System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41803, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41803 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41803
- **State**: PUBLISHED
- **Published Date**: December 13, 2024 at 14:24 UTC
- **Last Updated**: December 13, 2024 at 19:10 UTC
- **Reserved Date**: September 01, 2023 at 11:55 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in BitPay BitPay Checkout for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects BitPay Checkout for WooCommerce: from n/a through 4.1.0.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**BitPay - BitPay Checkout for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/bitpay-checkout-for-woocommerce/vulnerability/wordpress-bitpay-checkout-for-woocommerce-plugin-4-1-0-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2614, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2614 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2614
- **State**: PUBLISHED
- **Published Date**: August 17, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:30 UTC
- **Reserved Date**: August 17, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Discuz! 4.0 rc4 does not properly restrict types of files that are uploaded to the server, which allows remote attackers to execute arbitrary commands via a filename containing ".php.rar" or other multiple extensions that include .php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050814 STG Security Advisory: [SSA-20050812-27] Discuz! arbitrary script upload vulnerability](http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0440.html)
2. [1014673](http://securitytracker.com/id?1014673)
3. [14564](http://www.securityfocus.com/bid/14564)
4. [16433](http://secunia.com/advisories/16433) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20273, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20273 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20273
- **State**: PUBLISHED
- **Published Date**: October 23, 2024 at 17:07 UTC
- **Last Updated**: October 24, 2024 at 17:49 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**Cisco - Cisco Firepower Management Center**
Affected versions:
- 6.2.3.12 (Status: affected)
- 6.2.3.1 (Status: affected)
- 6.2.3.10 (Status: affected)
- 6.2.3.8 (Status: affected)
- 6.4.0.6 (Status: affected)
- 6.2.3 (Status: affected)
- 6.4.0.7 (Status: affected)
- 6.2.3.13 (Status: affected)
- 6.2.3.5 (Status: affected)
- 6.4.0.4 (Status: affected)
- 6.2.3.9 (Status: affected)
- 6.2.3.14 (Status: affected)
- 6.4.0.1 (Status: affected)
- 6.2.3.6 (Status: affected)
- 6.2.3.11 (Status: affected)
- 6.4.0.8 (Status: affected)
- 6.2.3.2 (Status: affected)
- 6.4.0.2 (Status: affected)
- 6.2.3.3 (Status: affected)
- 6.4.0.3 (Status: affected)
- 6.2.3.7 (Status: affected)
- 6.2.3.4 (Status: affected)
- 6.4.0.5 (Status: affected)
- 6.4.0 (Status: affected)
- 6.2.3.15 (Status: affected)
- 6.6.0 (Status: affected)
- 6.4.0.9 (Status: affected)
- 6.2.3.16 (Status: affected)
- 6.6.0.1 (Status: affected)
- 6.6.1 (Status: affected)
- 6.4.0.10 (Status: affected)
- 6.7.0 (Status: affected)
- 6.4.0.11 (Status: affected)
- 6.6.3 (Status: affected)
- 6.7.0.1 (Status: affected)
- 6.6.4 (Status: affected)
- 6.4.0.12 (Status: affected)
- 6.7.0.2 (Status: affected)
- 7.0.0 (Status: affected)
- 6.2.3.17 (Status: affected)
- 7.0.0.1 (Status: affected)
- 6.6.5 (Status: affected)
- 7.0.1 (Status: affected)
- 7.1.0 (Status: affected)
- 6.6.5.1 (Status: affected)
- 6.4.0.13 (Status: affected)
- 6.7.0.3 (Status: affected)
- 7.0.1.1 (Status: affected)
- 6.2.3.18 (Status: affected)
- 6.4.0.14 (Status: affected)
- 6.6.5.2 (Status: affected)
- 7.1.0.1 (Status: affected)
- 7.0.2 (Status: affected)
- 6.4.0.15 (Status: affected)
- 7.2.0 (Status: affected)
- 7.0.2.1 (Status: affected)
- 7.0.3 (Status: affected)
- 6.6.7 (Status: affected)
- 7.1.0.2 (Status: affected)
- 7.2.0.1 (Status: affected)
- 7.0.4 (Status: affected)
- 7.2.1 (Status: affected)
- 7.0.5 (Status: affected)
- 6.4.0.16 (Status: affected)
- 7.3.0 (Status: affected)
- 7.2.2 (Status: affected)
- 6.6.7.1 (Status: affected)
- 7.3.1 (Status: affected)
- 7.2.3 (Status: affected)
- 7.1.0.3 (Status: affected)
- 7.2.3.1 (Status: affected)
- 7.2.4 (Status: affected)
- 7.0.6 (Status: affected)
- 7.2.4.1 (Status: affected)
- 7.2.5 (Status: affected)
- 7.3.1.1 (Status: affected)
- 7.4.0 (Status: affected)
- 6.4.0.17 (Status: affected)
- 7.0.6.1 (Status: affected)
- 7.2.5.1 (Status: affected)
- 6.6.7.2 (Status: affected)
- 7.2.5.2 (Status: affected)
- 7.3.1.2 (Status: affected)
### References
1. [cisco-sa-fmc-xss-dhJxQYZs](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs)
2. [https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO)
3. [Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication](https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0224
- **State**: PUBLISHED
- **Published Date**: January 07, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 00:45 UTC
- **Reserved Date**: January 07, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SanDisk Cruzer Enterprise USB flash drives validate passwords with a program running on the host computer rather than the device hardware, which allows physically proximate attackers to access the cleartext drive contents via a modified program.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.syss.de/index.php?id=108&tx_ttnews%5Btt_news%5D=528&cHash=8d16fa63d9)
2. [1023408](http://securitytracker.com/id?1023408)
3. [](http://www.sandisk.com/business-solutions/enterprise/technical-support/security-bulletin-december-2009)
4. [](http://it.slashdot.org/story/10/01/05/1734242/)
5. [](http://www.h-online.com/security/news/item/NIST-certified-USB-Flash-drives-with-hardware-encryption-cracked-895308.html)
6. [](http://blogs.zdnet.com/hardware/?p=6655)
7. [](http://www.syss.de/fileadmin/ressources/040_veroeffentlichungen/dokumente/SySS_knackt_SanDisk_USB-Stick.pdf)
8. [ADV-2010-0078](http://www.vupen.com/english/advisories/2010/0078)
9. [37677](http://www.securityfocus.com/bid/37677)
10. [sandisk-access-control-sec-bypass(55475)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55475)
11. [](https://www.ironkey.com/usb-flash-drive-flaw-exposed) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0629, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0629 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0629
- **State**: PUBLISHED
- **Published Date**: March 04, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:21 UTC
- **Reserved Date**: March 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in profile.php in 427BB 2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) user or (2) Avatar parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14434](http://secunia.com/advisories/14434)
2. [12693](http://www.securityfocus.com/bid/12693)
3. [20050301 427BB profile.php XSS vulnerability.](http://marc.info/?l=bugtraq&m=110970911514167&w=2)
4. [1013337](http://securitytracker.com/id?1013337)
5. [427bb-profile-xss(19546)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19546)
6. [20050301 427BB profile.php XSS vulnerability.](http://marc.info/?l=bugtraq&m=110970474726113&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21202, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21202 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21202
- **State**: PUBLISHED
- **Published Date**: June 28, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 09:28 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In btm_delete_stored_link_key_complete of btm_devctl.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure over Bluetooth with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260568359
### Affected Products
**n/a - Android**
Affected versions:
- Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2023-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40872, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40872 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40872
- **State**: PUBLISHED
- **Published Date**: July 25, 2024 at 17:00 UTC
- **Last Updated**: August 02, 2024 at 04:39 UTC
- **Reserved Date**: July 10, 2024 at 20:40 UTC
- **Assigned By**: Absolute
### Vulnerability Description
There is an elevation of privilege vulnerability in server
and client components of Absolute Secure Access prior to version 13.07.
Attackers with local access and valid desktop user credentials can elevate
their privilege to system level by passing invalid address data to the vulnerable
component. This could be used to
manipulate process tokens to elevate the privilege of a normal process to
System. The scope is changed, the impact to system confidentiality and
integrity is high, the impact to the availability of the effected component is
none.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-822: Security Weakness
### Affected Products
**Absolute Security - Secure Access**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1307/cve-2024-40872/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44098, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44098 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44098
- **State**: PUBLISHED
- **Published Date**: October 25, 2024 at 10:34 UTC
- **Last Updated**: October 25, 2024 at 16:15 UTC
- **Reserved Date**: August 19, 2024 at 16:32 UTC
- **Assigned By**: Google_Devices
### Vulnerability Description
In lwis_device_event_states_clear_locked of lwis_event.c, there is a possible privilege escalation due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2024-10-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2027, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2027 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2027
- **State**: PUBLISHED
- **Published Date**: March 31, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 09:58 UTC
- **Reserved Date**: February 19, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
eGroupware before 1.8.006.20140217 allows remote attackers to conduct PHP object injection attacks, delete arbitrary files, and possibly execute arbitrary code via the (1) addr_fields or (2) trans parameter to addressbook/csv_import.php, (3) cal_fields or (4) trans parameter to calendar/csv_import.php, (5) info_fields or (6) trans parameter to csv_import.php in (a) projectmanager/ or (b) infolog/, or (7) processed parameter to preferences/inc/class.uiaclprefs.inc.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2015:087](http://www.mandriva.com/security/advisories?name=MDVSA-2015:087)
2. [[oss-security] 20140219 Re: CVE request: remote code execution in egroupware <= 1.8.005](http://openwall.com/lists/oss-security/2014/02/19/4)
3. [[oss-security] 20140219 Re: CVE request: remote code execution in egroupware <= 1.8.005](http://openwall.com/lists/oss-security/2014/02/19/10)
4. [](http://sourceforge.net/projects/egroupware/files/eGroupware-1.8/README/download)
5. [](http://advisories.mageia.org/MGASA-2014-0116.html)
6. [GLSA-201711-12](https://security.gentoo.org/glsa/201711-12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23294, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23294 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23294
- **State**: PUBLISHED
- **Published Date**: March 09, 2022 at 17:07 UTC
- **Last Updated**: January 02, 2025 at 18:35 UTC
- **Reserved Date**: January 15, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Event Tracing Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Event Tracing Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23294) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6105, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6105 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6105
- **State**: PUBLISHED
- **Published Date**: November 15, 2023 at 20:57 UTC
- **Last Updated**: February 13, 2025 at 17:26 UTC
- **Reserved Date**: November 13, 2023 at 15:10 UTC
- **Assigned By**: tenable
### Vulnerability Description
An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**ManageEngine - Service Desk Plus**
Affected versions:
- 0 (Status: affected)
**ManageEngine - Asset Explorer**
Affected versions:
- 0 (Status: affected)
**ManageEngine - Access Manager Plus**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.tenable.com/security/research/tra-2023-35)
2. [](https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25520, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25520 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25520
- **State**: PUBLISHED
- **Published Date**: February 25, 2025 at 00:00 UTC
- **Last Updated**: February 26, 2025 at 15:01 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Seacms <13.3 is vulnerable to SQL Injection in admin_pay.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Colorado-all/cve/blob/main/seacms/seacms%20V13.3-sql-4.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7147, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7147
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 16, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3065, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3065
- **State**: PUBLISHED
- **Published Date**: September 02, 2022 at 18:15 UTC
- **Last Updated**: August 03, 2024 at 01:00 UTC
- **Reserved Date**: August 30, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Improper Access Control in GitHub repository jgraph/drawio prior to 20.2.8.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**jgraph - jgraph/drawio**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/5f3bc4b6-1d53-46b7-a23d-70f5faaf0c76)
2. [](https://github.com/jgraph/drawio/commit/59887e45b36f06c8dd4919a32bacd994d9f084da) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41760, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41760 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41760
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 00:49 UTC
- **Last Updated**: March 11, 2025 at 02:01 UTC
- **Reserved Date**: July 22, 2024 at 12:02 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Common Cryptographic Architecture 7.0.0 through 7.5.51
could allow an attacker to obtain sensitive information due to a timing attack during certain RSA operations.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-203: Improper Input Validation
### Affected Products
**IBM - Common Cryptographic Architecture**
Affected versions:
- 7.0.0 (Status: affected)
**IBM - 4769 Developers Toolkit**
Affected versions:
- 7.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7185282) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28283, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28283 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28283
- **State**: PUBLISHED
- **Published Date**: December 29, 2020 at 17:05 UTC
- **Last Updated**: August 04, 2024 at 16:33 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: Mend
### Vulnerability Description
Prototype pollution vulnerability in 'libnested' versions 0.0.0 through 1.5.0 allows an attacker to cause a denial of service and may lead to remote code execution.
### Affected Products
**n/a - libnested**
Affected versions:
- 0.0.0, 1.0.0, 1.1.0, 1.2.1, 1.2.3, 1.3.1, 1.3.2, 1.4.0, 1.4.1, 1.5.0 (Status: affected)
### References
1. [](https://github.com/dominictarr/libnested/blob/d028a1b0f2e5f16fc28e568f52b936ae0bca0647/index.js#L27)
2. [](https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28284) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0682, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0682
- **State**: PUBLISHED
- **Published Date**: April 03, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 04:17 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco Unified Communications Domain Manager 8.1(4) allows remote authenticated users to execute arbitrary code by visiting a "deprecated page," aka Bug ID CSCup90168.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150331 Cisco Unified Communications Domain Manager Application Software Remote Code Execution Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=38113)
2. [1032002](http://www.securitytracker.com/id/1032002) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24551, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24551 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24551
- **State**: PUBLISHED
- **Published Date**: February 06, 2022 at 20:18 UTC
- **Last Updated**: August 03, 2024 at 04:13 UTC
- **Reserved Date**: February 06, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A flaw was found in StarWind Stack. The endpoint for setting a new password doesn’t check the current username and old password. An attacker could reset any local user password (including system/administrator user) using any available user This affects StarWind SAN and NAS v0.2 build 1633.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.starwindsoftware.com/security/sw-20220204-0001/)
2. [](https://www.starwindsoftware.com/security/sw-20220204-0001/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3906, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3906
- **State**: PUBLISHED
- **Published Date**: November 30, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:31 UTC
- **Reserved Date**: November 30, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in reflection APIs in Java SDK and JRE 1.4.2_08 and earlier and JDK and JRE 5.0 Update 3 and earlier allow remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary applications via unknown attack vectors, a different set of vulnerabilities than CVE-2005-3905. NOTE: this is associated with the "second and third issues" identified in SUNALERT:102003.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17847](http://secunia.com/advisories/17847)
2. [18503](http://secunia.com/advisories/18503)
3. [18435](http://secunia.com/advisories/18435)
4. [15615](http://www.securityfocus.com/bid/15615)
5. [102003](http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102003-1)
6. [ADV-2005-2946](http://www.vupen.com/english/advisories/2005/2946)
7. [ADV-2005-2675](http://www.vupen.com/english/advisories/2005/2675)
8. [](http://www-1.ibm.com/support/docview.wss?uid=swg21225628)
9. [ADV-2005-2636](http://www.vupen.com/english/advisories/2005/2636)
10. [GLSA-200601-10](http://www.gentoo.org/security/en/glsa/glsa-200601-10.xml)
11. [VU#974188](http://www.kb.cert.org/vuls/id/974188)
12. [1015280](http://securitytracker.com/id?1015280)
13. [APPLE-SA-2005-11-30](http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html)
14. [sun-reflection-api-elevate-privileges(23251)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23251)
15. [17748](http://secunia.com/advisories/17748)
16. [18092](http://secunia.com/advisories/18092) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40711, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40711 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40711
- **State**: PUBLISHED
- **Published Date**: August 20, 2023 at 00:00 UTC
- **Last Updated**: October 08, 2024 at 14:30 UTC
- **Reserved Date**: August 20, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Veilid before 0.1.9 does not check the size of uncompressed data during decompression upon an envelope receipt, which allows remote attackers to cause a denial of service (out-of-memory abort) via crafted packet data, as exploited in the wild in August 2023.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/veilid/veilid/-/blob/main/CHANGELOG.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15512, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15512
- **State**: REJECTED
- **Published Date**: January 23, 2018 at 17:00 UTC
- **Last Updated**: January 23, 2018 at 16:57 UTC
- **Reserved Date**: October 17, 2017 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4138, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4138 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4138
- **State**: PUBLISHED
- **Published Date**: August 03, 2023 at 13:41 UTC
- **Last Updated**: October 11, 2024 at 18:19 UTC
- **Reserved Date**: August 03, 2023 at 13:41 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.8.0.
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**ikus060 - ikus060/rdiffweb**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/1b1fa915-d588-4bb1-9e82-6a6be79befed)
2. [](https://github.com/ikus060/rdiffweb/commit/feef0d7b11d86aed29bf98c21526088117964d85) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0417, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0417 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0417
- **State**: PUBLISHED
- **Published Date**: May 24, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:21 UTC
- **Reserved Date**: May 24, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Kerberos 4 (aka krb4) allows local users to overwrite arbitrary files via a symlink attack on new ticket files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010307 Security advisory: Unsafe temporary file handling in krb4](http://archives.neohapsis.com/archives/bugtraq/2001-03/0078.html)
2. [RHSA-2001:025](http://www.redhat.com/support/errata/RHSA-2001-025.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1058
- **State**: PUBLISHED
- **Published Date**: March 24, 2022 at 14:15 UTC
- **Last Updated**: August 02, 2024 at 23:47 UTC
- **Reserved Date**: March 23, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Open Redirect on login in GitHub repository go-gitea/gitea prior to 1.16.5.
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**go-gitea - go-gitea/gitea**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/4fb42144-ac70-4f76-a5e1-ef6b5e55dc0d)
2. [](https://github.com/go-gitea/gitea/commit/e3d8e92bdc67562783de9a76b5b7842b68daeb48) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0850, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0850 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0850
- **State**: REJECTED
- **Published Date**: January 24, 2020 at 21:14 UTC
- **Last Updated**: January 24, 2020 at 21:14 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43336
- **State**: PUBLISHED
- **Published Date**: November 14, 2021 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 03:55 UTC
- **Reserved Date**: November 03, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An Out-of-Bounds Write vulnerability exists when reading a DXF or DWG file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DXF and DWG files. Crafted data in a DXF or DWG file (an invalid number of properties) can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.opendesign.com/security-advisories)
2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-301589.pdf)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-22-334/)
4. [](https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7112, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7112 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7112
- **State**: PUBLISHED
- **Published Date**: September 06, 2016 at 00:00 UTC
- **Last Updated**: September 16, 2024 at 17:58 UTC
- **Reserved Date**: August 30, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02. Attackers with network access to the device's web interface (port 80/tcp) could possibly circumvent authentication and perform certain administrative operations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92747](http://www.securityfocus.com/bid/92747)
2. [](https://www.siemens.com/cert/pool/cert/siemens_security_advisory_SSA-323211.pdf)
3. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-187-03)
4. [](http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-630413.pdf)
5. [99471](http://www.securityfocus.com/bid/99471) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2072, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2072 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2072
- **State**: REJECTED
- **Published Date**: January 05, 2018 at 14:00 UTC
- **Last Updated**: January 05, 2018 at 13:57 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36995, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36995 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36995
- **State**: PUBLISHED
- **Published Date**: July 28, 2022 at 00:51 UTC
- **Last Updated**: August 03, 2024 at 10:21 UTC
- **Reserved Date**: July 28, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Veritas NetBackup 8.1.x through 8.1.2, 8.2, 8.3.x through 8.3.0.2, 9.x through 9.0.0.1, and 9.1.x through 9.1.0.1 (and related NetBackup products). An attacker with authenticated access to a NetBackup Client could arbitrarily create directories on a NetBackup Primary server.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:N/C:N/I:L/PR:L/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.veritas.com/content/support/en_US/security/VTS22-004#m5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6150, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6150 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6150
- **State**: PUBLISHED
- **Published Date**: November 13, 2020 at 14:24 UTC
- **Last Updated**: August 04, 2024 at 08:55 UTC
- **Reserved Date**: January 07, 2020 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software USDC file format SPECS section decompression heap overflow.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**n/a - Pixar**
Affected versions:
- Pixar OpenUSD 20.05, Apple macOS Catalina 10.15.3 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48321, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48321
- **State**: PUBLISHED
- **Published Date**: November 30, 2023 at 16:28 UTC
- **Last Updated**: August 02, 2024 at 21:23 UTC
- **Reserved Date**: November 14, 2023 at 21:42 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ahmed Kaludi, Mohammed Kaludi AMP for WP – Accelerated Mobile Pages allows Stored XSS.This issue affects AMP for WP – Accelerated Mobile Pages: from n/a through 1.0.88.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Ahmed Kaludi, Mohammed Kaludi - AMP for WP – Accelerated Mobile Pages**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/accelerated-mobile-pages/wordpress-amp-for-wp-accelerated-mobile-pages-plugin-1-0-88-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- NGÔ THIÊN AN / ancorn_ from VNPT-VCI (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27176, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27176 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27176
- **State**: PUBLISHED
- **Published Date**: October 16, 2020 at 04:28 UTC
- **Last Updated**: August 04, 2024 at 16:11 UTC
- **Reserved Date**: October 16, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mutation XSS exists in Mark Text through 0.16.2 that leads to Remote Code Execution. NOTE: this might be considered a duplicate of CVE-2020-26870; however, it can also be considered an issue in the design of the "source code mode" feature, which parses HTML even though HTML support is not one of the primary advertised roles of the product.
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:R`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/marktext/marktext/issues/2360) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29951, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29951 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29951
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 19:21 UTC
- **Last Updated**: August 02, 2024 at 01:17 UTC
- **Reserved Date**: March 22, 2024 at 05:00 UTC
- **Assigned By**: brocade
### Vulnerability Description
Brocade SANnav before v2.3.1 and v2.3.0a uses the SHA-1 hash in internal SSH ports that are not open to remote connection.
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-326: Security Weakness
### Affected Products
**Brocade - Brocade SANnav**
Affected versions:
- before v2.3.1 and v2.3.0a (Status: affected)
### References
1. [](https://support.broadcom.com/external/content/SecurityAdvisories/0/23237) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1695, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1695 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1695
- **State**: PUBLISHED
- **Published Date**: May 19, 2020 at 14:13 UTC
- **Last Updated**: August 04, 2024 at 06:46 UTC
- **Reserved Date**: November 27, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Red Hat - resteasy**
Affected versions:
- all resteasy 3.x.x versions prior to 3.12.0.Final (Status: affected)
- all resteasy 4.x.x versions prior to 4.6.0.Final (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1695)
2. [FEDORA-2020-239503f5fa](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RX22C6I56BJUER76IIPYHGZIWBQIU3CQ/)
3. [FEDORA-2020-df970da9fc](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJDMT443YZWCBS5NS76XZ7TL3GK7BXHL/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4689, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4689 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4689
- **State**: PUBLISHED
- **Published Date**: October 22, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 10:24 UTC
- **Reserved Date**: October 22, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mantis before 1.1.3 does not unset the session cookie during logout, which makes it easier for remote attackers to hijack sessions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32975](http://secunia.com/advisories/32975)
2. [](http://www.mantisbt.org/bugs/file_download.php?file_id=1988&type=bug)
3. [GLSA-200812-07](http://www.gentoo.org/security/en/glsa/glsa-200812-07.xml)
4. [](http://www.mantisbt.org/bugs/view.php?id=9664)
5. [](http://www.mantisbt.org/bugs/changelog_page.php)
6. [mantis-session-cookie-hijacking(46084)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46084)
7. [[oss-security] 20081020 Re: CVE request: mantisbt < 1.1.4: RCE](http://www.openwall.com/lists/oss-security/2008/10/20/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12300, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12300 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12300
- **State**: PUBLISHED
- **Published Date**: May 13, 2019 at 12:36 UTC
- **Last Updated**: August 05, 2024 at 08:30 UTC
- **Reserved Date**: June 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Arbitrary Redirect in echo-server.html in Seagate NAS OS version 4.3.15.1 allows attackers to disclose information in the Referer header via the 'state' URL parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.securityevaluators.com/invading-your-personal-cloud-ise-labs-exploits-the-seagate-stcr3000101-ecf89de2170) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31198
- **State**: PUBLISHED
- **Published Date**: September 18, 2024 at 13:59 UTC
- **Last Updated**: September 18, 2024 at 15:13 UTC
- **Reserved Date**: March 29, 2024 at 08:24 UTC
- **Assigned By**: Nozomi
### Vulnerability Description
Out-of-bounds Read vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routine fluid_msg::of10::Port:unpack.
This issue affects libfluid: 0.1.0.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Open Networking Foundation (ONF) - libfluid**
Affected versions:
- 0.1.0 (Status: affected)
### References
1. [](https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31198) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23937, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23937 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23937
- **State**: PUBLISHED
- **Published Date**: May 25, 2021 at 08:05 UTC
- **Last Updated**: August 03, 2024 at 19:14 UTC
- **Reserved Date**: January 13, 2021 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
A DNS proxy and possible amplification attack vulnerability in WebClientInfo of Apache Wicket allows an attacker to trigger arbitrary DNS lookups from the server when the X-Forwarded-For header is not properly sanitized. This DNS lookup can be engineered to overload an internal DNS server or to slow down request processing of the Apache Wicket application causing a possible denial of service on either the internal infrastructure or the web application itself. This issue affects Apache Wicket Apache Wicket 9.x version 9.2.0 and prior versions; Apache Wicket 8.x version 8.11.0 and prior versions; Apache Wicket 7.x version 7.17.0 and prior versions and Apache Wicket 6.x version 6.2.0 and later versions.
### Affected Products
**Apache Software Foundation - Apache Wicket**
Affected versions:
- Apache Wicket 9.x (Status: affected)
- Apache Wicket 8.x (Status: affected)
- Apache Wicket 7.x (Status: affected)
- 6.2.0 (Status: affected)
### References
1. [](https://lists.apache.org/thread.html/rc2ef22f90793e158cef65a7e370cdbca023c499d1403d65feeca870d%40%3Cusers.wicket.apache.org%3E)
2. [[wicket-announce] 20210526 Re: CVE-2021-23937: Apache Wicket: DNS proxy and possible amplification attack](https://lists.apache.org/thread.html/r127c0c1f3cb71e5bc619ad1e4b898b97c49758d1f20a54042966473e%40%3Cannounce.wicket.apache.org%3E)
3. [[wicket-users] 20210526 Re: CVE-2021-23937: Apache Wicket: DNS proxy and possible amplification attack](https://lists.apache.org/thread.html/r127c0c1f3cb71e5bc619ad1e4b898b97c49758d1f20a54042966473e%40%3Cusers.wicket.apache.org%3E)
4. [[wicket-dev] 20210526 Re: CVE-2021-23937: Apache Wicket: DNS proxy and possible amplification attack](https://lists.apache.org/thread.html/r8ccbd91b56ebf045d151bd4282bfeea7842a0698a0b76118fca8fe78%40%3Cdev.wicket.apache.org%3E)
### Credits
- Apache Wicket would like to thank Jonathan Juursema from Topicus.Healthcare for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3953, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3953
- **State**: PUBLISHED
- **Published Date**: August 01, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 18:48 UTC
- **Reserved Date**: August 01, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in usercp.php in MyBB (aka MyBulletinBoard) 1.x allows remote attackers to inject arbitrary web script or HTML via the gallery parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060729 [KAPDA::#53] MYBB XSS and Dir Traversal in usercp.php](http://www.securityfocus.com/archive/1/441534/100/0/threaded)
2. [19193](http://www.securityfocus.com/bid/19193)
3. [1319](http://securityreason.com/securityalert/1319) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20720
- **State**: PUBLISHED
- **Published Date**: April 16, 2020 at 15:48 UTC
- **Last Updated**: August 05, 2024 at 02:53 UTC
- **Reserved Date**: April 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by stored XSS. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D7800 before 1.0.1.47, R7500v2 before 1.0.3.38, R7800 before 1.0.2.52, R8900 before 1.0.4.12, R9000 before 1.0.4.12, WN2000RPTv3 before 1.0.1.32, WN3000RPv3 before 1.0.2.70, and WN3100RPv2 before 1.0.0.66.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000061208/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0174) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34660
- **State**: PUBLISHED
- **Published Date**: September 04, 2024 at 05:32 UTC
- **Last Updated**: September 04, 2024 at 12:48 UTC
- **Reserved Date**: May 07, 2024 at 04:43 UTC
- **Assigned By**: SamsungMobile
### Vulnerability Description
Heap-based out-of-bounds write in Samsung Notes prior to version 4.4.21.62 allows local attackers to execute arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L`
### Affected Products
**Samsung Mobile - Samsung Notes**
Affected versions:
- 4.4.21.62 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=09) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4011, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4011
- **State**: PUBLISHED
- **Published Date**: November 09, 2019 at 02:49 UTC
- **Last Updated**: August 07, 2024 at 06:45 UTC
- **Reserved Date**: November 19, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
dtc-xen 0.5.x before 0.5.4 suffers from a race condition where an attacker could potentially get a bash access as xenXX user on the dom0, and then access a potentially reuse an already opened VPS console.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2009-4011)
2. [](https://tracker.debian.org/media/packages/d/dtc-xen/changelog-0.5.17-1.1)
3. [](https://bugs.launchpad.net/ubuntu/+source/dtc-xen/+bug/505072) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49350, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49350 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49350
- **State**: PUBLISHED
- **Published Date**: May 29, 2025 at 19:18 UTC
- **Last Updated**: May 29, 2025 at 19:29 UTC
- **Reserved Date**: October 14, 2024 at 12:05 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**IBM - Db2 for Linux, UNIX and Windows**
Affected versions:
- 11.5.0 (Status: affected)
- 12.1.0 (Status: affected)
- 11.1.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7235069) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0442
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:49 UTC
- **Reserved Date**: June 07, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in dlvr_audit for Caldera OpenServer 5.0.5 and 5.0.6 allows local users to gain root privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4273](http://www.securityfocus.com/bid/4273)
2. [CSSA-2002-SCO.8](ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.8/CSSA-2002-SCO.8.txt)
3. [openserver-dlvraudit-bo(8442)](http://www.iss.net/security_center/static/8442.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1171, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1171 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1171
- **State**: PUBLISHED
- **Published Date**: March 05, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 08:08 UTC
- **Reserved Date**: March 05, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in the 123 Flash Chat Module for phpBB allow remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter to (1) 123flashchat.php and (2) phpbb_login_chat.php. NOTE: CVE disputes this issue because $phpbb_root_path is explicitly set to "./" in both programs
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20080228 123 Flash Chat Module for phpBB](http://www.securityfocus.com/archive/1/488914/100/0/threaded)
2. [20080305 false: 123 Flash Chat RFI](http://www.attrition.org/pipermail/vim/2008-March/001913.html)
3. [20080228 Re: 123 Flash Chat Module for phpBB](http://www.securityfocus.com/archive/1/488922/100/0/threaded)
4. [3716](http://securityreason.com/securityalert/3716) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3496, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3496 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3496
- **State**: PUBLISHED
- **Published Date**: June 14, 2024 at 04:13 UTC
- **Last Updated**: August 19, 2024 at 12:45 UTC
- **Reserved Date**: April 09, 2024 at 00:59 UTC
- **Assigned By**: Toshiba
### Vulnerability Description
Attackers can bypass the web login authentication process to gain access to the printer's system information and upload malicious drivers to the printer. As for the affected products/models/versions, see the reference URL.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-288: Security Weakness
### Affected Products
**Toshiba Tec Corporation - Toshiba Tec e-Studio multi-function peripheral (MFP)**
Affected versions:
- see the reference URL (Status: affected)
### References
1. [](https://www.toshibatec.com/information/20240531_01.html)
2. [](https://www.toshibatec.com/information/pdf/information20240531_01.pdf)
3. [](https://jvn.jp/en/vu/JVNVU97136265/index.html)
### Credits
- We expresses its gratitude to Zhenhua Huang, Harry Zhang and Minmin Li for reporting relevant security vulnerabilities for our products. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0987, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0987 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0987
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 15:13 UTC
- **Last Updated**: August 04, 2024 at 06:18 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory, aka 'Microsoft Graphics Component Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-0982, CVE-2020-1005.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 for Itanium-Based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected)
- 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected)
- 2012 (Status: affected)
- 2012 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0987)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-647/)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-20-876/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30142
- **State**: PUBLISHED
- **Published Date**: June 15, 2022 at 21:51 UTC
- **Last Updated**: January 02, 2025 at 19:02 UTC
- **Reserved Date**: May 03, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows File History Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows File History Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30142) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29632, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29632 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29632
- **State**: PUBLISHED
- **Published Date**: June 06, 2023 at 00:00 UTC
- **Last Updated**: January 08, 2025 at 15:45 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PrestaShop jmspagebuilder 3.x is vulnerable to SQL Injection via ajax_jmspagebuilder.php.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://friends-of-presta.github.io/security-advisories/modules/2023/03/13/jmspagebuilder.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10396, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10396 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10396
- **State**: PUBLISHED
- **Published Date**: September 12, 2019 at 13:55 UTC
- **Last Updated**: August 04, 2024 at 22:17 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Dashboard View Plugin 2.11 and earlier did not escape build descriptions, resulting in a cross-site scripting vulnerability exploitable by users able to change build descriptions.
### Affected Products
**Jenkins project - Jenkins Dashboard View Plugin**
Affected versions:
- 2.11 and earlier (Status: affected)
### References
1. [[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/09/12/2)
2. [](https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1489) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35972, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35972 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35972
- **State**: PUBLISHED
- **Published Date**: May 20, 2024 at 09:41 UTC
- **Last Updated**: May 04, 2025 at 09:09 UTC
- **Reserved Date**: May 17, 2024 at 13:50 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init()
If ulp = kzalloc() fails, the allocated edev will leak because it is
not properly assigned and the cleanup path will not be able to free it.
Fix it by assigning it properly immediately after allocation.
### Affected Products
**Linux - Linux**
Affected versions:
- 30343221132430c24b468493c861f71e2bad131f (Status: affected)
- 30343221132430c24b468493c861f71e2bad131f (Status: affected)
- 30343221132430c24b468493c861f71e2bad131f (Status: affected)
**Linux - Linux**
Affected versions:
- 6.3 (Status: affected)
- 0 (Status: unaffected)
- 6.6.28 (Status: unaffected)
- 6.8.7 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/c60ed825530b8c0cc2b524efd39b1d696ec54004)
2. [](https://git.kernel.org/stable/c/10a9d6a7513f93d7faffcb341af0aa42be8218fe)
3. [](https://git.kernel.org/stable/c/7ac10c7d728d75bc9daaa8fade3c7a3273b9a9ff) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2641, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2641 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2641
- **State**: PUBLISHED
- **Published Date**: May 30, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:58 UTC
- **Reserved Date**: May 30, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
** UNVERIFIABLE ** NOTE: this issue does not contain any verifiable or actionable details. Cross-site scripting (XSS) vulnerability in John Frank Asset Manager (AssetMan) 2.4a and earlier allows remote attackers to inject arbitrary web script or HTML via "any of its input." NOTE: the original disclosure is based on vague researcher claims without vendor acknowledgement; therefore this identifier cannot be linked with any future identifier that identifies more specific vectors. Perhaps this should not be included in CVE.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18131](http://www.securityfocus.com/bid/18131)
2. [ADV-2006-2023](http://www.vupen.com/english/advisories/2006/2023)
3. [20060523 Assetman <= 2.4a XSS](http://www.securityfocus.com/archive/1/435139/100/0/threaded)
4. [assetman-multiple-xss(26702)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26702)
5. [20285](http://secunia.com/advisories/20285)
6. [979](http://securityreason.com/securityalert/979) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-25073, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-25073 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-25073
- **State**: PUBLISHED
- **Published Date**: January 11, 2023 at 13:54 UTC
- **Last Updated**: August 05, 2024 at 12:33 UTC
- **Reserved Date**: January 11, 2023 at 13:53 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in Newcomer1989 TSN-Ranksystem up to 1.2.6 and classified as problematic. This vulnerability affects the function getlog of the file webinterface/bot.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.2.7 is able to address this issue. The patch is identified as b3a3cd8efe2cd3bd3c5b3b7abf2fe80dbee51b77. It is recommended to upgrade the affected component. VDB-218002 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Newcomer1989 - TSN-Ranksystem**
Affected versions:
- 1.2.0 (Status: affected)
- 1.2.1 (Status: affected)
- 1.2.2 (Status: affected)
- 1.2.3 (Status: affected)
- 1.2.4 (Status: affected)
- 1.2.5 (Status: affected)
- 1.2.6 (Status: affected)
### References
1. [](https://vuldb.com/?id.218002)
2. [](https://vuldb.com/?ctiid.218002)
3. [](https://github.com/Newcomer1989/TSN-Ranksystem/pull/467)
4. [](https://github.com/Newcomer1989/TSN-Ranksystem/commit/b3a3cd8efe2cd3bd3c5b3b7abf2fe80dbee51b77)
5. [](https://github.com/Newcomer1989/TSN-Ranksystem/releases/tag/1.2.7)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5311, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5311 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5311
- **State**: REJECTED
- **Published Date**: October 08, 2012 at 17:00 UTC
- **Last Updated**: October 16, 2012 at 09:00 UTC
- **Reserved Date**: October 08, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4622, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4622
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:42 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1233, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1233 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1233
- **State**: PUBLISHED
- **Published Date**: April 05, 2025 at 05:32 UTC
- **Last Updated**: April 07, 2025 at 14:11 UTC
- **Reserved Date**: February 11, 2025 at 14:28 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Lafka Plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'lafka_options_upload' AJAX function in all versions up to, and including, 7.1.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to update the theme option that overrides the site.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**AlThemist - Lafka Plugin**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/865b87a8-ab8a-4054-9e18-50693023cb96?source=cve)
2. [](https://themeforest.net/item/lafka-fast-food-restaurant-woocommerce-theme/23969682)
### Credits
- István Márton |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0271, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0271 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0271
- **State**: PUBLISHED
- **Published Date**: February 16, 2013 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 14:18 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The MXit protocol plugin in libpurple in Pidgin before 2.10.7 might allow remote attackers to create or overwrite files via a crafted (1) mxit or (2) mxit/imagestrips pathname.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2013:0388](http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html)
2. [USN-1746-1](http://www.ubuntu.com/usn/USN-1746-1)
3. [oval:org.mitre.oval:def:18386](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18386)
4. [](http://hg.pidgin.im/pidgin/main/rev/a8aef1d340f2)
5. [openSUSE-SU-2013:0405](http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html)
6. [](http://www.pidgin.im/news/security/?id=65) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1742
- **State**: PUBLISHED
- **Published Date**: March 27, 2019 at 23:35 UTC
- **Last Updated**: November 19, 2024 at 19:13 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web UI of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access sensitive configuration information. The vulnerability is due to improper access control to files within the web UI. An attacker could exploit this vulnerability by sending a malicious request to an affected device. A successful exploit could allow the attacker to gain access to sensitive configuration information.
### Weakness Classification (CWE)
- CWE-16: Security Weakness
### Affected Products
**Cisco - Cisco IOS XE Software**
Affected versions:
- 3.2.0JA (Status: affected)
- 16.3.1 (Status: affected)
- 16.3.2 (Status: affected)
- 16.3.3 (Status: affected)
- 16.3.1a (Status: affected)
- 16.3.4 (Status: affected)
- 16.3.5 (Status: affected)
- 16.3.5b (Status: affected)
- 16.3.6 (Status: affected)
- 16.4.1 (Status: affected)
- 16.4.2 (Status: affected)
- 16.4.3 (Status: affected)
- 16.5.1 (Status: affected)
- 16.5.1a (Status: affected)
- 16.5.1b (Status: affected)
- 16.5.2 (Status: affected)
- 16.5.3 (Status: affected)
- 16.6.1 (Status: affected)
- 16.6.2 (Status: affected)
- 16.6.3 (Status: affected)
- 16.7.1 (Status: affected)
- 16.7.1a (Status: affected)
- 16.7.1b (Status: affected)
### References
1. [20190327 Cisco IOS XE Software Information Disclosure Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-xeid)
2. [107600](http://www.securityfocus.com/bid/107600) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4353, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4353 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4353
- **State**: PUBLISHED
- **Published Date**: August 01, 2024 at 18:23 UTC
- **Last Updated**: January 17, 2025 at 21:55 UTC
- **Reserved Date**: April 30, 2024 at 16:08 UTC
- **Assigned By**: ConcreteCMS
### Vulnerability Description
Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored XSS vulnerability in the generate dashboard board
instance functionality. The Name input field does not check the input sufficiently letting a rogue administrator have the capability to inject malicious
JavaScript code. The Concrete CMS security team gave this vulnerability a CVSS v4 score of 4.6 with a vector of CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N. Concrete versions below 9 are not affected by this vulnerability.Thanks fhAnso for reporting. (CNA updated this risk rank on 17 Jan 2025 by lowering the AC based on CVSS 4.0 documentation that access privileges should not be considered for AC).
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Concrete CMS - Concrete CMS**
Affected versions:
- 9.0.0 (Status: affected)
### References
1. [](https://github.com/concretecms/concretecms/pull/12151)
2. [](https://documentation.concretecms.org/9-x/developers/introduction/version-history/933-release-notes)
### Credits
- fhAnso |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5589, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5589 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5589
- **State**: PUBLISHED
- **Published Date**: August 29, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 17:15 UTC
- **Reserved Date**: August 25, 2013 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
SQL injection vulnerability in cacti/host.php in Cacti 0.8.8b and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [54652](http://secunia.com/advisories/54652)
2. [DSA-2747](http://www.debian.org/security/2013/dsa-2747)
3. [](http://bugs.cacti.net/view.php?id=2383)
4. [openSUSE-SU-2015:0479](http://lists.opensuse.org/opensuse-updates/2015-03/msg00034.html)
5. [62005](http://www.securityfocus.com/bid/62005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20618, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20618 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20618
- **State**: PUBLISHED
- **Published Date**: January 14, 2021 at 08:20 UTC
- **Last Updated**: August 03, 2024 at 17:45 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Privilege chaining vulnerability in acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier allows remote attackers to bypass authentication and to gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vectors.
### Affected Products
**Seeds Co.,Ltd. - acmailer and acmailer DB**
Affected versions:
- acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier (Status: affected)
### References
1. [](https://www.acmailer.jp/info/de.cgi?id=101)
2. [](https://jvn.jp/en/jp/JVN35906450/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5184, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5184 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5184
- **State**: PUBLISHED
- **Published Date**: October 06, 2006 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 19:41 UTC
- **Reserved Date**: October 06, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in PKR Internet Taskjitsu before 2.0.6 allows remote attackers to execute arbitrary SQL commands via the key parameter, when the limit query parameter is set to customerid.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.pkrinternet.com/taskjitsu/task/3517)
2. [1016978](http://securitytracker.com/id?1016978)
3. [20332](http://www.securityfocus.com/bid/20332)
4. [22257](http://secunia.com/advisories/22257)
5. [](https://www.pkrinternet.com/download/RELEASE-NOTES.txt)
6. [ADV-2006-3903](http://www.vupen.com/english/advisories/2006/3903) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17453, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17453 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17453
- **State**: PUBLISHED
- **Published Date**: October 10, 2019 at 16:46 UTC
- **Last Updated**: August 05, 2024 at 01:40 UTC
- **Reserved Date**: October 10, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Bento4 1.5.1.0 has a NULL pointer dereference in AP4_DescriptorListWriter::Action in Core/Ap4Descriptor.h, related to AP4_IodsAtom::WriteFields in Core/Ap4IodsAtom.cpp, as demonstrated by mp4encrypt or mp4compact.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/axiomatic-systems/Bento4/issues/437)
2. [](https://github.com/axiomatic-systems/Bento4/issues/436) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35340, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35340
- **State**: REJECTED
- **Published Date**: July 11, 2022 at 19:34 UTC
- **Last Updated**: July 11, 2022 at 19:34 UTC
- **Reserved Date**: July 07, 2022 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48670, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48670
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 14:49 UTC
- **Last Updated**: May 04, 2025 at 08:20 UTC
- **Reserved Date**: February 25, 2024 at 13:44 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
peci: cpu: Fix use-after-free in adev_release()
When auxiliary_device_add() returns an error, auxiliary_device_uninit()
is called, which causes refcount for device to be decremented and
.release callback will be triggered.
Because adev_release() re-calls auxiliary_device_uninit(), it will cause
use-after-free:
[ 1269.455172] WARNING: CPU: 0 PID: 14267 at lib/refcount.c:28 refcount_warn_saturate+0x110/0x15
[ 1269.464007] refcount_t: underflow; use-after-free.
### Affected Products
**Linux - Linux**
Affected versions:
- 6523d3b2ffa238ac033c34a726617061d6a744aa (Status: affected)
- 6523d3b2ffa238ac033c34a726617061d6a744aa (Status: affected)
**Linux - Linux**
Affected versions:
- 5.18 (Status: affected)
- 0 (Status: unaffected)
- 5.19.10 (Status: unaffected)
- 6.0 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/c87f1f99e26ea4ae08cabe753ae98e5626bdba89)
2. [](https://git.kernel.org/stable/c/1c11289b34ab67ed080bbe0f1855c4938362d9cf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27427, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27427
- **State**: PUBLISHED
- **Published Date**: May 03, 2022 at 20:16 UTC
- **Last Updated**: April 16, 2025 at 16:25 UTC
- **Reserved Date**: February 19, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
RIOT OS version 2020.01.1 is vulnerable to integer wrap-around in its implementation of calloc function, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**RIOT OS - RIOT OS**
Affected versions:
- 2020.01.1 (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-119-04)
2. [](https://github.com/RIOT-OS/RIOT)
### Credits
- David Atch, Omri Ben Bassat, and Tamir Ariel from Microsoft Section 52, and the Azure Defender for IoT research group reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6694, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6694 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6694
- **State**: PUBLISHED
- **Published Date**: July 20, 2024 at 03:20 UTC
- **Last Updated**: August 01, 2024 at 21:41 UTC
- **Reserved Date**: July 11, 2024 at 15:06 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP Mail SMTP plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 4.0.1. This is due to plugin providing the SMTP password in the SMTP Password field when viewing the settings. This makes it possible for authenticated attackers, with administrative-level access and above, to view the SMTP password for the supplied server. Although this would not be useful for attackers in most cases, if an administrator account becomes compromised this could be useful information to an attacker in a limited environment.
### CVSS Metrics
- **CVSS Base Score**: 2.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-257: Security Weakness
### Affected Products
**smub - WP Mail SMTP by WPForms – The Most Popular SMTP and Email Log Plugin**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2d4e9daf-d414-4ace-9efd-4c3e16deeb8f?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3120454/wp-mail-smtp/trunk/src/Providers/OptionsAbstract.php)
### Credits
- Guus Verbeek |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51100, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51100 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51100
- **State**: PUBLISHED
- **Published Date**: December 26, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 22:32 UTC
- **Reserved Date**: December 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda W9 V1.0.0.7(4456)_CN was discovered to contain a command injection vulnerability via the function formGetDiagnoseInfo .
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/GD008/TENDA/blob/main/W9/W9_getDiagnoseInfo/W9_getDiagnoseInfo.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2523, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2523 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2523
- **State**: PUBLISHED
- **Published Date**: May 11, 2007 at 03:55 UTC
- **Last Updated**: August 07, 2024 at 13:42 UTC
- **Reserved Date**: May 08, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CA Anti-Virus for the Enterprise r8 and Threat Manager r8 before 20070510 use weak permissions (NULL security descriptor) for the Task Service shared file mapping, which allows local users to modify this mapping and gain privileges by triggering a stack-based buffer overflow in InoCore.dll before 8.0.448.0.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://supportconnectw.ca.com/public/antivirus/infodocs/caav-secnotice050807.asp)
2. [1018043](http://www.securitytracker.com/id?1018043)
3. [](http://blog.48bits.com/?p=103)
4. [ADV-2007-1750](http://www.vupen.com/english/advisories/2007/1750)
5. [23906](http://www.securityfocus.com/bid/23906)
6. [VU#788416](http://www.kb.cert.org/vuls/id/788416)
7. [34586](http://www.osvdb.org/34586)
8. [25202](http://secunia.com/advisories/25202)
9. [20070511 Computer Associates eTrust InoTask.exe Antivirus Buffer Overflow Vulnerability](http://www.securityfocus.com/archive/1/468306/100/0/threaded)
10. [20070509 Computer Associates eTrust InoTask.exe Antivirus Buffer Overflow Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=530)
11. [20050711 [CAID 35330, 35331]: CA Anti-Virus, CA Threat Manager, and CA Anti-Spyware Console Login and File Mapping Vulnerabilities](http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063275.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15007, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15007 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15007
- **State**: PUBLISHED
- **Published Date**: June 24, 2020 at 10:55 UTC
- **Last Updated**: August 04, 2024 at 13:00 UTC
- **Reserved Date**: June 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A buffer overflow in the M_LoadDefaults function in m_misc.c in id Tech 1 (aka Doom engine) allows arbitrary code execution via an unsafe usage of fscanf, because it does not limit the number of characters to be read in a format argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://twitter.com/notrevenant/status/1268654123903340544)
2. [](https://github.com/AXDOOMER/doom-vanille/commit/8a6d9a02fa991a91ff90ccdc73b5ceabaa6cb9ec) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5073, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5073 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5073
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: August 06, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4540, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4540 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4540
- **State**: PUBLISHED
- **Published Date**: February 04, 2020 at 16:45 UTC
- **Last Updated**: September 16, 2024 at 22:52 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Directory Server 6.4.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 165813.
### Affected Products
**IBM - Security Directory Server**
Affected versions:
- 6.4.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/1288660)
2. [ibm-sds-cve20194540-info-disc (165813)](https://exchange.xforce.ibmcloud.com/vulnerabilities/165813) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1151, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1151 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1151
- **State**: PUBLISHED
- **Published Date**: February 11, 2024 at 14:29 UTC
- **Last Updated**: November 24, 2024 at 13:35 UTC
- **Reserved Date**: February 01, 2024 at 11:25 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:5.14.0-503.11.1.el9_5 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:5.14.0-503.11.1.el9_5 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support**
Affected versions:
- 0:5.14.0-284.75.1.el9_2 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support**
Affected versions:
- 0:5.14.0-284.75.1.rt14.360.el9_2 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 9**
### References
1. [RHSA-2024:4823](https://access.redhat.com/errata/RHSA-2024:4823)
2. [RHSA-2024:4831](https://access.redhat.com/errata/RHSA-2024:4831)
3. [RHSA-2024:9315](https://access.redhat.com/errata/RHSA-2024:9315)
4. [](https://access.redhat.com/security/cve/CVE-2024-1151)
5. [RHBZ#2262241](https://bugzilla.redhat.com/show_bug.cgi?id=2262241)
6. [](https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/)
### Credits
- This issue was discovered by Aaron Conole (Red Hat). |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0113
- **State**: PUBLISHED
- **Published Date**: January 18, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 18:16 UTC
- **Reserved Date**: December 12, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0118.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-1397-1](http://www.ubuntu.com/usn/USN-1397-1)
2. [53372](http://secunia.com/advisories/53372)
3. [GLSA-201308-06](http://security.gentoo.org/glsa/glsa-201308-06.xml)
4. [48250](http://secunia.com/advisories/48250)
5. [](http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html)
6. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687)
7. [DSA-2429](http://www.debian.org/security/2012/dsa-2429) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1420, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1420 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1420
- **State**: PUBLISHED
- **Published Date**: October 01, 2018 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 17:47 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere Portal 7.0, 8.0, 8.5, and 9.0 resets access control settings to the out of the box configuration during Combined Cumulative Fix (CF) installation. This can lead to security miss-configuration of the installation. IBM X-Force ID: 138950.
### Affected Products
**IBM - WebSphere Portal**
Affected versions:
- 7.0 (Status: affected)
- 8.0 (Status: affected)
- 8.5 (Status: affected)
- 9.0 (Status: affected)
### References
1. [ibm-websphere-cve20181420-improper-access(138950)](https://exchange.xforce.ibmcloud.com/vulnerabilities/138950)
2. [](https://www.ibm.com/support/docview.wss?uid=swg22014276)
3. [1041767](http://www.securitytracker.com/id/1041767) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4031, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4031
- **State**: PUBLISHED
- **Published Date**: April 28, 2025 at 18:00 UTC
- **Last Updated**: April 28, 2025 at 18:53 UTC
- **Reserved Date**: April 28, 2025 at 05:53 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/aboutus.php. The manipulation of the argument pagetitle leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Pre-School Enrollment System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-306394 | PHPGurukul Pre-School Enrollment System aboutus.php sql injection](https://vuldb.com/?id.306394)
2. [VDB-306394 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.306394)
3. [Submit #559221 | phpgurukul Pre-School Enrollment System v1.0 SQL Injection](https://vuldb.com/?submit.559221)
4. [](https://github.com/tailin1122/myCVE/issues/1)
5. [](https://phpgurukul.com/)
### Credits
- firefly (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32485, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32485 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32485
- **State**: PUBLISHED
- **Published Date**: October 12, 2022 at 19:25 UTC
- **Last Updated**: May 16, 2025 at 13:45 UTC
- **Reserved Date**: June 06, 2022 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Dell - CPG BIOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/000203758) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12651, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12651 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12651
- **State**: PUBLISHED
- **Published Date**: September 25, 2019 at 20:10 UTC
- **Last Updated**: November 21, 2024 at 19:14 UTC
- **Reserved Date**: June 04, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based user interface (Web UI) of Cisco IOS XE Software could allow an authenticated, remote attacker to execute commands with elevated privileges on the affected device. For more information about these vulnerabilities, see the Details section of this advisory.
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Cisco - Cisco IOS XE Software 3.2.11aSG**
Affected versions:
- unspecified (Status: affected)
### References
1. [20190925 Cisco IOS XE Software Web UI Command Injection Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-webui-cmd-injection) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50171, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50171 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50171
- **State**: PUBLISHED
- **Published Date**: November 07, 2024 at 09:31 UTC
- **Last Updated**: May 04, 2025 at 09:47 UTC
- **Reserved Date**: October 21, 2024 at 19:36 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: systemport: fix potential memory leak in bcm_sysport_xmit()
The bcm_sysport_xmit() returns NETDEV_TX_OK without freeing skb
in case of dma_map_single() fails, add dev_kfree_skb() to fix it.
### Affected Products
**Linux - Linux**
Affected versions:
- 80105befdb4b8cea924711b40b2462b87df65b62 (Status: affected)
- 80105befdb4b8cea924711b40b2462b87df65b62 (Status: affected)
- 80105befdb4b8cea924711b40b2462b87df65b62 (Status: affected)
- 80105befdb4b8cea924711b40b2462b87df65b62 (Status: affected)
- 80105befdb4b8cea924711b40b2462b87df65b62 (Status: affected)
- 80105befdb4b8cea924711b40b2462b87df65b62 (Status: affected)
- 80105befdb4b8cea924711b40b2462b87df65b62 (Status: affected)
- 80105befdb4b8cea924711b40b2462b87df65b62 (Status: affected)
**Linux - Linux**
Affected versions:
- 3.16 (Status: affected)
- 0 (Status: unaffected)
- 4.19.323 (Status: unaffected)
- 5.4.285 (Status: unaffected)
- 5.10.229 (Status: unaffected)
- 5.15.170 (Status: unaffected)
- 6.1.115 (Status: unaffected)
- 6.6.59 (Status: unaffected)
- 6.11.6 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/8e81ce7d0166a2249deb6d5e42f28a8b8c9ea72f)
2. [](https://git.kernel.org/stable/c/31701ef0c4547973991ff63596c927f841dfd133)
3. [](https://git.kernel.org/stable/c/b6321146773dcbbc372a54dbada67e0b50e0a25c)
4. [](https://git.kernel.org/stable/c/5febfc545389805ce83d37f9f4317055b26dd7d7)
5. [](https://git.kernel.org/stable/c/533d2f30aef272dade17870a509521c3afc38a03)
6. [](https://git.kernel.org/stable/c/4b70478b984af3c9d0279c121df5ff94e2533dbd)
7. [](https://git.kernel.org/stable/c/7d5030a819c3589cf9948b1eee397b626ec590f5)
8. [](https://git.kernel.org/stable/c/c401ed1c709948e57945485088413e1bb5e94bd1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0386, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0386 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0386
- **State**: PUBLISHED
- **Published Date**: March 03, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 16:34 UTC
- **Reserved Date**: January 24, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FileVault in Mac OS X 10.4.5 and earlier does not properly mount user directories when creating a FileVault image, which allows local users to access protected files when FileVault is enabled.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19064](http://secunia.com/advisories/19064)
2. [23642](http://www.osvdb.org/23642)
3. [16907](http://www.securityfocus.com/bid/16907)
4. [ADV-2006-0791](http://www.vupen.com/english/advisories/2006/0791)
5. [APPLE-SA-2006-03-01](http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html)
6. [macosx-filevault-file-access(25024)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25024)
7. [TA06-062A](http://www.us-cert.gov/cas/techalerts/TA06-062A.html)
8. [](http://docs.info.apple.com/article.html?artnum=303382) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3352, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3352 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3352
- **State**: PUBLISHED
- **Published Date**: October 21, 2020 at 18:36 UTC
- **Last Updated**: November 13, 2024 at 17:48 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to access hidden commands. The vulnerability is due to the presence of undocumented configuration commands. An attacker could exploit this vulnerability by performing specific steps that make the hidden commands accessible. A successful exploit could allow the attacker to make configuration changes to various sections of an affected device that should not be exposed to CLI access.
### Weakness Classification (CWE)
- CWE-912: Security Weakness
### Affected Products
**Cisco - Cisco Firepower Threat Defense Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20201021 Cisco Firepower Threat Defense Software Hidden Commands Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-hidcmd-pFDeWVBd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2310, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2310
- **State**: PUBLISHED
- **Published Date**: June 09, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 23:24 UTC
- **Reserved Date**: February 09, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
General Electric (GE) Multilink ML800, ML1200, ML1600, and ML2400 switches with firmware before 5.5.0 and ML810, ML3000, and ML3100 switches with firmware before 5.5.0k have hardcoded credentials, which allows remote attackers to modify configuration settings via the web interface.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-154-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29363, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29363 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29363
- **State**: PUBLISHED
- **Published Date**: May 12, 2022 at 17:15 UTC
- **Last Updated**: August 03, 2024 at 06:17 UTC
- **Reserved Date**: April 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Phpok v6.1 was discovered to contain a deserialization vulnerability via the update_f() function in login_control.php. This vulnerability allows attackers to getshell via writing arbitrary files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/qinggan/phpok/issues/12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18320, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18320 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18320
- **State**: PUBLISHED
- **Published Date**: January 03, 2019 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 21:20 UTC
- **Reserved Date**: June 15, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
QSEE unload attempt on a 3rd party TEE without previously loading results in a data abort in snapdragon automobile and snapdragon mobile in versions MSM8996AU, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 810, SD 820, SD 820A, SD 835, SDA660, SDM439, SDM630, SDM660, SDX24, Snapdragon_High_Med_2016, SXR1130.
### Affected Products
**Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile**
Affected versions:
- MSM8996AU, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 810, SD 820, SD 820A, SD 835, SDA660, SDM439, SDM630, SDM660, SDX24, Snapdragon_High_Med_2016, SXR1130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins)
2. [106128](http://www.securityfocus.com/bid/106128) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1899, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1899 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1899
- **State**: PUBLISHED
- **Published Date**: April 04, 2013 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 15:20 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.postgresql.org/docs/current/static/release-9-2-4.html)
2. [](http://www.postgresql.org/about/news/1456/)
3. [openSUSE-SU-2013:0628](http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html)
4. [openSUSE-SU-2013:0635](http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html)
5. [](http://www.postgresql.org/support/security/faq/2013-04-04/)
6. [MDVSA-2013:142](http://www.mandriva.com/security/advisories?name=MDVSA-2013:142)
7. [](http://support.apple.com/kb/HT5892)
8. [](http://www.postgresql.org/docs/current/static/release-9-0-13.html)
9. [USN-1789-1](http://www.ubuntu.com/usn/USN-1789-1)
10. [APPLE-SA-2013-09-12-1](http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html)
11. [FEDORA-2013-6148](http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html)
12. [APPLE-SA-2013-09-17-1](http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html)
13. [](http://www.postgresql.org/docs/current/static/release-9-1-9.html)
14. [SUSE-SU-2013:0633](http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html)
15. [DSA-2658](http://www.debian.org/security/2013/dsa-2658)
16. [openSUSE-SU-2013:0627](http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html)
17. [FEDORA-2013-5000](http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html)
18. [](http://support.apple.com/kb/HT5880) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8748
- **State**: PUBLISHED
- **Published Date**: February 03, 2016 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 08:29 UTC
- **Reserved Date**: January 06, 2016 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
Radicale before 1.1 allows remote authenticated users to bypass owner_write and owner_only limitations via regex metacharacters in the user name, as demonstrated by ".*".
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [80255](http://www.securityfocus.com/bid/80255)
2. [[oss-security] 20160105 CVE request for radicale](http://www.openwall.com/lists/oss-security/2016/01/05/7)
3. [](https://github.com/Kozea/Radicale/pull/341)
4. [DSA-3462](http://www.debian.org/security/2016/dsa-3462)
5. [FEDORA-2016-cf9e2429b5](http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175776.html)
6. [[oss-security] 20160106 Re: CVE request for radicale](http://www.openwall.com/lists/oss-security/2016/01/06/4)
7. [](https://github.com/Unrud/Radicale/commit/4bfe7c9f7991d534c8b9fbe153af9d341f925f98)
8. [FEDORA-2016-f048c43393](http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175738.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13943, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13943 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13943
- **State**: PUBLISHED
- **Published Date**: December 12, 2019 at 19:08 UTC
- **Last Updated**: August 05, 2024 at 00:05 UTC
- **Reserved Date**: July 18, 2019 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). The web interface could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify content of particular web pages, causing the application to behave in unexpected ways for legitimate users. Successful exploitation does not require for an attacker to be authenticated to the web interface. This could allow the attacker to read or modify contents of the web application. At the time of advisory publication no public exploitation of this security. vulnerability was known.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Siemens AG - EN100 Ethernet module DNP3 variant**
Affected versions:
- All versions (Status: affected)
**Siemens AG - EN100 Ethernet module IEC 61850 variant**
Affected versions:
- All versions < V4.37 (Status: affected)
**Siemens AG - EN100 Ethernet module IEC104 variant**
Affected versions:
- All versions (Status: affected)
**Siemens AG - EN100 Ethernet module Modbus TCP variant**
Affected versions:
- All versions (Status: affected)
**Siemens AG - EN100 Ethernet module PROFINET IO variant**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-418979.pdf)
2. [](https://www.us-cert.gov/ics/advisories/icsa-19-344-07) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2588, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2588
- **State**: REJECTED
- **Published Date**: August 08, 2022 at 18:52 UTC
- **Last Updated**: August 08, 2022 at 18:52 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-2185, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-2185 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2185
- **State**: PUBLISHED
- **Published Date**: November 16, 2005 at 21:17 UTC
- **Last Updated**: August 08, 2024 at 03:51 UTC
- **Reserved Date**: November 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2006:0140](http://www.redhat.com/support/errata/RHSA-2006-0140.html)
2. [18684](http://secunia.com/advisories/18684)
3. [igmp-spoofed-report-dos(9436)](https://exchange.xforce.ibmcloud.com/vulnerabilities/9436)
4. [oval:org.mitre.oval:def:10736](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10736)
5. [20020901-01-A](ftp://patches.sgi.com/support/free/security/advisories/20020901-01-A)
6. [RHSA-2006:0101](http://www.redhat.com/support/errata/RHSA-2006-0101.html)
7. [FLSA:157459-2](http://www.securityfocus.com/archive/1/428058/100/0/threaded)
8. [FLSA:157459-4](http://www.securityfocus.com/archive/1/427981/100/0/threaded)
9. [5020](http://www.securityfocus.com/bid/5020)
10. [20020614 IGMP denial of service vulnerability](http://online.securityfocus.com/archive/1/276968)
11. [RHSA-2006:0190](http://www.redhat.com/support/errata/RHSA-2006-0190.html)
12. [18510](http://secunia.com/advisories/18510)
13. [FLSA:157459-1](http://www.securityfocus.com/archive/1/428028/100/0/threaded)
14. [](http://www.cs.ucsb.edu/~krishna/igmp_dos/)
15. [FLSA:157459-3](http://www.securityfocus.com/archive/1/427980/100/0/threaded)
16. [RHSA-2006:0191](http://www.redhat.com/support/errata/RHSA-2006-0191.html)
17. [18562](http://secunia.com/advisories/18562) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7986, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7986 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7986
- **State**: PUBLISHED
- **Published Date**: August 23, 2024 at 11:51 UTC
- **Last Updated**: August 28, 2024 at 16:21 UTC
- **Reserved Date**: August 19, 2024 at 20:06 UTC
- **Assigned By**: Rockwell
### Vulnerability Description
A vulnerability exists in the Rockwell Automation ThinManager® ThinServer that allows a threat actor to disclose sensitive information. A threat actor can exploit this vulnerability by abusing the ThinServer™ service to read arbitrary files by creating a junction that points to the target directory.
### Weakness Classification (CWE)
- CWE-732: Security Weakness
### Affected Products
**Rockwell Automation - ThinManager® ThinServer™**
Affected versions:
- 11.1.0-11.1.7 11.2.0-11.2.8 12.0.0-12.0.6 12.1.0-12.1.7 13.0.0-13.0.4 13.1.0-13.1.2 13.2.0-13.2.1 (Status: affected)
### References
1. [](https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1692.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-20349, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-20349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-20349
- **State**: PUBLISHED
- **Published Date**: September 01, 2021 at 21:25 UTC
- **Last Updated**: August 04, 2024 at 14:22 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WTCMS 1.0 contains a stored cross-site scripting (XSS) vulnerability in the link address field under the background links module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/taosir/wtcms/issues/11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17102, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17102 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17102
- **State**: PUBLISHED
- **Published Date**: September 16, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 10:39 UTC
- **Reserved Date**: September 16, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in QuickAppsCMS (aka QACMS) through 2.0.0-beta2. A CSRF vulnerability can change the administrator password via the user/me URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/quickapps/cms/issues/187)
2. [](https://github.com/quickapps/cms/issues/199) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4497, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4497 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4497
- **State**: PUBLISHED
- **Published Date**: December 14, 2022 at 21:50 UTC
- **Last Updated**: April 17, 2025 at 20:06 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Spectrum Protect Plus 10.1.0 through 10.1.12 discloses sensitive information due to unencrypted data being used in the communication flow between Spectrum Protect Plus vSnap and its agents. An attacker could obtain information using main in the middle techniques. IBM X-Force ID: 182106.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-319: Security Weakness
### Affected Products
**IBM - Spectrum Protect Plus**
Affected versions:
- 10.1.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6847627)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/182106) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4373, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4373 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4373
- **State**: PUBLISHED
- **Published Date**: October 01, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 10:17 UTC
- **Reserved Date**: October 01, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in job_seeker/applynow.php in AvailScript Job Portal Script allows remote attackers to execute arbitrary SQL commands via the jid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4332](http://securityreason.com/securityalert/4332)
2. [6417](https://www.exploit-db.com/exploits/6417)
3. [31101](http://www.securityfocus.com/bid/31101)
4. [jobsportal-applynow-sql-injection(45041)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45041) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0720
- **State**: PUBLISHED
- **Published Date**: September 12, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:05 UTC
- **Reserved Date**: September 02, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in PINE before 4.58 allows remote attackers to execute arbitrary code via a malformed message/external-body MIME type.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2003:274](http://www.redhat.com/support/errata/RHSA-2003-274.html)
2. [20030910 iDEFENSE Security Advisory 09.10.03: Two Exploitable Overflows in PINE](http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0099.html)
3. [20030911 [slackware-security] security issues in pine (SSA:2003-253-01)](http://marc.info/?l=bugtraq&m=106329356702508&w=2)
4. [RHSA-2003:273](http://www.redhat.com/support/errata/RHSA-2003-273.html)
5. [oval:org.mitre.oval:def:499](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A499)
6. [](http://www.idefense.com/advisory/09.10.03.txt)
7. [20030910 iDEFENSE Security Advisory 09.10.03: Two Exploitable Overflows in PINE](http://marc.info/?l=bugtraq&m=106322571805153&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1213, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1213 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1213
- **State**: PUBLISHED
- **Published Date**: April 01, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 05:04 UTC
- **Reserved Date**: March 31, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in attachment.cgi in Bugzilla 3.2 before 3.2.3, 3.3 before 3.3.4, and earlier versions allows remote attackers to hijack the authentication of arbitrary users for requests that use attachment editing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2009-3405](https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00188.html)
2. [ADV-2009-0887](http://www.vupen.com/english/advisories/2009/0887)
3. [bugzilla-attachment-csrf(49524)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49524)
4. [](http://www.bugzilla.org/security/3.2.2/)
5. [34545](http://secunia.com/advisories/34545)
6. [](https://bugzilla.mozilla.org/show_bug.cgi?id=476603)
7. [34308](http://www.securityfocus.com/bid/34308)
8. [34547](http://secunia.com/advisories/34547)
9. [FEDORA-2009-3410](https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00191.html)
10. [34624](http://secunia.com/advisories/34624) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31462
- **State**: PUBLISHED
- **Published Date**: April 12, 2024 at 21:41 UTC
- **Last Updated**: August 02, 2024 at 01:52 UTC
- **Reserved Date**: April 03, 2024 at 17:55 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
stable-diffusion-webui is a web interface for Stable Diffusion, implemented using Gradio library. Stable-diffusion-webui 1.7.0 is vulnerable to a limited file write affecting Windows systems. The create_ui method (Backup/Restore tab) in modules/ui_extensions.py takes user input into the config_save_name variable on line 653. This user input is later used in the save_config_state method and used to create a file path on line 65, which is afterwards opened for writing on line 67, which leads to a limited file write exploitable on Windows systems. This issue may lead to limited file write. It allows for writing json files anywhere on the server where the web server has access.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**AUTOMATIC1111 - stable-diffusion-webui**
Affected versions:
- <= 1.8.0 (Status: affected)
### References
1. [https://securitylab.github.com/advisories/GHSL-2024-010_stable-diffusion-webui/](https://securitylab.github.com/advisories/GHSL-2024-010_stable-diffusion-webui/)
2. [https://github.com/AUTOMATIC1111/stable-diffusion-webui/commit/d9708c92b444894bce8070e4dcfaa093f8eb8d43](https://github.com/AUTOMATIC1111/stable-diffusion-webui/commit/d9708c92b444894bce8070e4dcfaa093f8eb8d43)
3. [https://github.com/AUTOMATIC1111/stable-diffusion-webui/blob/cf2772fab0af5573da775e7437e6acdca424f26e/modules/ui_extensions.py#L59](https://github.com/AUTOMATIC1111/stable-diffusion-webui/blob/cf2772fab0af5573da775e7437e6acdca424f26e/modules/ui_extensions.py#L59)
4. [https://github.com/AUTOMATIC1111/stable-diffusion-webui/blob/cf2772fab0af5573da775e7437e6acdca424f26e/modules/ui_extensions.py#L646-L660](https://github.com/AUTOMATIC1111/stable-diffusion-webui/blob/cf2772fab0af5573da775e7437e6acdca424f26e/modules/ui_extensions.py#L646-L660)
5. [https://github.com/AUTOMATIC1111/stable-diffusion-webui/blob/cf2772fab0af5573da775e7437e6acdca424f26e/modules/ui_extensions.py#L65](https://github.com/AUTOMATIC1111/stable-diffusion-webui/blob/cf2772fab0af5573da775e7437e6acdca424f26e/modules/ui_extensions.py#L65)
6. [https://github.com/AUTOMATIC1111/stable-diffusion-webui/blob/cf2772fab0af5573da775e7437e6acdca424f26e/modules/ui_extensions.py#L653](https://github.com/AUTOMATIC1111/stable-diffusion-webui/blob/cf2772fab0af5573da775e7437e6acdca424f26e/modules/ui_extensions.py#L653)
7. [https://github.com/AUTOMATIC1111/stable-diffusion-webui/blob/cf2772fab0af5573da775e7437e6acdca424f26e/modules/ui_extensions.py#L67](https://github.com/AUTOMATIC1111/stable-diffusion-webui/blob/cf2772fab0af5573da775e7437e6acdca424f26e/modules/ui_extensions.py#L67)
8. [https://github.com/AUTOMATIC1111/stable-diffusion-webui/blob/v1.7.0/modules/ui_extensions.py](https://github.com/AUTOMATIC1111/stable-diffusion-webui/blob/v1.7.0/modules/ui_extensions.py)
9. [https://github.com/AUTOMATIC1111/stable-diffusion-webui/discussions/15461](https://github.com/AUTOMATIC1111/stable-diffusion-webui/discussions/15461)
10. [https://securitylab.github.com/advisories/GHSL-2024-010_stable-diffusion-webui](https://securitylab.github.com/advisories/GHSL-2024-010_stable-diffusion-webui) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44109, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44109 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44109
- **State**: PUBLISHED
- **Published Date**: April 05, 2022 at 01:22 UTC
- **Last Updated**: August 04, 2024 at 04:10 UTC
- **Reserved Date**: November 22, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A buffer overflow in lib/sbi/message.c in Open5GS 2.3.6 and earlier allows remote attackers to Denial of Service via a crafted sbi request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/open5gs/open5gs/issues/1247)
2. [](https://github.com/open5gs/open5gs/commit/d919b2744cd05abae043490f0a3dd1946c1ccb8c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2345
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: March 18, 2015 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3307, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3307 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3307
- **State**: PUBLISHED
- **Published Date**: June 18, 2023 at 08:31 UTC
- **Last Updated**: August 02, 2024 at 06:48 UTC
- **Reserved Date**: June 18, 2023 at 07:06 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in miniCal 1.0.0. It has been rated as critical. This issue affects some unknown processing of the file /booking/show_bookings/. The manipulation of the argument search_query leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231803. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**n/a - miniCal**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.231803)
2. [](https://vuldb.com/?ctiid.231803)
3. [](https://github.com/ctflearner/Vulnerability/blob/main/MINICAL/minical.md)
### Credits
- Affan (VulDB User) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.