomat CMS](http://www.securityfocus.com/archive/1/511587/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21826, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21826 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21826 - **State**: PUBLISHED - **Published Date**: March 06, 2025 at 16:04 UTC - **Last Updated**: May 04, 2025 at 13:06 UTC - **Reserved Date**: December 29, 2024 at 08:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject mismatching sum of field_len with set key length The field length description provides the length of each separated key field in the concatenation, each field gets rounded up to 32-bits to calculate the pipapo rule width from pipapo_init(). The set key length provides the total size of the key aligned to 32-bits. Register-based arithmetics still allows for combining mismatching set key length and field length description, eg. set key length 10 and field description [ 5, 4 ] leading to pipapo width of 12. ### Affected Products **Linux - Linux** Affected versions: - 2d4c0798a1ef8db15b3277697ac2def4eda42312 (Status: affected) - 77be8c495a3f841e88b46508cc20d3d7d3289da3 (Status: affected) - 9cb084df01e198119de477ac691d682fb01e80f3 (Status: affected) - dc45bb00e66a33de1abb29e3d587880e1d4d9a7e (Status: affected) - 3ce67e3793f48c1b9635beb9bb71116ca1e51b58 (Status: affected) - 3ce67e3793f48c1b9635beb9bb71116ca1e51b58 (Status: affected) - 3ce67e3793f48c1b9635beb9bb71116ca1e51b58 (Status: affected) - ff67e3e488090908dc015ba04d7407d8bd467f7e (Status: affected) **Linux - Linux** Affected versions: - 6.8 (Status: affected) - 0 (Status: unaffected) - 5.10.235 (Status: unaffected) - 5.15.179 (Status: unaffected) - 6.1.129 (Status: unaffected) - 6.6.76 (Status: unaffected) - 6.12.13 (Status: unaffected) - 6.13.2 (Status: unaffected) - 6.14 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/6b467c8feac759f4c5c86d708beca2aa2b29584f) 2. [](https://git.kernel.org/stable/c/5083a7ae45003456c253e981b30a43f71230b4a3) 3. [](https://git.kernel.org/stable/c/2ac254343d3cf228ae0738b2615fedf85d000752) 4. [](https://git.kernel.org/stable/c/82e491e085719068179ff6a5466b7387cc4bbf32) 5. [](https://git.kernel.org/stable/c/49b7182b97bafbd5645414aff054b4a65d05823d) 6. [](https://git.kernel.org/stable/c/ab50d0eff4a939d20c37721fd9766347efcdb6f6) 7. [](https://git.kernel.org/stable/c/1b9335a8000fb70742f7db10af314104b6ace220)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13829, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13829 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13829 - **State**: PUBLISHED - **Published Date**: November 13, 2017 at 03:00 UTC - **Last Updated**: August 05, 2024 at 19:13 UTC - **Reserved Date**: August 30, 2017 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "CFNetwork" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.apple.com/HT208221)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36771, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36771 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36771 - **State**: PUBLISHED - **Published Date**: January 22, 2024 at 13:53 UTC - **Last Updated**: August 04, 2024 at 17:37 UTC - **Reserved Date**: January 22, 2024 at 13:33 UTC - **Assigned By**: redhat ### Vulnerability Description CloudLinux CageFS 7.1.1-1 or below passes the authentication token as a command line argument. In some configurations this allows local users to view the authentication token via the process list and gain code execution as another user. ### Weakness Classification (CWE) - CWE-214: Security Weakness ### Affected Products **Cloudlinux OS - cagefs** Affected versions: - 7.1.1-1 (Status: affected) - 7.1.2-2 (Status: unaffected) ### References 1. [](https://blog.cloudlinux.com/cagefs-lve-wrappers-and-bsock-have-been-rolled-out-to-100) 2. [](http://seclists.org/fulldisclosure/2024/Jan/24) 3. [](http://packetstormsecurity.com/files/176790/CloudLinux-CageFS-7.1.1-1-Token-Disclosure.html) 4. [](https://github.com/sbaresearch/advisories/tree/public/2020/SBA-ADV-20200707-01_CloudLinux_CageFS_Token_Disclosure) ### Credits - David Lisa Gnedt (SBA Research)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24016, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24016 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24016 - **State**: PUBLISHED - **Published Date**: August 11, 2023 at 02:36 UTC - **Last Updated**: August 02, 2024 at 10:49 UTC - **Reserved Date**: February 01, 2023 at 04:00 UTC - **Assigned By**: intel ### Vulnerability Description Uncontrolled search path element in some Intel(R) Quartus(R) Prime Pro and Standard edition software for linux may allow an authenticated user to potentially enable escalation of privilege via local access. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-427: Security Weakness ### Affected Products **n/a - Intel(R) Quartus(R) Prime Pro and Standard edition software for linux** Affected versions: - See references (Status: affected) ### References 1. [http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00800.html](http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00800.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9819, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9819 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9819 - **State**: PUBLISHED - **Published Date**: March 01, 2017 at 15:00 UTC - **Last Updated**: August 06, 2024 at 02:59 UTC - **Reserved Date**: December 04, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description libavcodec/mpegvideo.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [94732](http://www.securityfocus.com/bid/94732) 2. [](https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7233, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7233 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7233 - **State**: PUBLISHED - **Published Date**: August 04, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:40 UTC - **Reserved Date**: September 29, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GE Healthcare Precision THUNIS-800+ has a default password of (1) 1973 for the factory default System Utilities menu, (2) TH8740 for installation using TH8740_122_Setup.exe, (3) hrml for "Setup and Activation" using DSASetup, and (4) an empty string for Shutter Configuration, which has unspecified impact and attack vectors. NOTE: since these passwords appear to be used to access functionality during installation, this issue might not cross privilege boundaries and might not be a vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://apps.gehealthcare.com/servlet/ClientServlet/5458232-1EN+r4.pdf?REQ=RAA&DIRECTION=5458232-1EN&FILENAME=5458232-1EN%2Br4.pdf&FILEREV=4&DOCREV_ORG=4) 2. [](http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/) 3. [](https://twitter.com/digitalbond/status/619250429751222277) 4. [](https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3311, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3311 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3311 - **State**: PUBLISHED - **Published Date**: June 18, 2023 at 15:00 UTC - **Last Updated**: November 27, 2024 at 16:19 UTC - **Reserved Date**: June 18, 2023 at 14:32 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as problematic, was found in PuneethReddyHC online-shopping-system-advanced 1.0. This affects an unknown part of the file addsuppliers.php. The manipulation of the argument First name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231807. ### CVSS Metrics - **CVSS Base Score**: 2.4/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **PuneethReddyHC - online-shopping-system-advanced** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.231807) 2. [](https://vuldb.com/?ctiid.231807) 3. [](https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3311) ### Credits - Krishna Agarwal - kr1shna4garwal (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26080, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26080 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26080 - **State**: PUBLISHED - **Published Date**: March 16, 2023 at 12:53 UTC - **Last Updated**: February 26, 2025 at 15:04 UTC - **Reserved Date**: February 28, 2022 at 10:03 UTC - **Assigned By**: ABB ### Vulnerability Description Use of Insufficiently Random Values vulnerability in ABB Pulsar Plus System Controller NE843_S, ABB Infinity DC Power Plant.This issue affects Pulsar Plus System Controller NE843_S : comcode 150042936; Infinity DC Power Plant: H5692448 G104 G842 G224L G630-4 G451C(2) G461(2) – comcode 150047415. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N` ### Weakness Classification (CWE) - CWE-330: Security Weakness ### Affected Products **ABB - Pulsar Plus System Controller NE843_S ** Affected versions: - comcode 150042936 (Status: affected) **ABB - Infinity DC Power Plant** Affected versions: - H5692448 G104 G842 G224L G630-4 G451C(2) G461(2) – comcode 150047415 (Status: affected) ### References 1. [](https://search.abb.com/library/Download.aspx?DocumentID=9AKK108467A6732&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.256117643.1223066510.1678942947-1879524908.1677751217) ### Credits - We acknowledge the help of Vlad Ionescu of Facebook Red Team X for reports on the vulnerabilities described in this document.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8193, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8193 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8193 - **State**: PUBLISHED - **Published Date**: November 22, 2017 at 19:00 UTC - **Last Updated**: September 17, 2024 at 02:02 UTC - **Reserved Date**: April 25, 2017 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description The FusionSphere OpenStack V100R006C00SPC102(NFV) has a command injection vulnerability. Due to the insufficient input validation on one port, an authenticated, local attacker may exploit the vulnerability to gain root privileges by sending message with malicious commands. ### Affected Products **Huawei Technologies Co., Ltd. - FusionSphere OpenStack** Affected versions: - V100R006C00SPC102(NFV) (Status: affected) ### References 1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170830-01-OpenStack-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44574, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44574 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44574 - **State**: PUBLISHED - **Published Date**: September 11, 2024 at 00:00 UTC - **Last Updated**: September 11, 2024 at 19:25 UTC - **Reserved Date**: August 21, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain a command injection vulnerability via the sys_conf function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.relyum.com/web/support/vulnerability-report/) 2. [](http://system-on-chip.com)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9749, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9749 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9749 - **State**: PUBLISHED - **Published Date**: October 21, 2020 at 20:01 UTC - **Last Updated**: September 17, 2024 at 02:01 UTC - **Reserved Date**: March 02, 2020 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Animate version 20.5 (and earlier) is affected by an out-of-bounds read vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .fla file in Animate. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Adobe - Animate** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/animate/apsb20-61.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12314, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12314 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12314 - **State**: PUBLISHED - **Published Date**: February 18, 2025 at 04:21 UTC - **Last Updated**: February 18, 2025 at 17:07 UTC - **Reserved Date**: December 06, 2024 at 15:59 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Rapid Cache plugin for WordPress is vulnerable to Cache Poisoning in all versions up to, and including, 1.2.3. This is due to plugin storing HTTP headers in the cached data. This makes it possible for unauthenticated attackers to poison the cache with custom HTTP headers that may be unsanitized which can lead to Cross-Site Scripting. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-524: Security Weakness ### Affected Products **megaoptim - Rapid Cache** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/72b777ac-1870-4588-82fe-da96a784ec81?source=cve) 2. [](https://wordpress.org/plugins/rapid-cache/) ### Credits - Joshua Provoste
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3589, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3589 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3589 - **State**: PUBLISHED - **Published Date**: November 21, 2022 at 09:56 UTC - **Last Updated**: April 25, 2025 at 19:29 UTC - **Reserved Date**: October 18, 2022 at 13:47 UTC - **Assigned By**: CERTVDE ### Vulnerability Description An API Endpoint used by Miele's "AppWash" MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **Miele - appWash** Affected versions: - all (until October 5th 2022) (Status: affected) ### References 1. [](https://cert.vde.com/de/advisories/VDE-2022-052/) ### Credits - Miele would like to thank Bishoy Roufael for responsibly disclousing this vulnerability.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33022, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33022 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33022 - **State**: PUBLISHED - **Published Date**: April 01, 2022 at 22:17 UTC - **Last Updated**: April 16, 2025 at 16:32 UTC - **Reserved Date**: May 13, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-319: Security Weakness ### Affected Products **Philips - Vue PACS** Affected versions: - unspecified (Status: affected) **Philips - Vue MyVue** Affected versions: - unspecified (Status: affected) **Philips - Vue Speech** Affected versions: - unspecified (Status: affected) **Philips - Vue Motion** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01) 2. [](http://www.philips.com/productsecurity) ### Credits - Philips reported these vulnerabilities to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-46549, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-46549 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-46549 - **State**: PUBLISHED - **Published Date**: September 30, 2024 at 00:00 UTC - **Last Updated**: September 30, 2024 at 20:51 UTC - **Reserved Date**: September 11, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in the TP-Link MQTT Broker and API gateway of TP-Link Kasa KP125M v1.0.3 allows attackers to establish connections by impersonating devices owned by other users. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Chapoly1305/tp-link-cve/blob/main/CVE-2024-46549.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10329, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10329 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10329 - **State**: PUBLISHED - **Published Date**: November 05, 2024 at 13:55 UTC - **Last Updated**: November 05, 2024 at 14:18 UTC - **Reserved Date**: October 24, 2024 at 00:07 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Ultimate Bootstrap Elements for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.6 via the 'ube_get_page_templates' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including the contents of templates that are private. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **g5theme - Ultimate Bootstrap Elements for Elementor** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3af83ec2-9ebb-4cca-8523-8fe9b1517825?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/ultimate-bootstrap-elements-for-elementor/trunk/inc/functions/core.php#L239) 3. [](https://plugins.trac.wordpress.org/changeset/3176562/) ### Credits - Ankit Patel
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21745, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21745 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21745 - **State**: PUBLISHED - **Published Date**: June 06, 2022 at 17:29 UTC - **Last Updated**: August 03, 2024 at 02:53 UTC - **Reserved Date**: November 26, 2021 at 00:00 UTC - **Assigned By**: MediaTek ### Vulnerability Description In WIFI Firmware, there is a possible memory corruption due to a use after free. This could lead to remote escalation of privilege, when devices are connecting to the attacker-controllable Wi-Fi hotspot, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06468872; Issue ID: ALPS06468872. ### Affected Products **MediaTek, Inc. - MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8167S, MT8168, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8667, MT8675, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797** Affected versions: - Android 10.0, 11.0, 12.0 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/June-2022)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5496, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5496 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5496 - **State**: PUBLISHED - **Published Date**: August 18, 2015 at 17:00 UTC - **Last Updated**: August 06, 2024 at 06:50 UTC - **Reserved Date**: July 10, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The pass2pdf module for Drupal does not restrict access to generated PDF files, which allows remote attackers to obtain user passwords via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [74755](http://www.securityfocus.com/bid/74755) 2. [](https://www.drupal.org/node/2492205) 3. [[oss-security] 20150704 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-100 to SA-CONTRIB-2015-131)](http://www.openwall.com/lists/oss-security/2015/07/04/4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38035, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38035 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38035 - **State**: PUBLISHED - **Published Date**: August 21, 2023 at 16:51 UTC - **Last Updated**: February 13, 2025 at 17:01 UTC - **Reserved Date**: July 12, 2023 at 01:00 UTC - **Assigned By**: hackerone ### Vulnerability Description A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration. ### Affected Products **Ivanti - MobileIron Sentry** Affected versions: - 9.18.0 and below (Status: affected) ### References 1. [](https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface) 2. [](http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0763, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0763 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0763 - **State**: PUBLISHED - **Published Date**: October 13, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:28 UTC - **Reserved Date**: September 19, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description xlockmore and xlockf do not properly cleanse user-injected format strings, which allows local users to gain root privileges via the -d option. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20000816 xlockmore: possible shadow file compromise](http://www.debian.org/security/2000/20000816) 2. [FreeBSD-SA-00:44.xlockmore](http://archives.neohapsis.com/archives/freebsd/2000-08/0340.html) 3. [20000816 xlock vulnerability](http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000815231724.A14694%40subterrain.net) 4. [20000823 MDKSA-2000:038 - xlockmore update](http://archives.neohapsis.com/archives/bugtraq/2000-08/0294.html) 5. [1585](http://www.securityfocus.com/bid/1585) 6. [20000817 Conectiva Linux Security Announcement - xlockmore](http://archives.neohapsis.com/archives/bugtraq/2000-08/0212.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10706, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10706 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10706 - **State**: PUBLISHED - **Published Date**: July 02, 2017 at 13:00 UTC - **Last Updated**: August 05, 2024 at 17:41 UTC - **Reserved Date**: June 30, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description When Antiy Antivirus Engine before 5.0.0.05171547 scans a special ZIP archive, it crashes with a stack-based buffer overflow because a fixed path length is used. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.lofter.com/lpost/1d52afc9_105e13e5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22709, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22709 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22709 - **State**: PUBLISHED - **Published Date**: January 21, 2025 at 13:57 UTC - **Last Updated**: February 06, 2025 at 16:56 UTC - **Reserved Date**: January 07, 2025 at 21:03 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Soft8Soft LLC Verge3D allows Reflected XSS. This issue affects Verge3D: from n/a through 4.8.0. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Soft8Soft LLC - Verge3D** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/verge3d/vulnerability/wordpress-verge3d-publishing-and-e-commerce-plugin-4-8-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - 0xd4rk5id3 (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7266, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7266 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7266 - **State**: PUBLISHED - **Published Date**: March 26, 2017 at 05:47 UTC - **Last Updated**: August 05, 2024 at 15:56 UTC - **Reserved Date**: March 26, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Netflix Security Monkey before 0.8.0 has an Open Redirect. The logout functionality accepted the "next" parameter which then redirects to any domain irrespective of the Host header. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Netflix/security_monkey/releases/tag/v0.8.0) 2. [97088](http://www.securityfocus.com/bid/97088) 3. [](https://github.com/Netflix/security_monkey/commit/3b4da13efabb05970c80f464a50d3c1c12262466) 4. [](https://github.com/Netflix/security_monkey/pull/482)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3344, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3344 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3344 - **State**: PUBLISHED - **Published Date**: May 22, 2020 at 05:15 UTC - **Last Updated**: November 15, 2024 at 17:21 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in Cisco AMP for Endpoints Linux Connector Software and Cisco AMP for Endpoints Mac Connector Software could allow an authenticated, local attacker to cause a buffer overflow on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted packet to an affected device. A successful exploit could allow the attacker to cause the Cisco AMP for Endpoints service to crash and restart. ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **Cisco - Cisco AMP for Endpoints** Affected versions: - n/a (Status: affected) ### References 1. [20200520 Cisco AMP for Endpoints Linux Connector and AMP for Endpoints Mac Connector Software Memory Buffer Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp4elinux-h33dkrvb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6358, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6358 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6358 - **State**: PUBLISHED - **Published Date**: March 02, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 11:27 UTC - **Reserved Date**: March 02, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in group_index.php in Social Groupie allows remote attackers to execute arbitrary SQL commands via the id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [7433](https://www.exploit-db.com/exploits/7433) 2. [32787](http://www.securityfocus.com/bid/32787) 3. [33125](http://secunia.com/advisories/33125)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2306, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2306 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2306 - **State**: PUBLISHED - **Published Date**: April 22, 2016 at 00:00 UTC - **Last Updated**: August 05, 2024 at 23:24 UTC - **Reserved Date**: February 09, 2016 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description The HMI web server in Ecava IntegraXor before 5.0 build 4522 allows remote attackers to obtain sensitive cleartext information by sniffing the network. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-105-03)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3238, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3238 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3238 - **State**: PUBLISHED - **Published Date**: September 18, 2009 at 10:00 UTC - **Last Updated**: August 07, 2024 at 06:22 UTC - **Reserved Date**: September 18, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03836en_us) 2. [USN-852-1](http://www.ubuntu.com/usn/USN-852-1) 3. [](http://patchwork.kernel.org/patch/21766/) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=519692) 5. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30) 6. [37351](http://secunia.com/advisories/37351) 7. [](https://bugzilla.redhat.com/show_bug.cgi?id=499785) 8. [SUSE-SA:2010:012](http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html) 9. [oval:org.mitre.oval:def:11168](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11168) 10. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8a0a9bd4db63bc45e3017bedeafbd88d0eb84d02) 11. [RHSA-2009:1438](http://www.redhat.com/support/errata/RHSA-2009-1438.html) 12. [SUSE-SA:2009:054](http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html) 13. [37105](http://secunia.com/advisories/37105)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46122, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46122 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46122 - **State**: PUBLISHED - **Published Date**: April 18, 2022 at 15:27 UTC - **Last Updated**: August 04, 2024 at 05:02 UTC - **Reserved Date**: January 03, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tp-Link TL-WR840N (EU) v6.20 Firmware (0.9.1 4.17 v0001.0 Build 201124 Rel.64328n) is vulnerable to Buffer Overflow via the Password reset feature. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://k4m1ll0.com/cve-tplink-tlwr840n-euV620-password-reset.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-48905, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-48905 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-48905 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 06:38 UTC - **Last Updated**: June 09, 2025 at 13:27 UTC - **Reserved Date**: May 28, 2025 at 08:10 UTC - **Assigned By**: huawei ### Vulnerability Description Wasm exception capture vulnerability in the arkweb v8 module Impact: Successful exploitation of this vulnerability may cause the failure to capture specific Wasm exception types. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-1068: Security Weakness ### Affected Products **Huawei - HarmonyOS** Affected versions: - 5.0.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2025/6/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33449 - **State**: PUBLISHED - **Published Date**: April 29, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 02:27 UTC - **Reserved Date**: April 23, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An SSRF issue in the PDFMyURL service allows a remote attacker to obtain sensitive information and execute arbitrary code via a POST request in the url parameter ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://grumpz.net/uncovering-an-ssrf-vulnerability-in-pdfmyurl-affecting-numerous-users) 2. [](https://pdfmyurl.com/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18336, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18336 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18336 - **State**: REJECTED - **Published Date**: August 30, 2019 at 15:20 UTC - **Last Updated**: August 30, 2019 at 15:20 UTC - **Reserved Date**: June 15, 2018 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30405, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30405 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30405 - **State**: PUBLISHED - **Published Date**: April 28, 2023 at 00:00 UTC - **Last Updated**: January 30, 2025 at 20:36 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site scripting (XSS) vulnerability in Aigital Wireless-N Repeater Mini_Router v0.131229 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the wl_ssid parameter at /boafrm/formHomeWlanSetup. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com/files/172057/Aigital-Wireless-N-Repeater-Mini_Router.0.131229-Cross-Site-Scripting.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-13955, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-13955 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-13955 - **State**: PUBLISHED - **Published Date**: July 26, 2019 at 12:13 UTC - **Last Updated**: August 05, 2024 at 00:05 UTC - **Reserved Date**: July 18, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Mikrotik RouterOS before 6.44.5 (long-term release tree) is vulnerable to stack exhaustion. By sending a crafted HTTP request, an authenticated remote attacker can crash the HTTP server via recursive parsing of JSON. Malicious code cannot be injected. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://seclists.org/fulldisclosure/2019/Jul/20) 2. [](http://packetstormsecurity.com/files/153733/Mikrotik-RouterOS-Resource-Stack-Exhaustion.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-2193, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-2193 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-2193 - **State**: PUBLISHED - **Published Date**: November 16, 2005 at 21:17 UTC - **Last Updated**: September 17, 2024 at 03:37 UTC - **Reserved Date**: November 16, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in mojo.cgi for Mojo Mail 2.7 allows remote attackers to inject arbitrary web script via the email parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [6040](http://www.securityfocus.com/bid/6040) 2. [20021024 XSS vulnerability in Mojo Mail Sign-Up Form](http://archives.neohapsis.com/archives/bugtraq/2002-10/0352.html) 3. [mojo-mail-mojo-xss(10477)](http://www.iss.net/security_center/static/10477.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15129, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15129 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15129 - **State**: PUBLISHED - **Published Date**: August 07, 2018 at 07:00 UTC - **Last Updated**: September 17, 2024 at 03:32 UTC - **Reserved Date**: August 07, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ThinkSAAS through 2018-07-25 has XSS via the index.php?app=article&ac=comment&ts=do content parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/thinksaas/ThinkSAAS/issues/16)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7990, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7990 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7990 - **State**: PUBLISHED - **Published Date**: March 20, 2025 at 10:08 UTC - **Last Updated**: March 20, 2025 at 19:00 UTC - **Reserved Date**: August 19, 2024 at 21:19 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description A stored cross-site scripting (XSS) vulnerability exists in open-webui/open-webui version 0.3.8. The vulnerability is present in the `/api/v1/models/add` endpoint, where the model description field is improperly sanitized before being rendered in chat. This allows an attacker to inject malicious scripts that can be executed by any user, including administrators, potentially leading to arbitrary code execution. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **open-webui - open-webui/open-webui** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/2256e336-0f67-449e-a82d-7fc57081a21c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32438, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32438 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32438 - **State**: PUBLISHED - **Published Date**: September 06, 2023 at 01:36 UTC - **Last Updated**: September 26, 2024 at 20:24 UTC - **Reserved Date**: May 08, 2023 at 22:31 UTC - **Assigned By**: apple ### Vulnerability Description This issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in tvOS 16.3, macOS Ventura 13.2, watchOS 9.3, iOS 16.3 and iPadOS 16.3. An app may be able to bypass Privacy preferences. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213606) 2. [](https://support.apple.com/en-us/HT213601) 3. [](https://support.apple.com/en-us/HT213605) 4. [](https://support.apple.com/en-us/HT213599)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11968, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11968 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11968 - **State**: PUBLISHED - **Published Date**: June 05, 2019 at 15:22 UTC - **Last Updated**: August 04, 2024 at 23:10 UTC - **Reserved Date**: May 13, 2019 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. ### Affected Products **n/a - HPE Intelligent Management Center (IMC) PLAT** Affected versions: - 7.3 E0506P09 and earlier (Status: affected) ### References 1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4481 - **State**: PUBLISHED - **Published Date**: August 05, 2020 at 13:15 UTC - **Last Updated**: September 16, 2024 at 19:25 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 181848. ### Affected Products **IBM - UrbanCode Deploy** Affected versions: - 6.2.7.3 (Status: affected) - 7.0.3.0 (Status: affected) - 7.0.4.0 (Status: affected) - 6.2.7.4 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6256128) 2. [ibm-ucd-cve20204481-xxe (181848)](https://exchange.xforce.ibmcloud.com/vulnerabilities/181848)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4365, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4365 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4365 - **State**: PUBLISHED - **Published Date**: September 30, 2008 at 21:00 UTC - **Last Updated**: August 07, 2024 at 10:17 UTC - **Reserved Date**: September 30, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in search.php in Siteman 1.1.11 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [31439](http://www.securityfocus.com/bid/31439) 2. [siteman-search-xss(45484)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45484)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1379, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1379 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1379 - **State**: PUBLISHED - **Published Date**: August 17, 2020 at 19:13 UTC - **Last Updated**: August 04, 2024 at 06:32 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1803** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1909 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1709 for 32-bit Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1709** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1379)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0736, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0736 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0736 - **State**: PUBLISHED - **Published Date**: September 04, 2003 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:05 UTC - **Reserved Date**: September 03, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in phpWebSite 0.9.x and earlier allow remote attackers to execute arbitrary web script via (1) the day parameter in the calendar module, (2) the fatcat_id parameter in the fatcat module, (3) the PAGE_id parameter in the pagemaster module, (4) the PDA_limit parameter in the search, and (5) possibly other parameters in the calendar, fatcat, and pagemaster modules. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20030902 GLSA: phpwebsite (200309-03)](http://marc.info/?l=bugtraq&m=106252188522715&w=2) 2. [VU#664422](http://www.kb.cert.org/vuls/id/664422) 3. [20030810 phpWebSite SQL Injection & DoS & XSS Vulnerabilities](http://marc.info/?l=bugtraq&m=106062021711496&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1205, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1205 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1205 - **State**: REJECTED - **Published Date**: April 01, 2009 at 10:00 UTC - **Last Updated**: April 03, 2009 at 09:00 UTC - **Reserved Date**: March 31, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-4219, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-4219 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-4219 - **State**: PUBLISHED - **Published Date**: March 23, 2022 at 19:46 UTC - **Last Updated**: August 03, 2024 at 17:16 UTC - **Reserved Date**: February 15, 2022 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **n/a - imagemagick** Affected versions: - imagemagick 6.9.12-34, imagemagick 7.1.0-19 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2054611)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31474 - **State**: PUBLISHED - **Published Date**: May 14, 2024 at 22:29 UTC - **Last Updated**: August 02, 2024 at 01:52 UTC - **Reserved Date**: April 03, 2024 at 21:21 UTC - **Assigned By**: hpe ### Vulnerability Description There is an arbitrary file deletion vulnerability in the CLI service accessed by PAPI (Aruba's Access Point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the affected Access Point ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H` ### Affected Products **Hewlett Packard Enterprise (HPE) - Aruba InstantOS and Aruba Access Points running ArubaOS 10** Affected versions: - InstantOS or ArubaOS (access points) 10.5.x.x: 10.5.1.0 and below. (Status: affected) - InstantOS or ArubaOS (access points) 10.4.x.x: 10.4.1.0 and below. (Status: affected) - InstantOS or ArubaOS (access points) 8.11.x.x: 8.11.2.1 and below. (Status: affected) - InstantOS or ArubaOS (access points) 8.10.x.x: 8.10.0.10 and below. (Status: affected) - InstantOS or ArubaOS (access points) 8.6.x.x: 8.6.0.23 and below. (Status: affected) ### References 1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt) ### Credits - Chancen
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35356, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35356 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35356 - **State**: REJECTED - **Published Date**: July 11, 2022 at 19:36 UTC - **Last Updated**: July 11, 2022 at 19:36 UTC - **Reserved Date**: July 07, 2022 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48666, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48666 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48666 - **State**: PUBLISHED - **Published Date**: April 28, 2024 at 13:01 UTC - **Last Updated**: May 04, 2025 at 08:20 UTC - **Reserved Date**: February 25, 2024 at 13:44 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix a use-after-free There are two .exit_cmd_priv implementations. Both implementations use resources associated with the SCSI host. Make sure that these resources are still available when .exit_cmd_priv is called by waiting inside scsi_remove_host() until the tag set has been freed. This commit fixes the following use-after-free: ================================================================== BUG: KASAN: use-after-free in srp_exit_cmd_priv+0x27/0xd0 [ib_srp] Read of size 8 at addr ffff888100337000 by task multipathd/16727 Call Trace: <TASK> dump_stack_lvl+0x34/0x44 print_report.cold+0x5e/0x5db kasan_report+0xab/0x120 srp_exit_cmd_priv+0x27/0xd0 [ib_srp] scsi_mq_exit_request+0x4d/0x70 blk_mq_free_rqs+0x143/0x410 __blk_mq_free_map_and_rqs+0x6e/0x100 blk_mq_free_tag_set+0x2b/0x160 scsi_host_dev_release+0xf3/0x1a0 device_release+0x54/0xe0 kobject_put+0xa5/0x120 device_release+0x54/0xe0 kobject_put+0xa5/0x120 scsi_device_dev_release_usercontext+0x4c1/0x4e0 execute_in_process_context+0x23/0x90 device_release+0x54/0xe0 kobject_put+0xa5/0x120 scsi_disk_release+0x3f/0x50 device_release+0x54/0xe0 kobject_put+0xa5/0x120 disk_release+0x17f/0x1b0 device_release+0x54/0xe0 kobject_put+0xa5/0x120 dm_put_table_device+0xa3/0x160 [dm_mod] dm_put_device+0xd0/0x140 [dm_mod] free_priority_group+0xd8/0x110 [dm_multipath] free_multipath+0x94/0xe0 [dm_multipath] dm_table_destroy+0xa2/0x1e0 [dm_mod] __dm_destroy+0x196/0x350 [dm_mod] dev_remove+0x10c/0x160 [dm_mod] ctl_ioctl+0x2c2/0x590 [dm_mod] dm_ctl_ioctl+0x5/0x10 [dm_mod] __x64_sys_ioctl+0xb4/0xf0 dm_ctl_ioctl+0x5/0x10 [dm_mod] __x64_sys_ioctl+0xb4/0xf0 do_syscall_64+0x3b/0x90 entry_SYSCALL_64_after_hwframe+0x46/0xb0 ### Affected Products **Linux - Linux** Affected versions: - 65ca846a53149a1a72cd8d02e7b2e73dd545b834 (Status: affected) - 65ca846a53149a1a72cd8d02e7b2e73dd545b834 (Status: affected) - 65ca846a53149a1a72cd8d02e7b2e73dd545b834 (Status: affected) - 65ca846a53149a1a72cd8d02e7b2e73dd545b834 (Status: affected) **Linux - Linux** Affected versions: - 5.7 (Status: affected) - 0 (Status: unaffected) - 5.10.223 (Status: unaffected) - 5.15.164 (Status: unaffected) - 5.19.12 (Status: unaffected) - 6.0 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/5ce8fad941233e81f2afb5b52a3fcddd3ba8732f) 2. [](https://git.kernel.org/stable/c/f818708eeeae793e12dc39f8984ed7732048a7d9) 3. [](https://git.kernel.org/stable/c/2e7eb4c1e8af8385de22775bd0be552f59b28c9a) 4. [](https://git.kernel.org/stable/c/8fe4ce5836e932f5766317cb651c1ff2a4cd0506)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27431, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27431 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27431 - **State**: PUBLISHED - **Published Date**: May 03, 2022 at 20:23 UTC - **Last Updated**: April 16, 2025 at 16:24 UTC - **Reserved Date**: February 19, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description ARM CMSIS RTOS2 versions prior to 2.1.3 are vulnerable to integer wrap-around inosRtxMemoryAlloc (local malloc equivalent) function, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or injected code execution. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-190: Security Weakness ### Affected Products **ARM - CMSIS RTOS2** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-119-04) ### Credits - David Atch, Omri Ben Bassat, and Tamir Ariel from Microsoft Section 52, and the Azure Defender for IoT research group reported these vulnerabilities to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2138, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2138 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2138 - **State**: PUBLISHED - **Published Date**: July 09, 2012 at 22:00 UTC - **Last Updated**: September 16, 2024 at 20:42 UTC - **Reserved Date**: April 04, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The @CopyFrom operation in the POST servlet in the org.apache.sling.servlets.post bundle before 2.1.2 in Apache Sling does not prevent attempts to copy an ancestor node to a descendant node, which allows remote attackers to cause a denial of service (infinite loop) via a crafted HTTP request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://issues.apache.org/jira/browse/SLING-2517) 2. [](http://svn.apache.org/viewvc?view=revision&revision=1352865) 3. [[www-announce] 20120706 [SECURITY] CVE-2012-2138 Apache Sling denial of service vulnerability](http://mail-archives.apache.org/mod_mbox/www-announce/201207.mbox/%3CCAEWfVJ=PwoQmwJg0KmbrC17Gw51kgfKRsqgy=4RpMQsdGh0bVg%40mail.gmail.com%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2535, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2535 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2535 - **State**: PUBLISHED - **Published Date**: May 09, 2007 at 01:00 UTC - **Last Updated**: August 07, 2024 at 13:42 UTC - **Reserved Date**: May 08, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [multiple-vendor-zoo-dos(34080)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34080) 2. [23823](http://www.securityfocus.com/bid/23823) 3. [20070504 Multiple vendors ZOO file decompression infinite loop DoS](http://www.securityfocus.com/archive/1/467646/100/0/threaded) 4. [41750](http://osvdb.org/41750) 5. [2680](http://securityreason.com/securityalert/2680)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15011, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15011 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15011 - **State**: PUBLISHED - **Published Date**: June 24, 2020 at 11:34 UTC - **Last Updated**: August 04, 2024 at 13:00 UTC - **Reserved Date**: June 24, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.launchpad.net/mailman/+bug/1877379) 2. [[debian-lts-announce] 20200630 [SECURITY] [DLA 2265-1] mailman security update](https://lists.debian.org/debian-lts-announce/2020/06/msg00036.html) 3. [USN-4406-1](https://usn.ubuntu.com/4406-1/) 4. [[debian-lts-announce] 20200710 [SECURITY] [DLA 2276-1] mailman security update](https://lists.debian.org/debian-lts-announce/2020/07/msg00007.html) 5. [openSUSE-SU-2020:1707](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html) 6. [openSUSE-SU-2020:1752](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html) 7. [DSA-4991](https://www.debian.org/security/2021/dsa-4991)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5065, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5065 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5065 - **State**: PUBLISHED - **Published Date**: November 27, 2013 at 23:00 UTC - **Last Updated**: February 10, 2025 at 19:21 UTC - **Reserved Date**: August 06, 2013 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in November 2013. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/ms-windows-local-privilege-escalation-zero-day-in-the-wild.html) 2. [37732](https://www.exploit-db.com/exploits/37732/) 3. [MS14-002](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-002) 4. [](http://technet.microsoft.com/security/advisory/2914486)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4556, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4556 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4556 - **State**: PUBLISHED - **Published Date**: November 09, 2019 at 01:41 UTC - **Last Updated**: September 16, 2024 at 23:25 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM QRadar Advisor 1.0.0 through 2.4.0 uses incomplete blacklisting for input validation which allows attackers to bypass application controls resulting in direct impact to the system and data integrity. IBM X-Force ID: 166205. ### Affected Products **IBM - Qradar Advisor** Affected versions: - 1.0.0 (Status: affected) - 2.4.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/1102443) 2. [ibm-qradar-cve20194556-input-validation (166205)](https://exchange.xforce.ibmcloud.com/vulnerabilities/166205)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1147, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1147 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1147 - **State**: PUBLISHED - **Published Date**: March 21, 2024 at 07:33 UTC - **Last Updated**: November 11, 2024 at 20:23 UTC - **Reserved Date**: February 01, 2024 at 09:27 UTC - **Assigned By**: OpenText ### Vulnerability Description Weak access control in OpenText PVCS Version Manager allows potential bypassing of authentication and download of files. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **OpenText - PVCS Version Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://portal.microfocus.com/s/article/KM000026669)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5468, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5468 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5468 - **State**: PUBLISHED - **Published Date**: October 27, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 19:48 UTC - **Reserved Date**: October 23, 2006 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Unspecified vulnerability in the HTTP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#363992](http://www.kb.cert.org/vuls/id/363992) 2. [](http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm) 3. [oval:org.mitre.oval:def:10707](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10707) 4. [wireshark-http-dos(29840)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29840) 5. [23096](http://secunia.com/advisories/23096) 6. [](http://www.wireshark.org/security/wnpa-sec-2006-03.html) 7. [](https://issues.rpath.com/browse/RPL-746) 8. [22590](http://secunia.com/advisories/22590) 9. [20061101-01-P](ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P) 10. [ADV-2006-4220](http://www.vupen.com/english/advisories/2006/4220) 11. [22841](http://secunia.com/advisories/22841) 12. [20762](http://www.securityfocus.com/bid/20762) 13. [SUSE-SA:2006:065](http://www.novell.com/linux/security/advisories/2006_65_ethereal.html) 14. [RHSA-2006:0726](http://www.redhat.com/support/errata/RHSA-2006-0726.html) 15. [oval:org.mitre.oval:def:14120](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14120) 16. [22929](http://secunia.com/advisories/22929) 17. [20061101 rPSA-2006-0202-1 tshark wireshark](http://www.securityfocus.com/archive/1/450307/100/0/threaded) 18. [22692](http://secunia.com/advisories/22692) 19. [MDKSA-2006:195](http://www.mandriva.com/security/advisories?name=MDKSA-2006:195) 20. [1017129](http://securitytracker.com/id?1017129) 21. [22672](http://secunia.com/advisories/22672) 22. [22797](http://secunia.com/advisories/22797)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0105, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0105 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0105 - **State**: PUBLISHED - **Published Date**: January 18, 2012 at 22:00 UTC - **Last Updated**: August 06, 2024 at 18:16 UTC - **Reserved Date**: December 12, 2011 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization 4.1 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Windows Guest Additions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [78442](http://osvdb.org/78442) 2. [GLSA-201204-01](http://security.gentoo.org/glsa/glsa-201204-01.xml) 3. [openSUSE-SU-2012:1323](http://lists.opensuse.org/opensuse-updates/2012-10/msg00041.html) 4. [48755](http://secunia.com/advisories/48755) 5. [](http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html) 6. [virtualization-vmvirtualbox-cve20120105(72511)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72511) 7. [oval:org.mitre.oval:def:16235](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16235) 8. [50897](http://secunia.com/advisories/50897)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4027, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4027 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4027 - **State**: PUBLISHED - **Published Date**: April 28, 2025 at 16:00 UTC - **Last Updated**: April 28, 2025 at 18:02 UTC - **Reserved Date**: April 28, 2025 at 05:47 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in PHPGurukul Old Age Home Management System 1.0. Affected is an unknown function of the file /admin/rules.php. The manipulation of the argument pagetitle leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **PHPGurukul - Old Age Home Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-306390 | PHPGurukul Old Age Home Management System rules.php sql injection](https://vuldb.com/?id.306390) 2. [VDB-306390 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.306390) 3. [Submit #559159 | PHPGurukul Old Age Home Management System V1.0 SQL Injection](https://vuldb.com/?submit.559159) 4. [](https://github.com/Q3qc1n/myCVE/issues/2) 5. [](https://phpgurukul.com/) ### Credits - Lum1n0us (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0508, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0508 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0508 - **State**: PUBLISHED - **Published Date**: January 26, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 12:19 UTC - **Reserved Date**: January 25, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in lib/selectlang.php in BBClone 0.31 allows remote attackers to execute arbitrary PHP code via a URL in the BBC_LANGUAGE_PATH parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2007-0318](http://www.vupen.com/english/advisories/2007/0318) 2. [23874](http://secunia.com/advisories/23874) 3. [32957](http://osvdb.org/32957) 4. [3183](https://www.exploit-db.com/exploits/3183)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32493, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32493 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32493 - **State**: PUBLISHED - **Published Date**: October 12, 2022 at 19:25 UTC - **Last Updated**: May 15, 2025 at 15:35 UTC - **Reserved Date**: June 06, 2022 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell BIOS contains an Stack-Based Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. ### CVSS Metrics - **CVSS Base Score**: 6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Dell - CPG BIOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/000203758)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12647, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12647 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12647 - **State**: PUBLISHED - **Published Date**: September 25, 2019 at 20:05 UTC - **Last Updated**: November 19, 2024 at 18:56 UTC - **Reserved Date**: June 04, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Ident protocol handler of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability exists because the affected software incorrectly handles memory structures, leading to a NULL pointer dereference. An attacker could exploit this vulnerability by opening a TCP connection to specific ports and sending traffic over that connection. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **Cisco - Cisco IOS** Affected versions: - unspecified (Status: affected) ### References 1. [20190925 Cisco IOS and IOS XE Software IP Ident Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-identd-dos)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50167, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50167 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50167 - **State**: PUBLISHED - **Published Date**: November 07, 2024 at 09:31 UTC - **Last Updated**: May 04, 2025 at 09:47 UTC - **Reserved Date**: October 21, 2024 at 19:36 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: be2net: fix potential memory leak in be_xmit() The be_xmit() returns NETDEV_TX_OK without freeing skb in case of be_xmit_enqueue() fails, add dev_kfree_skb_any() to fix it. ### Affected Products **Linux - Linux** Affected versions: - 760c295e0e8d982917d004c9095cff61c0cbd803 (Status: affected) - 760c295e0e8d982917d004c9095cff61c0cbd803 (Status: affected) - 760c295e0e8d982917d004c9095cff61c0cbd803 (Status: affected) - 760c295e0e8d982917d004c9095cff61c0cbd803 (Status: affected) - 760c295e0e8d982917d004c9095cff61c0cbd803 (Status: affected) - 760c295e0e8d982917d004c9095cff61c0cbd803 (Status: affected) - 760c295e0e8d982917d004c9095cff61c0cbd803 (Status: affected) - 760c295e0e8d982917d004c9095cff61c0cbd803 (Status: affected) **Linux - Linux** Affected versions: - 4.2 (Status: affected) - 0 (Status: unaffected) - 4.19.323 (Status: unaffected) - 5.4.285 (Status: unaffected) - 5.10.229 (Status: unaffected) - 5.15.170 (Status: unaffected) - 6.1.115 (Status: unaffected) - 6.6.59 (Status: unaffected) - 6.11.6 (Status: unaffected) - 6.12 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/941026023c256939943a47d1c66671526befbb26) 2. [](https://git.kernel.org/stable/c/6b7ce8ee01c33c380aaa5077ff25215492e7eb0e) 3. [](https://git.kernel.org/stable/c/77bc881d370e850b7f3cd2b5eae67d596b40efbc) 4. [](https://git.kernel.org/stable/c/919ab6e2370289a2748780f44a43333cd3878aa7) 5. [](https://git.kernel.org/stable/c/4c5f170ef4f85731a4d43ad9a6ac51106c0946be) 6. [](https://git.kernel.org/stable/c/641c1beed52bf3c6deb0193fe4d38ec9ff75d2ae) 7. [](https://git.kernel.org/stable/c/e86a79b804e26e3b7f1e415b22a085c0bb7ea3d3) 8. [](https://git.kernel.org/stable/c/e4dd8bfe0f6a23acd305f9b892c00899089bd621)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0390, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0390 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0390 - **State**: REJECTED - **Published Date**: March 06, 2006 at 20:00 UTC - **Last Updated**: September 17, 2024 at 01:12 UTC - **Reserved Date**: January 24, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3480, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3480 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3480 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 14:10 UTC - **Last Updated**: August 01, 2024 at 20:12 UTC - **Reserved Date**: April 08, 2024 at 18:34 UTC - **Assigned By**: lenovo ### Vulnerability Description An Implicit intent vulnerability was reported in the Motorola framework that could allow an attacker to read telephony-related data. ### CVSS Metrics - **CVSS Base Score**: 2.8/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-927: Security Weakness ### Affected Products **Motorola - Phones** Affected versions: - (Status: affected) ### References 1. [](https://en-us.support.motorola.com/app/answers/detail/a_id/178948) ### Credits - Sergey Toshin and Illia Khorolskyi of Oversecured (ovesecured.com)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15478, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15478 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15478 - **State**: PUBLISHED - **Published Date**: August 26, 2019 at 11:42 UTC - **Last Updated**: August 05, 2024 at 00:49 UTC - **Reserved Date**: August 22, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Status Board 1.1.81 has reflected XSS via logic.ts. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/jameswlane/status-board/pull/949)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0991, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0991 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0991 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 15:13 UTC - **Last Updated**: August 04, 2024 at 06:18 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka 'Microsoft Office Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0760. ### Affected Products **Microsoft - Microsoft Office** Affected versions: - 2019 for 32-bit editions (Status: affected) - 2019 for 64-bit editions (Status: affected) - 2016 (32-bit edition) (Status: affected) - 2016 (64-bit edition) (Status: affected) - 2010 Service Pack 2 (32-bit editions) (Status: affected) - 2010 Service Pack 2 (64-bit editions) (Status: affected) - 2013 RT Service Pack 1 (Status: affected) - 2013 Service Pack 1 (32-bit editions) (Status: affected) - 2013 Service Pack 1 (64-bit editions) (Status: affected) **Microsoft - Office 365 ProPlus** Affected versions: - 32-bit Systems (Status: affected) - 64-bit Systems (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0991)