System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3774, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3774 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3774 - **State**: PUBLISHED - **Published Date**: July 28, 2023 at 00:45 UTC - **Last Updated**: October 22, 2024 at 18:22 UTC - **Reserved Date**: July 19, 2023 at 14:24 UTC - **Assigned By**: HashiCorp ### Vulnerability Description An unhandled error in Vault Enterprise's namespace creation may cause the Vault process to crash, potentially resulting in denial of service. Fixed in 1.14.1, 1.13.5, and 1.12.9. ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-248: Security Weakness ### Affected Products **HashiCorp - Vault Enterprise** Affected versions: - 1.14.0 (Status: affected) - 1.13.4 (Status: affected) - 1.12.8 (Status: affected) ### References 1. [](https://discuss.hashicorp.com/t/hcsec-2023-23-vault-enterprise-namespace-creation-may-lead-to-denial-of-service/56617)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41921, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41921 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41921 - **State**: PUBLISHED - **Published Date**: November 28, 2022 at 00:00 UTC - **Last Updated**: April 23, 2025 at 16:34 UTC - **Reserved Date**: September 30, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Discourse is an open-source discussion platform. Prior to version 2.9.0.beta13, users can post chat messages of an unlimited length, which can cause a denial of service for other users when posting huge amounts of text. Users should upgrade to version 2.9.0.beta13, where a limit has been introduced. No known workarounds are available. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **discourse - discourse** Affected versions: - < 2.9.0.beta13 (Status: affected) ### References 1. [](https://github.com/discourse/discourse/security/advisories/GHSA-mfh7-6cv6-qccc) 2. [](https://github.com/discourse/discourse/commit/3de765c89524a526ce611e11468d758a471a933f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2736, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2736 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2736 - **State**: PUBLISHED - **Published Date**: July 06, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 05:24 UTC - **Reserved Date**: March 25, 2015 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description The nsZipArchive::BuildFileList function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openSUSE-SU-2015:1229](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html) 2. [RHSA-2015:1455](http://rhn.redhat.com/errata/RHSA-2015-1455.html) 3. [SUSE-SU-2015:1268](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html) 4. [GLSA-201512-10](https://security.gentoo.org/glsa/201512-10) 5. [75541](http://www.securityfocus.com/bid/75541) 6. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html) 7. [DSA-3324](http://www.debian.org/security/2015/dsa-3324) 8. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1167888) 9. [USN-2673-1](http://www.ubuntu.com/usn/USN-2673-1) 10. [1032784](http://www.securitytracker.com/id/1032784) 11. [RHSA-2015:1207](http://rhn.redhat.com/errata/RHSA-2015-1207.html) 12. [](http://www.mozilla.org/security/announce/2015/mfsa2015-66.html) 13. [SUSE-SU-2015:1269](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html) 14. [openSUSE-SU-2015:1266](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html) 15. [USN-2656-1](http://www.ubuntu.com/usn/USN-2656-1) 16. [SUSE-SU-2015:1449](http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html) 17. [1032783](http://www.securitytracker.com/id/1032783) 18. [DSA-3300](http://www.debian.org/security/2015/dsa-3300) 19. [USN-2656-2](http://www.ubuntu.com/usn/USN-2656-2) 20. [](http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34382, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34382 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34382 - **State**: PUBLISHED - **Published Date**: June 30, 2021 at 10:24 UTC - **Last Updated**: August 04, 2024 at 00:12 UTC - **Reserved Date**: June 09, 2021 at 00:00 UTC - **Assigned By**: nvidia ### Vulnerability Description Trusty TLK contains a vulnerability in the NVIDIA TLK kernel’s tz_map_shared_mem function where an integer overflow on the size parameter causes the request buffer and the logging buffer to overflow, allowing writes to arbitrary addresses within the kernel. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Affected Products **NVIDIA - NVIDIA Jetson TX1** Affected versions: - All Jetson Linux versions prior to r32.5.1 (Status: affected) ### References 1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5205)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36314, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36314 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36314 - **State**: PUBLISHED - **Published Date**: April 07, 2021 at 11:07 UTC - **Last Updated**: August 04, 2024 at 17:23 UTC - **Reserved Date**: April 07, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description fr-archive-libarchive.c in GNOME file-roller through 3.38.0, as used by GNOME Shell and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink in certain complex situations. NOTE: this issue exists because of an incomplete fix for CVE-2020-11736. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.gnome.org/GNOME/file-roller/-/issues/108) 2. [](https://gitlab.gnome.org/GNOME/file-roller/-/commit/e970f4966bf388f6e7c277357c8b186c645683ae) 3. [FEDORA-2021-7109d72f07](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6KJBZVCHQ4SSX2JAJZVJ5J4P3GEMXJ75/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24473, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24473 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24473 - **State**: PUBLISHED - **Published Date**: March 30, 2023 at 15:47 UTC - **Last Updated**: August 02, 2024 at 10:56 UTC - **Reserved Date**: January 25, 2023 at 21:42 UTC - **Assigned By**: talos ### Vulnerability Description An information disclosure vulnerability exists in the TGAInput::read_tga2_header functionality of OpenImageIO Project OpenImageIO v2.4.7.1. A specially crafted targa file can lead to a disclosure of sensitive information. An attacker can provide a malicious file to trigger this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **OpenImageIO Project - OpenImageIO** Affected versions: - v2.4.7.1 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1707](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1707)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13863, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13863 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13863 - **State**: PUBLISHED - **Published Date**: March 25, 2025 at 06:00 UTC - **Last Updated**: March 25, 2025 at 14:16 UTC - **Reserved Date**: February 11, 2025 at 19:40 UTC - **Assigned By**: WPScan ### Vulnerability Description The Stylish Google Sheet Reader 4.0 WordPress plugin before 4.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Stylish Google Sheet Reader 4.0** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/a6161595-0934-4baa-9da6-73792f4b87fd/) ### Credits - Hassan Khan Yusufzai - Splint3r7 - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0535, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0535 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0535 - **State**: PUBLISHED - **Published Date**: February 08, 2011 at 21:00 UTC - **Last Updated**: August 06, 2024 at 21:58 UTC - **Reserved Date**: January 20, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in the Users module in Zikula before 1.2.5 allows remote attackers to hijack the authentication of administrators for requests that change account privileges via an edit access_permissions action to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20110203 Re: CVE Request: Zikula CMS 1.2.4 <= Cross Site Request Forgery (CSRF) Vulnerability](http://openwall.com/lists/oss-security/2011/02/03/1) 2. [](http://community.zikula.org/index.php?module=News&func=display&sid=3041&title=zikula-1.2.5-released) 3. [](http://code.zikula.org/core12/browser/tags/Zikula-1.2.5/src/docs/CHANGELOG) 4. [70751](http://www.osvdb.org/70751) 5. [43114](http://secunia.com/advisories/43114) 6. [8067](http://securityreason.com/securityalert/8067) 7. [[oss-security] 20110201 CVE Request: Zikula CMS 1.2.4 <= Cross Site Request Forgery (CSRF) Vulnerability](http://openwall.com/lists/oss-security/2011/02/01/1) 8. [20110201 Zikula CMS 1.2.4 <= Cross Site Request Forgery (CSRF) Vulnerability](http://seclists.org/fulldisclosure/2011/Feb/0) 9. [](http://bl0g.yehg.net/2011/02/zikula-cms-124-cross-site-request.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0138, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0138 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0138 - **State**: PUBLISHED - **Published Date**: May 31, 2006 at 10:00 UTC - **Last Updated**: August 08, 2024 at 00:10 UTC - **Reserved Date**: February 11, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The ELF loader in Linux kernel 2.4 before 2.4.25 allows local users to cause a denial of service (crash) via a crafted ELF file with an interpreter with an invalid arch (architecture), which triggers a BUG() when an invalid VMA is unmapped. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20163](http://secunia.com/advisories/20163) 2. [](http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.25) 3. [DSA-1082](http://www.debian.org/security/2006/dsa-1082) 4. [](http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes) 5. [linux-kernel-elfloader-dos(43124)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43124) 6. [DSA-1070](http://www.debian.org/security/2006/dsa-1070) 7. [20162](http://secunia.com/advisories/20162) 8. [18174](http://www.securityfocus.com/bid/18174) 9. [RHSA-2004:549](http://www.redhat.com/support/errata/RHSA-2004-549.html) 10. [DSA-1067](http://www.debian.org/security/2006/dsa-1067) 11. [DSA-1069](http://www.debian.org/security/2006/dsa-1069) 12. [20202](http://secunia.com/advisories/20202) 13. [RHSA-2004:504](http://www.redhat.com/support/errata/RHSA-2004-504.html) 14. [](http://linux.bkbits.net:8080/linux-2.4/cset%404021346f79nBb-4X_usRikR3Iyb4Vg) 15. [oval:org.mitre.oval:def:10123](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10123) 16. [20338](http://secunia.com/advisories/20338)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3824, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3824 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3824 - **State**: PUBLISHED - **Published Date**: October 01, 2015 at 00:00 UTC - **Last Updated**: August 06, 2024 at 05:56 UTC - **Reserved Date**: May 12, 2015 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not properly restrict size addition, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow and memory corruption) via a crafted MPEG-4 tx3g atom, aka internal bug 20923261. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033094](http://www.securitytracker.com/id/1033094) 2. [76052](http://www.securityfocus.com/bid/76052) 3. [](http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm) 4. [](http://www.huawei.com/en/psirt/security-advisories/hw-448928) 5. [[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)](https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ) 6. [](https://android.googlesource.com/platform/frameworks/av/+/463a6f807e187828442949d1924e143cf07778c6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40633, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40633 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40633 - **State**: PUBLISHED - **Published Date**: March 02, 2023 at 22:18 UTC - **Last Updated**: January 17, 2025 at 22:11 UTC - **Reserved Date**: December 21, 2022 at 17:02 UTC - **Assigned By**: icscert ### Vulnerability Description A malicious actor can clone access cards used to open control cabinets secured with Rittal CMC III locks. ### Affected Products **Rittal - CMC III** Affected versions: - all versions (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-061-03)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2866, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2866 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2866 - **State**: PUBLISHED - **Published Date**: June 07, 2023 at 20:12 UTC - **Last Updated**: January 16, 2025 at 21:32 UTC - **Reserved Date**: May 24, 2023 at 14:09 UTC - **Assigned By**: icscert ### Vulnerability Description If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-351: Security Weakness ### Affected Products **Advantech - WebAccess/SCADA** Affected versions: - 8.4.5 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-150-01) ### Credits - Marlon Luis Petry reported this vulnerability to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6944, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6944 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6944 - **State**: PUBLISHED - **Published Date**: October 15, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:31 UTC - **Reserved Date**: September 19, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The mitfahrgelegenheit.at (aka com.carpooling.android.at) application 2.3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#869817](http://www.kb.cert.org/vuls/id/869817) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2508, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2508 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2508 - **State**: PUBLISHED - **Published Date**: July 14, 2011 at 23:00 UTC - **Last Updated**: August 06, 2024 at 23:00 UTC - **Reserved Date**: June 15, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Directory traversal vulnerability in libraries/display_tbl.lib.php in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1, when a certain MIME transformation feature is enabled, allows remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in a GLOBALS[mime_map][$meta->name][transformation] parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.xxor.se/advisories/phpMyAdmin_3.x_Multiple_Remote_Code_Executions.txt) 2. [[oss-security] 20110628 CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities](http://www.openwall.com/lists/oss-security/2011/06/28/2) 3. [](http://typo3.org/teams/security/security-bulletins/typo3-sa-2011-008/) 4. [](http://www.phpmyadmin.net/home_page/security/PMASA-2011-8.php) 5. [45292](http://secunia.com/advisories/45292) 6. [[oss-security] 20110628 Re: CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities](http://www.openwall.com/lists/oss-security/2011/06/28/6) 7. [[oss-security] 20110628 Re: [Phpmyadmin-security] CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities](http://www.openwall.com/lists/oss-security/2011/06/28/8) 8. [73614](http://www.osvdb.org/73614) 9. [MDVSA-2011:124](http://www.mandriva.com/security/advisories?name=MDVSA-2011:124) 10. [8306](http://securityreason.com/securityalert/8306) 11. [45139](http://secunia.com/advisories/45139) 12. [](http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=b434320eff8ca9c2fc1b043c1804f868341af9a7) 13. [DSA-2286](http://www.debian.org/security/2011/dsa-2286) 14. [20110707 phpMyAdmin 3.x Multiple Remote Code Executions](http://www.securityfocus.com/archive/1/518804/100/0/threaded) 15. [[oss-security] 20110629 Re: CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities](http://www.openwall.com/lists/oss-security/2011/06/29/11) 16. [](http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html) 17. [45315](http://secunia.com/advisories/45315) 18. [FEDORA-2011-9144](http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062719.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2105, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2105 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2105 - **State**: PUBLISHED - **Published Date**: May 27, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:15 UTC - **Reserved Date**: May 27, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The webacc servlet in Novell NetWare Enterprise Web Server 5.1 and 6.0 allows remote attackers to read arbitrary .htt files via a full pathname in the error parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20040123 NetWare-Enterprise-Web-Server/5.1/6.0 Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=107487862304440&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1819, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1819 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1819 - **State**: PUBLISHED - **Published Date**: August 14, 2015 at 18:00 UTC - **Last Updated**: August 06, 2024 at 04:54 UTC - **Reserved Date**: February 17, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2015:2550](http://rhn.redhat.com/errata/RHSA-2015-2550.html) 2. [APPLE-SA-2016-03-21-5](http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html) 3. [openSUSE-SU-2016:0106](http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html) 4. [](https://support.apple.com/HT206167) 5. [](https://support.apple.com/HT206168) 6. [DSA-3430](http://www.debian.org/security/2015/dsa-3430) 7. [FEDORA-2015-037f844d3e](http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172943.html) 8. [APPLE-SA-2016-03-21-1](http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html) 9. [](http://xmlsoft.org/news.html) 10. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html) 11. [GLSA-201507-08](https://security.gentoo.org/glsa/201507-08) 12. [APPLE-SA-2016-03-21-2](http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html) 13. [75570](http://www.securityfocus.com/bid/75570) 14. [FEDORA-2015-c24af963a2](http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172710.html) 15. [1034243](http://www.securitytracker.com/id/1034243) 16. [USN-2812-1](http://www.ubuntu.com/usn/USN-2812-1) 17. [RHSA-2015:1419](http://rhn.redhat.com/errata/RHSA-2015-1419.html) 18. [GLSA-201701-37](https://security.gentoo.org/glsa/201701-37) 19. [openSUSE-SU-2015:2372](http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html) 20. [](https://git.gnome.org/browse/libxml2/commit/?id=213f1fe0d76d30eaed6e5853057defc43e6df2c9) 21. [APPLE-SA-2016-03-21-3](http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html) 22. [](https://support.apple.com/HT206169) 23. [](https://support.apple.com/HT206166) 24. [](http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-58132, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-58132 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-58132 - **State**: PUBLISHED - **Published Date**: April 06, 2025 at 00:00 UTC - **Last Updated**: April 07, 2025 at 14:11 UTC - **Reserved Date**: April 06, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In chainmaker-go (aka ChainMaker) before 2.3.6, multiple updates to a single node's configuration can cause other normal nodes to perform concurrent read and write operations on a map, leading to a panic. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-821: Security Weakness ### Affected Products **ChainMaker - chainmaker-go** Affected versions: - 0 (Status: affected) ### References 1. [](https://git.chainmaker.org.cn/chainmaker/issue/-/issues/1202)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4979, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4979 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4979 - **State**: PUBLISHED - **Published Date**: July 26, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 11:34 UTC - **Reserved Date**: July 16, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Apple QuickTime allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed version number and flags in an mvhd atom. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://zerodayinitiative.com/advisories/ZDI-14-264/) 2. [](https://support.apple.com/kb/HT6493) 3. [68852](http://www.securityfocus.com/bid/68852) 4. [1030638](http://www.securitytracker.com/id/1030638) 5. [](http://support.apple.com/kb/HT6443)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9112, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9112 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9112 - **State**: PUBLISHED - **Published Date**: November 22, 2024 at 21:33 UTC - **Last Updated**: November 26, 2024 at 15:18 UTC - **Reserved Date**: September 23, 2024 at 18:14 UTC - **Assigned By**: zdi ### Vulnerability Description FastStone Image Viewer PSD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FastStone Image Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PSD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25102. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **FastStone - Image Viewer** Affected versions: - 7.8 (Status: affected) ### References 1. [ZDI-24-1273](https://www.zerodayinitiative.com/advisories/ZDI-24-1273/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9463, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9463 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9463 - **State**: PUBLISHED - **Published Date**: December 04, 2024 at 23:40 UTC - **Last Updated**: December 05, 2024 at 15:23 UTC - **Reserved Date**: April 05, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In sw49408_irq_runtime_engine_debug of touch_sw49408.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - Kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2018-08-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2390, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2390 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2390 - **State**: PUBLISHED - **Published Date**: October 13, 2010 at 22:00 UTC - **Last Updated**: August 07, 2024 at 02:32 UTC - **Reserved Date**: June 21, 2010 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Database Control component in EM Console in Oracle Database Server 10.1.0.5 and 10.2.0.3, Oracle Fusion Middleware 10.1.2.3 and 10.1.4.3, and Enterprise Manager Grid Control allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html) 2. [TA10-287A](http://www.us-cert.gov/cas/techalerts/TA10-287A.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5159, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5159 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5159 - **State**: PUBLISHED - **Published Date**: October 30, 2018 at 18:00 UTC - **Last Updated**: August 06, 2024 at 06:32 UTC - **Reserved Date**: July 01, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1245200) 2. [](https://github.com/latchset/kdcproxy/commit/f274aa6787cb8b3ec1cc12c440a56665b7231882)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0434, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0434 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0434 - **State**: PUBLISHED - **Published Date**: September 18, 2001 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:21 UTC - **Reserved Date**: May 24, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The LogDataListToFile ActiveX function used in (1) Knowledge Center and (2) Back web components of Compaq Presario computers allows remote attackers to modify arbitrary files and cause a denial of service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [compaq-activex-dos(6355)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6355) 2. [SSRT0716](http://ftp.support.compaq.com/patches/.new/html/SSRT0716-01.shtml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0039, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0039 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0039 - **State**: PUBLISHED - **Published Date**: February 08, 2014 at 00:00 UTC - **Last Updated**: August 06, 2024 at 08:58 UTC - **Reserved Date**: December 03, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Untrusted search path vulnerability in fwsnort before 1.6.4, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnort.conf in the current working directory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/mrash/fwsnort/blob/master/ChangeLog) 2. [FEDORA-2014-1975](http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128188.html) 3. [FEDORA-2014-1972](http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128205.html) 4. [102822](http://osvdb.org/102822) 5. [65341](http://www.securityfocus.com/bid/65341) 6. [](https://github.com/mrash/fwsnort/commit/fa977453120cc48e1654f373311f9cac468d3348) 7. [[oss-security] 20140203 CVE-2014-0039: fwsnort loaded configuration file from cwd when run as a non-root user](http://seclists.org/oss-sec/2014/q1/221)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15531, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15531 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15531 - **State**: PUBLISHED - **Published Date**: January 23, 2018 at 20:00 UTC - **Last Updated**: September 16, 2024 at 19:15 UTC - **Reserved Date**: October 17, 2017 at 00:00 UTC - **Assigned By**: symantec ### Vulnerability Description Symantec Reporter 9.5 prior to 9.5.4.1 and 10.1 prior to 10.1.5.5 does not restrict excessive authentication attempts for management interface users. A remote attacker can use brute force search to guess a user password and gain access to Reporter. ### Affected Products **Symantec Corporation - Reporter** Affected versions: - 9.5 prior to 9.5.4.1 (Status: affected) - 10.x prior to 10.2 (Status: affected) ### References 1. [102751](http://www.securityfocus.com/bid/102751) 2. [](https://www.symantec.com/security-center/network-protection-security-advisories/SA158)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3925, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3925 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3925 - **State**: PUBLISHED - **Published Date**: November 30, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:31 UTC - **Reserved Date**: November 30, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in Central Manchester CLC Helpdesk Issue Manager 0.9 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) detail[], (2) orderdir, and (3) orderby parameters to find.php, and the (4) id parameter to issue.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://pridels0.blogspot.com/2005/11/helpdesk-issue-manager-v09-sql-inj.html) 2. [21114](http://www.osvdb.org/21114) 3. [21115](http://www.osvdb.org/21115) 4. [15604](http://www.securityfocus.com/bid/15604) 5. [17714](http://secunia.com/advisories/17714) 6. [ADV-2005-2589](http://www.vupen.com/english/advisories/2005/2589)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-46086, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-46086 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-46086 - **State**: PUBLISHED - **Published Date**: September 18, 2024 at 00:00 UTC - **Last Updated**: September 18, 2024 at 18:57 UTC - **Reserved Date**: September 11, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FrogCMS V0.9.5 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/?/plugin/file_manager/delete/123 ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/PG2Stom/cms/tree/main/12/readme.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40732, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40732 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40732 - **State**: PUBLISHED - **Published Date**: September 12, 2023 at 09:32 UTC - **Last Updated**: February 27, 2025 at 20:55 UTC - **Reserved Date**: August 21, 2023 at 10:57 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in QMS Automotive (All versions < V12.39). The QMS.Mobile module of the affected application does not invalidate the session token on logout. This could allow an attacker to perform session hijacking attacks. ### CVSS Metrics - **CVSS Base Score**: 3.9/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-613: Security Weakness ### Affected Products **Siemens - QMS Automotive** Affected versions: - All versions < V12.39 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36215, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36215 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36215 - **State**: PUBLISHED - **Published Date**: September 08, 2021 at 17:50 UTC - **Last Updated**: August 04, 2024 at 00:54 UTC - **Reserved Date**: July 07, 2021 at 00:00 UTC - **Assigned By**: LINE ### Vulnerability Description LINE client for iOS 10.21.3 and before allows address bar spoofing due to inappropriate address handling. ### Affected Products **LINE Corporation - LINE client for iOS** Affected versions: - <= (Status: affected) ### References 1. [](https://hackerone.com/reports/1082991)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24572, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24572 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24572 - **State**: PUBLISHED - **Published Date**: February 28, 2022 at 13:14 UTC - **Last Updated**: August 03, 2024 at 04:13 UTC - **Reserved Date**: February 07, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Car Driving School Management System v1.0 is affected by Cross Site Scripting (XSS) in the User Enrollment Form (Username Field). To exploit this Vulnerability, an admin views the registered user details. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/nsparker1337/OpenSource/blob/main/exploit_xss)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4783, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4783 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4783 - **State**: PUBLISHED - **Published Date**: February 13, 2023 at 14:32 UTC - **Last Updated**: March 21, 2025 at 14:37 UTC - **Reserved Date**: December 28, 2022 at 10:10 UTC - **Assigned By**: WPScan ### Vulnerability Description The Youtube Channel Gallery WordPress plugin through 2.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Youtube Channel Gallery** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/38e4c7fe-94d5-48b9-8659-e114cbbb4252) ### Credits - Lana Codes - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34228, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34228 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34228 - **State**: PUBLISHED - **Published Date**: August 20, 2021 at 16:49 UTC - **Last Updated**: August 04, 2024 at 00:05 UTC - **Reserved Date**: June 07, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting in parent_control.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Description" field and "Service Name" field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/pup2y/IoTVul/tree/main/TOTOLINK/A3002R)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41743, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41743 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41743 - **State**: PUBLISHED - **Published Date**: January 19, 2025 at 15:02 UTC - **Last Updated**: January 21, 2025 at 15:05 UTC - **Reserved Date**: July 22, 2024 at 12:02 UTC - **Assigned By**: ibm ### Vulnerability Description IBM TXSeries for Multiplatforms 10.1 could allow a remote attacker to cause a denial of service using persistent connections due to improper allocation of resources. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-770: Security Weakness ### Affected Products **IBM - TXSeries for Multiplatforms** Affected versions: - 10.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7172103)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19897, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19897 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19897 - **State**: PUBLISHED - **Published Date**: January 23, 2020 at 20:54 UTC - **Last Updated**: August 05, 2024 at 02:32 UTC - **Reserved Date**: December 18, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In IXP EasyInstall 6.2.13723, there is Remote Code Execution via the Agent Service. An unauthenticated attacker can communicate with the Agent Service over TCP port 20051, and execute code in the NT AUTHORITY\SYSTEM context of the target system by using the Execute Command Line function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://improsec.com/tech-blog/multiple-vulnerabilities-in-easyinstall-rmm-and-deployment-software)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3046, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3046 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3046 - **State**: PUBLISHED - **Published Date**: September 26, 2022 at 15:01 UTC - **Last Updated**: May 22, 2025 at 13:48 UTC - **Reserved Date**: August 30, 2022 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in Browser Tag in Google Chrome prior to 105.0.5195.52 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html) 2. [](https://crbug.com/1346245) 3. [GLSA-202209-23](https://security.gentoo.org/glsa/202209-23) 4. [FEDORA-2022-3f28aa88cf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7164, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7164 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7164 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 16, 2015 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6126, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6126 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6126 - **State**: PUBLISHED - **Published Date**: November 14, 2023 at 15:51 UTC - **Last Updated**: January 08, 2025 at 16:15 UTC - **Reserved Date**: November 14, 2023 at 15:51 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description Code Injection in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2. ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **salesagility - salesagility/suitecrm** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/e22a9be3-3273-42cb-bfcc-c67a1025684e) 2. [](https://github.com/salesagility/suitecrm/commit/54bc56c3bd9f1db75408db1c1d7d652c3f5f71e9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2004, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2004 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2004 - **State**: PUBLISHED - **Published Date**: June 16, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 09:58 UTC - **Reserved Date**: February 17, 2014 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.seil.jp/support/security/a01443.html) 2. [JVN#10724763](http://jvn.jp/en/jp/JVN10724763/index.html) 3. [JVNDB-2014-000055](http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9286, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9286 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9286 - **State**: PUBLISHED - **Published Date**: April 07, 2020 at 18:52 UTC - **Last Updated**: October 25, 2024 at 14:02 UTC - **Reserved Date**: February 19, 2020 at 00:00 UTC - **Assigned By**: fortinet ### Vulnerability Description An improper authorization vulnerability in FortiADC may allow a remote authenticated user with low privileges to perform certain actions such as rebooting the system. ### Affected Products **n/a - FortiADC** Affected versions: - FortiADC 5.3.3 and earlier. (Status: affected) ### References 1. [](https://fortiguard.com/psirt/FG-IR-20-013)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1918, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1918 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1918 - **State**: PUBLISHED - **Published Date**: February 21, 2006 at 19:00 UTC - **Last Updated**: August 07, 2024 at 22:06 UTC - **Reserved Date**: June 08, 2005 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/". ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:9946](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9946) 2. [5834](http://www.securityfocus.com/bid/5834) 3. [SUSE-SR:2006:005](http://www.novell.com/linux/security/advisories/2006_05_sr.html) 4. [1015655](http://securitytracker.com/id?1015655) 5. [](http://support.avaya.com/elmodocs2/security/ASA-2006-110.htm) 6. [18988](http://secunia.com/advisories/18988) 7. [19130](http://secunia.com/advisories/19130) 8. [RHSA-2006:0195](http://www.redhat.com/support/errata/RHSA-2006-0195.html) 9. [20397](http://secunia.com/advisories/20397) 10. [FLSA:183571-1](http://www.securityfocus.com/archive/1/430297/100/0/threaded) 11. [20060301-01-U](ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc) 12. [](https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=140589) 13. [19183](http://secunia.com/advisories/19183)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40799, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40799 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40799 - **State**: PUBLISHED - **Published Date**: November 29, 2022 at 00:00 UTC - **Last Updated**: April 25, 2025 at 14:54 UTC - **Reserved Date**: September 19, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.com/lu-ka/cve-2022-40799)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18785, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18785 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18785 - **State**: PUBLISHED - **Published Date**: March 20, 2020 at 00:31 UTC - **Last Updated**: August 05, 2024 at 02:02 UTC - **Reserved Date**: November 06, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SuiteCRM 7.10.x prior to 7.10.21 and 7.11.x prior to 7.11.9 mishandles API access tokens and credentials. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://docs.suitecrm.com/admin/releases/7.11.x/#_7_11_9) 2. [](https://docs.suitecrm.com/admin/releases/7.10.x/#_7_10_21)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-40851, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-40851 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-40851 - **State**: PUBLISHED - **Published Date**: October 28, 2024 at 21:07 UTC - **Last Updated**: October 30, 2024 at 14:37 UTC - **Reserved Date**: July 10, 2024 at 17:11 UTC - **Assigned By**: apple ### Vulnerability Description This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker with physical access may be able to access contact photos from the lock screen. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/121563)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0092, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0092 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0092 - **State**: PUBLISHED - **Published Date**: January 29, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:10 UTC - **Reserved Date**: January 23, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unknown vulnerability in Safari web browser in Mac OS X 10.2.8 and 10.3.2, with unknown impact. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2004-01-26](http://lists.apple.com/archives/security-announce/2004/Jan/msg00000.html) 2. [9504](http://www.securityfocus.com/bid/9504)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0207, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0207 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0207 - **State**: PUBLISHED - **Published Date**: October 30, 2019 at 20:46 UTC - **Last Updated**: August 07, 2024 at 00:37 UTC - **Reserved Date**: January 06, 2010 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description In xpdf, the xref table contains an infinite loop which allows remote attackers to cause a denial of service (application crash) in xpdf-based PDF viewers. ### Affected Products **poppler - poppler** Affected versions: - 0.26.5-2 (Status: affected) ### References 1. [](https://security-tracker.debian.org/tracker/CVE-2010-0207) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-0207)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45061, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45061 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45061 - **State**: PUBLISHED - **Published Date**: November 09, 2022 at 00:00 UTC - **Last Updated**: May 01, 2025 at 14:24 UTC - **Reserved Date**: November 09, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/python/cpython/issues/98433) 2. [FEDORA-2022-45d2cfdfa4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/) 3. [FEDORA-2022-3e859b6bc6](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/) 4. [FEDORA-2022-e1ce71ff40](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/) 5. [FEDORA-2022-fdb2739feb](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/) 6. [](https://security.netapp.com/advisory/ntap-20221209-0007/) 7. [FEDORA-2022-6f4e6120d7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/) 8. [FEDORA-2022-e6d0495206](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/) 9. [FEDORA-2022-6d51289820](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/) 10. [FEDORA-2022-50deb53896](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/) 11. [FEDORA-2022-93c6916349](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/) 12. [FEDORA-2022-18b234c18b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/) 13. [FEDORA-2022-de755fd092](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/) 14. [FEDORA-2022-fd3771db30](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/) 15. [FEDORA-2022-6b8b96f883](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/) 16. [FEDORA-2022-3d7e44dbd5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/) 17. [FEDORA-2022-b2f06fbb62](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/) 18. [FEDORA-2022-6ba889e0e3](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/) 19. [FEDORA-2022-dbb811d203](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/) 20. [FEDORA-2022-e699dd5247](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/) 21. [FEDORA-2022-fbf6a320fe](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/) 22. [FEDORA-2022-bcf089dd07](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/) 23. [FEDORA-2023-a990c93ed0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/) 24. [FEDORA-2023-78b4ce2f23](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/) 25. [FEDORA-2023-af5206f71d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/) 26. [FEDORA-2023-943556a733](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/) 27. [FEDORA-2023-097dd40685](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/) 28. [FEDORA-2023-f1381c83af](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/) 29. [GLSA-202305-02](https://security.gentoo.org/glsa/202305-02) 30. [[debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update](https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html) 31. [[debian-lts-announce] 20230630 [SECURITY] [DLA 3477-1] python3.7 security update](https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html) 32. [FEDORA-2023-129178fd27](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/) 33. [FEDORA-2023-c43a940a93](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/) 34. [FEDORA-2023-5460cf6dfb](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41820, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41820 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41820 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 14:04 UTC - **Last Updated**: August 08, 2024 at 14:57 UTC - **Reserved Date**: September 01, 2023 at 14:25 UTC - **Assigned By**: lenovo ### Vulnerability Description An implicit intent vulnerability was reported in the Motorola Ready For application that could allow a local attacker to read information about connected Bluetooth audio devices.  ### CVSS Metrics - **CVSS Base Score**: 5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-927: Security Weakness ### Affected Products **Motorola - Phones** Affected versions: - (Status: affected) ### References 1. [](https://en-us.support.motorola.com/app/answers/detail/a_id/178878) ### Credits - Sergey Toshin and Illia Khorolskyi of Oversecured (ovesecured.com)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2637, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2637 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2637 - **State**: PUBLISHED - **Published Date**: August 20, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:45 UTC - **Reserved Date**: August 20, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in PHPFreeNews 1.40 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) Match or (2) CatID parameter to SearchResults.php, or (3) the password to AccessControl.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [16490](http://secunia.com/advisories/16490/) 2. [1014726](http://securitytracker.com/id?1014726) 3. [20050817 PHPFreeNews V1.40 and prior Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=112439254700016&w=2) 4. [14589](http://www.securityfocus.com/bid/14589)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-9351, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-9351 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-9351 - **State**: PUBLISHED - **Published Date**: September 27, 2019 at 18:05 UTC - **Last Updated**: August 04, 2024 at 21:46 UTC - **Reserved Date**: February 28, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In SyncStatusObserver, there is a possible bypass for operating system protections that isolate user profiles from each other due to a missing permission check. This could lead to local limited information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-128599864 ### Affected Products **n/a - Android** Affected versions: - Android-10 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/android-10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-58098, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-58098 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-58098 - **State**: PUBLISHED - **Published Date**: May 05, 2025 at 14:53 UTC - **Last Updated**: May 09, 2025 at 08:06 UTC - **Reserved Date**: March 06, 2025 at 15:52 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: bpf: track changes_pkt_data property for global functions When processing calls to certain helpers, verifier invalidates all packet pointers in a current state. For example, consider the following program: __attribute__((__noinline__)) long skb_pull_data(struct __sk_buff *sk, __u32 len) { return bpf_skb_pull_data(sk, len); } SEC("tc") int test_invalidate_checks(struct __sk_buff *sk) { int *p = (void *)(long)sk->data; if ((void *)(p + 1) > (void *)(long)sk->data_end) return TCX_DROP; skb_pull_data(sk, 0); *p = 42; return TCX_PASS; } After a call to bpf_skb_pull_data() the pointer 'p' can't be used safely. See function filter.c:bpf_helper_changes_pkt_data() for a list of such helpers. At the moment verifier invalidates packet pointers when processing helper function calls, and does not traverse global sub-programs when processing calls to global sub-programs. This means that calls to helpers done from global sub-programs do not invalidate pointers in the caller state. E.g. the program above is unsafe, but is not rejected by verifier. This commit fixes the omission by computing field bpf_subprog_info->changes_pkt_data for each sub-program before main verification pass. changes_pkt_data should be set if: - subprogram calls helper for which bpf_helper_changes_pkt_data returns true; - subprogram calls a global function, for which bpf_subprog_info->changes_pkt_data should be set. The verifier.c:check_cfg() pass is modified to compute this information. The commit relies on depth first instruction traversal done by check_cfg() and absence of recursive function calls: - check_cfg() would eventually visit every call to subprogram S in a state when S is fully explored; - when S is fully explored: - every direct helper call within S is explored (and thus changes_pkt_data is set if needed); - every call to subprogram S1 called by S was visited with S1 fully explored (and thus S inherits changes_pkt_data from S1). The downside of such approach is that dead code elimination is not taken into account: if a helper call inside global function is dead because of current configuration, verifier would conservatively assume that the call occurs for the purpose of the changes_pkt_data computation. ### Affected Products **Linux - Linux** Affected versions: - 51c39bb1d5d105a02e29aa7960f0a395086e6342 (Status: affected) - 51c39bb1d5d105a02e29aa7960f0a395086e6342 (Status: affected) - 51c39bb1d5d105a02e29aa7960f0a395086e6342 (Status: affected) **Linux - Linux** Affected versions: - 5.6 (Status: affected) - 0 (Status: unaffected) - 6.6.90 (Status: unaffected) - 6.12.25 (Status: unaffected) - 6.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/79751e9227a5910c0e5a2c7186877d91821d957d) 2. [](https://git.kernel.org/stable/c/1d572c60488b52882b719ed273767ee3b280413d) 3. [](https://git.kernel.org/stable/c/51081a3f25c742da5a659d7fc6fd77ebfdd555be)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-39520, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-39520 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-39520 - **State**: PUBLISHED - **Published Date**: April 16, 2025 at 12:45 UTC - **Last Updated**: April 16, 2025 at 13:26 UTC - **Reserved Date**: April 16, 2025 at 06:24 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Wham Checkout Files Upload for WooCommerce allows Stored XSS. This issue affects Checkout Files Upload for WooCommerce: from n/a through 2.2.0. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **WP Wham - Checkout Files Upload for WooCommerce** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/checkout-files-upload-woocommerce/vulnerability/wordpress-checkout-files-upload-for-woocommerce-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - muhammad yudha (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1488, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1488 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1488 - **State**: PUBLISHED - **Published Date**: February 15, 2024 at 05:04 UTC - **Last Updated**: January 30, 2025 at 21:13 UTC - **Reserved Date**: February 14, 2024 at 12:47 UTC - **Assigned By**: redhat ### Vulnerability Description A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged attacker to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether. ### CVSS Metrics - **CVSS Base Score**: 8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H` ### Weakness Classification (CWE) - CWE-276: Security Weakness ### Affected Products **Unknown - Unknown** Affected versions: - 1.16.2 (Status: affected) **Red Hat - Red Hat Enterprise Linux 8** Affected versions: - 0:1.16.2-5.el8_9.6 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 8** Affected versions: - 0:1.16.2-5.8.el8_10 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 8.2 Advanced Update Support** Affected versions: - 0:1.7.3-12.el8_2.1 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 8.2 Telecommunications Update Service** Affected versions: - 0:1.7.3-12.el8_2.1 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions** Affected versions: - 0:1.7.3-12.el8_2.1 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support** Affected versions: - 0:1.7.3-15.el8_4.1 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 8.4 Telecommunications Update Service** Affected versions: - 0:1.7.3-15.el8_4.1 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions** Affected versions: - 0:1.7.3-15.el8_4.1 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 8.6 Extended Update Support** Affected versions: - 0:1.7.3-17.el8_6.4 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 8.8 Extended Update Support** Affected versions: - 0:1.16.2-5.el8_8.4 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9** Affected versions: - 0:1.16.2-3.el9_3.5 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9.0 Extended Update Support** Affected versions: - 0:1.13.1-13.el9_0.4 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support** Affected versions: - 0:1.16.2-3.el9_2.4 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 6** **Red Hat - Red Hat Enterprise Linux 7** ### References 1. [RHSA-2024:1750](https://access.redhat.com/errata/RHSA-2024:1750) 2. [RHSA-2024:1751](https://access.redhat.com/errata/RHSA-2024:1751) 3. [RHSA-2024:1780](https://access.redhat.com/errata/RHSA-2024:1780) 4. [RHSA-2024:1801](https://access.redhat.com/errata/RHSA-2024:1801) 5. [RHSA-2024:1802](https://access.redhat.com/errata/RHSA-2024:1802) 6. [RHSA-2024:1804](https://access.redhat.com/errata/RHSA-2024:1804) 7. [RHSA-2024:2587](https://access.redhat.com/errata/RHSA-2024:2587) 8. [RHSA-2024:2696](https://access.redhat.com/errata/RHSA-2024:2696) 9. [RHSA-2025:0837](https://access.redhat.com/errata/RHSA-2025:0837) 10. [](https://access.redhat.com/security/cve/CVE-2024-1488) 11. [RHBZ#2264183](https://bugzilla.redhat.com/show_bug.cgi?id=2264183)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4370, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4370 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4370 - **State**: PUBLISHED - **Published Date**: May 14, 2024 at 23:31 UTC - **Last Updated**: August 01, 2024 at 20:40 UTC - **Reserved Date**: April 30, 2024 at 19:35 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WPZOOM Addons for Elementor (Templates, Widgets) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget Image Box in all versions up to, and including, 1.1.36 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **wpzoom - WPZOOM Addons for Elementor (Templates, Widgets)** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c7aaff3e-0c81-4fe7-b162-569c517f6c49?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wpzoom-elementor-addons/trunk/includes/widgets/image-box/image-box.php#L1229) 3. [](https://wordpress.org/plugins/wpzoom-elementor-addons/#developers) 4. [](https://plugins.trac.wordpress.org/changeset/3084540) ### Credits - Matthew Rollings
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0252, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0252 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0252 - **State**: PUBLISHED - **Published Date**: March 12, 2013 at 21:00 UTC - **Last Updated**: August 06, 2024 at 14:18 UTC - **Reserved Date**: December 06, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description boost::locale::utf::utf_traits in the Boost.Locale library in Boost 1.48 through 1.52 does not properly detect certain invalid UTF-8 sequences, which might allow remote attackers to bypass input validation protection mechanisms via crafted trailing bytes. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2013-2448](http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099122.html) 2. [57675](http://www.securityfocus.com/bid/57675) 3. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699649) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=907481) 5. [](https://svn.boost.org/trac/boost/ticket/7743) 6. [[oss-security] 20130203 Re: CVE id request: boost](http://www.openwall.com/lists/oss-security/2013/02/04/2) 7. [FEDORA-2013-2420](http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099103.html) 8. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699650) 9. [](http://www.boost.org/users/news/boost_locale_security_notice.html) 10. [USN-1727-1](http://www.ubuntu.com/usn/USN-1727-1) 11. [MDVSA-2013:065](http://www.mandriva.com/security/advisories?name=MDVSA-2013:065)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1761, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1761 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1761 - **State**: PUBLISHED - **Published Date**: March 28, 2019 at 00:25 UTC - **Last Updated**: November 21, 2024 at 19:41 UTC - **Reserved Date**: December 06, 2018 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Hot Standby Router Protocol (HSRP) subsystem of Cisco IOS and IOS XE Software could allow an unauthenticated, adjacent attacker to receive potentially sensitive information from an affected device. The vulnerability is due to insufficient memory initialization. An attacker could exploit this vulnerability by receiving HSRPv2 traffic from an adjacent HSRP member. A successful exploit could allow the attacker to receive potentially sensitive information from the adjacent device. ### Weakness Classification (CWE) - CWE-665: Security Weakness ### Affected Products **Cisco - Cisco IOS and IOS XE Software** Affected versions: - 3.2.0SG (Status: affected) - 3.2.1SG (Status: affected) - 3.2.2SG (Status: affected) - 3.2.3SG (Status: affected) - 3.2.4SG (Status: affected) - 3.2.5SG (Status: affected) - 3.2.6SG (Status: affected) - 3.2.7SG (Status: affected) - 3.2.8SG (Status: affected) - 3.2.9SG (Status: affected) - 3.2.10SG (Status: affected) - 3.2.11SG (Status: affected) - 3.7.0S (Status: affected) - 3.7.1S (Status: affected) - 3.7.2S (Status: affected) - 3.7.3S (Status: affected) - 3.7.4S (Status: affected) - 3.7.5S (Status: affected) - 3.7.6S (Status: affected) - 3.7.7S (Status: affected) - 3.7.8S (Status: affected) - 3.7.4aS (Status: affected) - 3.7.2tS (Status: affected) - 3.7.0bS (Status: affected) - 3.7.1aS (Status: affected) - 3.3.0SG (Status: affected) - 3.3.2SG (Status: affected) - 3.3.1SG (Status: affected) - 3.8.0S (Status: affected) - 3.8.1S (Status: affected) - 3.8.2S (Status: affected) - 3.9.1S (Status: affected) - 3.9.0S (Status: affected) - 3.9.2S (Status: affected) - 3.9.1aS (Status: affected) - 3.9.0aS (Status: affected) - 3.2.0SE (Status: affected) - 3.2.1SE (Status: affected) - 3.2.2SE (Status: affected) - 3.2.3SE (Status: affected) - 3.3.0SE (Status: affected) - 3.3.1SE (Status: affected) - 3.3.2SE (Status: affected) - 3.3.3SE (Status: affected) - 3.3.4SE (Status: affected) - 3.3.5SE (Status: affected) - 3.3.0XO (Status: affected) - 3.3.1XO (Status: affected) - 3.3.2XO (Status: affected) - 3.4.0SG (Status: affected) - 3.4.2SG (Status: affected) - 3.4.1SG (Status: affected) - 3.4.3SG (Status: affected) - 3.4.4SG (Status: affected) - 3.4.5SG (Status: affected) - 3.4.6SG (Status: affected) - 3.4.7SG (Status: affected) - 3.4.8SG (Status: affected) - 3.5.0E (Status: affected) - 3.5.1E (Status: affected) - 3.5.2E (Status: affected) - 3.5.3E (Status: affected) - 3.10.0S (Status: affected) - 3.10.1S (Status: affected) - 3.10.2S (Status: affected) - 3.10.3S (Status: affected) - 3.10.4S (Status: affected) - 3.10.5S (Status: affected) - 3.10.6S (Status: affected) - 3.10.2aS (Status: affected) - 3.10.2tS (Status: affected) - 3.10.7S (Status: affected) - 3.10.8S (Status: affected) - 3.10.8aS (Status: affected) - 3.10.9S (Status: affected) - 3.10.10S (Status: affected) - 3.11.1S (Status: affected) - 3.11.2S (Status: affected) - 3.11.0S (Status: affected) - 3.11.3S (Status: affected) - 3.11.4S (Status: affected) - 3.12.0S (Status: affected) - 3.12.1S (Status: affected) - 3.12.2S (Status: affected) - 3.12.3S (Status: affected) - 3.12.0aS (Status: affected) - 3.12.4S (Status: affected) - 3.13.0S (Status: affected) - 3.13.1S (Status: affected) - 3.13.2S (Status: affected) - 3.13.3S (Status: affected) - 3.13.4S (Status: affected) - 3.13.5S (Status: affected) - 3.13.2aS (Status: affected) - 3.13.0aS (Status: affected) - 3.13.5aS (Status: affected) - 3.13.6S (Status: affected) - 3.13.7S (Status: affected) - 3.13.6aS (Status: affected) - 3.13.6bS (Status: affected) - 3.13.7aS (Status: affected) - 3.13.8S (Status: affected) - 3.13.9S (Status: affected) - 3.13.10S (Status: affected) - 3.6.0E (Status: affected) - 3.6.1E (Status: affected) - 3.6.0aE (Status: affected) - 3.6.0bE (Status: affected) - 3.6.2aE (Status: affected) - 3.6.2E (Status: affected) - 3.6.3E (Status: affected) - 3.6.4E (Status: affected) - 3.6.5E (Status: affected) - 3.6.6E (Status: affected) - 3.6.5aE (Status: affected) - 3.6.5bE (Status: affected) - 3.6.7E (Status: affected) - 3.6.8E (Status: affected) - 3.6.7aE (Status: affected) - 3.6.7bE (Status: affected) - 3.6.9E (Status: affected) - 3.6.9aE (Status: affected) - 3.14.0S (Status: affected) - 3.14.1S (Status: affected) - 3.14.2S (Status: affected) - 3.14.3S (Status: affected) - 3.14.4S (Status: affected) - 3.15.0S (Status: affected) - 3.15.1S (Status: affected) - 3.15.2S (Status: affected) - 3.15.1cS (Status: affected) - 3.15.3S (Status: affected) - 3.15.4S (Status: affected) - 3.3.0SQ (Status: affected) - 3.3.1SQ (Status: affected) - 3.4.0SQ (Status: affected) - 3.4.1SQ (Status: affected) - 3.7.0E (Status: affected) - 3.7.1E (Status: affected) - 3.7.2E (Status: affected) - 3.7.3E (Status: affected) - 3.7.4E (Status: affected) - 3.7.5E (Status: affected) - 3.5.0SQ (Status: affected) - 3.5.1SQ (Status: affected) - 3.5.2SQ (Status: affected) - 3.5.3SQ (Status: affected) - 3.5.4SQ (Status: affected) - 3.5.5SQ (Status: affected) - 3.5.6SQ (Status: affected) - 3.5.7SQ (Status: affected) - 3.5.8SQ (Status: affected) - 3.16.0S (Status: affected) - 3.16.1S (Status: affected) - 3.16.0aS (Status: affected) - 3.16.1aS (Status: affected) - 3.16.2S (Status: affected) - 3.16.2aS (Status: affected) - 3.16.0bS (Status: affected) - 3.16.0cS (Status: affected) - 3.16.3S (Status: affected) - 3.16.2bS (Status: affected) - 3.16.3aS (Status: affected) - 3.16.4S (Status: affected) - 3.16.4aS (Status: affected) - 3.16.4bS (Status: affected) - 3.16.4gS (Status: affected) - 3.16.5S (Status: affected) - 3.16.4cS (Status: affected) - 3.16.4dS (Status: affected) - 3.16.4eS (Status: affected) - 3.16.6S (Status: affected) - 3.16.5aS (Status: affected) - 3.16.5bS (Status: affected) - 3.16.7S (Status: affected) - 3.16.6bS (Status: affected) - 3.16.7aS (Status: affected) - 3.16.7bS (Status: affected) - 3.16.8S (Status: affected) - 3.17.0S (Status: affected) - 3.17.1S (Status: affected) - 3.17.2S (Status: affected) - 3.17.1aS (Status: affected) - 3.17.3S (Status: affected) - 3.17.4S (Status: affected) - 16.1.1 (Status: affected) - 16.1.2 (Status: affected) - 16.1.3 (Status: affected) - 3.2.0JA (Status: affected) - 16.2.1 (Status: affected) - 16.2.2 (Status: affected) - 3.8.0E (Status: affected) - 3.8.1E (Status: affected) - 3.8.2E (Status: affected) - 3.8.3E (Status: affected) - 3.8.4E (Status: affected) - 3.8.5E (Status: affected) - 3.8.5aE (Status: affected) - 3.8.6E (Status: affected) - 3.8.7E (Status: affected) - 16.3.1 (Status: affected) - 16.3.2 (Status: affected) - 16.3.3 (Status: affected) - 16.3.1a (Status: affected) - 16.3.4 (Status: affected) - 16.3.5 (Status: affected) - 16.3.5b (Status: affected) - 16.3.6 (Status: affected) - 16.3.7 (Status: affected) - 16.4.1 (Status: affected) - 16.4.2 (Status: affected) - 16.4.3 (Status: affected) - 16.5.1 (Status: affected) - 16.5.1a (Status: affected) - 16.5.1b (Status: affected) - 16.5.2 (Status: affected) - 16.5.3 (Status: affected) - 3.18.0aS (Status: affected) - 3.18.0S (Status: affected) - 3.18.1S (Status: affected) - 3.18.2S (Status: affected) - 3.18.3S (Status: affected) - 3.18.4S (Status: affected) - 3.18.0SP (Status: affected) - 3.18.1SP (Status: affected) - 3.18.1aSP (Status: affected) - 3.18.1gSP (Status: affected) - 3.18.1bSP (Status: affected) - 3.18.1cSP (Status: affected) - 3.18.2SP (Status: affected) - 3.18.1hSP (Status: affected) - 3.18.2aSP (Status: affected) - 3.18.1iSP (Status: affected) - 3.18.3SP (Status: affected) - 3.18.4SP (Status: affected) - 3.18.3aSP (Status: affected) - 3.18.3bSP (Status: affected) - 3.18.5SP (Status: affected) - 3.9.0E (Status: affected) - 3.9.1E (Status: affected) - 3.9.2E (Status: affected) - 3.9.2bE (Status: affected) - 16.6.1 (Status: affected) - 16.6.2 (Status: affected) - 16.6.3 (Status: affected) - 16.6.4 (Status: affected) - 16.6.4s (Status: affected) - 16.6.4a (Status: affected) - 16.7.1 (Status: affected) - 16.7.1a (Status: affected) - 16.7.1b (Status: affected) - 16.7.2 (Status: affected) - 16.8.1 (Status: affected) - 16.8.1a (Status: affected) - 16.8.1b (Status: affected) - 16.8.1s (Status: affected) - 16.8.1c (Status: affected) - 16.8.1d (Status: affected) - 16.8.2 (Status: affected) - 16.8.1e (Status: affected) - 16.9.1 (Status: affected) - 16.9.1a (Status: affected) - 16.9.1b (Status: affected) - 16.9.1s (Status: affected) - 16.9.1c (Status: affected) - 16.9.1d (Status: affected) - 3.10.0E (Status: affected) - 3.10.1E (Status: affected) - 3.10.0cE (Status: affected) - 3.10.2E (Status: affected) - 3.10.1aE (Status: affected) - 3.10.1sE (Status: affected) ### References 1. [20190327 Cisco IOS and IOS XE Software Hot Standby Router Protocol Information Leak Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-ios-infoleak) 2. [107620](http://www.securityfocus.com/bid/107620)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1210, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1210 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1210 - **State**: PUBLISHED - **Published Date**: February 12, 2025 at 17:00 UTC - **Last Updated**: February 12, 2025 at 19:04 UTC - **Reserved Date**: February 10, 2025 at 19:07 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical was found in code-projects Wazifa System 1.0. Affected by this vulnerability is an unknown functionality of the file /controllers/control.php. The manipulation of the argument to leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **code-projects - Wazifa System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-295147 | code-projects Wazifa System control.php sql injection](https://vuldb.com/?id.295147) 2. [VDB-295147 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.295147) 3. [Submit #497357 | codeprojects Wazifa v1.0 SQL Injection](https://vuldb.com/?submit.497357) 4. [](https://github.com/nanguawuming/CVE2/blob/main/cve3.pdf) 5. [](https://code-projects.org/) ### Credits - eXVtaW5n (VulDB User) - eXVtaW5n (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5332, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5332 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5332 - **State**: PUBLISHED - **Published Date**: October 08, 2012 at 23:00 UTC - **Last Updated**: August 06, 2024 at 21:05 UTC - **Reserved Date**: October 08, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description at32 Reverse Proxy 1.060.310 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a long string in an HTTP header field, as demonstrated using the If-Unmodified-Since field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20120318 at32 ReverseProxy - Multiple HTTP Header Field Denial Of Service Vulnerability](http://archives.neohapsis.com/archives/bugtraq/2012-03/0080.html) 2. [at32reverse-proxy-dos(74133)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74133) 3. [52553](http://www.securityfocus.com/bid/52553) 4. [48460](http://secunia.com/advisories/48460)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4601, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4601 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4601 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:42 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12388, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12388 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12388 - **State**: PUBLISHED - **Published Date**: December 02, 2019 at 16:40 UTC - **Last Updated**: August 04, 2024 at 23:17 UTC - **Reserved Date**: May 28, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Anviz access control devices perform cleartext transmission of sensitive information (passwords/pins and names) when replying to query on port tcp/5010. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-25050, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-25050 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-25050 - **State**: PUBLISHED - **Published Date**: December 28, 2022 at 09:04 UTC - **Last Updated**: April 10, 2025 at 20:37 UTC - **Reserved Date**: December 28, 2022 at 08:57 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as problematic, has been found in Harvest Chosen up to 1.8.6. Affected by this issue is the function AbstractChosen of the file coffee/lib/abstract-chosen.coffee. The manipulation of the argument group_label leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.7 is able to address this issue. The name of the patch is 77fd031d541e77510268d1041ed37798fdd1017e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216956. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Harvest - Chosen** Affected versions: - 1.8.0 (Status: affected) - 1.8.1 (Status: affected) - 1.8.2 (Status: affected) - 1.8.3 (Status: affected) - 1.8.4 (Status: affected) - 1.8.5 (Status: affected) - 1.8.6 (Status: affected) ### References 1. [](https://vuldb.com/?id.216956) 2. [](https://vuldb.com/?ctiid.216956) 3. [](https://github.com/harvesthq/chosen/pull/2997) 4. [](https://github.com/harvesthq/chosen/commit/77fd031d541e77510268d1041ed37798fdd1017e) 5. [](https://github.com/harvesthq/chosen/releases/tag/v1.8.7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31110, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31110 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31110 - **State**: REJECTED - **Last Updated**: March 27, 2025 at 03:55 UTC - **Reserved Date**: March 26, 2025 at 14:23 UTC - **Assigned By**: fortinet ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2662, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2662 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2662 - **State**: PUBLISHED - **Published Date**: June 02, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:58 UTC - **Reserved Date**: May 30, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description VMware Server before RC1 does not clear user credentials from memory after a console connection is made, which might allow local attackers to gain privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060602 VMSA-2006-0002 - VMware Server sensitive information lifetime issue](http://www.securityfocus.com/archive/1/435709/100/0/threaded) 2. [ADV-2006-2104](http://www.vupen.com/english/advisories/2006/2104) 3. [vmware-server-information-disclosure(26879)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26879) 4. [](http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2124) 5. [18236](http://www.securityfocus.com/bid/18236) 6. [1016200](http://securitytracker.com/id?1016200)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52495, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52495 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52495 - **State**: PUBLISHED - **Published Date**: November 28, 2024 at 10:43 UTC - **Last Updated**: November 28, 2024 at 12:15 UTC - **Reserved Date**: November 11, 2024 at 06:40 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eniture Technology Distance Based Shipping Calculator allows SQL Injection.This issue affects Distance Based Shipping Calculator: from n/a through 2.0.21. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Eniture Technology - Distance Based Shipping Calculator** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/distance-based-shipping-calculator/vulnerability/wordpress-distance-based-shipping-calculator-plugin-2-0-21-sql-injection-vulnerability?_s_id=cve) ### Credits - João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35951, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35951 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35951 - **State**: PUBLISHED - **Published Date**: May 20, 2024 at 09:41 UTC - **Last Updated**: May 04, 2025 at 09:09 UTC - **Reserved Date**: May 17, 2024 at 13:50 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() Subject: [PATCH] drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() If some the pages or sgt allocation failed, we shouldn't release the pages ref we got earlier, otherwise we will end up with unbalanced get/put_pages() calls. We should instead leave everything in place and let the BO release function deal with extra cleanup when the object is destroyed, or let the fault handler try again next time it's called. ### Affected Products **Linux - Linux** Affected versions: - 187d2929206e6b098312c174ea873e4cedf5420d (Status: affected) - 187d2929206e6b098312c174ea873e4cedf5420d (Status: affected) - 187d2929206e6b098312c174ea873e4cedf5420d (Status: affected) **Linux - Linux** Affected versions: - 5.4 (Status: affected) - 0 (Status: unaffected) - 6.6.28 (Status: unaffected) - 6.8.7 (Status: unaffected) - 6.9 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/31806711e8a4b75e09b1c43652f2a6420e6e1002) 2. [](https://git.kernel.org/stable/c/e18070c622c63f0cab170348e320454728c277aa) 3. [](https://git.kernel.org/stable/c/1fc9af813b25e146d3607669247d0f970f5a87c3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35699, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35699 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35699 - **State**: PUBLISHED - **Published Date**: September 19, 2022 at 15:47 UTC - **Last Updated**: April 23, 2025 at 16:58 UTC - **Reserved Date**: July 12, 2022 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Adobe - Bridge** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/bridge/apsb22-49.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4886, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4886 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4886 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30161, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30161 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30161 - **State**: PUBLISHED - **Published Date**: June 15, 2022 at 21:51 UTC - **Last Updated**: January 02, 2025 at 19:03 UTC - **Reserved Date**: May 03, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 21H1** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30161)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0461, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0461 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0461 - **State**: PUBLISHED - **Published Date**: June 11, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:49 UTC - **Reserved Date**: June 07, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Internet Explorer 5.01 through 6 allows remote attackers to cause a denial of service (application crash) via Javascript in a web page that calls location.replace on itself, causing a loop. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4322](http://www.securityfocus.com/bid/4322) 2. [20020318 Javascript loop causes IE to crash](http://online.securityfocus.com/archive/1/262994) 3. [ie-javascript-dos(8488)](http://www.iss.net/security_center/static/8488.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1152, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1152 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1152 - **State**: PUBLISHED - **Published Date**: March 27, 2008 at 17:00 UTC - **Last Updated**: August 07, 2024 at 08:08 UTC - **Reserved Date**: March 05, 2008 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The data-link switching (DLSw) component in Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service (device restart or memory consumption) via crafted (1) UDP port 2067 or (2) IP protocol 91 packets. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-1006](http://www.vupen.com/english/advisories/2008/1006/references) 2. [TA08-087B](http://www.us-cert.gov/cas/techalerts/TA08-087B.html) 3. [1019712](http://www.securitytracker.com/id?1019712) 4. [28465](http://www.securityfocus.com/bid/28465) 5. [20080326 Multiple DLSw Denial of Service Vulnerabilities in Cisco IOS](http://www.cisco.com/en/US/products/products_security_advisory09186a0080969866.shtml) 6. [29507](http://secunia.com/advisories/29507) 7. [oval:org.mitre.oval:def:5821](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5821) 8. [cisco-ios-dlsw-dos(41482)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41482)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49373, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49373 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49373 - **State**: PUBLISHED - **Published Date**: October 22, 2024 at 15:58 UTC - **Last Updated**: October 22, 2024 at 17:13 UTC - **Reserved Date**: October 14, 2024 at 13:56 UTC - **Assigned By**: GitHub_M ### Vulnerability Description No Fuss Computing Centurion ERP is open source enterprise resource planning (ERP) software. Prior to version 1.2.1, an authenticated user can view projects within organizations they are not apart of. Version 1.2.1 fixes the problem. ### CVSS Metrics - **CVSS Base Score**: 4.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-653: Security Weakness ### Affected Products **nofusscomputing - centurion_erp** Affected versions: - < 1.2.1 (Status: affected) ### References 1. [https://github.com/nofusscomputing/centurion_erp/security/advisories/GHSA-5qmx-pr2f-qhj5](https://github.com/nofusscomputing/centurion_erp/security/advisories/GHSA-5qmx-pr2f-qhj5) 2. [https://github.com/nofusscomputing/centurion_erp/pull/358](https://github.com/nofusscomputing/centurion_erp/pull/358) 3. [https://github.com/nofusscomputing/centurion_erp/commit/c3a4685200faa060167d4fde86e806dc91eddcae](https://github.com/nofusscomputing/centurion_erp/commit/c3a4685200faa060167d4fde86e806dc91eddcae)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4032, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4032 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4032 - **State**: PUBLISHED - **Published Date**: November 27, 2009 at 19:00 UTC - **Last Updated**: August 07, 2024 at 06:45 UTC - **Reserved Date**: November 20, 2009 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.7e allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) graph.php, (2) include/top_graph_header.php, (3) lib/html_form.php, and (4) lib/timespan_settings.php, as demonstrated by the (a) graph_end or (b) graph_start parameters to graph.php; (c) the date1 parameter in a tree action to graph_view.php; and the (d) page_refresh and (e) default_dual_pane_width parameters to graph_settings.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.cacti.net/download_patches.php) 2. [20091126 Cacti 0.8.7e: Multiple security issues](http://www.securityfocus.com/archive/1/508129/100/0/threaded) 3. [20091125 Cacti 0.8.7e: Multiple security issues](http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0292.html) 4. [FEDORA-2009-12575](https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01390.html) 5. [38087](http://secunia.com/advisories/38087) 6. [JVN#09758120](http://jvn.jp/en/jp/JVN09758120/index.html) 7. [cacti-name-xss(54388)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54388) 8. [41041](http://secunia.com/advisories/41041) 9. [JVNDB-2009-003901](http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-003901.html) 10. [](http://docs.cacti.net/#cross-site_scripting_fixes) 11. [RHSA-2010:0635](https://rhn.redhat.com/errata/RHSA-2010-0635.html) 12. [[oss-security] 20091125 CVE Request - Cacti - 0.8.7e](http://www.openwall.com/lists/oss-security/2009/11/25/2) 13. [[oss-security] 20091130 Re: CVE Request - Cacti - 0.8.7e](http://www.openwall.com/lists/oss-security/2009/11/30/2) 14. [37481](http://secunia.com/advisories/37481) 15. [[oss-security] 20091125 Re: CVE Request - Cacti - 0.8.7e](http://www.openwall.com/lists/oss-security/2009/11/25/4) 16. [[oss-security] 20091126 Re: CVE Request - Cacti - 0.8.7e](http://www.openwall.com/lists/oss-security/2009/11/26/1) 17. [37109](http://www.securityfocus.com/bid/37109) 18. [ADV-2009-3325](http://www.vupen.com/english/advisories/2009/3325) 19. [ADV-2010-2132](http://www.vupen.com/english/advisories/2010/2132) 20. [37934](http://secunia.com/advisories/37934) 21. [60483](http://www.osvdb.org/60483) 22. [](http://bugs.gentoo.org/show_bug.cgi?id=294573) 23. [FEDORA-2009-12560](https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00166.html) 24. [](http://www.cacti.net/downloads/patches/0.8.7e/cross_site_fix.patch)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-34643, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-34643 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-34643 - **State**: PUBLISHED - **Published Date**: September 04, 2024 at 05:32 UTC - **Last Updated**: September 04, 2024 at 13:13 UTC - **Reserved Date**: May 07, 2024 at 04:43 UTC - **Assigned By**: SamsungMobile ### Vulnerability Description Improper access control in key input related function in Dressroom prior to SMR Sep-2024 Release 1 allows local attackers to access protected data. User interaction is required for triggering this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N` ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - SMR Sep-2024 Release in Selected Android 14 devices (Status: unaffected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20703, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20703 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20703 - **State**: PUBLISHED - **Published Date**: April 16, 2020 at 14:40 UTC - **Last Updated**: August 05, 2024 at 02:46 UTC - **Reserved Date**: April 15, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, and XR500 before 2.3.2.32. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000061226/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Gateways-PSV-2018-0393)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3970, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3970 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3970 - **State**: PUBLISHED - **Published Date**: August 01, 2006 at 22:00 UTC - **Last Updated**: August 07, 2024 at 18:48 UTC - **Reserved Date**: August 01, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in lmo.php in the LMO Component (com_lmo) 1.0b2 and earlier for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [lmo-lmo-file-include(28079)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28079) 2. [2092](https://www.exploit-db.com/exploits/2092) 3. [](http://developer.joomla.org/sf/sfmain/do/viewProject/projects.lmo) 4. [](http://forum.joomla.org/index.php/topic%2C100164.0.html) 5. [](http://forum.joomla.org/index.php/topic%2C81590.0.html) 6. [ADV-2006-3063](http://www.vupen.com/english/advisories/2006/3063)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-25168, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-25168 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-25168 - **State**: PUBLISHED - **Published Date**: April 14, 2022 at 20:06 UTC - **Last Updated**: April 16, 2025 at 16:29 UTC - **Reserved Date**: September 04, 2020 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Hard-coded credentials in the B. Braun Melsungen AG SpaceCom Version L81/U61 and earlier, and the Data module compactplus Versions A10 and A11 enable attackers with command line access to access the device’s Wi-Fi module. ### CVSS Metrics - **CVSS Base Score**: 3.3/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-798: Cross-site Scripting (XSS) ### Affected Products **B. Braun Melsungen AG - SpaceCom** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) **B. Braun Melsungen AG - Battery pack with Wi-Fi** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) **B. Braun Melsungen AG - Data module compactplus** Affected versions: - A10 (Status: affected) - A11 (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsma-20-296-02) 2. [](https://www.bbraun.com/en/products-and-therapies/services/b-braun-vulnerability-disclosure-policy/security-advisory.html) ### Credits - Julian Suleder, Nils Emmerich, and Birk Kauer of ERNW Research GmbH; Dr. Oliver Matula of ERNW Enno Rey Netzwerke GmbH, reported these vulnerabilities to the Federal Office for Information Security (BSI), Germany, in the context of the BSI project ManiMed (Manipulation of medical devices).
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-12323, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-12323 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-12323 - **State**: PUBLISHED - **Published Date**: June 13, 2018 at 16:00 UTC - **Last Updated**: September 17, 2024 at 04:15 UTC - **Reserved Date**: June 13, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Momentum Axel 720P 5.1.8 devices. A password of EHLGVG is hard-coded for the root and admin accounts, which makes it easier for physically proximate attackers to login at the console. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rchase.com/downloads/momentum-iot-penetration-test-report.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5794, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5794 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5794 - **State**: PUBLISHED - **Published Date**: February 15, 2018 at 22:00 UTC - **Last Updated**: September 17, 2024 at 01:36 UTC - **Reserved Date**: February 01, 2017 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A Remote Arbitrary File Download vulnerability in HPE Intelligent Management Center (IMC) PLAT version 7.2 E0403P06 was found. ### Affected Products **Hewlett Packard Enterprise - Intelligent Management Center (IMC) PLAT** Affected versions: - PLAT 7.2 E0403P06 (Status: affected) ### References 1. [](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03715en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21929, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21929 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21929 - **State**: PUBLISHED - **Published Date**: December 22, 2021 at 18:07 UTC - **Last Updated**: August 03, 2024 at 18:30 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘prod_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **n/a - Advantech** Affected versions: - Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021) (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-35632, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-35632 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-35632 - **State**: PUBLISHED - **Published Date**: December 12, 2023 at 18:10 UTC - **Last Updated**: January 01, 2025 at 02:18 UTC - **Reserved Date**: June 15, 2023 at 01:03 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-190: Security Weakness ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35632)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27155, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27155 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27155 - **State**: PUBLISHED - **Published Date**: October 22, 2020 at 16:48 UTC - **Last Updated**: August 04, 2024 at 16:11 UTC - **Reserved Date**: October 15, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Octopus Deploy through 2020.4.4. If enabled, the websocket endpoint may allow an untrusted tentacle host to present itself as a trusted one. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/OctopusDeploy) 2. [](https://github.com/OctopusDeploy/Issues/issues/6637) 3. [](https://github.com/OctopusDeploy/Issues/issues/6639) 4. [](https://github.com/OctopusDeploy/Issues/issues/6640)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29972, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29972 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29972 - **State**: PUBLISHED - **Published Date**: June 04, 2024 at 01:24 UTC - **Last Updated**: August 02, 2024 at 01:17 UTC - **Reserved Date**: March 22, 2024 at 08:49 UTC - **Assigned By**: Zyxel ### Vulnerability Description ** UNSUPPORTED WHEN ASSIGNED ** The command injection vulnerability in the CGI program "remote_help-cgi" in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Zyxel - NAS326 firmware** Affected versions: - < V5.21(AAZF.17)C0 (Status: affected) **Zyxel - NAS542 firmware** Affected versions: - < V5.21(ABAG.14)C0 (Status: affected) ### References 1. [](https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024) 2. [](https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6697, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6697 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6697 - **State**: PUBLISHED - **Published Date**: April 10, 2009 at 15:00 UTC - **Last Updated**: August 07, 2024 at 11:42 UTC - **Reserved Date**: April 10, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in TARGET-E WorldCup Bets (worldcup) 2.0.0 and earlier extension for TYPO3 allows remote attackers to execute arbitrary SQL commands via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [46396](http://osvdb.org/46396) 2. [worldcup-unspecified-sql-injection(43213)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43213) 3. [29826](http://www.securityfocus.com/bid/29826) 4. [](http://typo3.org/teams/security/security-bulletins/typo3-20080619-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48302, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48302 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48302 - **State**: PUBLISHED - **Published Date**: November 21, 2023 at 21:53 UTC - **Last Updated**: August 02, 2024 at 21:23 UTC - **Reserved Date**: November 14, 2023 at 17:41 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, when a user is tricked into copy pasting HTML code without markup (Ctrl+Shift+V) the markup will actually render. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app text. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **nextcloud - security-advisories** Affected versions: - >= 25.0.0, < 25.0.13 (Status: affected) - >= 26.0.0, < 26.0.8 (Status: affected) - >= 27.0.0, < 27.1.3 (Status: affected) ### References 1. [https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p7g9-x25m-4h87](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p7g9-x25m-4h87) 2. [https://github.com/nextcloud/text/pull/4877](https://github.com/nextcloud/text/pull/4877) 3. [https://hackerone.com/reports/2211561](https://hackerone.com/reports/2211561)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6173, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6173 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6173 - **State**: PUBLISHED - **Published Date**: January 14, 2020 at 18:50 UTC - **Last Updated**: August 04, 2024 at 08:55 UTC - **Reserved Date**: January 08, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TUF (aka The Update Framework) 0.7.2 through 0.12.1 allows Uncontrolled Resource Consumption. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/theupdateframework/tuf/commits/develop) 2. [](https://github.com/theupdateframework/tuf/issues/973)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2051, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2051 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2051 - **State**: REJECTED - **Published Date**: January 05, 2018 at 14:00 UTC - **Last Updated**: January 05, 2018 at 13:57 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3013, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3013 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3013 - **State**: PUBLISHED - **Published Date**: June 11, 2021 at 11:19 UTC - **Last Updated**: August 03, 2024 at 16:45 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ripgrep before 13 on Windows allows attackers to trigger execution of arbitrary programs from the current working directory via the -z/--search-zip or --pre flag. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BurntSushi/ripgrep/blob/master/CHANGELOG.md) 2. [](https://github.com/BurntSushi/ripgrep/blob/e48a17e1891e1ea9dd06ba0e48d5fb140ca7c0c4/CHANGELOG.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7131, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7131 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7131 - **State**: PUBLISHED - **Published Date**: September 12, 2016 at 01:00 UTC - **Last Updated**: August 06, 2024 at 01:50 UTC - **Reserved Date**: September 02, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via a malformed wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a tag that lacks a < (less than) character. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.php.net/ChangeLog-7.php) 2. [](https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1) 3. [GLSA-201611-22](https://security.gentoo.org/glsa/201611-22) 4. [1036680](http://www.securitytracker.com/id/1036680) 5. [RHSA-2016:2750](http://rhn.redhat.com/errata/RHSA-2016-2750.html) 6. [](https://bugs.php.net/bug.php?id=72790) 7. [](http://www.php.net/ChangeLog-5.php) 8. [](https://www.tenable.com/security/tns-2016-19) 9. [92768](http://www.securityfocus.com/bid/92768) 10. [[oss-security] 20160902 Re: CVE assignment for PHP 5.6.25 and 7.0.10 - and libcurl](http://openwall.com/lists/oss-security/2016/09/02/9) 11. [](https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5913, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5913 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5913 - **State**: PUBLISHED - **Published Date**: June 14, 2019 at 17:02 UTC - **Last Updated**: August 05, 2024 at 05:47 UTC - **Reserved Date**: January 19, 2018 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description A non-time constant function memcmp is used which creates a side channel that could leak information in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130 ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables** Affected versions: - MDM9150, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43315, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43315 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43315 - **State**: PUBLISHED - **Published Date**: March 24, 2023 at 00:00 UTC - **Last Updated**: February 25, 2025 at 15:08 UTC - **Reserved Date**: November 03, 2021 at 00:00 UTC - **Assigned By**: fedora ### Vulnerability Description A heap-based buffer overflows was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5349 ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **n/a - upx** Affected versions: - upx before 4.0.0-git-c6b9e3c62d15 (Status: affected) ### References 1. [](https://github.com/upx/upx/issues/380)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8291, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8291 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8291 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 19, 2015 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0873, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0873 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0873 - **State**: REJECTED - **Published Date**: January 24, 2020 at 21:14 UTC - **Last Updated**: January 24, 2020 at 21:14 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31441, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31441 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31441 - **State**: PUBLISHED - **Published Date**: May 10, 2024 at 14:43 UTC - **Last Updated**: August 02, 2024 at 01:52 UTC - **Reserved Date**: April 03, 2024 at 17:55 UTC - **Assigned By**: GitHub_M ### Vulnerability Description DataEase is an open source data visualization analysis tool. Due to the lack of restrictions on the connection parameters for the ClickHouse data source, it is possible to exploit certain malicious parameters to achieve arbitrary file reading. The vulnerability has been fixed in v1.18.19. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **dataease - dataease** Affected versions: - < 1.18.19 (Status: affected) ### References 1. [https://github.com/dataease/dataease/security/advisories/GHSA-h7hj-7wg6-p5wh](https://github.com/dataease/dataease/security/advisories/GHSA-h7hj-7wg6-p5wh)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0703, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0703 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0703 - **State**: PUBLISHED - **Published Date**: September 12, 2003 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:05 UTC - **Reserved Date**: August 24, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description KisMAC before 0.05d trusts user-supplied variables to load arbitrary kernels or kernel modules, which allows local users to gain privileges via the $DRIVER_KEXT environment variable as used in (1) viha_driver.sh, (2) macjack_load.sh, or (3) airojack_load.sh, or (4) via "similar techniques" using exchangeKernel.sh. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [kismac-driverkext-load-modules(13007)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13007) 2. [kismac-exchangekernel-kernel-overwrite(13008)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13008) 3. [8497](http://www.securityfocus.com/bid/8497) 4. [A082203-1](http://www.atstake.com/research/advisories/2003/a082203-1.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1230, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1230 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1230 - **State**: PUBLISHED - **Published Date**: April 02, 2009 at 15:00 UTC - **Last Updated**: August 07, 2024 at 05:04 UTC - **Reserved Date**: April 02, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Static code injection vulnerability in index.php in Podcast Generator 1.1 and earlier allows remote authenticated administrators to inject arbitrary PHP code into config.php via the recent parameter in a config change action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [8324](https://www.exploit-db.com/exploits/8324)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4350, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4350 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4350 - **State**: PUBLISHED - **Published Date**: September 30, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 10:08 UTC - **Reserved Date**: September 30, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in main.php in vbLOGIX Tutorial Script 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the cat_id parameter in a list action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [48107](http://osvdb.org/48107) 2. [31829](http://secunia.com/advisories/31829) 3. [6446](https://www.exploit-db.com/exploits/6446) 4. [vblogixtutorials-main-sql-injection(45108)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45108) 5. [ADV-2008-2563](http://www.vupen.com/english/advisories/2008/2563) 6. [31157](http://www.securityfocus.com/bid/31157)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0596, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0596 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0596 - **State**: PUBLISHED - **Published Date**: May 12, 2017 at 15:00 UTC - **Last Updated**: August 05, 2024 at 13:11 UTC - **Reserved Date**: November 29, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description An elevation of privilege vulnerability in libstagefright in Mediaserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-34749392. ### Affected Products **Google Inc. - Android** Affected versions: - 4.4.4 (Status: affected) - 5.0.2 (Status: affected) - 5.1.1 (Status: affected) - 6.0 (Status: affected) - 6.0.1 (Status: affected) - 7.0 (Status: affected) - 7.1.1 (Status: affected) ### References 1. [](https://android.googlesource.com/platform/frameworks/av/+/5443b57cc54f2e46b35246637be26a69e9f493e1) 2. [](https://source.android.com/security/bulletin/2017-05-01) 3. [98130](http://www.securityfocus.com/bid/98130)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49689, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49689 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49689 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:30 UTC - **Last Updated**: November 20, 2024 at 14:36 UTC - **Reserved Date**: October 17, 2024 at 09:52 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Harmonic Design HD Quiz – Save Results Light allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects HD Quiz – Save Results Light: from n/a through 0.5. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Harmonic Design - HD Quiz – Save Results Light** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/hd-quiz-save-results-light/wordpress-hd-quiz-save-results-light-plugin-0-5-broken-access-control-vulnerability?_s_id=cve) ### Credits - Fariq Fadillah Gusti Insani (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3887, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3887 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3887 - **State**: PUBLISHED - **Published Date**: November 13, 2013 at 00:00 UTC - **Last Updated**: August 06, 2024 at 16:22 UTC - **Reserved Date**: June 03, 2013 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The Ancillary Function Driver (AFD) in afd.sys in the kernel-mode drivers in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 allows local users to obtain sensitive information from kernel memory by leveraging improper copy operations, aka "Ancillary Function Driver Information Disclosure Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [TA13-317A](http://www.us-cert.gov/ncas/alerts/TA13-317A) 2. [MS13-093](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-093) 3. [oval:org.mitre.oval:def:18805](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18805)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6489, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6489 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6489 - **State**: PUBLISHED - **Published Date**: May 21, 2020 at 03:46 UTC - **Last Updated**: August 04, 2024 at 09:02 UTC - **Reserved Date**: January 08, 2020 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Inappropriate implementation in developer tools in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had convinced the user to take certain actions in developer tools to obtain potentially sensitive information from disk via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html) 2. [](https://crbug.com/1050756) 3. [GLSA-202006-02](https://security.gentoo.org/glsa/202006-02) 4. [openSUSE-SU-2020:0823](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html) 5. [openSUSE-SU-2020:0832](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html) 6. [FEDORA-2020-08561721ad](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/) 7. [DSA-4714](https://www.debian.org/security/2020/dsa-4714) 8. [FEDORA-2020-77f89ab772](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/) 9. [GLSA-202101-30](https://security.gentoo.org/glsa/202101-30)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3495, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3495 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3495 - **State**: PUBLISHED - **Published Date**: August 06, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 09:37 UTC - **Reserved Date**: August 06, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in kategori.asp in Pcshey Portal allows remote attackers to execute arbitrary SQL commands via the kid parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [pcsheyportal-kategori-sql-injection(44213)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44213) 2. [30534](http://www.securityfocus.com/bid/30534) 3. [](http://downloads.securityfocus.com/vulnerabilities/exploits/30534.pl)