System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1808, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1808 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1808 - **State**: PUBLISHED - **Published Date**: May 31, 2022 at 22:00 UTC - **Last Updated**: August 03, 2024 at 00:16 UTC - **Reserved Date**: May 20, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Execution with Unnecessary Privileges in GitHub repository polonel/trudesk prior to 1.2.3. ### Weakness Classification (CWE) - CWE-250: Security Weakness ### Affected Products **polonel - polonel/trudesk** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/9-polonel/trudesk) 2. [](https://github.com/polonel/trudesk/commit/f739eac6fc52adc0cba83a49034100e5b99ac7c8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21531, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21531 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21531 - **State**: PUBLISHED - **Published Date**: October 01, 2024 at 05:00 UTC - **Last Updated**: November 07, 2024 at 15:26 UTC - **Reserved Date**: December 22, 2023 at 12:33 UTC - **Assigned By**: snyk ### Vulnerability Description All versions of the package git-shallow-clone are vulnerable to Command injection due to missing sanitization or mitigation flags in the process variable of the gitShallowClone function. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P` ### Affected Products **n/a - git-shallow-clone** Affected versions: - 0 (Status: affected) ### References 1. [](https://security.snyk.io/vuln/SNYK-JS-GITSHALLOWCLONE-3253853) 2. [](https://github.com/10uei011/git-shallow-clone/blob/master/index.js%23L27) ### Credits - Liran Tal - Snyk Research Team
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27285, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27285 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27285 - **State**: PUBLISHED - **Published Date**: June 04, 2023 at 23:52 UTC - **Last Updated**: January 08, 2025 at 19:48 UTC - **Reserved Date**: February 27, 2023 at 17:47 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Aspera Connect 4.2.5 and IBM Aspera Cargo 4.2.5 is vulnerable to a buffer overflow, caused by improper bounds checking. An attacker could overflow a buffer and execute arbitrary code on the system. IBM X-Force ID: 248625. ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **IBM - Aspera Connect** Affected versions: - 4.2.5 (Status: affected) **IBM - Aspera Cargo** Affected versions: - 4.2.5 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7001053) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/248625)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3156, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3156 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3156 - **State**: PUBLISHED - **Published Date**: October 05, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 23:01 UTC - **Reserved Date**: October 05, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in printfaq.php in EasyGuppy (Guppy for Windows) 4.5.4 and 4.5.5 allows remote attackers to read arbitrary files via ".." sequences in the pg parameter, which is cleansed for XSS but not directory traversal. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050930 BID #14752 update](http://marc.info/?l=bugtraq&m=112812059917394&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6955, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6955 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6955 - **State**: PUBLISHED - **Published Date**: January 12, 2024 at 13:56 UTC - **Last Updated**: October 15, 2024 at 22:56 UTC - **Reserved Date**: December 19, 2023 at 17:02 UTC - **Assigned By**: GitLab ### Vulnerability Description A missing authorization check vulnerability exists in GitLab Remote Development affecting all versions prior to 16.5.6, 16.6 prior to 16.6.4 and 16.7 prior to 16.7.2. This condition allows an attacker to create a workspace in one group that is associated with an agent from another group. ### CVSS Metrics - **CVSS Base Score**: 6.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **GitLab - GitLab** Affected versions: - 0 (Status: affected) - 16.6 (Status: affected) - 16.7 (Status: affected) ### References 1. [GitLab Issue #432188](https://gitlab.com/gitlab-org/gitlab/-/issues/432188) ### Credits - This vulnerability has been discovered internally by GitLab team member Jerry Seto
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3835, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3835 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3835 - **State**: PUBLISHED - **Published Date**: December 26, 2022 at 12:28 UTC - **Last Updated**: April 11, 2025 at 23:12 UTC - **Reserved Date**: November 02, 2022 at 13:04 UTC - **Assigned By**: WPScan ### Vulnerability Description The Kwayy HTML Sitemap WordPress plugin before 4.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Kwayy HTML Sitemap** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/514ffd28-f2c2-4c95-87b5-d05ce0746f89) ### Credits - zhangyunpei - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7917, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7917 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7917 - **State**: PUBLISHED - **Published Date**: December 23, 2015 at 02:00 UTC - **Last Updated**: August 06, 2024 at 08:06 UTC - **Reserved Date**: October 22, 2015 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Untrusted search path vulnerability in Open Automation OPC Systems.NET 8.00.0023 and earlier allows local users to gain privileges via a Trojan horse DLL in an unspecified directory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [78909](http://www.securityfocus.com/bid/78909) 2. [](https://ics-cert.us-cert.gov/advisories/ICSA-15-344-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4406, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4406 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4406 - **State**: PUBLISHED - **Published Date**: April 16, 2014 at 18:00 UTC - **Last Updated**: August 07, 2024 at 00:09 UTC - **Reserved Date**: November 07, 2011 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description The Ubuntu AccountsService package before 0.6.14-1git1ubuntu1.1 does not properly drop privileges when changing language settings, which allows local users to modify arbitrary files via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4406.html) 2. [](http://bazaar.launchpad.net/~ubuntu-branches/ubuntu/oneiric/accountsservice/oneiric-updates/revision/21) 3. [USN-1351-1](http://www.ubuntu.com/usn/USN-1351-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39230, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39230 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39230 - **State**: PUBLISHED - **Published Date**: September 23, 2022 at 07:10 UTC - **Last Updated**: April 23, 2025 at 16:56 UTC - **Reserved Date**: September 02, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description fhir-works-on-aws-authz-smart is an implementation of the authorization interface from the FHIR Works interface. Versions 3.1.1 and 3.1.2 are subject to Exposure of Sensitive Information to an Unauthorized Actor. This issue allows a client of the API to retrieve more information than the client’s OAuth scope permits when making “search-type” requests. This issue would not allow a client to retrieve information about individuals other than those the client was already authorized to access. Users of fhir-works-on-aws-authz-smart 3.1.1 or 3.1.2 should upgrade to version 3.1.3 or higher immediately. Versions 3.1.0 and below are unaffected. There is no workaround for this issue. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **awslabs - fhir-works-on-aws-authz-smart** Affected versions: - > 3.1.0, < 3.1.3 (Status: affected) ### References 1. [](https://github.com/awslabs/fhir-works-on-aws-authz-smart/security/advisories/GHSA-vv7x-7w4m-q72f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4693, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4693 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4693 - **State**: PUBLISHED - **Published Date**: February 01, 2006 at 20:00 UTC - **Last Updated**: September 16, 2024 at 19:16 UTC - **Reserved Date**: February 01, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Gaim-Encryption 2.38-1 on Debian Linux allows remote attackers to cause a denial of service (crash) via a crafted message from an ICQ buddy, possibly involving the GE_received_key function in keys.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=337127) 2. [21233](http://www.osvdb.org/21233) 3. [17739](http://secunia.com/advisories/17739)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29090, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29090 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29090 - **State**: PUBLISHED - **Published Date**: June 02, 2021 at 02:00 UTC - **Last Updated**: September 17, 2024 at 03:29 UTC - **Reserved Date**: March 23, 2021 at 00:00 UTC - **Assigned By**: synology ### Vulnerability Description Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in PHP component in Synology Photo Station before 6.8.14-3500 allows remote authenticated users to execute arbitrary SQL command via unspecified vectors. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Synology - Synology Photo Station** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.synology.com/security/advisory/Synology_SA_20_20)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8223, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8223 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8223 - **State**: PUBLISHED - **Published Date**: August 27, 2024 at 22:31 UTC - **Last Updated**: August 28, 2024 at 13:54 UTC - **Reserved Date**: August 27, 2024 at 12:49 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical was found in SourceCodester Music Gallery Site 1.0. This vulnerability affects unknown code of the file /classes/Master.php?f=delete_category. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Music Gallery Site** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-275932 | SourceCodester Music Gallery Site Master.php sql injection](https://vuldb.com/?id.275932) 2. [VDB-275932 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275932) 3. [Submit #398722 | sourcecodester Music Gallery Site v1.0 SQL injection](https://vuldb.com/?submit.398722) 4. [](https://github.com/LiuHaoBin6/cve/blob/main/sql4.md) 5. [](https://www.sourcecodester.com/) ### Credits - Liuhaobin (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-40573, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-40573 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-40573 - **State**: PUBLISHED - **Published Date**: May 13, 2025 at 09:38 UTC - **Last Updated**: May 13, 2025 at 18:43 UTC - **Reserved Date**: April 16, 2025 at 08:20 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions). Affected devices are vulnerable to path traversal attacks. This could allow a privileged local attacker to restore backups that are outside the backup folder. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-35: Security Weakness ### Affected Products **Siemens - SCALANCE LPE9403** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/html/ssa-327438.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22087, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22087 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22087 - **State**: PUBLISHED - **Published Date**: October 17, 2023 at 21:02 UTC - **Last Updated**: September 13, 2024 at 16:03 UTC - **Reserved Date**: December 17, 2022 at 19:26 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Hospitality OPERA 5 Property Services product of Oracle Hospitality Applications (component: Opera). The supported version that is affected is 5.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Hospitality OPERA 5 Property Services. Successful attacks of this vulnerability can result in takeover of Hospitality OPERA 5 Property Services. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Oracle Corporation - Hospitality OPERA 5 Property Services** Affected versions: - 5.6 (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2023.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3639, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3639 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3639 - **State**: PUBLISHED - **Published Date**: November 30, 2011 at 02:00 UTC - **Last Updated**: August 06, 2024 at 23:37 UTC - **Reserved Date**: September 21, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=752080) 2. [RHSA-2012:0128](http://rhn.redhat.com/errata/RHSA-2012-0128.html) 3. [](http://svn.apache.org/viewvc?view=revision&revision=1188745) 4. [DSA-2405](http://www.debian.org/security/2012/dsa-2405)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38873, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38873 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38873 - **State**: PUBLISHED - **Published Date**: September 28, 2023 at 00:00 UTC - **Last Updated**: September 23, 2024 at 19:33 UTC - **Reserved Date**: July 25, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The commit 3730880 (April 2023) and v.0.9-beta1 of gugoan Economizzer is vulnerable to Clickjacking. Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top-level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gugoan/economizzer) 2. [](https://www.economizzer.org) 3. [](https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38873)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4764, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4764 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4764 - **State**: PUBLISHED - **Published Date**: March 18, 2011 at 16:00 UTC - **Last Updated**: September 16, 2024 at 17:58 UTC - **Reserved Date**: March 18, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Open Ticket Request System (OTRS) before 2.4.10, and 3.x before 3.0.3, does not present warnings about incoming encrypted e-mail messages that were based on revoked PGP or GPG keys, which makes it easier for remote attackers to spoof e-mail communication by leveraging a key that has a revocation signature. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://bugs.otrs.org/show_bug.cgi?id=6131) 2. [](http://source.otrs.org/viewvc.cgi/otrs/CHANGES?revision=1.1807)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4369, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4369 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4369 - **State**: PUBLISHED - **Published Date**: December 20, 2005 at 02:00 UTC - **Last Updated**: August 07, 2024 at 23:46 UTC - **Reserved Date**: December 20, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Acuity CMS 2.6.2 allows remote attackers to inject arbitrary web script or HTML via unspecified search parameters, possibly strSearchKeywords to browse.asp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [15934](http://www.securityfocus.com/bid/15934) 2. [](http://pridels0.blogspot.com/2005/12/acuity-cms-26x-asp-xss-vuln.html) 3. [18070](http://secunia.com/advisories/18070) 4. [ADV-2005-2970](http://www.vupen.com/english/advisories/2005/2970) 5. [21794](http://www.osvdb.org/21794)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1604, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1604 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1604 - **State**: PUBLISHED - **Published Date**: May 03, 2011 at 22:00 UTC - **Last Updated**: August 06, 2024 at 22:37 UTC - **Reserved Date**: April 05, 2011 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Memory leak in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 6.x before 6.1(5)su3, 7.x before 7.1(5b)su3, 8.0 before 8.0(3a)su2, and 8.5 before 8.5(1) allows remote attackers to cause a denial of service (memory consumption and process failure) via a malformed SIP message, aka Bug ID CSCti42904. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ucm-sip-dos(67122)](https://exchange.xforce.ibmcloud.com/vulnerabilities/67122) 2. [44331](http://secunia.com/advisories/44331) 3. [20110502 Re: ZDI-11-143: Cisco Unified CallManager xmldirectorylist.jsp SQL Injection Vulnerability](http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0051.html) 4. [1025449](http://www.securitytracker.com/id?1025449) 5. [47609](http://www.securityfocus.com/bid/47609) 6. [ADV-2011-1122](http://www.vupen.com/english/advisories/2011/1122) 7. [20110427 Multiple Vulnerabilities in Cisco Unified Communications Manager](http://www.cisco.com/en/US/products/products_security_advisory09186a0080b79904.shtml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1209, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1209 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1209 - **State**: PUBLISHED - **Published Date**: December 15, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:46 UTC - **Reserved Date**: December 14, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Verisign Payflow Link, when running with empty Accepted URL fields, does not properly verify the data in the hidden AMOUNT field, which allows remote attackers to modify the price of the items that they purchase. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20041129 [SHK-001]Payflow Link Default Config may lead to Hidden Field Modification](http://marc.info/?l=bugtraq&m=110181288820226&w=2) 2. [payflow-link-modification(18299)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18299)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17885, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17885 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17885 - **State**: PUBLISHED - **Published Date**: December 24, 2017 at 04:00 UTC - **Last Updated**: August 05, 2024 at 21:06 UTC - **Reserved Date**: December 23, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allows attackers to cause a denial of service via a crafted PICT image file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-3681-1](https://usn.ubuntu.com/3681-1/) 2. [](https://github.com/ImageMagick/ImageMagick/issues/879)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39802, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39802 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39802 - **State**: PUBLISHED - **Published Date**: January 14, 2025 at 14:21 UTC - **Last Updated**: January 15, 2025 at 20:49 UTC - **Reserved Date**: June 28, 2024 at 18:05 UTC - **Assigned By**: talos ### Vulnerability Description Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `qos_dat` POST parameter. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **Wavlink - Wavlink AC3000** Affected versions: - M33A8.V5030.210505 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-2049](https://talosintelligence.com/vulnerability_reports/TALOS-2024-2049) ### Credits - Discovered by Lilith &gt;_&gt; of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25742, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25742 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25742 - **State**: PUBLISHED - **Published Date**: June 02, 2023 at 00:00 UTC - **Last Updated**: January 09, 2025 at 16:16 UTC - **Reserved Date**: February 13, 2023 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) **Mozilla - Thunderbird** Affected versions: - unspecified (Status: affected) **Mozilla - Firefox ESR** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.mozilla.org/security/advisories/mfsa2023-06/) 2. [](https://www.mozilla.org/security/advisories/mfsa2023-05/) 3. [](https://www.mozilla.org/security/advisories/mfsa2023-07/) 4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1813424)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1491, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1491 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1491 - **State**: PUBLISHED - **Published Date**: May 11, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:51 UTC - **Reserved Date**: May 11, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2 allows remote authenticated users to (1) move their home directory via viewaction.html or (2) move arbitrary files via the importfile parameter to importaction.html. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050504 Multiple vulnerabilities in Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2](http://marc.info/?l=bugtraq&m=111530933016434&w=2) 2. [15249](http://secunia.com/advisories/15249) 3. [merak-icewarp-directory-relocation(20471)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20471)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31859, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31859 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31859 - **State**: PUBLISHED - **Published Date**: July 14, 2021 at 16:38 UTC - **Last Updated**: August 03, 2024 at 23:10 UTC - **Reserved Date**: April 28, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Incorrect privileges in the MU55 FlexiSpooler service in YSoft SafeQ 6 6.0.55 allows local user privilege escalation by overwriting the executable file via an alternative data stream. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.ysoft.com/en) 2. [](https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6567, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6567 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6567 - **State**: PUBLISHED - **Published Date**: January 21, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 12:17 UTC - **Reserved Date**: September 17, 2014 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information is from the January 2015 CPU. Oracle has not commented on the researcher's claim that this is a stack-based buffer overflow in DBMS_AW.EXECUTE, which allows code execution via a long Current Directory Alias (CDA) command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html) 2. [](http://www.databaseforensics.com/Oracle_Jan2015_CPU.pdf) 3. [1031572](http://www.securitytracker.com/id/1031572) 4. [72134](http://www.securityfocus.com/bid/72134)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2445, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2445 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2445 - **State**: PUBLISHED - **Published Date**: May 02, 2023 at 13:11 UTC - **Last Updated**: January 30, 2025 at 16:10 UTC - **Reserved Date**: May 01, 2023 at 14:10 UTC - **Assigned By**: DEVOLUTIONS ### Vulnerability Description Improper access control in Subscriptions Folder path filter in Devolutions Server 2023.1.1 and earlier allows attackers with administrator privileges to retrieve usage information on folders in user vaults via a specific folder name. ### Affected Products **Devolutions - Devolutions Server** Affected versions: - 0 (Status: affected) ### References 1. [](https://devolutions.net/security/advisories/DEVO-2023-0013/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3407, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3407 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3407 - **State**: PUBLISHED - **Published Date**: May 19, 2015 at 18:00 UTC - **Last Updated**: August 06, 2024 at 05:47 UTC - **Reserved Date**: April 23, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Module::Signature before 0.74 allows remote attackers to bypass signature verification for files via a signature file that does not list the files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://metacpan.org/changes/distribution/Module-Signature) 2. [DSA-3261](http://www.debian.org/security/2015/dsa-3261) 3. [[oss-security] 20150406 CVE request: Module::Signature before 0.75 - multiple vulnerabilities](http://www.openwall.com/lists/oss-security/2015/04/07/1) 4. [](https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d1c7bc85372f) 5. [[oss-security] 20150423 Re: CVE request: Module::Signature before 0.75 - multiple vulnerabilities](http://www.openwall.com/lists/oss-security/2015/04/23/17) 6. [USN-2607-1](http://ubuntu.com/usn/usn-2607-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0916, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0916 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0916 - **State**: PUBLISHED - **Published Date**: February 08, 2011 at 21:00 UTC - **Last Updated**: August 06, 2024 at 22:05 UTC - **Reserved Date**: February 08, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in the SMTP service in IBM Lotus Domino allows remote attackers to execute arbitrary code via long arguments in a filename parameter in a malformed MIME e-mail message, aka SPR KLYH889M8H. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [43247](http://secunia.com/advisories/43247) 2. [](http://zerodayinitiative.com/advisories/ZDI-11-049/) 3. [](http://www-01.ibm.com/support/docview.wss?uid=swg21461514)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13440, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13440 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13440 - **State**: PUBLISHED - **Published Date**: February 09, 2025 at 04:22 UTC - **Last Updated**: February 13, 2025 at 16:30 UTC - **Reserved Date**: January 15, 2025 at 20:41 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Super Store Finder plugin for WordPress is vulnerable to SQL Injection via the ‘ssf_wp_user_name’ parameter in all versions up to, and including, 7.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into an already existing query to store cross-site scripting in store reviews. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Super Store Finder - Super Store Finder** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/cc468bfd-b9a2-4fe6-b896-d738c767146a?source=cve) 2. [](https://superstorefinder.net/support/forums/topic/super-store-finder-for-wordpress-patch-notes/) ### Credits - Muhammad Zeeshan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24850, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24850 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24850 - **State**: PUBLISHED - **Published Date**: October 03, 2023 at 05:00 UTC - **Last Updated**: February 27, 2025 at 20:48 UTC - **Reserved Date**: January 31, 2023 at 16:25 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory Corruption in HLOS while importing a cryptographic key into KeyMaster Trusted Application. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-129: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - APQ8017 (Status: affected) - APQ8037 (Status: affected) - AQT1000 (Status: affected) - AR8035 (Status: affected) - CSRA6620 (Status: affected) - CSRA6640 (Status: affected) - FastConnect 6200 (Status: affected) - FastConnect 6700 (Status: affected) - FastConnect 6800 (Status: affected) - FastConnect 6900 (Status: affected) - FastConnect 7800 (Status: affected) - Home Hub 100 Platform (Status: affected) - PM8937 (Status: affected) - QAM8255P (Status: affected) - QAM8295P (Status: affected) - QAM8650P (Status: affected) - QAM8775P (Status: affected) - QAMSRV1H (Status: affected) - QCA6174A (Status: affected) - QCA6391 (Status: affected) - QCA6420 (Status: affected) - QCA6421 (Status: affected) - QCA6426 (Status: affected) - QCA6430 (Status: affected) - QCA6431 (Status: affected) - QCA6436 (Status: affected) - QCA6574 (Status: affected) - QCA6574A (Status: affected) - QCA6574AU (Status: affected) - QCA6595 (Status: affected) - QCA6595AU (Status: affected) - QCA6696 (Status: affected) - QCA6698AQ (Status: affected) - QCA6797AQ (Status: affected) - QCA8081 (Status: affected) - QCA8337 (Status: affected) - QCA9379 (Status: affected) - QCC710 (Status: affected) - QCM2290 (Status: affected) - QCM4290 (Status: affected) - QCM4325 (Status: affected) - QCM4490 (Status: affected) - QCM6125 (Status: affected) - QCM6490 (Status: affected) - QCM8550 (Status: affected) - QCN6024 (Status: affected) - QCN6224 (Status: affected) - QCN6274 (Status: affected) - QCN7606 (Status: affected) - QCN9024 (Status: affected) - QCS2290 (Status: affected) - QCS4290 (Status: affected) - QCS4490 (Status: affected) - QCS6125 (Status: affected) - QCS6490 (Status: affected) - QCS8550 (Status: affected) - QDU1000 (Status: affected) - QDU1010 (Status: affected) - QDU1110 (Status: affected) - QDU1210 (Status: affected) - QDX1010 (Status: affected) - QDX1011 (Status: affected) - QFW7114 (Status: affected) - QFW7124 (Status: affected) - QRU1032 (Status: affected) - QRU1052 (Status: affected) - QRU1062 (Status: affected) - QSM8350 (Status: affected) - Qualcomm 215 Mobile Platform (Status: affected) - Qualcomm Video Collaboration VC1 Platform (Status: affected) - Qualcomm Video Collaboration VC3 Platform (Status: affected) - SA4150P (Status: affected) - SA4155P (Status: affected) - SA6145P (Status: affected) - SA6150P (Status: affected) - SA6155 (Status: affected) - SA6155P (Status: affected) - SA8145P (Status: affected) - SA8150P (Status: affected) - SA8155 (Status: affected) - SA8155P (Status: affected) - SA8195P (Status: affected) - SA8255P (Status: affected) - SA8295P (Status: affected) - SA8540P (Status: affected) - SA8650P (Status: affected) - SA9000P (Status: affected) - SD 8 Gen1 5G (Status: affected) - SD626 (Status: affected) - SD670 (Status: affected) - SD730 (Status: affected) - SD855 (Status: affected) - SD865 5G (Status: affected) - SD888 (Status: affected) - SDM429W (Status: affected) - SG4150P (Status: affected) - SG8275P (Status: affected) - SM4125 (Status: affected) - SM6250 (Status: affected) - SM7250P (Status: affected) - SM7315 (Status: affected) - SM7325P (Status: affected) - SM8550P (Status: affected) - Smart Audio 400 Platform (Status: affected) - Smart Display 200 Platform (APQ5053-AA) (Status: affected) - Snapdragon 4 Gen 1 Mobile Platform (Status: affected) - Snapdragon 4 Gen 2 Mobile Platform (Status: affected) - Snapdragon 425 Mobile Platform (Status: affected) - Snapdragon 427 Mobile Platform (Status: affected) - Snapdragon 429 Mobile Platform (Status: affected) - Snapdragon 430 Mobile Platform (Status: affected) - Snapdragon 435 Mobile Platform (Status: affected) - Snapdragon 439 Mobile Platform (Status: affected) - Snapdragon 450 Mobile Platform (Status: affected) - Snapdragon 460 Mobile Platform (Status: affected) - Snapdragon 480 5G Mobile Platform (Status: affected) - Snapdragon 480+ 5G Mobile Platform (SM4350-AC) (Status: affected) - Snapdragon 625 Mobile Platform (Status: affected) - Snapdragon 626 Mobile Platform (Status: affected) - Snapdragon 632 Mobile Platform (Status: affected) - Snapdragon 662 Mobile Platform (Status: affected) - Snapdragon 665 Mobile Platform (Status: affected) - Snapdragon 670 Mobile Platform (Status: affected) - Snapdragon 675 Mobile Platform (Status: affected) - Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected) - Snapdragon 680 4G Mobile Platform (Status: affected) - Snapdragon 685 4G Mobile Platform (SM6225-AD) (Status: affected) - Snapdragon 690 5G Mobile Platform (Status: affected) - Snapdragon 695 5G Mobile Platform (Status: affected) - Snapdragon 710 Mobile Platform (Status: affected) - Snapdragon 720G Mobile Platform (Status: affected) - Snapdragon 730 Mobile Platform (SM7150-AA) (Status: affected) - Snapdragon 730G Mobile Platform (SM7150-AB) (Status: affected) - Snapdragon 732G Mobile Platform (SM7150-AC) (Status: affected) - Snapdragon 750G 5G Mobile Platform (Status: affected) - Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected) - Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected) - Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected) - Snapdragon 778G 5G Mobile Platform (Status: affected) - Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) (Status: affected) - Snapdragon 780G 5G Mobile Platform (Status: affected) - Snapdragon 782G Mobile Platform (SM7325-AF) (Status: affected) - Snapdragon 7c+ Gen 3 Compute (Status: affected) - Snapdragon 8 Gen 1 Mobile Platform (Status: affected) - Snapdragon 8 Gen 2 Mobile Platform (Status: affected) - Snapdragon 8+ Gen 1 Mobile Platform (Status: affected) - Snapdragon 8+ Gen 2 Mobile Platform (Status: affected) - Snapdragon 855 Mobile Platform (Status: affected) - Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected) - Snapdragon 865 5G Mobile Platform (Status: affected) - Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected) - Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected) - Snapdragon 888 5G Mobile Platform (Status: affected) - Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected) - Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB) (Status: affected) - Snapdragon AR2 Gen 1 Platform (Status: affected) - Snapdragon W5+ Gen 1 Wearable Platform (Status: affected) - Snapdragon X50 5G Modem-RF System (Status: affected) - Snapdragon X55 5G Modem-RF System (Status: affected) - Snapdragon X65 5G Modem-RF System (Status: affected) - Snapdragon X75 5G Modem-RF System (Status: affected) - Snapdragon XR1 Platform (Status: affected) - Snapdragon XR2 5G Platform (Status: affected) - Snapdragon XR2+ Gen 1 Platform (Status: affected) - SRV1H (Status: affected) - SSG2115P (Status: affected) - SSG2125P (Status: affected) - SW5100 (Status: affected) - SW5100P (Status: affected) - SXR1120 (Status: affected) - SXR1230P (Status: affected) - SXR2130 (Status: affected) - SXR2230P (Status: affected) - Vision Intelligence 100 Platform (APQ8053-AA) (Status: affected) - Vision Intelligence 200 Platform (APQ8053-AC) (Status: affected) - WCD9326 (Status: affected) - WCD9335 (Status: affected) - WCD9340 (Status: affected) - WCD9341 (Status: affected) - WCD9370 (Status: affected) - WCD9375 (Status: affected) - WCD9380 (Status: affected) - WCD9385 (Status: affected) - WCD9390 (Status: affected) - WCD9395 (Status: affected) - WCN3610 (Status: affected) - WCN3615 (Status: affected) - WCN3620 (Status: affected) - WCN3660 (Status: affected) - WCN3660B (Status: affected) - WCN3680B (Status: affected) - WCN3910 (Status: affected) - WCN3950 (Status: affected) - WCN3980 (Status: affected) - WCN3988 (Status: affected) - WCN3990 (Status: affected) - WCN6740 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) - WSA8830 (Status: affected) - WSA8832 (Status: affected) - WSA8835 (Status: affected) - WSA8840 (Status: affected) - WSA8845 (Status: affected) - WSA8845H (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38710, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38710 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38710 - **State**: PUBLISHED - **Published Date**: July 20, 2024 at 07:29 UTC - **Last Updated**: August 02, 2024 at 04:19 UTC - **Reserved Date**: June 19, 2024 at 11:16 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jewel Theme Master Addons for Elementor allows Stored XSS.This issue affects Master Addons for Elementor: from n/a through 2.0.6.2. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Jewel Theme - Master Addons for Elementor** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/master-addons/wordpress-master-addons-free-widgets-hover-effects-toggle-conditions-animations-for-elementor-plugin-2-0-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Michael (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16797 - **State**: PUBLISHED - **Published Date**: November 12, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 20:35 UTC - **Reserved Date**: November 12, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In SWFTools 0.9.2, the png_load function in lib/png.c does not properly validate an alloclen_64 multiplication of width and height values, which allows remote attackers to cause a denial of service (integer overflow, heap-based buffer overflow, and application crash) or possibly have unspecified other impact via a crafted PNG file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/matthiaskramm/swftools/issues/51)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32776, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32776 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32776 - **State**: PUBLISHED - **Published Date**: July 21, 2021 at 20:25 UTC - **Last Updated**: August 03, 2024 at 23:33 UTC - **Reserved Date**: May 12, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.4, CSRF tokens can be reused by a malicious user, as on Windows servers no cleanup is done on CSRF tokens. This issue is fixed in versions 2.7.4 and 3.0.0. ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Combodo - iTop** Affected versions: - < 2.7.4 (Status: affected) ### References 1. [](https://github.com/Combodo/iTop/security/advisories/GHSA-cxw7-2x7h-f7pr)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9840, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9840 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9840 - **State**: PUBLISHED - **Published Date**: April 10, 2018 at 05:00 UTC - **Last Updated**: August 05, 2024 at 07:24 UTC - **Reserved Date**: April 07, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Open Whisper Signal app before 2.23.2 for iOS allows physically proximate attackers to bypass the screen locker feature via certain rapid sequences of actions that include app opening, clicking on cancel, and using the home button. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/signalapp/Signal-iOS/commit/018a35df7b42b4941cb4dfc9f462b37c3fafd9e9) 2. [](https://github.com/signalapp/Signal-iOS/commits/release/2.23.2) 3. [](http://nint.en.do/Signal-Bypass-Screen-locker.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20011, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20011 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20011 - **State**: PUBLISHED - **Published Date**: May 10, 2022 at 19:57 UTC - **Last Updated**: August 03, 2024 at 01:55 UTC - **Reserved Date**: October 06, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In getArray of NotificationManagerService.java , there is a possible leak of one user notifications to another due to missing check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-214999128 ### Affected Products **n/a - Android** Affected versions: - Android-10 Android-11 Android-12 Android-12L (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2022-05-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5380, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5380 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5380 - **State**: PUBLISHED - **Published Date**: October 25, 2023 at 19:46 UTC - **Last Updated**: November 23, 2024 at 02:51 UTC - **Reserved Date**: October 04, 2023 at 14:27 UTC - **Assigned By**: redhat ### Vulnerability Description A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Red Hat - Red Hat Enterprise Linux 7** Affected versions: - 0:1.8.0-26.el7_9 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 8** Affected versions: - 0:1.20.11-22.el8 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 8** Affected versions: - 0:1.13.1-8.el8 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9** Affected versions: - 0:1.20.11-24.el9 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 9** Affected versions: - 0:1.13.1-8.el9 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 6** **Red Hat - Red Hat Enterprise Linux 6** **Red Hat - Red Hat Enterprise Linux 7** **Red Hat - Red Hat Enterprise Linux 8** **Red Hat - Red Hat Enterprise Linux 9** ### References 1. [RHSA-2023:7428](https://access.redhat.com/errata/RHSA-2023:7428) 2. [RHSA-2024:2169](https://access.redhat.com/errata/RHSA-2024:2169) 3. [RHSA-2024:2298](https://access.redhat.com/errata/RHSA-2024:2298) 4. [RHSA-2024:2995](https://access.redhat.com/errata/RHSA-2024:2995) 5. [RHSA-2024:3067](https://access.redhat.com/errata/RHSA-2024:3067) 6. [](https://access.redhat.com/security/cve/CVE-2023-5380) 7. [RHBZ#2244736](https://bugzilla.redhat.com/show_bug.cgi?id=2244736) 8. [](https://lists.x.org/archives/xorg-announce/2023-October/003430.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0185, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0185 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0185 - **State**: PUBLISHED - **Published Date**: September 29, 1999 at 04:00 UTC - **Last Updated**: August 01, 2024 at 16:27 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In SunOS or Solaris, a remote user could connect from an FTP server's data port to an rlogin server on a host that trusts the FTP server, allowing remote command execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [00156](http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/156)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11052 - **State**: PUBLISHED - **Published Date**: October 10, 2017 at 20:00 UTC - **Last Updated**: September 16, 2024 at 17:03 UTC - **Reserved Date**: July 07, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing a specially crafted QCA_NL80211_VENDOR_SUBCMD_NDP cfg80211 vendor command a buffer over-read can occur. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2017-10-01) 2. [101160](http://www.securityfocus.com/bid/101160)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-1037, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-1037 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-1037 - **State**: PUBLISHED - **Published Date**: November 29, 2000 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:37 UTC - **Reserved Date**: November 24, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Check Point Firewall-1 session agent 3.0 through 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote attackers to determine valid usernames and guess a password via a brute force attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1662](http://www.securityfocus.com/bid/1662) 2. [20000815 Firewall-1 session agent 3.0 -> 4.1, dictionnary and brute force attack](http://www.securityfocus.com/archive/1/76389)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-44251, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-44251 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-44251 - **State**: PUBLISHED - **Published Date**: December 13, 2023 at 08:52 UTC - **Last Updated**: August 02, 2024 at 19:59 UTC - **Reserved Date**: September 27, 2023 at 12:26 UTC - **Assigned By**: fortinet ### Vulnerability Description ** UNSUPPORTED WHEN ASSIGNED **A improper limitation of a pathname to a restricted directory ('path traversal') vulnerability [CWE-22] in Fortinet FortiWAN version 5.2.0 through 5.2.1 and version 5.1.1. through 5.1.2 may allow an authenticated attacker to read and delete arbitrary file of the system via crafted HTTP or HTTPs requests. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H/E:F/RL:X/RC:C` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Fortinet - FortiWAN** Affected versions: - 5.2.0 (Status: affected) - 5.1.1 (Status: affected) ### References 1. [https://fortiguard.com/psirt/FG-IR-23-265](https://fortiguard.com/psirt/FG-IR-23-265)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3452, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3452 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3452 - **State**: PUBLISHED - **Published Date**: July 21, 2016 at 10:00 UTC - **Last Updated**: October 11, 2024 at 20:57 UTC - **Reserved Date**: March 17, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows remote attackers to affect confidentiality via vectors related to Server: Security: Encryption. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2016:1481](http://rhn.redhat.com/errata/RHSA-2016-1481.html) 2. [RHSA-2016:1132](https://access.redhat.com/errata/RHSA-2016:1132) 3. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html) 4. [](https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/) 5. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html) 6. [RHSA-2016:1480](http://rhn.redhat.com/errata/RHSA-2016-1480.html) 7. [](https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/) 8. [](http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168) 9. [1036362](http://www.securitytracker.com/id/1036362) 10. [91999](http://www.securityfocus.com/bid/91999) 11. [RHSA-2016:1602](http://rhn.redhat.com/errata/RHSA-2016-1602.html) 12. [91787](http://www.securityfocus.com/bid/91787) 13. [RHSA-2016:0705](http://rhn.redhat.com/errata/RHSA-2016-0705.html) 14. [](https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6532, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6532 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6532 - **State**: PUBLISHED - **Published Date**: July 20, 2017 at 13:00 UTC - **Last Updated**: August 05, 2024 at 15:33 UTC - **Reserved Date**: March 07, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Televes COAXDATA GATEWAY 1Gbps devices doc-wifi-hgw_v1.02.0014 4.20 have cleartext credentials in /mib.db. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.tarlogic.com/advisories/Televes_CoaxData_Gateway_es.txt) 2. [](https://www.tarlogic.com/advisories/Televes_CoaxData_Gateway_en.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11185, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11185 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11185 - **State**: PUBLISHED - **Published Date**: June 01, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 08:01 UTC - **Reserved Date**: May 16, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 43 of 46). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20180531 [CORE-2018-0002] - Quest DR Series Disk Backup Multiple Vulnerabilities](http://seclists.org/fulldisclosure/2018/May/71) 2. [](http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html) 3. [](https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9692, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9692 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9692 - **State**: PUBLISHED - **Published Date**: April 02, 2017 at 20:00 UTC - **Last Updated**: August 06, 2024 at 13:55 UTC - **Reserved Date**: March 13, 2015 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description Huawei Tecal RH1288 V2 V100R002C00SPC107 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 and earlier versions, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 and earlier versions, Tecal RH2288H V2 V100R002C00SPC115 and earlier versions, Tecal RH2485 V2 V100R002C00SPC502 and earlier versions, Tecal RH5885 V2 V100R001C02SPC109 and earlier versions, Tecal RH5885 V3 V100R003C01SPC102 and earlier versions, Tecal RH5885H V3 V100R003C00SPC102 and earlier versions, Tecal XH310 V2 V100R001C00SPC110 and earlier versions, Tecal XH311 V2 V100R001C00SPC110 and earlier versions, Tecal XH320 V2 V100R001C00SPC110 and earlier versions, Tecal XH621 V2 V100R001C00SPC106 and earlier versions, Tecal DH310 V2 V100R001C00SPC110 and earlier versions, Tecal DH320 V2 V100R001C00SPC106 and earlier versions, Tecal DH620 V2 V100R001C00SPC106 and earlier versions, Tecal DH621 V2 V100R001C00SPC107 and earlier versions, Tecal DH628 V2 V100R001C00SPC107 and earlier versions, Tecal BH620 V2 V100R002C00SPC107 and earlier versions, Tecal BH621 V2 V100R002C00SPC106 and earlier versions, Tecal BH622 V2 V100R002C00SPC110 and earlier versions, Tecal BH640 V2 V100R002C00SPC108 and earlier versions, Tecal CH121 V100R001C00SPC180 and earlier versions, Tecal CH140 V100R001C00SPC110 and earlier versions, Tecal CH220 V100R001C00SPC180 and earlier versions, Tecal CH221 V100R001C00SPC180 and earlier versions, Tecal CH222 V100R002C00SPC180 and earlier versions, Tecal CH240 V100R001C00SPC180 and earlier versions, Tecal CH242 V100R001C00SPC180 and earlier versions, Tecal CH242 V3 V100R001C00SPC110 and earlier versions could allow attackers to figure out the RMCP+ session IDs of users and access the system with forged identities. ### Affected Products **n/a - Tecal RH1288 V2,Tecal RH2265 V2,Tecal RH2285 V2,Tecal RH2265 V2,Tecal RH2285H V2,Tecal RH2268 V2,Tecal RH2288 V2,Tecal RH2288H V2,Tecal RH2485 V2,Tecal RH5885 V2,Tecal RH5885 V3,Tecal RH5885H V3,Tecal XH310 V2,Tecal XH311 V2,Tecal XH320 V2,Tecal XH621 V2,Tecal DH310 V2,Tecal DH320 V2,Tecal DH620 V2,Tecal DH621 V2,Tecal DH628 V2,Tecal BH620 V2,Tecal BH621 V2,Tecal BH622 V2,Tecal BH640 V2,Tecal CH121,Tecal CH140,Tecal CH220,Tecal CH221,Tecal CH222,Tecal CH240,Tecal CH242,Tecal CH242 V3, Tecal RH1288 V2 V100R002C00SPC107 and earlier versions,Tecal RH2265 V2 V100R002C00,Tecal RH2285 V2 V100R002C00SPC115 and earlier versions,Tecal RH2265 V2 V100R002C00,Tecal RH2285H V2 V100R002C00SPC111 and earlier versions,Tecal RH2268 V2 V100R002C00,Tecal RH2288 V2 V100R002C00SPC117 and earlier versions,Tecal RH2288H V2 V100R002C00SPC115 and earlier versions,Tecal RH2485 V2 V100R002C00SPC502 and earlier versions,Tecal RH5885 V2 V100R001C02SPC109 and earlier versions,Tecal RH5885 V3 V100R003C01SPC102 and earlier versions,Tecal RH5885H V3 V100R003C00SPC102 and earlier versions,Tecal XH310 V2 V100R001C00SPC110 and earlier versions,Tecal XH311 V2 V100R001C00SPC110 and earlier versions,Tecal XH320 V2 V100R001C00SPC110 and earlier versions,Tecal XH621 V2 V100R001C00SPC106 and earlier versions,Tecal DH310 V2 V100R001C00SPC110 and earlier versions,Tecal DH320 V2 V100R001C00SPC106 and earlier versions,Tecal DH620 V2 V100R001C00SPC106 and earlier versions,Tecal DH621 V2 V100R001C00SPC107 and earlier versions,Tecal DH628 V2 V100R001C00SPC107 and earlier versions,Tecal BH620 V2 V100R002C00SPC107 and earlier versions,Tecal BH621 V2 V100R002C00SPC106 and earlier versions,Tecal BH622 V2 V100R002C00SPC110 ?and earlier versions,Tecal BH640 V2 V100R002C00SPC108 and earlier versions,Tecal CH121 V100R001C00SPC180 and earlier versions,Tecal CH140 V100R001C00SPC110 and earlier versions,Tecal CH220 V100R001C00SPC180 and earlier versions,Tecal CH221 V100R001C00SPC180 and earlier versions,Tecal CH222 V100R002C00SPC180 and earlier versions,Te ...[truncated*]** Affected versions: - Tecal RH1288 V2,Tecal RH2265 V2,Tecal RH2285 V2,Tecal RH2265 V2,Tecal RH2285H V2,Tecal RH2268 V2,Tecal RH2288 V2,Tecal RH2288H V2,Tecal RH2485 V2,Tecal RH5885 V2,Tecal RH5885 V3,Tecal RH5885H V3,Tecal XH310 V2,Tecal XH311 V2,Tecal XH320 V2,Tecal XH621 V2,Tecal DH310 V2,Tecal DH320 V2,Tecal DH620 V2,Tecal DH621 V2,Tecal DH628 V2,Tecal BH620 V2,Tecal BH621 V2,Tecal BH622 V2,Tecal BH640 V2,Tecal CH121,Tecal CH140,Tecal CH220,Tecal CH221,Tecal CH222,Tecal CH240,Tecal CH242,Tecal CH242 V3, Tecal RH1288 V2 V100R002C00SPC107 and earlier versions,Tecal RH2265 V2 V100R002C00,Tecal RH2285 V2 V100R002C00SPC115 and earlier versions,Tecal RH2265 V2 V100R002C00,Tecal RH2285H V2 V100R002C00SPC111 and earlier versions,Tecal RH2268 V2 V100R002C00,Tecal RH2288 V2 V100R002C00SPC117 and earlier versions,Tecal RH2288H V2 V100R002C00SPC115 and earlier versions,Tecal RH2485 V2 V100R002C00SPC502 and earlier versions,Tecal RH5885 V2 V100R001C02SPC109 and earlier versions,Tecal RH5885 V3 V100R003C01SPC102 and earlier v ...[truncated*] (Status: affected) ### References 1. [](http://www.huawei.com/en/psirt/security-advisories/hw-408100)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1901, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1901 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1901 - **State**: PUBLISHED - **Published Date**: March 05, 2024 at 21:33 UTC - **Last Updated**: November 06, 2024 at 14:24 UTC - **Reserved Date**: February 26, 2024 at 18:32 UTC - **Assigned By**: DEVOLUTIONS ### Vulnerability Description Denial of service in PAM password rotation during the check-in process in Devolutions Server 2023.3.14.0 allows an authenticated user with specific PAM permissions to make PAM credentials unavailable. ### Affected Products **Devolutions - Server** Affected versions: - 0 (Status: affected) ### References 1. [](https://devolutions.net/security/advisories/DEVO-2024-0002)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5823, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5823 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5823 - **State**: PUBLISHED - **Published Date**: October 16, 2013 at 17:31 UTC - **Last Updated**: August 06, 2024 at 17:22 UTC - **Reserved Date**: September 18, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via unknown vectors related to Security. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2014:0414](https://access.redhat.com/errata/RHSA-2014:0414) 2. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml) 3. [oval:org.mitre.oval:def:18783](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18783) 4. [RHSA-2013:1447](http://rhn.redhat.com/errata/RHSA-2013-1447.html) 5. [RHSA-2013:1440](http://rhn.redhat.com/errata/RHSA-2013-1440.html) 6. [USN-2033-1](http://www.ubuntu.com/usn/USN-2033-1) 7. [USN-2089-1](http://www.ubuntu.com/usn/USN-2089-1) 8. [RHSA-2013:1508](http://rhn.redhat.com/errata/RHSA-2013-1508.html) 9. [SUSE-SU-2013:1677](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html) 10. [HPSBUX02944](http://marc.info/?l=bugtraq&m=138674073720143&w=2) 11. [RHSA-2013:1505](http://rhn.redhat.com/errata/RHSA-2013-1505.html) 12. [](http://www-01.ibm.com/support/docview.wss?uid=swg21655201) 13. [HPSBUX02943](http://marc.info/?l=bugtraq&m=138674031212883&w=2) 14. [openSUSE-SU-2013:1663](http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html) 15. [SUSE-SU-2013:1666](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html) 16. [RHSA-2013:1793](http://rhn.redhat.com/errata/RHSA-2013-1793.html) 17. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html) 18. [APPLE-SA-2013-10-15-1](http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html) 19. [RHSA-2013:1507](http://rhn.redhat.com/errata/RHSA-2013-1507.html) 20. [](http://support.apple.com/kb/HT5982) 21. [RHSA-2013:1451](http://rhn.redhat.com/errata/RHSA-2013-1451.html) 22. [](http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28421, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28421 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28421 - **State**: PUBLISHED - **Published Date**: April 21, 2022 at 19:05 UTC - **Last Updated**: August 03, 2024 at 05:56 UTC - **Reserved Date**: April 04, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin.php?id=posts&action=display&value=1&postid=. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/janobe/baby-care-system/SQLi-2.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4861, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4861 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4861 - **State**: PUBLISHED - **Published Date**: May 18, 2025 at 05:31 UTC - **Last Updated**: May 19, 2025 at 14:24 UTC - **Reserved Date**: May 16, 2025 at 18:57 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical was found in PHPGurukul Beauty Parlour Management System 1.1. Affected by this vulnerability is an unknown functionality of the file /admin/admin-profile.php. The manipulation of the argument contactnumber leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **PHPGurukul - Beauty Parlour Management System** Affected versions: - 1.1 (Status: affected) ### References 1. [VDB-309403 | PHPGurukul Beauty Parlour Management System admin-profile.php sql injection](https://vuldb.com/?id.309403) 2. [VDB-309403 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309403) 3. [Submit #575230 | PHPGurukul Beauty Parlour Management System 1.1 SQL Injection](https://vuldb.com/?submit.575230) 4. [](https://github.com/Schatten-42/MyCVE/issues/1) 5. [](https://phpgurukul.com/) ### Credits - -Schatten- (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0943, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0943 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0943 - **State**: PUBLISHED - **Published Date**: May 22, 2014 at 23:00 UTC - **Last Updated**: August 06, 2024 at 18:45 UTC - **Reserved Date**: February 01, 2012 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description debian/guest-account in Light Display Manager (lightdm) 1.0.x before 1.0.6 and 1.1.x before 1.1.7, as used in Ubuntu Linux 11.10, allows local users to delete arbitrary files via a space in the name of a file in /tmp. NOTE: this identifier was SPLIT per ADT1/ADT2 due to different codebases and affected versions. CVE-2012-6648 has been assigned for the gdm-guest-session issue. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/953044) 2. [USN-1399-2](http://www.ubuntu.com/usn/USN-1399-2) 3. [](https://launchpadlibrarian.net/96471251/lightdm.secure-cleanup.debdiff)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000008, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000008 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000008 - **State**: PUBLISHED - **Published Date**: July 13, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 21:45 UTC - **Reserved Date**: July 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Chyrp Lite version 2016.04 is vulnerable to a CSRF in the user settings function allowing attackers to hijack the authentication of logged in users to modify account information, including their password. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/xenocrat/chyrp-lite/commit/79bb2de7f57d163d256b6bdb127dc09cfdb6235a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50921, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50921 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50921 - **State**: PUBLISHED - **Published Date**: December 10, 2024 at 00:00 UTC - **Last Updated**: December 11, 2024 at 21:03 UTC - **Reserved Date**: October 28, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause a Denial of Service (DoS) via repeatedly sending crafted packets to the controller. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/CNK2100/2024-CVE/blob/main/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2288, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2288 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2288 - **State**: PUBLISHED - **Published Date**: April 22, 2021 at 21:53 UTC - **Last Updated**: September 26, 2024 at 14:12 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Bills of Material product of Oracle E-Business Suite (component: Bill Issues). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Bills of Material. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Bills of Material accessible data as well as unauthorized access to critical data or complete access to all Oracle Bills of Material accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N` ### Affected Products **Oracle Corporation - Bills of Material** Affected versions: - 12.1.1-12.1.3 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-29450, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-29450 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-29450 - **State**: PUBLISHED - **Published Date**: April 17, 2025 at 00:00 UTC - **Last Updated**: April 21, 2025 at 19:13 UTC - **Reserved Date**: March 11, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in twonav v.2.1.18-20241105 allows a remote attacker to obtain sensitive information via the site settings component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.yuque.com/morysummer/vx41bz/ftlzvxve3t5713c6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16640, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16640 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16640 - **State**: PUBLISHED - **Published Date**: September 06, 2018 at 22:00 UTC - **Last Updated**: August 05, 2024 at 10:32 UTC - **Reserved Date**: September 06, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ImageMagick 7.0.8-5 has a memory leak vulnerability in the function ReadOneJNGImage in coders/png.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ImageMagick/ImageMagick/issues/1201) 2. [](https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b) 3. [USN-3785-1](https://usn.ubuntu.com/3785-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4397, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4397 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4397 - **State**: PUBLISHED - **Published Date**: August 06, 2018 at 20:00 UTC - **Last Updated**: August 06, 2024 at 00:25 UTC - **Reserved Date**: April 29, 2016 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A local code execution security vulnerability was identified in HP Network Node Manager i (NNMi) v10.00, v10.10 and v10.20 Software. ### Affected Products **Hewlett Packard Enterprise - HP Network Node Manager (NNMi)** Affected versions: - v10.00, v10.10 and v10.20 (Status: affected) ### References 1. [1037234](http://www.securitytracker.com/id/1037234) 2. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05325811) 3. [94154](http://www.securityfocus.com/bid/94154) 4. [95080](http://www.securityfocus.com/bid/95080)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1062, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1062 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1062 - **State**: PUBLISHED - **Published Date**: February 08, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:12 UTC - **Reserved Date**: February 08, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unknown vulnerability in the sysinfo system call for Solaris for SPARC 2.6 through 9, and Solaris for x86 2.6, 7, and 8, allows local users to read kernel memory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [solaris-sysinfo-read-memory(13435)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13435) 2. [10006](http://secunia.com/advisories/10006/) 3. [57340](http://sunsolve.sun.com/search/document.do?assetkey=1-26-57340-1) 4. [8831](http://www.securityfocus.com/bid/8831)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0551, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0551 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0551 - **State**: PUBLISHED - **Published Date**: April 15, 2009 at 03:49 UTC - **Last Updated**: October 21, 2024 at 16:26 UTC - **Reserved Date**: February 12, 2009 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 6 SP1, 6 and 7 on Windows XP SP2 and SP3, 6 and 7 on Windows Server 2003 SP1 and SP2, 7 on Windows Vista Gold and SP1, and 7 on Windows Server 2008 does not properly handle transition errors in a request for one HTTP document followed by a request for a second HTTP document, which allows remote attackers to execute arbitrary code via vectors involving (1) multiple crafted pages on a web site or (2) a web page with crafted inline content such as banner advertisements, aka "Page Transition Memory Corruption Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2009-1028](http://www.vupen.com/english/advisories/2009/1028) 2. [53624](http://osvdb.org/53624) 3. [TA09-104A](http://www.us-cert.gov/cas/techalerts/TA09-104A.html) 4. [34678](http://secunia.com/advisories/34678) 5. [](http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=871138) 6. [oval:org.mitre.oval:def:6164](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6164) 7. [MS09-014](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014) 8. [1022042](http://www.securitytracker.com/id?1022042) 9. [](http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5431, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5431 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5431 - **State**: PUBLISHED - **Published Date**: December 11, 2008 at 15:00 UTC - **Last Updated**: August 07, 2024 at 10:56 UTC - **Reserved Date**: December 11, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Teamtek Universal FTP Server 1.0.44 allows remote attackers to cause a denial of service via (1) a certain CWD command, (2) a long LIST command, or (3) a certain PORT command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20080214 UniversalFtp Server 1.0.44 Multiple Remote Denial of service](http://www.securityfocus.com/archive/1/488142/100/200/threaded) 2. [4722](http://securityreason.com/securityalert/4722) 3. [27804](http://www.securityfocus.com/bid/27804) 4. [22553](http://secunia.com/advisories/22553)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36494, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36494 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36494 - **State**: PUBLISHED - **Published Date**: August 02, 2023 at 15:54 UTC - **Last Updated**: October 11, 2024 at 14:09 UTC - **Reserved Date**: July 17, 2023 at 22:41 UTC - **Assigned By**: f5 ### Vulnerability Description Audit logs on F5OS-A may contain undisclosed sensitive information.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **F5 - F5OS - Appliance** Affected versions: - 1.4.0 (Status: affected) ### References 1. [](https://my.f5.com/manage/s/article/K000134922) ### Credits - F5
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17952, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17952 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17952 - **State**: PUBLISHED - **Published Date**: December 12, 2018 at 14:00 UTC - **Last Updated**: August 05, 2024 at 11:01 UTC - **Reserved Date**: October 03, 2018 at 00:00 UTC - **Assigned By**: microfocus ### Vulnerability Description Cross site scripting vulnerability in eDirectory prior to 9.1 SP2 ### Affected Products **Micro Focus - NetIQ eDirectory 9.1 SP2** Affected versions: - All versions prior to version 9.1 SP2 (Status: affected) ### References 1. [](https://www.netiq.com/documentation/edirectory-91/edirectory912_releasenotes/data/edirectory912_releasenotes.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34402, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34402 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34402 - **State**: PUBLISHED - **Published Date**: October 10, 2022 at 20:55 UTC - **Last Updated**: September 16, 2024 at 23:26 UTC - **Reserved Date**: June 23, 2022 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell Wyse ThinOS 2205 contains a Regular Expression Denial of Service Vulnerability in UI. An admin privilege attacker could potentially exploit this vulnerability, leading to denial-of-service. ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-1333: Security Weakness ### Affected Products **Dell - Wyse Proprietary OS (Modern ThinOS)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000203376/dsa-2022-247-dell-wyse-thinos-security-update-for-a-regular-expression-vulnerability)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-26365, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-26365 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-26365 - **State**: PUBLISHED - **Published Date**: May 09, 2023 at 18:58 UTC - **Last Updated**: January 28, 2025 at 15:47 UTC - **Reserved Date**: January 29, 2021 at 21:24 UTC - **Assigned By**: AMD ### Vulnerability Description Certain size values in firmware binary headers could trigger out of bounds reads during signature validation, leading to denial of service or potentially limited leakage of information about out-of-bounds memory contents. ### Affected Products **AMD - Ryzen™ 2000 series Desktop Processors “Raven Ridge” AM4** Affected versions: - various (Status: affected) **AMD - Ryzen™ 5000 Series Desktop processor with Radeon™ Graphics “Cezanne” AM4** Affected versions: - various (Status: affected) **AMD - Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” ULP** Affected versions: - various (Status: affected) **AMD - Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock”** Affected versions: - various (Status: affected) **AMD - Ryzen™ 2000 Series Mobile Processors “Raven Ridge” FP5** Affected versions: - various (Status: affected) **AMD - Ryzen™ 3000 Series Mobile processor, 2nd Gen AMD Ryzen™ Mobile Processors with Radeon™ Graphics “Picasso”** Affected versions: - various (Status: affected) **AMD - Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Renoir” ** Affected versions: - various (Status: affected) **AMD - Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne”** Affected versions: - various (Status: affected) **AMD - Ryzen™ 5000 Series Mobile processors with Radeon™ Graphics “Cezanne”** Affected versions: - various (Status: affected) **AMD - Ryzen™ 6000 Series Mobile Processors "Rembrandt"** Affected versions: - various (Status: affected) ### References 1. [](https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-6194, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-6194 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-6194 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: December 06, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6599, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6599 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6599 - **State**: PUBLISHED - **Published Date**: January 04, 2008 at 02:00 UTC - **Last Updated**: August 07, 2024 at 16:11 UTC - **Reserved Date**: December 31, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Race condition in fileserver in OpenAFS 1.3.50 through 1.4.5 and 1.5.0 through 1.5.27 allows remote attackers to cause a denial of service (daemon crash) by simultaneously acquiring and giving back file callbacks, which causes the handler for the GiveUpAllCallBacks RPC to perform linked-list operations without the host_glock lock. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [27132](http://www.securityfocus.com/bid/27132) 2. [SUSE-SR:2008:002](http://www.novell.com/linux/security/advisories/suse_security_summary_report.html) 3. [[OpenAFS-announce] 20071220 OpenAFS Security Advisory 2007-003: denial of service in OpenAFS fileserver](http://lists.openafs.org/pipermail/openafs-announce/2007/000220.html) 4. [28401](http://secunia.com/advisories/28401) 5. [28327](http://secunia.com/advisories/28327) 6. [](http://www.openafs.org/security/OPENAFS-SA-2007-003.txt) 7. [GLSA-200801-04](http://security.gentoo.org/glsa/glsa-200801-04.xml) 8. [28433](http://secunia.com/advisories/28433) 9. [DSA-1458](http://www.debian.org/security/2008/dsa-1458) 10. [MDVSA-2008:207](http://www.mandriva.com/security/advisories?name=MDVSA-2008:207) 11. [ADV-2008-0046](http://www.vupen.com/english/advisories/2008/0046) 12. [28636](http://secunia.com/advisories/28636)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49132, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49132 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49132 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 01:55 UTC - **Last Updated**: May 04, 2025 at 08:30 UTC - **Reserved Date**: February 26, 2025 at 01:49 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: ath11k: pci: fix crash on suspend if board file is not found Mario reported that the kernel was crashing on suspend if ath11k was not able to find a board file: [ 473.693286] PM: Suspending system (s2idle) [ 473.693291] printk: Suspending console(s) (use no_console_suspend to debug) [ 474.407787] BUG: unable to handle page fault for address: 0000000000002070 [ 474.407791] #PF: supervisor read access in kernel mode [ 474.407794] #PF: error_code(0x0000) - not-present page [ 474.407798] PGD 0 P4D 0 [ 474.407801] Oops: 0000 [#1] PREEMPT SMP NOPTI [ 474.407805] CPU: 2 PID: 2350 Comm: kworker/u32:14 Tainted: G W 5.16.0 #248 [...] [ 474.407868] Call Trace: [ 474.407870] <TASK> [ 474.407874] ? _raw_spin_lock_irqsave+0x2a/0x60 [ 474.407882] ? lock_timer_base+0x72/0xa0 [ 474.407889] ? _raw_spin_unlock_irqrestore+0x29/0x3d [ 474.407892] ? try_to_del_timer_sync+0x54/0x80 [ 474.407896] ath11k_dp_rx_pktlog_stop+0x49/0xc0 [ath11k] [ 474.407912] ath11k_core_suspend+0x34/0x130 [ath11k] [ 474.407923] ath11k_pci_pm_suspend+0x1b/0x50 [ath11k_pci] [ 474.407928] pci_pm_suspend+0x7e/0x170 [ 474.407935] ? pci_pm_freeze+0xc0/0xc0 [ 474.407939] dpm_run_callback+0x4e/0x150 [ 474.407947] __device_suspend+0x148/0x4c0 [ 474.407951] async_suspend+0x20/0x90 dmesg-efi-164255130401001: Oops#1 Part1 [ 474.407955] async_run_entry_fn+0x33/0x120 [ 474.407959] process_one_work+0x220/0x3f0 [ 474.407966] worker_thread+0x4a/0x3d0 [ 474.407971] kthread+0x17a/0x1a0 [ 474.407975] ? process_one_work+0x3f0/0x3f0 [ 474.407979] ? set_kthread_struct+0x40/0x40 [ 474.407983] ret_from_fork+0x22/0x30 [ 474.407991] </TASK> The issue here is that board file loading happens after ath11k_pci_probe() succesfully returns (ath11k initialisation happends asynchronously) and the suspend handler is still enabled, of course failing as ath11k is not properly initialised. Fix this by checking ATH11K_FLAG_QMI_FAIL during both suspend and resume. Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03003-QCAHSPSWPL_V1_V2_SILICONZ_LITE-2 ### Affected Products **Linux - Linux** Affected versions: - d5c65159f2895379e11ca13f62feabe93278985d (Status: affected) - d5c65159f2895379e11ca13f62feabe93278985d (Status: affected) - d5c65159f2895379e11ca13f62feabe93278985d (Status: affected) - d5c65159f2895379e11ca13f62feabe93278985d (Status: affected) **Linux - Linux** Affected versions: - 5.6 (Status: affected) - 0 (Status: unaffected) - 5.15.34 (Status: unaffected) - 5.16.20 (Status: unaffected) - 5.17.3 (Status: unaffected) - 5.18 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/fed4cef115ab21a18faf499b3fa9b9a4b544f941) 2. [](https://git.kernel.org/stable/c/f3c5ef433da82d257337424b3647ce9dcb37d4b5) 3. [](https://git.kernel.org/stable/c/aeed776c00e804a0f7896db39c7c661cea34ee1f) 4. [](https://git.kernel.org/stable/c/b4f4c56459a5c744f7f066b9fc2b54ea995030c5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3261, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3261 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3261 - **State**: PUBLISHED - **Published Date**: June 19, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 14:14 UTC - **Reserved Date**: June 19, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in widgets/widget_search.php in dKret before 2.6 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO (PHP_SELF). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://sourceforge.net/project/shownotes.php?release_id=516770&group_id=185847) 2. [24518](http://www.securityfocus.com/bid/24518) 3. [](http://dkret.svn.sourceforge.net/viewvc/dkret/trunk/widgets/widget_search.php?r1=275&r2=281) 4. [dkret-widgetsearch-xss(34930)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34930) 5. [25731](http://secunia.com/advisories/25731) 6. [36373](http://osvdb.org/36373) 7. [ADV-2007-2243](http://www.vupen.com/english/advisories/2007/2243)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6301, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6301 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6301 - **State**: PUBLISHED - **Published Date**: December 06, 2006 at 19:00 UTC - **Last Updated**: August 07, 2024 at 20:19 UTC - **Reserved Date**: December 05, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description DenyHosts 2.5 does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a login name containing certain strings with an IP address, which is not properly handled by a regular expression. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://bugs.gentoo.org/show_bug.cgi?id=157163) 2. [ADV-2006-4876](http://www.vupen.com/english/advisories/2006/4876) 3. [23236](http://secunia.com/advisories/23236) 4. [denyhosts-log-files-dos(30761)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30761) 5. [21468](http://www.securityfocus.com/bid/21468) 6. [23603](http://secunia.com/advisories/23603) 7. [GLSA-200701-01](http://security.gentoo.org/glsa/glsa-200701-01.xml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14745, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14745 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14745 - **State**: PUBLISHED - **Published Date**: October 21, 2020 at 14:04 UTC - **Last Updated**: September 26, 2024 at 20:29 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle REST Data Services product of Oracle REST Data Services (component: General). Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c; Standalone ORDS: prior to 20.2.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle REST Data Services. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle REST Data Services accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Affected Products **Oracle Corporation - REST Data Services** Affected versions: - 11.2.0.4 (Status: affected) - 12.1.0.2 (Status: affected) - 12.2.0.1 (Status: affected) - 18c (Status: affected) - 19c; Standalone ORDS: prior to 20.2.1 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1651, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1651 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1651 - **State**: PUBLISHED - **Published Date**: September 19, 2012 at 19:00 UTC - **Last Updated**: September 16, 2024 at 17:33 UTC - **Reserved Date**: March 12, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Submenu Tree module before 6.x-1.5 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://drupal.org/node/1461470) 2. [79696](http://www.osvdb.org/79696) 3. [52226](http://www.securityfocus.com/bid/52226) 4. [48202](http://secunia.com/advisories/48202) 5. [](http://drupal.org/node/1132838) 6. [[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)](http://www.openwall.com/lists/oss-security/2012/04/07/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0362, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0362 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0362 - **State**: PUBLISHED - **Published Date**: June 21, 2018 at 11:00 UTC - **Last Updated**: November 29, 2024 at 14:56 UTC - **Reserved Date**: November 27, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in BIOS authentication management of Cisco 5000 Series Enterprise Network Compute System and Cisco Unified Computing (UCS) E-Series Servers could allow an unauthenticated, local attacker to bypass the BIOS authentication and execute actions as an unprivileged user. The vulnerability is due to improper security restrictions that are imposed by the affected system. An attacker could exploit this vulnerability by submitting an empty password value to an affected device's BIOS authentication prompt. An exploit could allow the attacker to have access to a restricted set of user-level BIOS commands. Cisco Bug IDs: CSCvh83260. ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **n/a - Cisco 5000 Series Enterprise Network Compute System and Cisco UCS E-Series Servers unknown** Affected versions: - Cisco 5000 Series Enterprise Network Compute System and Cisco UCS E-Series Servers unknown (Status: affected) ### References 1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-encs-ucs-bios-auth-bypass) 2. [1041173](http://www.securitytracker.com/id/1041173)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46964, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46964 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46964 - **State**: PUBLISHED - **Published Date**: February 27, 2024 at 18:47 UTC - **Last Updated**: May 04, 2025 at 07:01 UTC - **Reserved Date**: February 27, 2024 at 18:42 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Reserve extra IRQ vectors Commit a6dcfe08487e ("scsi: qla2xxx: Limit interrupt vectors to number of CPUs") lowers the number of allocated MSI-X vectors to the number of CPUs. That breaks vector allocation assumptions in qla83xx_iospace_config(), qla24xx_enable_msix() and qla2x00_iospace_config(). Either of the functions computes maximum number of qpairs as: ha->max_qpairs = ha->msix_count - 1 (MB interrupt) - 1 (default response queue) - 1 (ATIO, in dual or pure target mode) max_qpairs is set to zero in case of two CPUs and initiator mode. The number is then used to allocate ha->queue_pair_map inside qla2x00_alloc_queues(). No allocation happens and ha->queue_pair_map is left NULL but the driver thinks there are queue pairs available. qla2xxx_queuecommand() tries to find a qpair in the map and crashes: if (ha->mqenable) { uint32_t tag; uint16_t hwq; struct qla_qpair *qpair = NULL; tag = blk_mq_unique_tag(cmd->request); hwq = blk_mq_unique_tag_to_hwq(tag); qpair = ha->queue_pair_map[hwq]; # <- HERE if (qpair) return qla2xxx_mqueuecommand(host, cmd, qpair); } BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] SMP PTI CPU: 0 PID: 72 Comm: kworker/u4:3 Tainted: G W 5.10.0-rc1+ #25 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.0.0-prebuilt.qemu-project.org 04/01/2014 Workqueue: scsi_wq_7 fc_scsi_scan_rport [scsi_transport_fc] RIP: 0010:qla2xxx_queuecommand+0x16b/0x3f0 [qla2xxx] Call Trace: scsi_queue_rq+0x58c/0xa60 blk_mq_dispatch_rq_list+0x2b7/0x6f0 ? __sbitmap_get_word+0x2a/0x80 __blk_mq_sched_dispatch_requests+0xb8/0x170 blk_mq_sched_dispatch_requests+0x2b/0x50 __blk_mq_run_hw_queue+0x49/0xb0 __blk_mq_delay_run_hw_queue+0xfb/0x150 blk_mq_sched_insert_request+0xbe/0x110 blk_execute_rq+0x45/0x70 __scsi_execute+0x10e/0x250 scsi_probe_and_add_lun+0x228/0xda0 __scsi_scan_target+0xf4/0x620 ? __pm_runtime_resume+0x4f/0x70 scsi_scan_target+0x100/0x110 fc_scsi_scan_rport+0xa1/0xb0 [scsi_transport_fc] process_one_work+0x1ea/0x3b0 worker_thread+0x28/0x3b0 ? process_one_work+0x3b0/0x3b0 kthread+0x112/0x130 ? kthread_park+0x80/0x80 ret_from_fork+0x22/0x30 The driver should allocate enough vectors to provide every CPU it's own HW queue and still handle reserved (MB, RSP, ATIO) interrupts. The change fixes the crash on dual core VM and prevents unbalanced QP allocation where nr_hw_queues is two less than the number of CPUs. ### Affected Products **Linux - Linux** Affected versions: - a6dcfe08487e5e83b6b4214c959a9577a9ed2d9f (Status: affected) - a6dcfe08487e5e83b6b4214c959a9577a9ed2d9f (Status: affected) - a6dcfe08487e5e83b6b4214c959a9577a9ed2d9f (Status: affected) **Linux - Linux** Affected versions: - 5.11 (Status: affected) - 0 (Status: unaffected) - 5.11.20 (Status: unaffected) - 5.12.3 (Status: unaffected) - 5.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/4ecd42dec858b6632c5f024fe13e9ad6c30f2734) 2. [](https://git.kernel.org/stable/c/0f86d66b38501e3ac66cf2d9f9f8ad6838bad0e6) 3. [](https://git.kernel.org/stable/c/f02d4086a8f36a0e1aaebf559b54cf24a177a486)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-48143, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-48143 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-48143 - **State**: PUBLISHED - **Published Date**: June 09, 2025 at 15:53 UTC - **Last Updated**: June 10, 2025 at 13:58 UTC - **Reserved Date**: May 15, 2025 at 18:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in salesup2019 Formulario de contacto SalesUp! allows Reflected XSS. This issue affects Formulario de contacto SalesUp!: from n/a through 1.0.14. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **salesup2019 - Formulario de contacto SalesUp!** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/formularios-de-contacto-salesup/vulnerability/wordpress-formulario-de-contacto-salesup-plugin-1-0-14-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Nguyen Xuan Chien (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4731, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4731 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4731 - **State**: PUBLISHED - **Published Date**: June 29, 2013 at 21:00 UTC - **Last Updated**: September 16, 2024 at 16:38 UTC - **Reserved Date**: June 29, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax modem allows remote attackers to execute arbitrary commands via shell metacharacters in the pip parameter in an Ajax tag_ipPing request, a different vulnerability than CVE-2013-3581. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#932044](http://www.kb.cert.org/vuls/id/932044)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0613, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0613 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0613 - **State**: PUBLISHED - **Published Date**: May 02, 2024 at 16:52 UTC - **Last Updated**: August 01, 2024 at 18:11 UTC - **Reserved Date**: January 16, 2024 at 17:33 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Delete Custom Fields plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.3.1. This is due to missing or incorrect nonce validation on the ajax_delete_field() function. This makes it possible for unauthenticated attackers to delete arbitrary post meta data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **gluten - Delete Custom Fields** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c13ba1df-25fa-4cc8-9745-2d6f6168788a?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/delete-custom-fields/trunk/delete-custom-fields.php#L357) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8980, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8980 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8980 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 18, 2014 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16778, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16778 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16778 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:51 UTC - **Last Updated**: December 20, 2021 at 22:51 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13080, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13080 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13080 - **State**: REJECTED - **Published Date**: January 14, 2022 at 16:25 UTC - **Last Updated**: January 14, 2022 at 16:25 UTC - **Reserved Date**: May 15, 2020 at 00:00 UTC - **Assigned By**: AMD ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51633, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51633 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51633 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:32 UTC - **Last Updated**: November 20, 2024 at 14:26 UTC - **Reserved Date**: October 30, 2024 at 15:04 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in IvyCat Web Services Simple Page Specific Sidebars allows Stored XSS.This issue affects Simple Page Specific Sidebars: from n/a through 2.14.1. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **IvyCat Web Services - Simple Page Specific Sidebars** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/page-specific-sidebars/wordpress-simple-page-specific-sidebars-plugin-2-14-1-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24358, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24358 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24358 - **State**: PUBLISHED - **Published Date**: June 14, 2021 at 13:37 UTC - **Last Updated**: August 03, 2024 at 19:28 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Plus Addons for Elementor Page Builder WordPress plugin before 4.1.10 did not validate a redirect parameter on a specifically crafted URL before redirecting the user to it, leading to an Open Redirect issue. ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **Unknown - The Plus Addons for Elementor Page Builder** Affected versions: - 4.1.10 (Status: affected) ### References 1. [](https://theplusaddons.com/changelog/) 2. [](https://wpscan.com/vulnerability/fd4352ad-dae0-4404-94d1-11083cb1f44d) ### Credits - Nicolas Vidal from TEHTRIS
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-13113, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-13113 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-13113 - **State**: PUBLISHED - **Published Date**: June 30, 2019 at 22:21 UTC - **Last Updated**: August 04, 2024 at 23:41 UTC - **Reserved Date**: June 30, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to assertion failure) via an invalid data location in a CRW image file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Exiv2/exiv2/issues/841) 2. [](https://github.com/Exiv2/exiv2/pull/842) 3. [USN-4056-1](https://usn.ubuntu.com/4056-1/) 4. [FEDORA-2019-60553d5a18](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7242, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7242 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7242 - **State**: PUBLISHED - **Published Date**: January 20, 2020 at 21:56 UTC - **Last Updated**: August 04, 2024 at 09:25 UTC - **Reserved Date**: January 20, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Comtech Stampede FX-1010 7.4.3 devices allow remote authenticated administrators to achieve remote code execution by navigating to the Diagnostics Trace Route page and entering shell metacharacters in the Target IP address field. (In some cases, authentication can be achieved with the comtech password for the comtech account.) ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sku11army.blogspot.com/2020/01/comtech-authenticated-rce-on-comtech.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3360, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3360 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3360 - **State**: PUBLISHED - **Published Date**: January 27, 2017 at 22:01 UTC - **Last Updated**: October 08, 2024 at 20:23 UTC - **Reserved Date**: December 06, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Customer Intelligence component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Intelligence. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Customer Intelligence, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Customer Intelligence accessible data as well as unauthorized update, insert or delete access to some of Oracle Customer Intelligence accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). ### Affected Products **Oracle - Customer Intelligence** Affected versions: - 12.1.1 (Status: affected) - 12.1.2 (Status: affected) - 12.1.3 (Status: affected) ### References 1. [95511](http://www.securityfocus.com/bid/95511) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2322, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2322 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2322 - **State**: PUBLISHED - **Published Date**: June 23, 2021 at 22:25 UTC - **Last Updated**: September 26, 2024 at 14:08 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Oracle Corporation - OpenGrok** Affected versions: - 1.6.7 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/oracle-open-source-cves-outside-other-oracle-public-documents.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-42024, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-42024 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-42024 - **State**: PUBLISHED - **Published Date**: December 14, 2021 at 12:06 UTC - **Last Updated**: August 04, 2024 at 03:22 UTC - **Reserved Date**: October 06, 2021 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in Simcenter STAR-CCM+ Viewer (All versions < 2021.3.1). The starview+.exe application lacks proper validation of user-supplied data when parsing scene files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Siemens - Simcenter STAR-CCM+ Viewer** Affected versions: - All versions < 2021.3.1 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-161331.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5989, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5989 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5989 - **State**: REJECTED - **Published Date**: February 05, 2020 at 18:21 UTC - **Last Updated**: February 05, 2020 at 18:21 UTC - **Reserved Date**: October 03, 2013 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9738, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9738 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9738 - **State**: PUBLISHED - **Published Date**: July 06, 2015 at 14:55 UTC - **Last Updated**: September 16, 2024 at 20:07 UTC - **Reserved Date**: July 06, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the Tournament module 7.x-1.x before 7.x-1.2 for Drupal allow remote authenticated users with certain permissions to inject arbitrary web script or HTML via an (1) account username, a (2) node title, or a (3) team entity title. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [71198](http://www.securityfocus.com/bid/71198) 2. [](https://www.drupal.org/node/2378401) 3. [](https://www.drupal.org/node/2378289)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26264, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26264 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26264 - **State**: PUBLISHED - **Published Date**: December 11, 2020 at 16:45 UTC - **Last Updated**: August 04, 2024 at 15:56 UTC - **Reserved Date**: October 01, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.25 a denial-of-service vulnerability can make a LES server crash via malicious GetProofsV2 request from a connected LES client. This vulnerability only concerns users explicitly enabling les server; disabling les prevents the exploit. The vulnerability was patched in version 1.9.25. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **ethereum - go-ethereum** Affected versions: - < 1.9.25 (Status: affected) ### References 1. [](https://github.com/ethereum/go-ethereum/security/advisories/GHSA-r33q-22hv-j29q) 2. [](https://github.com/ethereum/go-ethereum/pull/21896) 3. [](https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46) 4. [](https://github.com/ethereum/go-ethereum/releases/tag/v1.9.25)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6498, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6498 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6498 - **State**: PUBLISHED - **Published Date**: March 06, 2017 at 02:00 UTC - **Last Updated**: August 05, 2024 at 15:33 UTC - **Reserved Date**: March 05, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in ImageMagick 6.9.7. Incorrect TGA files could trigger assertion failures, thus leading to DoS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ImageMagick/ImageMagick/commit/65f75a32a93ae4044c528a987a68366ecd4b46b9) 2. [](https://github.com/ImageMagick/ImageMagick/pull/359) 3. [96591](http://www.securityfocus.com/bid/96591) 4. [DSA-3808](http://www.debian.org/security/2017/dsa-3808) 5. [](https://bugs.debian.org/856878)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3896, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3896 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3896 - **State**: PUBLISHED - **Published Date**: July 24, 2024 at 12:43 UTC - **Last Updated**: August 01, 2024 at 20:26 UTC - **Reserved Date**: April 16, 2024 at 17:55 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Photo Gallery, Images, Slider in Rbs Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the the Gallery title field in all versions up to, and including, 3.2.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **robosoft - Photo Gallery, Images, Slider in Rbs Image Gallery** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/69ab404b-1c2f-441b-8622-3cf830587d95?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3100759/robo-gallery) ### Credits - Tim Coen
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0587, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0587 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0587 - **State**: PUBLISHED - **Published Date**: November 12, 2020 at 17:55 UTC - **Last Updated**: August 04, 2024 at 06:02 UTC - **Reserved Date**: October 28, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. ### Affected Products **n/a - Intel(R) Processors** Affected versions: - See references (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00358) 2. [](https://security.netapp.com/advisory/ntap-20201113-0001/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13012, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13012 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13012 - **State**: PUBLISHED - **Published Date**: June 29, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 08:52 UTC - **Reserved Date**: June 29, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Download of code with improper integrity check in snsupd.exe and upd.exe in SAFE'N'SEC SoftControl/SafenSoft SysWatch, SoftControl/SafenSoft TPSecure, and SoftControl/SafenSoft Enterprise Suite before 4.4.12 allows the remote attacker to execute unauthorized code by substituting a forged update server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.safensoft.com/security.phtml?c=865#SNSVE-2018-5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1750, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1750 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1750 - **State**: PUBLISHED - **Published Date**: June 21, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:34 UTC - **Reserved Date**: June 21, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description csGuestbook.cgi in CGISCRIPT.NET csGuestbook 1.0 allows remote attackers to execute arbitrary Perl code via the setup parameter, which is processed by the Perl eval function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20020408 multiple CGIscript.net scripts - Remote Code Execution](http://cert.uni-stuttgart.de/archive/bugtraq/2002/04/msg00106.html) 2. [4448](http://www.securityfocus.com/bid/4448) 3. [cgiscript-url-execute-commands(8636)](https://exchange.xforce.ibmcloud.com/vulnerabilities/8636)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0263, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0263 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0263 - **State**: PUBLISHED - **Published Date**: January 15, 2008 at 19:00 UTC - **Last Updated**: August 07, 2024 at 07:39 UTC - **Reserved Date**: January 15, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The SIP module in Ingate Firewall before 4.6.1 and SIParator before 4.6.1 does not reuse SIP media ports in unspecified call hold and send-only stream scenarios, which allows remote attackers to cause a denial of service (port exhaustion) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [40365](http://osvdb.org/40365) 2. [1019177](http://www.securitytracker.com/id?1019177) 3. [](http://www.ingate.com/relnote-461.php) 4. [28394](http://secunia.com/advisories/28394) 5. [27222](http://www.securityfocus.com/bid/27222) 6. [ADV-2008-0108](http://www.vupen.com/english/advisories/2008/0108) 7. [1019176](http://www.securitytracker.com/id?1019176)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48042, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48042 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48042 - **State**: PUBLISHED - **Published Date**: October 16, 2024 at 12:58 UTC - **Last Updated**: October 16, 2024 at 14:35 UTC - **Reserved Date**: October 08, 2024 at 13:14 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Supsystic Contact Form by Supsystic allows Command Injection.This issue affects Contact Form by Supsystic: from n/a through 1.7.28. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-1336: Security Weakness ### Affected Products **Supsystic - Contact Form by Supsystic** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/contact-form-by-supsystic/wordpress-contact-form-by-supsystic-plugin-1-7-28-remote-code-execution-rce-vulnerability?_s_id=cve) ### Credits - Hakiduck (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40019, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40019 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40019 - **State**: PUBLISHED - **Published Date**: September 16, 2022 at 17:58 UTC - **Last Updated**: August 04, 2024 at 02:27 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description Out-of-bounds heap read vulnerability in the HW_KEYMASTER module. Successful exploitation of this vulnerability may cause out-of-bounds access. ### Affected Products **Huawei - EMUI** Affected versions: - 12.0.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2022/9/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000630, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000630 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000630 - **State**: PUBLISHED - **Published Date**: December 28, 2018 at 14:00 UTC - **Last Updated**: August 05, 2024 at 12:40 UTC - **Reserved Date**: July 27, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Battelle V2I Hub 2.5.1 is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements to /api/PluginStatusActions.php and /status/pluginStatus.php using the jtSorting or id parameter, which could allow the attacker to view, add, modify or delete information in the back-end database. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/147307)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31250, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31250 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31250 - **State**: PUBLISHED - **Published Date**: July 20, 2022 at 07:55 UTC - **Last Updated**: September 17, 2024 at 01:06 UTC - **Reserved Date**: May 20, 2022 at 00:00 UTC - **Assigned By**: suse ### Vulnerability Description A UNIX Symbolic Link (Symlink) Following vulnerability in keylime of openSUSE Tumbleweed allows local attackers to escalate from the keylime user to root. This issue affects: openSUSE Tumbleweed keylime versions prior to 6.4.2-1.1. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-59: Security Weakness ### Affected Products **openSUSE - Tumbleweed** Affected versions: - keylime (Status: affected) ### References 1. [](https://bugzilla.suse.com/show_bug.cgi?id=1200885) ### Credits - Johannes Segitz from SUSE
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2784, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2784 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2784 - **State**: PUBLISHED - **Published Date**: May 24, 2024 at 04:29 UTC - **Last Updated**: August 01, 2024 at 19:25 UTC - **Reserved Date**: March 21, 2024 at 16:17 UTC - **Assigned By**: Wordfence ### Vulnerability Description The The Plus Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Hover Card widget in all versions up to, and including, 5.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **posimyththemes - The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/cc6fdb7c-b750-4f03-9785-a9dc7573580d?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3090866/) ### Credits - Colin Xu
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7395, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7395 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7395 - **State**: PUBLISHED - **Published Date**: February 05, 2019 at 00:00 UTC - **Last Updated**: August 04, 2024 at 20:46 UTC - **Reserved Date**: February 04, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06) 2. [](https://github.com/ImageMagick/ImageMagick/issues/1451) 3. [106850](http://www.securityfocus.com/bid/106850) 4. [openSUSE-SU-2019:1141](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html) 5. [openSUSE-SU-2019:1320](http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html) 6. [USN-4034-1](https://usn.ubuntu.com/4034-1/) 7. [DSA-4712](https://www.debian.org/security/2020/dsa-4712)