System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26096, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26096 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26096 - **State**: PUBLISHED - **Published Date**: April 11, 2022 at 19:37 UTC - **Last Updated**: August 03, 2024 at 04:56 UTC - **Reserved Date**: February 24, 2022 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Null pointer dereference vulnerability in parser_ispe function in libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds write by remote attacker. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - Q(10), R(11), S(12) (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8185, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8185 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8185 - **State**: PUBLISHED - **Published Date**: November 22, 2017 at 19:00 UTC - **Last Updated**: September 17, 2024 at 01:15 UTC - **Reserved Date**: April 25, 2017 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description ME906s-158 earlier than ME906S_Installer_13.1805.10.3 versions has a privilege elevation vulnerability. An attacker could exploit this vulnerability to modify the configuration information containing malicious files and trick users into executing the files, resulting in the execution of arbitrary code. ### Affected Products **Huawei Technologies Co., Ltd. - ME906s-158** Affected versions: - Earlier than ME906S_Installer_13.1805.10.3 versions (Status: affected) ### References 1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170927-01-me906s-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31009, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31009 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31009 - **State**: PUBLISHED - **Published Date**: August 24, 2021 at 18:51 UTC - **Last Updated**: August 03, 2024 at 22:48 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Multiple issues were addressed by removing HDF5. This issue is fixed in iOS 15.2 and iPadOS 15.2, macOS Monterey 12.1. Multiple issues in HDF5. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT212976) 2. [](https://support.apple.com/en-us/HT212978)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12302, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12302 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12302 - **State**: PUBLISHED - **Published Date**: January 06, 2025 at 06:00 UTC - **Last Updated**: January 06, 2025 at 13:37 UTC - **Reserved Date**: December 06, 2024 at 14:45 UTC - **Assigned By**: WPScan ### Vulnerability Description The Icegram Engage WordPress plugin before 3.1.32 does not sanitise and escape some of its Campaign settings, which could allow authors and above to perform Stored Cross-Site Scripting attacks ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Icegram Engage** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/ed860dac-8c4a-482f-8826-31f1a894b6ce/) ### Credits - Dmitrii Ignatyev - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33034, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33034 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33034 - **State**: PUBLISHED - **Published Date**: May 14, 2021 at 22:57 UTC - **Last Updated**: August 03, 2024 at 23:42 UTC - **Reserved Date**: May 14, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1) 2. [](https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl) 3. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3) 4. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4) 5. [FEDORA-2021-bae582b42c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GI7Z7UBWBGD3ABNIL2DC7RQDCGA4UVQW/) 6. [[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update](https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html) 7. [[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update](https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21753, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21753 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21753 - **State**: PUBLISHED - **Published Date**: June 06, 2022 at 17:38 UTC - **Last Updated**: August 03, 2024 at 02:53 UTC - **Reserved Date**: November 26, 2021 at 00:00 UTC - **Assigned By**: MediaTek ### Vulnerability Description In WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06493873; Issue ID: ALPS06493899. ### Affected Products **MediaTek, Inc. - MT6580, MT6735, MT6739, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8167S, MT8168, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8667, MT8675, MT8695, MT8696, MT8766, MT8768, MT8786, MT8788, MT8789, MT8797** Affected versions: - Android 11.0, 12.0 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/June-2022)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-35848, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-35848 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-35848 - **State**: PUBLISHED - **Published Date**: December 30, 2020 at 00:39 UTC - **Last Updated**: August 04, 2024 at 17:16 UTC - **Reserved Date**: December 30, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php newpassword function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://getcockpit.com/) 2. [](https://github.com/agentejo/cockpit/commit/79fc9631ffa29146e3124ceaf99879b92e1ef24b) 3. [](https://github.com/agentejo/cockpit/commit/33e7199575631ba1f74cba6b16b10c820bec59af) 4. [](https://github.com/agentejo/cockpit/commit/2a385af8d80ed60d40d386ed813c1039db00c466) 5. [](http://packetstormsecurity.com/files/163762/Cockpit-CMS-0.11.1-NoSQL-Injection.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0378, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0378 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0378 - **State**: PUBLISHED - **Published Date**: January 21, 2015 at 18:00 UTC - **Last Updated**: August 06, 2024 at 04:10 UTC - **Reserved Date**: December 17, 2014 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to Libc. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1031583](http://www.securitytracker.com/id/1031583) 2. [72147](http://www.securityfocus.com/bid/72147) 3. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html) 4. [oracle-cpujan2015-cve20150378(100174)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100174)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38023, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38023 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38023 - **State**: PUBLISHED - **Published Date**: December 30, 2023 at 00:00 UTC - **Last Updated**: November 20, 2024 at 17:42 UTC - **Reserved Date**: July 11, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in SCONE Confidential Computing Platform before 5.8.0 for Intel SGX. Lack of pointer-alignment logic in __scone_dispatch and other entry functions allows a local attacker to access unauthorized information, aka an "AEPIC Leak." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sconedocs.github.io/release5.7/) 2. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html) 3. [](https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#inpage-nav-3-2-2) 4. [](https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/stale-data-read-from-xapic.html) 5. [](https://github.com/openenclave/openenclave/security/advisories/GHSA-v3vm-9h66-wm76) 6. [](https://sconedocs.github.io/release5.8/) 7. [](https://jovanbulck.github.io/files/oakland24-pandora.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0775, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0775 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0775 - **State**: PUBLISHED - **Published Date**: September 21, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:28 UTC - **Reserved Date**: September 19, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in RobTex Viking server earlier than 1.06-370 allows remote attackers to cause a denial of service or execute arbitrary commands via a long HTTP GET request, or long Unless-Modified-Since, If-Range, or If-Modified-Since headers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1614](http://www.securityfocus.com/bid/1614) 2. [](http://www.robtex.com/viking/bugs.htm) 3. [20000828 [NT] Viking security vulnerabilities enable remote code execution (long URL, date parsing)](http://www.securityfocus.com/templates/archive.pike?list=1&msg=399a01c01122%240d7f2310%240201a8c0%40aviram)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9010, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9010 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9010 - **State**: PUBLISHED - **Published Date**: March 25, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 07:10 UTC - **Reserved Date**: March 25, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Intelbras TELEFONE IP TIP200/200 LITE 60.0.75.29 devices allow remote authenticated admins to read arbitrary files via the /cgi-bin/cgiServer.exx page parameter, aka absolute path traversal. In some cases, authentication can be achieved via the admin account with its default admin password. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [44317](https://www.exploit-db.com/exploits/44317/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-41231, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-41231 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-41231 - **State**: PUBLISHED - **Published Date**: May 20, 2025 at 12:54 UTC - **Last Updated**: May 20, 2025 at 13:21 UTC - **Reserved Date**: April 16, 2025 at 09:29 UTC - **Assigned By**: vmware ### Vulnerability Description VMware Cloud Foundation contains a missing authorisation vulnerability. A malicious actor with access to VMware Cloud Foundation appliance may be able to perform certain unauthorised actions and access limited sensitive information. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L` ### Affected Products **n/a - VMware Cloud Foundation** Affected versions: - 5.x (Status: affected) - 4.5.x (Status: affected) ### References 1. [](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25733)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20841, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20841 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20841 - **State**: PUBLISHED - **Published Date**: August 10, 2022 at 08:10 UTC - **Last Updated**: November 01, 2024 at 18:55 UTC - **Reserved Date**: November 02, 2021 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. ### CVSS Metrics - **CVSS Base Score**: 9/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **Cisco - Cisco Small Business RV Series Router Firmware** Affected versions: - n/a (Status: affected) ### References 1. [20220803 Cisco Small Business RV Series Routers Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9561, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9561 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9561 - **State**: PUBLISHED - **Published Date**: October 06, 2024 at 22:31 UTC - **Last Updated**: October 07, 2024 at 13:48 UTC - **Reserved Date**: October 06, 2024 at 10:07 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01 BETA. This affects the function formSetWAN_Wizard51/formSetWAN_Wizard52. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **D-Link - DIR-605L** Affected versions: - 2.13B01 BETA (Status: affected) ### References 1. [VDB-279369 | D-Link DIR-605L formSetWAN_Wizard52 buffer overflow](https://vuldb.com/?id.279369) 2. [VDB-279369 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.279369) 3. [Submit #413920 | D-Link DIR-605L 2.13B01 BETA Buffer Overflow](https://vuldb.com/?submit.413920) 4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetWAN_Wizard.md) 5. [](https://www.dlink.com/) ### Credits - wxhwxhwxh_tutu (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-20789, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-20789 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-20789 - **State**: PUBLISHED - **Published Date**: August 14, 2024 at 14:55 UTC - **Last Updated**: August 16, 2024 at 04:01 UTC - **Reserved Date**: December 04, 2023 at 16:52 UTC - **Assigned By**: adobe ### Vulnerability Description Dimension versions 3.4.11 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Adobe - Dimension** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/dimension/apsb24-47.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2576, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2576 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2576 - **State**: PUBLISHED - **Published Date**: November 28, 2005 at 23:00 UTC - **Last Updated**: August 08, 2024 at 01:29 UTC - **Reserved Date**: November 28, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description class.vfs_dav.inc.php in phpGroupWare 0.9.16.000 does not create .htaccess files to enable authorization checks for access to users' home-directory files, which allows remote attackers to obtain sensitive information from these files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [7617](http://www.osvdb.org/7617) 2. [phpgroupware-classvfsdavinc-security-bypass(19195)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19195) 3. [](https://savannah.gnu.org/bugs/?func=detailitem&item_id=8359)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-9688, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-9688 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-9688 - **State**: PUBLISHED - **Published Date**: March 11, 2019 at 16:00 UTC - **Last Updated**: August 04, 2024 at 21:54 UTC - **Reserved Date**: March 11, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description sftnow through 2018-12-29 allows index.php?g=Admin&m=User&a=add_post CSRF to add an admin account. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/forgeekscn/sftnow/issues/6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11802, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11802 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11802 - **State**: PUBLISHED - **Published Date**: October 13, 2017 at 13:00 UTC - **Last Updated**: September 17, 2024 at 01:46 UTC - **Reserved Date**: July 31, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821. ### Affected Products **Microsoft Corporation - ChakraCore, Microsoft Edge** Affected versions: - ChakraCore, Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016. (Status: affected) ### References 1. [1039529](http://www.securitytracker.com/id/1039529) 2. [43000](https://www.exploit-db.com/exploits/43000/) 3. [101130](http://www.securityfocus.com/bid/101130) 4. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11802)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0146, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0146 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0146 - **State**: PUBLISHED - **Published Date**: March 03, 2011 at 19:00 UTC - **Last Updated**: August 06, 2024 at 21:43 UTC - **Reserved Date**: December 23, 2010 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:16843](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16843) 2. [](http://support.apple.com/kb/HT4564) 3. [](http://support.apple.com/kb/HT4566) 4. [APPLE-SA-2011-03-02-1](http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html) 5. [APPLE-SA-2011-03-09-1](http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html) 6. [](http://support.apple.com/kb/HT4554) 7. [APPLE-SA-2011-03-09-2](http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-5026, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-5026 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-5026 - **State**: PUBLISHED - **Published Date**: November 02, 2011 at 21:00 UTC - **Last Updated**: August 07, 2024 at 04:09 UTC - **Reserved Date**: November 02, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in winners.php in Science Fair In A Box (SFIAB) 2.0.6 and 2.2.0 allows remote attackers to execute arbitrary SQL commands via the type parameter. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2010-1428](http://www.vupen.com/english/advisories/2010/1428) 2. [40170](http://secunia.com/advisories/40170) 3. [13801](http://www.exploit-db.com/exploits/13801) 4. [8516](http://securityreason.com/securityalert/8516) 5. [sciencefairinabox-winners-sql-injection(59282)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59282) 6. [40743](http://www.securityfocus.com/bid/40743) 7. [](http://packetstormsecurity.org/1006-exploits/fairinabox-sqlxss.txt) 8. [65420](http://www.osvdb.org/65420)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21830, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21830 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21830 - **State**: PUBLISHED - **Published Date**: March 06, 2025 at 16:08 UTC - **Last Updated**: May 04, 2025 at 07:22 UTC - **Reserved Date**: December 29, 2024 at 08:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: landlock: Handle weird files A corrupted filesystem (e.g. bcachefs) might return weird files. Instead of throwing a warning and allowing access to such file, treat them as regular files. ### Affected Products **Linux - Linux** Affected versions: - cb2c7d1a1776057c9a1f48ed1250d85e94d4850d (Status: affected) - cb2c7d1a1776057c9a1f48ed1250d85e94d4850d (Status: affected) - cb2c7d1a1776057c9a1f48ed1250d85e94d4850d (Status: affected) - cb2c7d1a1776057c9a1f48ed1250d85e94d4850d (Status: affected) - cb2c7d1a1776057c9a1f48ed1250d85e94d4850d (Status: affected) - cb2c7d1a1776057c9a1f48ed1250d85e94d4850d (Status: affected) **Linux - Linux** Affected versions: - 5.13 (Status: affected) - 0 (Status: unaffected) - 5.15.179 (Status: unaffected) - 6.1.129 (Status: unaffected) - 6.6.76 (Status: unaffected) - 6.12.13 (Status: unaffected) - 6.13.2 (Status: unaffected) - 6.14 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/a1fccf6b72b56343dd4f2d96b008147f9951eebd) 2. [](https://git.kernel.org/stable/c/7d6121228959ddf44a4b9b6a177384ac7854e2f9) 3. [](https://git.kernel.org/stable/c/39bb3d56f1c351e76bb18895d0e73796e653d5c1) 4. [](https://git.kernel.org/stable/c/2569e65d2eb6ac1afe6cb6dfae476afee8b6771a) 5. [](https://git.kernel.org/stable/c/0fde195a373ab1267e60baa9e1a703a97e7464cd) 6. [](https://git.kernel.org/stable/c/49440290a0935f428a1e43a5ac8dc275a647ff80)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36767, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36767 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36767 - **State**: PUBLISHED - **Published Date**: October 30, 2023 at 00:00 UTC - **Last Updated**: September 09, 2024 at 19:59 UTC - **Reserved Date**: October 30, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description tinyfiledialogs (aka tiny file dialogs) before 3.8.0 allows shell metacharacters in titles, messages, and other input data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/servo/servo/issues/25498#issuecomment-703527082)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-38088, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-38088 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-38088 - **State**: PUBLISHED - **Published Date**: January 26, 2023 at 21:24 UTC - **Last Updated**: August 03, 2024 at 10:45 UTC - **Reserved Date**: September 19, 2022 at 17:22 UTC - **Assigned By**: talos ### Vulnerability Description A directory traversal vulnerability exists in the httpd downfile.cgi functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted HTTP request can lead to arbitrary file read. An attacker can send an HTTP request to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Siretta - QUARTZ-GOLD** Affected versions: - G5.0.1.5-210720-141020 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2022-1609](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1609)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24000, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24000 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24000 - **State**: PUBLISHED - **Published Date**: October 31, 2023 at 13:54 UTC - **Last Updated**: September 06, 2024 at 18:03 UTC - **Reserved Date**: January 20, 2023 at 09:29 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GamiPress gamipress allows SQL Injection.This issue affects GamiPress: from n/a through 2.5.7. ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **GamiPress - GamiPress** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/gamipress/wordpress-gamipress-plugin-2-5-7-unauthenticated-sql-injection-vulnerability?_s_id=cve) ### Credits - Dave Jong (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25710, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25710 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25710 - **State**: PUBLISHED - **Published Date**: November 15, 2022 at 00:00 UTC - **Last Updated**: April 22, 2025 at 15:50 UTC - **Reserved Date**: February 22, 2022 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Denial of service due to null pointer dereference when GATT is disconnected in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music** Affected versions: - APQ8009 (Status: affected) - APQ8017 (Status: affected) - APQ8096AU (Status: affected) - AR8031 (Status: affected) - CSRA6620 (Status: affected) - CSRA6640 (Status: affected) - CSRB31024 (Status: affected) - MDM9150 (Status: affected) - MDM9206 (Status: affected) - MDM9250 (Status: affected) - MDM9607 (Status: affected) - MDM9628 (Status: affected) - MDM9640 (Status: affected) - MDM9650 (Status: affected) - MSM8996AU (Status: affected) - QAM8295P (Status: affected) - QCA4020 (Status: affected) - QCA6174A (Status: affected) - QCA6175A (Status: affected) - QCA6564A (Status: affected) - QCA6564AU (Status: affected) - QCA6574 (Status: affected) - QCA6574A (Status: affected) - QCA6574AU (Status: affected) - QCA6584 (Status: affected) - QCA6584AU (Status: affected) - QCA6595 (Status: affected) - QCA6595AU (Status: affected) - QCA6696 (Status: affected) - QCA9367 (Status: affected) - QCA9377 (Status: affected) - QCA9379 (Status: affected) - QCS405 (Status: affected) - SA4150P (Status: affected) - SA415M (Status: affected) - SA515M (Status: affected) - SA6145P (Status: affected) - SA6150P (Status: affected) - SA6155 (Status: affected) - SA6155P (Status: affected) - SA8145P (Status: affected) - SA8150P (Status: affected) - SA8155 (Status: affected) - SA8155P (Status: affected) - SA8195P (Status: affected) - SA8295P (Status: affected) - SD626 (Status: affected) - SDX20 (Status: affected) - SDX20M (Status: affected) - SDX55 (Status: affected) - WCD9326 (Status: affected) - WCD9335 (Status: affected) - WCD9360 (Status: affected) - WCN3610 (Status: affected) - WCN3615 (Status: affected) - WCN3660B (Status: affected) - WCN3680B (Status: affected) - WCN3980 (Status: affected) - WCN3998 (Status: affected) - WCN3999 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/november-2022-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0481 - **State**: PUBLISHED - **Published Date**: February 24, 2023 at 00:00 UTC - **Last Updated**: March 12, 2025 at 15:29 UTC - **Reserved Date**: January 24, 2023 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description In RestEasy Reactive implementation of Quarkus the insecure File.createTempFile() is used in the FileBodyHandler class which creates temp files with insecure permissions that could be read by a local user. ### Weakness Classification (CWE) - CWE-378: Security Weakness ### Affected Products **n/a - Quarkus** Affected versions: - Fixed in 2.16.1 (Status: affected) ### References 1. [](https://github.com/quarkusio/quarkus/pull/30694)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37077, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37077 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37077 - **State**: PUBLISHED - **Published Date**: December 07, 2021 at 16:04 UTC - **Last Updated**: August 04, 2024 at 01:09 UTC - **Reserved Date**: July 20, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel crash. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) ### References 1. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11484, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11484 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11484 - **State**: PUBLISHED - **Published Date**: November 20, 2024 at 15:31 UTC - **Last Updated**: December 02, 2024 at 18:53 UTC - **Reserved Date**: November 20, 2024 at 08:11 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical was found in Code4Berry Decoration Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /decoration/admin/update_image.php of the component User Image Handler. The manipulation of the argument productimage1 leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-284: Security Weakness - CWE-266: Security Weakness ### Affected Products **Code4Berry - Decoration Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-285499 | Code4Berry Decoration Management System User Image update_image.php access control](https://vuldb.com/?id.285499) 2. [VDB-285499 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.285499) 3. [Submit #441913 | Code4Berry Decoration Management System 1.0 Improper Access Controls](https://vuldb.com/?submit.441913) ### Credits - scumdestroy (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0219, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0219 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0219 - **State**: PUBLISHED - **Published Date**: January 20, 2022 at 16:30 UTC - **Last Updated**: August 02, 2024 at 23:18 UTC - **Reserved Date**: January 13, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2. ### Weakness Classification (CWE) - CWE-611: Security Weakness ### Affected Products **skylot - skylot/jadx** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/0d093863-29e8-4dd7-a885-64f76d50bf5e) 2. [](https://github.com/skylot/jadx/commit/d22db30166e7cb369d72be41382bb63ac8b81c52)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14753, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14753 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14753 - **State**: PUBLISHED - **Published Date**: September 27, 2017 at 03:00 UTC - **Last Updated**: August 05, 2024 at 19:34 UTC - **Reserved Date**: September 26, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the EyesOfNetwork web interface (aka eonweb) 5.1-0 allows remote authenticated users to inject arbitrary web script or HTML via the filter parameter to module/module_filters/index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/jsj730sos/Vulnerability-details/wiki/eyesofnetwork_eonweb-5.1_filter_cross-site-scripting-%28XSS%29) 2. [101031](http://www.securityfocus.com/bid/101031)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5379, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5379 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5379 - **State**: PUBLISHED - **Published Date**: December 12, 2023 at 21:54 UTC - **Last Updated**: December 02, 2024 at 14:30 UTC - **Reserved Date**: October 04, 2023 at 11:52 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in Undertow. When an AJP request is sent that exceeds the max-header-size attribute in ajp-listener, JBoss EAP is marked in an error state by mod_cluster in httpd, causing JBoss EAP to close the TCP connection without returning an AJP response. This happens because mod_proxy_cluster marks the JBoss EAP instance as an error worker when the TCP connection is closed from the backend after sending the AJP request without receiving an AJP response, and stops forwarding. This issue could allow a malicious user could to repeatedly send requests that exceed the max-header-size, causing a Denial of Service (DoS). ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-770: Security Weakness ### Affected Products **Red Hat - Red Hat JBoss Enterprise Application Platform 7** **Red Hat - Red Hat build of Quarkus** **Red Hat - Red Hat Data Grid 8** **Red Hat - Red Hat Decision Manager 7** **Red Hat - Red Hat Fuse 7** **Red Hat - Red Hat JBoss Data Grid 7** **Red Hat - Red Hat JBoss Enterprise Application Platform 7** **Red Hat - Red Hat JBoss Fuse 6** **Red Hat - Red Hat Process Automation 7** **Red Hat - Red Hat Single Sign-On 7** **Red Hat - Red Hat support for Spring Boot** ### References 1. [RHSA-2023:4509](https://access.redhat.com/errata/RHSA-2023:4509) 2. [](https://access.redhat.com/security/cve/CVE-2023-5379) 3. [RHBZ#2242099](https://bugzilla.redhat.com/show_bug.cgi?id=2242099)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6306, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6306 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6306 - **State**: PUBLISHED - **Published Date**: September 25, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 07:15 UTC - **Reserved Date**: August 17, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco AnyConnect Secure Mobility Client 4.1(8) on OS X and Linux does not verify pathnames before installation actions, which allows local users to obtain root privileges via a crafted installation file, aka Bug ID CSCuv11947. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033656](http://www.securitytracker.com/id/1033656) 2. [20150923 Cisco AnyConnect elevation of privileges via DMG install script](http://www.securityfocus.com/archive/1/536534/100/0/threaded) 3. [38303](https://www.exploit-db.com/exploits/38303/) 4. [](http://packetstormsecurity.com/files/133685/Cisco-AnyConnect-DMG-Install-Script-Privilege-Escalation.html) 5. [20150923 Cisco AnyConnect elevation of privileges via DMG install script](http://seclists.org/fulldisclosure/2015/Sep/86) 6. [20150923 Cisco AnyConnect Secure Mobility Client for Linux and Mac OS X Privilege Escalation Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=41135) 7. [](https://www.securify.nl/advisory/SFY20150701/cisco_anyconnect_elevation_%20of_privileges_via_dmg_install_script.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2224, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2224 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2224 - **State**: PUBLISHED - **Published Date**: July 18, 2022 at 16:18 UTC - **Last Updated**: August 03, 2024 at 00:32 UTC - **Reserved Date**: June 27, 2022 at 00:00 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WordPress plugin Gallery for Social Photo is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.0.0.27 due to failure to properly check for the existence of a nonce in the function gifeed_duplicate_feed. This make it possible for unauthenticated attackers to duplicate existing posts or pages granted they can trick a site administrator into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N` ### Affected Products **ghozylab - Gallery for Social Photo** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c6683edc-8c77-446c-bd7e-e97b8c5d0c57?source=cve) 2. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2224) 3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2749351%40feed-instagram-lite&new=2749351%40feed-instagram-lite&sfp_email=&sfph_mail=) ### Credits - Marco Wotschka
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3266, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3266 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3266 - **State**: PUBLISHED - **Published Date**: May 23, 2014 at 22:00 UTC - **Last Updated**: August 06, 2024 at 10:35 UTC - **Reserved Date**: May 07, 2014 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the web framework in Cisco Security Manager 4.6 and earlier allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCun65189. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [58923](http://secunia.com/advisories/58923) 2. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=34340) 3. [67569](http://www.securityfocus.com/bid/67569) 4. [20140522 Cisco Security Manager Cross-Site Scripting Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3266)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13096, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13096 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13096 - **State**: PUBLISHED - **Published Date**: July 13, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 18:58 UTC - **Reserved Date**: August 22, 2017 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including modification of Rights Block to remove or relax access control. The methods are flawed and, in the most egregious cases, enable attack vectors that allow recovery of the entire underlying plaintext IP. Implementations of IEEE P1735 may be weak to cryptographic attacks that allow an attacker to obtain plaintext intellectual property without the key, among other impacts. ### Weakness Classification (CWE) - CWE-310: Security Weakness ### Affected Products **IEEE - Standard** Affected versions: - P1735 (Status: affected) ### References 1. [101699](http://www.securityfocus.com/bid/101699) 2. [VU#739007](https://www.kb.cert.org/vuls/id/739007)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21099, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21099 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21099 - **State**: PUBLISHED - **Published Date**: May 13, 2025 at 21:02 UTC - **Last Updated**: May 15, 2025 at 04:01 UTC - **Reserved Date**: January 08, 2025 at 04:00 UTC - **Assigned By**: intel ### Vulnerability Description Uncontrolled search path for some Intel(R) Graphics software may allow an authenticated user to potentially enable escalation of privilege via local access. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-427: Security Weakness ### Affected Products **n/a - Intel(R) Graphics software** Affected versions: - See references (Status: affected) ### References 1. [https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html](https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-40521, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-40521 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-40521 - **State**: PUBLISHED - **Published Date**: July 12, 2024 at 00:00 UTC - **Last Updated**: March 13, 2025 at 15:21 UTC - **Reserved Date**: July 05, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SeaCMS 12.9 has a remote code execution vulnerability. The vulnerability is due to the fact that although admin_template.php imposes certain restrictions on the edited file, attackers can still bypass the restrictions and write code in some way, allowing authenticated attackers to exploit the vulnerability to execute arbitrary commands and gain system privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitee.com/fushuling/cve/blob/master/%20SeaCMS%2012.9%20admin_template.php%20%20code%20injection.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46295, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46295 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46295 - **State**: PUBLISHED - **Published Date**: May 01, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 20:45 UTC - **Reserved Date**: October 21, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Teledyne FLIR M300 2.00-19. Unauthenticated remote code execution can occur in the web server. An attacker can exploit this by sending a POST request to the vulnerable PHP page. An attacker can elevate to root permissions with Sudo. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.com/loudmouth-security/vulnerability-disclosures/cve-2023-46295)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25873, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25873 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25873 - **State**: PUBLISHED - **Published Date**: March 14, 2025 at 00:00 UTC - **Last Updated**: March 19, 2025 at 18:38 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross Site Request Forgery vulnerability in Open Panel OpenAdmin v.0.3.4 allows a remote attacker to escalate privileges via the Change Root Password function ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://openpanel.com/docs/) 2. [](https://packetstorm.news/files/id/189597)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4105, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4105 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4105 - **State**: PUBLISHED - **Published Date**: February 17, 2012 at 23:00 UTC - **Last Updated**: August 07, 2024 at 00:01 UTC - **Reserved Date**: October 18, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description LightDM before 1.0.6 allows local users to change ownership of arbitrary files via a symlink attack on ~/.Xauthority. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-1262-1](http://www.ubuntu.com/usn/USN-1262-1) 2. [[oss-security] 20111102 Re: Re: [LightDM] Version 1.0.6 released](http://www.openwall.com/lists/oss-security/2011/11/02/9) 3. [[oss-security] 20111102 Re: Re: [LightDM] Version 1.0.6 released](http://www.openwall.com/lists/oss-security/2011/11/02/10) 4. [[oss-security] 20111102 Re: [LightDM] Version 1.0.6 released](http://www.openwall.com/lists/oss-security/2011/11/02/6) 5. [[LightDM] 20111102 Version 1.0.6 released](http://lists.freedesktop.org/archives/lightdm/2011-November/000178.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-11000, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-11000 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-11000 - **State**: PUBLISHED - **Published Date**: September 20, 2019 at 14:32 UTC - **Last Updated**: August 06, 2024 at 03:47 UTC - **Reserved Date**: September 20, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The wp-ultimate-exporter plugin through 1.1 for WordPress has SQL injection via the export_type_name parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/wp-ultimate-exporter/#developers) 2. [](https://seclists.org/bugtraq/2016/Feb/183)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1065, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1065 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1065 - **State**: PUBLISHED - **Published Date**: March 23, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 01:14 UTC - **Reserved Date**: March 23, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Lebisoft Ziyaretci Defteri 7.4 and 7.5 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for db/lebisoft.mdb. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [11015](http://www.exploit-db.com/exploits/11015) 2. [38039](http://secunia.com/advisories/38039) 3. [lebisoftzdefter-lebisoft-info-disclosure(55452)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55452)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1468, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1468 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1468 - **State**: PUBLISHED - **Published Date**: May 05, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:51 UTC - **Reserved Date**: May 05, 2005 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple unknown vulnerabilities in the (1) WSP, (2) Q.931, (3) H.245, (4) KINK, (5) MGCP, (6) RPC, (7) SMBMailslot, and (8) SMB NETLOGON dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash) via unknown vectors that lead to a null dereference. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [13504](http://www.securityfocus.com/bid/13504) 2. [RHSA-2005:427](http://www.redhat.com/support/errata/RHSA-2005-427.html) 3. [oval:org.mitre.oval:def:10049](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10049) 4. [](http://www.ethereal.com/appnotes/enpa-sa-00019.html) 5. [FLSA-2006:152922](http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html) 6. [CLSA-2005:963](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000963) 7. [](http://www.ethereal.com/news/item_20050504_01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-19474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-19474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-19474 - **State**: PUBLISHED - **Published Date**: July 21, 2021 at 17:11 UTC - **Last Updated**: August 04, 2024 at 14:08 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue has been found in function Gfx::doShowText in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an Use After Free . ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/flexpaper/pdf2json/issues/35)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4390, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4390 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4390 - **State**: PUBLISHED - **Published Date**: December 20, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:46 UTC - **Reserved Date**: December 20, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in ContentServ 3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the StoryID parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [15956](http://www.securityfocus.com/bid/15956) 2. [](http://pridels0.blogspot.com/2005/12/contentserv-31-sql-inj.html) 3. [ADV-2005-2982](http://www.vupen.com/english/advisories/2005/2982) 4. [contentserv-storyid-sql-injection(23825)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23825) 5. [21851](http://www.osvdb.org/21851)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20043, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20043 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20043 - **State**: PUBLISHED - **Published Date**: January 19, 2023 at 01:36 UTC - **Last Updated**: August 02, 2024 at 08:57 UTC - **Reserved Date**: October 27, 2022 at 18:47 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in Cisco CX Cloud Agent of could allow an authenticated, local attacker to elevate their privileges. This vulnerability is due to insecure file permissions. An attacker could exploit this vulnerability by calling the script with sudo. A successful exploit could allow the attacker to take complete control of the affected device. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Cisco - Cisco CX Cloud Agent** Affected versions: - 0.9 (Status: affected) - 0.0.1 (Status: affected) - 0.0.2 (Status: affected) - 0.9.2 (Status: affected) - 0.9.3 (Status: affected) - 1.1 (Status: affected) - 1.2 (Status: affected) - 1.3 (Status: affected) - 1.4 (Status: affected) - 1.5 (Status: affected) - 1.6 (Status: affected) - 1.7 (Status: affected) - 1.8 (Status: affected) - 1.0.0 (Status: affected) - 2.2 (Status: affected) ### References 1. [cisco-sa-cxagent-gOq9QjqZ](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cxagent-gOq9QjqZ)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8133 - **State**: PUBLISHED - **Published Date**: November 05, 2019 at 23:09 UTC - **Last Updated**: August 04, 2024 at 21:10 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description A security bypass vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. A user with privileges to generate sitemaps can bypass configuration that restricts directory access. The bypass allows overwrite of a subset of configuration files which can lead to denial of service. ### Affected Products **Adobe Systems Incorporated - Magento 2** Affected versions: - Magento 2.2 prior to 2.2.10 (Status: affected) - Magento 2.3 prior to 2.3.3 or 2.3.2-p1 (Status: affected) ### References 1. [](https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24802, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24802 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24802 - **State**: PUBLISHED - **Published Date**: March 31, 2022 at 23:15 UTC - **Last Updated**: April 23, 2025 at 18:42 UTC - **Reserved Date**: February 10, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description deepmerge-ts is a typescript library providing functionality to deep merging of javascript objects. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). This issue has been patched in version 4.0.2. There are no known workarounds for this issue. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-915: Security Weakness ### Affected Products **RebeccaStevens - deepmerge-ts** Affected versions: - < 4.0.2 (Status: affected) ### References 1. [](https://github.com/RebeccaStevens/deepmerge-ts/security/advisories/GHSA-r9w3-g83q-m6hq) 2. [](https://github.com/RebeccaStevens/deepmerge-ts/commit/b39f1a93d9e1c3541bd2fe159fd696a16dbe1c72) 3. [](https://github.com/RebeccaStevens/deepmerge-ts/commit/d637db7e4fb2bfb113cb4bc1c85a125936d7081b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29069, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29069 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29069 - **State**: PUBLISHED - **Published Date**: March 23, 2021 at 07:00 UTC - **Last Updated**: August 03, 2024 at 21:55 UTC - **Reserved Date**: March 23, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by command injection by an authenticated user. This affects XR450 before 2.3.2.114, XR500 before 2.3.2.114, and WNR2000v5 before 1.0.0.76. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AC:H/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:R` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000063023/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2020-0595)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0944, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0944 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0944 - **State**: PUBLISHED - **Published Date**: February 02, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:37 UTC - **Reserved Date**: January 31, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description DDE in mIRC allows local users to launch applications under another user's account via a DDE message that executes a command, which may be executed by the other user's process. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20011202 mIRC bug?](http://marc.info/?l=bugtraq&m=100734173831990&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15841, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15841 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15841 - **State**: PUBLISHED - **Published Date**: May 06, 2019 at 22:23 UTC - **Last Updated**: August 05, 2024 at 20:04 UTC - **Reserved Date**: October 24, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description When HOST sends a Special command ID packet, Controller triggers a RAM Dump and FW reset in Snapdragon Mobile in version SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 835, Snapdragon_High_Med_2016. ### Affected Products **Qualcomm Technologies, Inc. - Snapdragon Mobile** Affected versions: - SD 410/12 (Status: affected) - SD 425 (Status: affected) - SD 427 (Status: affected) - SD 430 (Status: affected) - SD 435 (Status: affected) - SD 450 (Status: affected) - SD 615/16/SD 415 (Status: affected) - SD 625 (Status: affected) - SD 650/52 (Status: affected) - SD 820 (Status: affected) - SD 835 (Status: affected) - Snapdragon_High_Med_2016 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27786, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27786 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27786 - **State**: PUBLISHED - **Published Date**: March 16, 2023 at 00:00 UTC - **Last Updated**: February 26, 2025 at 16:06 UTC - **Reserved Date**: March 05, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the macinstring function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/appneta/tcpreplay/issues/782) 2. [](https://github.com/appneta/tcpreplay/pull/783) 3. [FEDORA-2023-37bdea9241](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/) 4. [FEDORA-2023-7ffeed7339](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/) 5. [FEDORA-2023-96ffd40fd4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21032, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21032 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21032 - **State**: PUBLISHED - **Published Date**: April 16, 2024 at 21:26 UTC - **Last Updated**: December 03, 2024 at 18:56 UTC - **Reserved Date**: December 07, 2023 at 22:28 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **Oracle Corporation - Complex Maintenance, Repair, and Overhaul** Affected versions: - 12.2.3 (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2024.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3058, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3058 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3058 - **State**: PUBLISHED - **Published Date**: August 20, 2010 at 17:00 UTC - **Last Updated**: September 16, 2024 at 22:35 UTC - **Reserved Date**: August 20, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Mount service in IBM Tivoli Storage Manager (TSM) FastBack 5.x.x before 5.5.7, and 6.1.0.0, establishes an open UDP port, which might allow remote attackers to overwrite memory locations and execute arbitrary code, or cause a denial of service (application hang), via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21443820) 2. [41044](http://secunia.com/advisories/41044) 3. [IC69883](http://www-01.ibm.com/support/docview.wss?uid=swg1IC69883) 4. [42549](http://www.securityfocus.com/bid/42549)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3455, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3455 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3455 - **State**: PUBLISHED - **Published Date**: November 02, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:10 UTC - **Reserved Date**: November 02, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple unspecified vulnerabilities in Oracle E-Business Suite and Applications 11.5 up to 11.5.10 have unknown impact and attack vectors, as identified by Oracle Vuln# (1) APPS01 in Application Install; (2) APPS02 and (3) APPS03 in Application Object Library; (4) APPS05 and (5) APPS06 in Applications Technology Stack; (6) APPS07 in Applications Utilities; (7) APPS09, (8) APPS10, and (9) APPS11 in HRMS; (10) APPS12 in Mobile Application Foundation; (11) APPS13 in SDP Number Portability; (12) APPS14 in Oracle Service; (13) APPS15 in Service Fulfillment Manage, (14) APPS16 in Universal Work Queue; and (15) APPS20 in Workflow Cartridge. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2005-090497.html) 2. [VU#609340](http://www.kb.cert.org/vuls/id/609340) 3. [VU#265700](http://www.kb.cert.org/vuls/id/265700) 4. [TA05-292A](http://www.us-cert.gov/cas/techalerts/TA05-292A.html) 5. [15134](http://www.securityfocus.com/bid/15134) 6. [VU#210524](http://www.kb.cert.org/vuls/id/210524) 7. [17250](http://secunia.com/advisories/17250) 8. [VU#150508](http://www.kb.cert.org/vuls/id/150508)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15996, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15996 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15996 - **State**: PUBLISHED - **Published Date**: January 18, 2019 at 17:00 UTC - **Last Updated**: August 05, 2024 at 10:10 UTC - **Reserved Date**: August 28, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [106162](http://www.securityfocus.com/bid/106162) 2. [](https://helpx.adobe.com/security/products/acrobat/apsb18-41.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13079, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13079 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13079 - **State**: REJECTED - **Published Date**: January 14, 2022 at 16:25 UTC - **Last Updated**: January 14, 2022 at 16:25 UTC - **Reserved Date**: May 15, 2020 at 00:00 UTC - **Assigned By**: AMD ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30372, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30372 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30372 - **State**: PUBLISHED - **Published Date**: March 28, 2025 at 14:51 UTC - **Last Updated**: March 28, 2025 at 15:43 UTC - **Reserved Date**: March 21, 2025 at 14:12 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Emlog is an open source website building system. Emlog Pro versions pro-2.5.7 and pro-2.5.8 contain an SQL injection vulnerability. `search_controller.php` does not use addslashes after urldecode, allowing the preceeding addslashes to be bypassed by URL double encoding. This could result in potential leakage of sensitive information from the user database. Version pro-2.5.9 fixes the issue. ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **emlog - emlog** Affected versions: - >= pro-2.5.7, < pro-2.5.9 (Status: affected) ### References 1. [https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c](https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1030, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1030 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1030 - **State**: PUBLISHED - **Published Date**: September 16, 2013 at 01:00 UTC - **Last Updated**: September 16, 2024 at 22:19 UTC - **Reserved Date**: January 10, 2013 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description mdmclient in Mobile Device Management in Apple Mac OS X before 10.8.5 places a password on the command line, which allows local users to obtain sensitive information by listing the process. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2013-09-12-1](http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html) 2. [](http://support.apple.com/kb/HT5880)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5112, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5112 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5112 - **State**: PUBLISHED - **Published Date**: May 20, 2024 at 02:00 UTC - **Last Updated**: August 01, 2024 at 21:03 UTC - **Reserved Date**: May 19, 2024 at 04:57 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /view/student_profile.php. The manipulation of the argument std_index leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-265102 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Campcodes - Complete Web-Based School Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-265102 | Campcodes Complete Web-Based School Management System student_profile.php sql injection](https://vuldb.com/?id.265102) 2. [VDB-265102 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.265102) 3. [Submit #338516 | Campcodes Complete Web-Based School Management System ≤1.0 SQL Injection](https://vuldb.com/?submit.338516) 4. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2017.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4150, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4150 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4150 - **State**: PUBLISHED - **Published Date**: August 15, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 20:28 UTC - **Reserved Date**: August 07, 2012 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2051, CVE-2012-4147, CVE-2012-4148, CVE-2012-4149, CVE-2012-4151, CVE-2012-4152, CVE-2012-4153, CVE-2012-4154, CVE-2012-4155, CVE-2012-4156, CVE-2012-4157, CVE-2012-4158, CVE-2012-4159, and CVE-2012-4160. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:16467](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16467) 2. [](http://www.adobe.com/support/security/bulletins/apsb12-16.html) 3. [GLSA-201308-03](http://security.gentoo.org/glsa/glsa-201308-03.xml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5463, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5463 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5463 - **State**: PUBLISHED - **Published Date**: April 09, 2018 at 21:00 UTC - **Last Updated**: September 16, 2024 at 20:26 UTC - **Reserved Date**: January 12, 2018 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description A structured exception handler overflow vulnerability in Leao Consultoria e Desenvolvimento de Sistemas (LCDS) LTDA ME LAquis SCADA 4.1.0.3391 and earlier may allow code execution. ### Weakness Classification (CWE) - CWE-703: Security Weakness ### Affected Products **ICS-CERT - LCDS - Le&#195;&#163;o Consultoria e Desenvolvimento de Sistemas LTDA ME LAquis SCADA** Affected versions: - 4.1.0.3391 and prior (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-095-03) 2. [103724](http://www.securityfocus.com/bid/103724)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0072, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0072 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0072 - **State**: PUBLISHED - **Published Date**: May 02, 2025 at 09:54 UTC - **Last Updated**: May 12, 2025 at 15:51 UTC - **Reserved Date**: December 13, 2024 at 13:18 UTC - **Assigned By**: Arm ### Vulnerability Description Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU memory processing operations to gain access to already freed memory. This issue affects Valhall GPU Kernel Driver: from r29p0 through r49p3, from r50p0 through r53p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p3, from r50p0 through r53p0. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Arm Ltd - Valhall GPU Kernel Driver** Affected versions: - r29p0 (Status: affected) - r50p0 (Status: affected) **Arm Ltd - Arm 5th Gen GPU Architecture Kernel Driver** Affected versions: - r41p0 (Status: affected) - r50p0 (Status: affected) ### References 1. [](https://developer.arm.com/documentation/110465/latest/) ### Credits - Man Yue Mo of GitHub Security Lab
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21459, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21459 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21459 - **State**: PUBLISHED - **Published Date**: January 12, 2021 at 14:38 UTC - **Last Updated**: August 03, 2024 at 18:16 UTC - **Reserved Date**: December 30, 2020 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. ### Affected Products **SAP SE - SAP 3D Visual Enterprise Viewer** Affected versions: - < 9 (Status: affected) ### References 1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564760476) 2. [](https://launchpad.support.sap.com/#/notes/3002617)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54132, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54132 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54132 - **State**: PUBLISHED - **Published Date**: December 04, 2024 at 15:29 UTC - **Last Updated**: December 04, 2024 at 21:40 UTC - **Reserved Date**: November 29, 2024 at 18:02 UTC - **Assigned By**: GitHub_M ### Vulnerability Description The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **cli - cli** Affected versions: - < 2.63.1 (Status: affected) ### References 1. [https://github.com/cli/cli/security/advisories/GHSA-2m9h-r57g-45pj](https://github.com/cli/cli/security/advisories/GHSA-2m9h-r57g-45pj) 2. [https://github.com/cli/cli/commit/1136764c369aaf0cae4ec2ee09dc35d871076932](https://github.com/cli/cli/commit/1136764c369aaf0cae4ec2ee09dc35d871076932)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52686, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52686 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52686 - **State**: PUBLISHED - **Published Date**: May 17, 2024 at 14:24 UTC - **Last Updated**: May 04, 2025 at 07:41 UTC - **Reserved Date**: March 07, 2024 at 14:49 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null pointer check in opal_event_init() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. ### Affected Products **Linux - Linux** Affected versions: - 2717a33d60745f2f72e521cdaedf79b00f66f8ca (Status: affected) - 2717a33d60745f2f72e521cdaedf79b00f66f8ca (Status: affected) - 2717a33d60745f2f72e521cdaedf79b00f66f8ca (Status: affected) - 2717a33d60745f2f72e521cdaedf79b00f66f8ca (Status: affected) - 2717a33d60745f2f72e521cdaedf79b00f66f8ca (Status: affected) - 2717a33d60745f2f72e521cdaedf79b00f66f8ca (Status: affected) - 2717a33d60745f2f72e521cdaedf79b00f66f8ca (Status: affected) - 2717a33d60745f2f72e521cdaedf79b00f66f8ca (Status: affected) **Linux - Linux** Affected versions: - 4.11 (Status: affected) - 0 (Status: unaffected) - 4.19.306 (Status: unaffected) - 5.4.268 (Status: unaffected) - 5.10.209 (Status: unaffected) - 5.15.148 (Status: unaffected) - 6.1.75 (Status: unaffected) - 6.6.14 (Status: unaffected) - 6.7.2 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/8422d179cf46889c15ceff9ede48c5bfa4e7f0b4) 2. [](https://git.kernel.org/stable/c/e93d7cf4c1ddbcd846739e7ad849f955a4f18031) 3. [](https://git.kernel.org/stable/c/e6ad05e3ae9c84c5a71d7bb2d44dc845ae7990cf) 4. [](https://git.kernel.org/stable/c/c0b111ea786ddcc8be0682612830796ece9436c7) 5. [](https://git.kernel.org/stable/c/9a523e1da6d88c2034f946adfa4f74b236c95ca9) 6. [](https://git.kernel.org/stable/c/a14c55eb461d630b836f80591d8caf1f74e62877) 7. [](https://git.kernel.org/stable/c/e08c2e275fa1874de945b87093f925997722ee42) 8. [](https://git.kernel.org/stable/c/8649829a1dd25199bbf557b2621cedb4bf9b3050)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8979, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8979 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8979 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 18, 2014 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16781, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16781 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16781 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:51 UTC - **Last Updated**: December 20, 2021 at 22:51 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29402, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29402 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29402 - **State**: PUBLISHED - **Published Date**: April 16, 2024 at 00:00 UTC - **Last Updated**: November 07, 2024 at 15:14 UTC - **Reserved Date**: March 19, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description cskefu v7 suffers from Insufficient Session Expiration, which allows attackers to exploit the old session for malicious activity. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/cskefu/cskefu/issues/781) 2. [](https://github.com/cskefu/cskefu/pull/803) 3. [](https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3695, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3695 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3695 - **State**: PUBLISHED - **Published Date**: July 25, 2012 at 19:00 UTC - **Last Updated**: August 06, 2024 at 20:13 UTC - **Reserved Date**: June 19, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 6.0 allows remote attackers to inject arbitrary web script or HTML by leveraging improper URL canonicalization during the handling of the location.href property. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html) 2. [](http://support.apple.com/kb/HT5503) 3. [APPLE-SA-2012-07-25-1](http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html) 4. [54695](http://www.securityfocus.com/bid/54695) 5. [](http://support.apple.com/kb/HT5400)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3298, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3298 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3298 - **State**: PUBLISHED - **Published Date**: June 20, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 14:14 UTC - **Reserved Date**: June 20, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in Spey before 0.4.1 allows remote attackers to execute arbitrary SQL commands via unspecified vectors related to MessageProcessor.cc and possibly other components. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://sourceforge.net/project/shownotes.php?group_id=108104&release_id=502366) 2. [ADV-2007-2249](http://www.vupen.com/english/advisories/2007/2249) 3. [38729](http://osvdb.org/38729) 4. [](http://sourceforge.net/forum/forum.php?forum_id=687624) 5. [](http://spey.cvs.sourceforge.net/spey/spey/src/MessageProcessor.cc?view=log)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31303, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31303 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31303 - **State**: PUBLISHED - **Published Date**: June 21, 2022 at 12:51 UTC - **Last Updated**: August 03, 2024 at 07:11 UTC - **Reserved Date**: May 23, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description maccms10 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Server Group text field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/maccmspro/maccms10/issues/20)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28473, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28473 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28473 - **State**: PUBLISHED - **Published Date**: April 28, 2023 at 00:00 UTC - **Last Updated**: November 27, 2024 at 14:41 UTC - **Reserved Date**: March 15, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Concrete CMS (previously concrete5) versions 8.5.12 and below, and 9.0 through 9.1.3 is vulnerable to possible Auth bypass in the jobs section. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://concretecms.com) 2. [](https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2023-04-20) 3. [](https://www.concretecms.org/about/project-news/security/2023-11-09-security-blog-about-updated-cves-and-new-release)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11044, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11044 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11044 - **State**: PUBLISHED - **Published Date**: May 07, 2020 at 00:00 UTC - **Last Updated**: August 04, 2024 at 11:21 UTC - **Reserved Date**: March 30, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In FreeRDP greater than 1.2 and before 2.0.0, a double free in update_read_cache_bitmap_v3_order crashes the client application if corrupted data from a manipulated server is parsed. This has been patched in 2.0.0. ### CVSS Metrics - **CVSS Base Score**: 2.2/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-415: Security Weakness ### Affected Products **FreeRDP - FreeRDP** Affected versions: - > 1.2, < 2.0.0 (Status: affected) ### References 1. [](https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cgqh-p732-6x2w) 2. [](https://github.com/FreeRDP/FreeRDP/issues/6013) 3. [](https://github.com/FreeRDP/FreeRDP/commit/67c2aa52b2ae0341d469071d1bc8aab91f8d2ed8) 4. [USN-4379-1](https://usn.ubuntu.com/4379-1/) 5. [[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update](https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0911, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0911 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0911 - **State**: PUBLISHED - **Published Date**: April 02, 2003 at 05:00 UTC - **Last Updated**: August 08, 2024 at 03:03 UTC - **Reserved Date**: August 16, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Caldera Volution Manager 1.1 stores the Directory Administrator password in cleartext in the slapd.conf file, which could allow local users to gain privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [CSSA-2002-024.0](ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-024.0.txt) 2. [volution-manager-plaintext-password(9240)](http://www.iss.net/security_center/static/9240.php) 3. [4923](http://www.securityfocus.com/bid/4923)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3400, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3400 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3400 - **State**: PUBLISHED - **Published Date**: July 06, 2006 at 20:00 UTC - **Last Updated**: August 07, 2024 at 18:30 UTC - **Reserved Date**: July 06, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in the CG_ServerCommand function in Quake 3 Engine as used by Soldier of Fortune 2 (SOF2MP) GOLD 1.03 allows remote attackers to cause a denial of service and possibly execute code by sending a long command from the server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [quake3-cgservercommand-bo(27614)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27614) 2. [1976](https://www.exploit-db.com/exploits/1976) 3. [20946](http://secunia.com/advisories/20946) 4. [18777](http://www.securityfocus.com/bid/18777) 5. [ADV-2006-2657](http://www.vupen.com/english/advisories/2006/2657)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6560, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6560 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6560 - **State**: PUBLISHED - **Published Date**: December 28, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 16:11 UTC - **Reserved Date**: December 27, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Logaholic before 2.0 RC8 allow remote attackers to inject arbitrary web script or HTML via (1) the newconfname parameter to profiles.php or (2) the conf parameter to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [39793](http://osvdb.org/39793) 2. [28263](http://secunia.com/advisories/28263) 3. [3496](http://securityreason.com/securityalert/3496) 4. [logaholic-profiles-xss(39223)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39223) 5. [39792](http://osvdb.org/39792) 6. [27003](http://www.securityfocus.com/bid/27003) 7. [20071223 Logaholic Web Analytics Software](http://www.securityfocus.com/archive/1/485480/100/0/threaded) 8. [20080326 Re: Logaholic Web Analytics Software](http://www.securityfocus.com/archive/1/490101/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1496, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1496 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1496 - **State**: PUBLISHED - **Published Date**: April 13, 2016 at 14:00 UTC - **Last Updated**: August 05, 2024 at 22:55 UTC - **Reserved Date**: January 05, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The graphics driver in Huawei P8 smartphones with software GRA-TL00 before GRA-TL00C01B230, GRA-CL00 before GRA-CL00C92B230, GRA-CL10 before GRA-CL10C92B230, GRA-UL00 before GRA-UL00C00B230, and GRA-UL10 before GRA-UL10C00B230 allows attackers to cause a denial of service (system crash) via a crafted application, aka a "semaphore deadlock issue." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160113-01-smartphone-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38382, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38382 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38382 - **State**: PUBLISHED - **Published Date**: August 10, 2021 at 17:15 UTC - **Last Updated**: August 04, 2024 at 01:37 UTC - **Reserved Date**: August 10, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Live555 through 1.08 does not handle Matroska and Ogg files properly. Sending two successive RTSP SETUP commands for the same track causes a Use-After-Free and daemon crash. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://lists.live555.com/pipermail/live-devel/2021-August/021959.html) 2. [](http://www.live555.com/liveMedia/public/changelog.txt#%5B2021.08.06%5D)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35421, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35421 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35421 - **State**: PUBLISHED - **Published Date**: November 08, 2024 at 00:00 UTC - **Last Updated**: November 12, 2024 at 15:21 UTC - **Reserved Date**: May 17, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description vmir e8117 was discovered to contain a segmentation violation via the wasm_parse_block function at /src/vmir_wasm_parser.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/andoma/vmir/issues/22) 2. [](https://gist.github.com/haruki3hhh/318c4e35531f9e3b01df51016ac5c12b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1603, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1603 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1603 - **State**: PUBLISHED - **Published Date**: March 25, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 03:34 UTC - **Reserved Date**: March 25, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GoAhead Web Server 2.1.7 and earlier allows remote attackers to obtain the source code of ASP files via a URL terminated with a /, \, %2f (encoded /), %20 (encoded space), or %00 (encoded null) character, which returns the ASP source code unparsed. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [goahead-script-source-disclosure(10885)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10885) 2. [VU#975041](http://www.kb.cert.org/vuls/id/975041) 3. [7741](http://secunia.com/advisories/7741) 4. [VU#124059](http://www.kb.cert.org/vuls/id/124059) 5. [](http://rockwellautomation.custhelp.com/cgi-bin/rockwellautomation.cfg/php/enduser/std_adp.php?p_faqid=57729) 6. [](http://www.procheckup.com/PDFs/ProCheckUp_Vulns_2002.pdf) 7. [](http://data.goahead.com/Software/Webserver/2.1.8/release.htm#bug-with-urls-like-asp) 8. [](http://www.kb.cert.org/vuls/id/RGII-7MWKZ3) 9. [9239](http://www.securityfocus.com/bid/9239) 10. [](http://aluigi.altervista.org/adv/goahead-adv3.txt) 11. [1005820](http://securitytracker.com/id?1005820) 12. [13295](http://www.osvdb.org/13295) 13. [](http://www.procheckup.com/security_info/vuln_pr0213.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0330, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0330 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0330 - **State**: PUBLISHED - **Published Date**: January 17, 2008 at 21:07 UTC - **Last Updated**: August 07, 2024 at 07:39 UTC - **Reserved Date**: January 17, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Open System Consultants (OSC) Radiator before 4.0 allows remote attackers to cause a denial of service (daemon crash) via malformed RADIUS requests, as demonstrated by packets sent by nmap. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-0598](http://www.vupen.com/english/advisories/2008/0598) 2. [osc-radiator-unspecified-dos(40664)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40664) 3. [27306](http://www.securityfocus.com/bid/27306) 4. [radiator-radius-dos(39730)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39730) 5. [28463](http://secunia.com/advisories/28463) 6. [](http://www.open.com.au/radiator/history.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3233, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3233 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3233 - **State**: PUBLISHED - **Published Date**: April 24, 2017 at 19:00 UTC - **Last Updated**: October 07, 2024 at 16:23 UTC - **Reserved Date**: December 06, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Automatic Service Request (ASR) component of Oracle Support Tools (subcomponent: ASR Manager). The supported version that is affected is Prior to 5.7. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Automatic Service Request (ASR). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Automatic Service Request (ASR) accessible data. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). ### Affected Products **Oracle Corporation - Automatic Service Request (ASR)** Affected versions: - unspecified (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html) 2. [97799](http://www.securityfocus.com/bid/97799)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7311, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7311 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7311 - **State**: PUBLISHED - **Published Date**: September 10, 2020 at 09:45 UTC - **Last Updated**: September 17, 2024 at 01:31 UTC - **Reserved Date**: January 21, 2020 at 00:00 UTC - **Assigned By**: trellix ### Vulnerability Description Privilege Escalation vulnerability in the installer in McAfee Agent (MA) for Windows prior to 5.6.6 allows local users to assume SYSTEM rights during the installation of MA via manipulation of log files. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **McAfee LLC - MA for Windows** Affected versions: - 5.6.x (Status: affected) ### References 1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10325) ### Credits - McAfee credits Sebastian Schuster from Airbus CyberSecurity for responsibly reporting this flaw.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1010113, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1010113 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1010113 - **State**: PUBLISHED - **Published Date**: July 19, 2019 at 15:22 UTC - **Last Updated**: August 05, 2024 at 03:07 UTC - **Reserved Date**: March 20, 2019 at 00:00 UTC - **Assigned By**: dwf ### Vulnerability Description Premium Software CLEditor 1.4.5 and earlier is affected by: Cross Site Scripting (XSS). The impact is: An attacker might be able to inject arbitrary html and script code into the web site. The component is: jQuery plug-in. The attack vector is: the victim must open a crafted href attribute of a link (A) element. ### Affected Products **Premium Software - CLEditor** Affected versions: - ≤ 1.4.5 (Status: affected) ### References 1. [](https://drive.google.com/drive/folders/1UxgdL8SJO6KKnG3bh0-LTl7C6i41VwoW?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6353, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6353 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6353 - **State**: PUBLISHED - **Published Date**: November 26, 2019 at 13:48 UTC - **Last Updated**: August 06, 2024 at 01:29 UTC - **Reserved Date**: July 26, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cloudera Search in CDH before 5.7.0 allows unauthorized document access because Solr Queries by document id can bypass Sentry document-level security via the RealTimeGetHandler. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://docs.cloudera.com/documentation/other/security-bulletins/topics/Security-Bulletin.html#tsb_165)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2271, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2271 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2271 - **State**: PUBLISHED - **Published Date**: April 22, 2021 at 21:53 UTC - **Last Updated**: September 26, 2024 at 14:56 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Work in Process product of Oracle E-Business Suite (component: Resource Exceptions). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.8. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Work in Process. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Work in Process accessible data as well as unauthorized access to critical data or complete access to all Oracle Work in Process accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N` ### Affected Products **Oracle Corporation - Work in Process** Affected versions: - 12.1.3 (Status: affected) - 12.2.3-12.2.8 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26337, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26337 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26337 - **State**: REJECTED - **Last Updated**: December 02, 2022 at 00:00 UTC - **Reserved Date**: October 01, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2595, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2595 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2595 - **State**: PUBLISHED - **Published Date**: July 24, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 05:59 UTC - **Reserved Date**: July 24, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in productSearch.html in Censura 2.0.4 and 2.1.0 allows remote attackers to inject arbitrary web script or HTML via the q parameter in a ProductSearch action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.censura.info/forums/project.php?issueid=151) 2. [](http://www.censura.info/forums/showthread.php?t=969) 3. [censura-q-xss(51665)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51665) 4. [35795](http://secunia.com/advisories/35795) 5. [55791](http://www.osvdb.org/55791) 6. [35920](http://www.securityfocus.com/bid/35920)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-49160, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-49160 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-49160 - **State**: PUBLISHED - **Published Date**: December 15, 2023 at 13:54 UTC - **Last Updated**: August 02, 2024 at 21:46 UTC - **Reserved Date**: November 22, 2023 at 23:36 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in formzu Inc. Formzu WP allows Stored XSS.This issue affects Formzu WP: from n/a through 1.6.6. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **formzu Inc. - Formzu WP** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/formzu-wp/wordpress-formzu-wp-plugin-1-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - resecured.io (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34450, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34450 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34450 - **State**: PUBLISHED - **Published Date**: July 03, 2023 at 16:36 UTC - **Last Updated**: October 29, 2024 at 13:49 UTC - **Reserved Date**: June 06, 2023 at 16:16 UTC - **Assigned By**: GitHub_M ### Vulnerability Description CometBFT is a Byzantine Fault Tolerant (BFT) middleware that takes a state transition machine and replicates it on many machines. An internal modification made in versions 0.34.28 and 0.37.1 to the way struct `PeerState` is serialized to JSON introduced a deadlock when new function MarshallJSON is called. This function can be called from two places. The first is via logs, setting the `consensus` logging module to "debug" level (should not happen in production), and setting the log output format to JSON. The second is via RPC `dump_consensus_state`. Case 1, which should not be hit in production, will eventually hit the deadlock in most goroutines, effectively halting the node. In case 2, only the data structures related to the first peer will be deadlocked, together with the thread(s) dealing with the RPC request(s). This means that only one of the channels of communication to the node's peers will be blocked. Eventually the peer will timeout and excluded from the list (typically after 2 minutes). The goroutines involved in the deadlock will not be garbage collected, but they will not interfere with the system after the peer is excluded. The theoretical worst case for case 2, is a network with only two validator nodes. In this case, each of the nodes only has one `PeerState` struct. If `dump_consensus_state` is called in either node (or both), the chain will halt until the peer connections time out, after which the nodes will reconnect (with different `PeerState` structs) and the chain will progress again. Then, the same process can be repeated. As the number of nodes in a network increases, and thus, the number of peer struct each node maintains, the possibility of reproducing the perturbation visible with two nodes decreases. Only the first `PeerState` struct will deadlock, and not the others (RPC `dump_consensus_state` accesses them in a for loop, so the deadlock at the first iteration causes the rest of the iterations of that "for" loop to never be reached). This regression was fixed in versions 0.34.29 and 0.37.2. Some workarounds are available. For case 1 (hitting the deadlock via logs), either don't set the log output to "json", leave at "plain", or don't set the consensus logging module to "debug", leave it at "info" or higher. For case 2 (hitting the deadlock via RPC `dump_consensus_state`), do not expose `dump_consensus_state` RPC endpoint to the public internet (e.g., via rules in one's nginx setup). ### CVSS Metrics - **CVSS Base Score**: 3.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-401: Security Weakness - CWE-770: Security Weakness ### Affected Products **cometbft - cometbft** Affected versions: - = 0.34.28 (Status: affected) - = 0.37.1 (Status: affected) ### References 1. [https://github.com/cometbft/cometbft/security/advisories/GHSA-mvj3-qrqh-cjvr](https://github.com/cometbft/cometbft/security/advisories/GHSA-mvj3-qrqh-cjvr) 2. [https://github.com/cometbft/cometbft/pull/524](https://github.com/cometbft/cometbft/pull/524) 3. [https://github.com/cometbft/cometbft/pull/863](https://github.com/cometbft/cometbft/pull/863) 4. [https://github.com/cometbft/cometbft/pull/865](https://github.com/cometbft/cometbft/pull/865)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4898, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4898 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4898 - **State**: PUBLISHED - **Published Date**: May 18, 2025 at 22:00 UTC - **Last Updated**: May 19, 2025 at 14:02 UTC - **Reserved Date**: May 17, 2025 at 12:57 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Student Result Management System 1.0. It has been declared as critical. This vulnerability affects the function unlink of the file update_system.php of the component Logo File Handler. The manipulation of the argument old_logo leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **SourceCodester - Student Result Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-309454 | SourceCodester Student Result Management System Logo File update_system.php unlink path traversal](https://vuldb.com/?id.309454) 2. [VDB-309454 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309454) 3. [Submit #578036 | SRMS Student Result Management System 1.0 Path Traversal](https://vuldb.com/?submit.578036) 4. [](https://magnificent-dill-351.notion.site/Arbitrary-File-Delete-in-SRMS-1-0-1f4c693918ed80de80b0e7925ddbdadc) 5. [](https://www.sourcecodester.com/) ### Credits - s0l42 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-29153, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-29153 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-29153 - **State**: PUBLISHED - **Published Date**: May 07, 2025 at 00:00 UTC - **Last Updated**: May 07, 2025 at 14:00 UTC - **Reserved Date**: March 11, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL Injection vulnerability in lemeconsultoria HCM galera.app v.4.58.0 allows an attacker to execute arbitrary code via the Data export, filters functions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://worzyus.medium.com/391c437c3960) 2. [](https://wellington-almeida.medium.com/poc-sql-391c437c3960)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16343, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16343 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16343 - **State**: PUBLISHED - **Published Date**: September 02, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 10:24 UTC - **Reserved Date**: September 02, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SeaCMS 6.61 allows remote attackers to execute arbitrary code because parseIf() in include/main.class.php does not block use of $GLOBALS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/cumtxujiabin/CmsPoc/blob/master/Seacms_v6.61_backend_RCE.md) 2. [](http://zhinianyuxin.postach.io/post/seacms-v6-61-latest-version-backend-rce)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4694, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4694 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4694 - **State**: PUBLISHED - **Published Date**: September 25, 2016 at 10:00 UTC - **Last Updated**: August 06, 2024 at 00:39 UTC - **Reserved Date**: May 11, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description The Apache HTTP Server in Apple OS X before 10.12 and OS X Server before 5.2 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted CGI client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue, a related issue to CVE-2016-5387. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [93060](http://www.securityfocus.com/bid/93060) 2. [](https://support.apple.com/HT207171) 3. [APPLE-SA-2016-09-20](http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html) 4. [1036853](http://www.securitytracker.com/id/1036853) 5. [](https://support.apple.com/HT207170) 6. [APPLE-SA-2016-09-20-4](http://lists.apple.com/archives/security-announce/2016/Sep/msg00009.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1561, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1561 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1561 - **State**: PUBLISHED - **Published Date**: July 14, 2008 at 23:00 UTC - **Last Updated**: August 08, 2024 at 02:35 UTC - **Reserved Date**: July 14, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Opera, probably before 7.50, sends Referer headers containing https:// URLs in requests for http:// URLs, which allows remote attackers to obtain potentially sensitive information by reading Referer log data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4004](http://securityreason.com/securityalert/4004) 2. [20031230 RE: IE 5.22 on Mac Transmitting HTTP Referer from Secure Page](http://www.securityfocus.com/archive/1/348574)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0052 - **State**: PUBLISHED - **Published Date**: November 12, 2009 at 23:00 UTC - **Last Updated**: August 07, 2024 at 04:17 UTC - **Reserved Date**: January 07, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Atheros wireless driver, as used in Netgear WNDAP330 Wi-Fi access point with firmware 2.1.11 and other versions before 3.0.3 on the Atheros AR9160-BC1A chipset, and other products, allows remote authenticated users to cause a denial of service (device reboot or hang) and possibly execute arbitrary code via a truncated reserved management frame. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [36991](http://www.securityfocus.com/bid/36991) 2. [20091110 Atheros Driver Reserved Frame Vulnerability](http://www.securityfocus.com/archive/1/507777/100/0/threaded) 3. [ADV-2009-3212](http://www.vupen.com/english/advisories/2009/3212) 4. [37344](http://secunia.com/advisories/37344) 5. [59880](http://www.osvdb.org/59880) 6. [netgear-wndap330-frame-dos(54216)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54216)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38678, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38678 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38678 - **State**: PUBLISHED - **Published Date**: January 14, 2022 at 01:00 UTC - **Last Updated**: September 17, 2024 at 03:59 UTC - **Reserved Date**: August 13, 2021 at 00:00 UTC - **Assigned By**: qnap ### Vulnerability Description An open redirect vulnerability has been reported to affect QNAP device running QcalAgent. If exploited, this vulnerability allows attackers to redirect users to an untrusted page that contains malware. We have already fixed this vulnerability in the following versions of QcalAgent: QcalAgent 1.1.7 and later ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **QNAP Systems Inc. - QcalAgent** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.qnap.com/en/security-advisory/qsa-21-60) ### Credits - Tony Martin, a security researcher
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5132, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5132 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5132 - **State**: PUBLISHED - **Published Date**: November 18, 2008 at 11:00 UTC - **Last Updated**: August 07, 2024 at 10:40 UTC - **Reserved Date**: November 17, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in inc/ajax/ajax_rating.php in MemHT Portal 4.0.1 allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For HTTP header. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [7114](https://www.exploit-db.com/exploits/7114) 2. [49903](http://osvdb.org/49903) 3. [memhtportal-ajaxrating-sql-injection(46610)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46610) 4. [32294](http://www.securityfocus.com/bid/32294) 5. [32632](http://secunia.com/advisories/32632) 6. [](http://www.memht.com/news_118_Small-fix-4-0-1.html) 7. [4608](http://securityreason.com/securityalert/4608)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30623, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30623 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30623 - **State**: PUBLISHED - **Published Date**: March 29, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 01:39 UTC - **Reserved Date**: March 27, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the page parameter from fromDhcpListClient function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromDhcpListClient_page.md)