System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8076
- **State**: PUBLISHED
- **Published Date**: September 12, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 21:10 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe application manager installer version 10.0 have an Insecure Library Loading (DLL hijacking) vulnerability. Successful exploitation could lead to Arbitrary Code Execution in the context of the current user.
### Affected Products
**Adobe - Application Manager**
Affected versions:
- Application Manager (installer) 10.0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/application_manager/apsb19-45.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24947, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24947
- **State**: PUBLISHED
- **Published Date**: February 25, 2022 at 08:30 UTC
- **Last Updated**: August 03, 2024 at 04:29 UTC
- **Reserved Date**: February 10, 2022 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache JSPWiki user preferences form is vulnerable to CSRF attacks, which can lead to account takeover. Apache JSPWiki users should upgrade to 2.11.2 or later.
### Affected Products
**Apache Software Foundation - Apache JSPWiki**
Affected versions:
- Apache JSPWiki up to 2.11.1 (Status: affected)
### References
1. [](https://lists.apache.org/thread/txrgykjkpt80t57kzpbjo8kfrv8ss02c)
2. [[oss-security] 20220225 [CVE-2022-24947] Apache JSPWiki CSRF Account Takeover](http://www.openwall.com/lists/oss-security/2022/02/25/1)
### Credits
- This issue was discovered initially by Cristian Borlovan from Ounce Labs Security (ref. JSPWIKI-79), and later on and independently from this by Paulos Yibelo, from Octagon Networks. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3785, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3785 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3785
- **State**: PUBLISHED
- **Published Date**: September 24, 2011 at 00:00 UTC
- **Last Updated**: September 17, 2024 at 03:33 UTC
- **Reserved Date**: September 23, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP Point Of Sale (POS) 10.7 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by system/scaffolding/views/view.php and certain other files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHP-Point-Of-Sale-10.7)
2. [[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability](http://www.openwall.com/lists/oss-security/2011/06/27/6)
3. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21177
- **State**: PUBLISHED
- **Published Date**: July 16, 2024 at 22:40 UTC
- **Last Updated**: March 13, 2025 at 13:21 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL NDB Cluster**
Affected versions:
- * (Status: affected)
- * (Status: affected)
- * (Status: affected)
- * (Status: affected)
**Oracle Corporation - MySQL Server**
Affected versions:
- * (Status: affected)
- * (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujul2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3510, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3510 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3510
- **State**: PUBLISHED
- **Published Date**: November 06, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:17 UTC
- **Reserved Date**: November 06, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2006:0161](http://www.redhat.com/support/errata/RHSA-2006-0161.html)
2. [](http://tomcat.apache.org/security-4.html)
3. [30908](http://secunia.com/advisories/30908)
4. [17416](http://secunia.com/advisories/17416)
5. [239312](http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1)
6. [20439](http://www.osvdb.org/20439)
7. [30899](http://secunia.com/advisories/30899)
8. [15325](http://www.securityfocus.com/bid/15325)
9. [ADV-2008-1979](http://www.vupen.com/english/advisories/2008/1979/references)
10. [20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)](http://www.securityfocus.com/archive/1/500412/100/0/threaded)
11. [33668](http://secunia.com/advisories/33668)
12. [20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/500396/100/0/threaded)
13. [20051104 Apache Tomcat 5.5.x remote Denial Of Service](http://www.securityfocus.com/archive/1/415782/30/0/threaded)
14. [ADV-2009-0233](http://www.vupen.com/english/advisories/2009/0233)
15. [1015147](http://securitytracker.com/id?1015147)
16. [](http://tomcat.apache.org/security-5.html)
17. [RHSA-2008:0261](http://www.redhat.com/support/errata/RHSA-2008-0261.html)
18. [](http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx)
19. [](http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540)
20. [[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E)
21. [[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E)
22. [[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0801, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0801 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0801
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:37 UTC
- **Reserved Date**: October 25, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
lpstat in IRIX 6.5.13f and earlier allows local users to gain root privileges by specifying a Trojan Horse nettype shared library.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20011003-02-P](ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P)
2. [](http://www.lsd-pl.net/files/get?IRIX/irx_lpstat2)
3. [irix-lpstat-net-type-library(7639)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7639) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4040, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4040 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4040
- **State**: PUBLISHED
- **Published Date**: November 21, 2011 at 11:00 UTC
- **Last Updated**: September 17, 2024 at 03:48 UTC
- **Reserved Date**: October 13, 2011 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Buffer overflow in MiniSmtp 3.0.11818 in NJStar Communicator allows remote attackers to execute arbitrary code via a crafted packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#819630](http://www.kb.cert.org/vuls/id/819630) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1120, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1120 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1120
- **State**: PUBLISHED
- **Published Date**: March 25, 2010 at 20:31 UTC
- **Last Updated**: September 16, 2024 at 17:29 UTC
- **Reserved Date**: March 25, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Safari 4 on Apple Mac OS X 10.6 allows remote attackers to execute arbitrary code via unknown vectors, as demonstrated by Charlie Miller during a Pwn2Own competition at CanSecWest 2010.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://twitter.com/thezdi/statuses/11002504493)
2. [](http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010)
3. [](http://news.cnet.com/8301-27080_3-20001126-245.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17939
- **State**: PUBLISHED
- **Published Date**: December 28, 2017 at 06:00 UTC
- **Last Updated**: September 17, 2024 at 00:00 UTC
- **Reserved Date**: December 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP Scripts Mall Single Theater Booking has CSRF via admin/sitesettings.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/d4wner/Vulnerabilities-Report/blob/master/Single-Theater-Booking.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8869, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8869
- **State**: PUBLISHED
- **Published Date**: July 27, 2017 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 16:48 UTC
- **Reserved Date**: May 09, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in MediaCoder 0.8.48.5888 allows remote attackers to execute arbitrary code via a crafted .m3u file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [42384](https://www.exploit-db.com/exploits/42384/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20106, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20106 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20106
- **State**: PUBLISHED
- **Published Date**: May 18, 2023 at 00:00 UTC
- **Last Updated**: October 25, 2024 at 15:57 UTC
- **Reserved Date**: October 27, 2022 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to delete or read arbitrary files on the underlying operating system. To exploit these vulnerabilities, an attacker must have valid credentials on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-602: Security Weakness
### Affected Products
**Cisco - Cisco Identity Services Engine Software **
Affected versions:
- n/a (Status: affected)
### References
1. [20230517 Cisco Identity Services Engine Arbitrary File Delete and File Read Vulnerabilities](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-delete-read-PK5ghDDd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31246, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31246 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31246
- **State**: PUBLISHED
- **Published Date**: June 17, 2022 at 13:39 UTC
- **Last Updated**: August 03, 2024 at 07:11 UTC
- **Reserved Date**: May 20, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
paymentrequest.py in Electrum before 4.2.2 allows a file:// URL in the r parameter of a payment request (e.g., within QR code data). On Windows, this can lead to capture of credentials over SMB. On Linux and UNIX, it can lead to a denial of service by specifying the /dev/zero filename.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355)
2. [](https://twitter.com/ElectrumWallet/status/1534540879905665028) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2792
- **State**: PUBLISHED
- **Published Date**: April 09, 2024 at 18:59 UTC
- **Last Updated**: August 01, 2024 at 19:25 UTC
- **Reserved Date**: March 21, 2024 at 17:23 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via widgets in all versions up to, and including, 1.13.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Affected Products
**webtechstreet - Elementor Addon Elements**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/dcc5a611-23bf-499e-8141-684458d9ce3b?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.13#modules/image-compare/widgets)
3. [](https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.13/modules/image-compare/widgets/image-compare.php#L508)
4. [](https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.13/modules/image-compare/widgets/image-compare.php#L521)
5. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3058768%40addon-elements-for-elementor-page-builder&new=3058768%40addon-elements-for-elementor-page-builder&sfp_email=&sfph_mail=)
### Credits
- wesley |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23521, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23521 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23521
- **State**: PUBLISHED
- **Published Date**: January 31, 2022 at 10:50 UTC
- **Last Updated**: September 17, 2024 at 02:51 UTC
- **Reserved Date**: January 08, 2021 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
This affects the package juce-framework/JUCE before 6.1.5. This vulnerability is triggered when a malicious archive is crafted with an entry containing a symbolic link. When extracted, the symbolic link is followed outside of the target dir allowing writing arbitrary files on the target host. In some cases, this can allow an attacker to execute arbitrary code. The vulnerable code is in the ZipFile::uncompressEntry function in juce_ZipFile.cpp and is executed when the archive is extracted upon calling uncompressTo() on a ZipFile object.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/juce-framework/JUCE/commit/2e874e80cba0152201aff6a4d0dc407997d10a7f)
2. [](https://snyk.io/vuln/SNYK-UNMANAGED-JUCEFRAMEWORKJUCE-2388608)
### Credits
- Snyk Security Research Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7383, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7383
- **State**: PUBLISHED
- **Published Date**: March 17, 2019 at 19:04 UTC
- **Last Updated**: August 04, 2024 at 20:46 UTC
- **Reserved Date**: February 04, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Systrome Cumilon ISG-600C, ISG-600H, and ISG-800W devices with firmware V1.1-R2.1_TRUNK-20181105.bin. A shell command injection occurs by editing the description of an ISP file. The file network/isp/isp_update_edit.php does not properly validate user input, which leads to shell command injection via the des parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/151648/SYSTORME-ISG-Command-Injection.html)
2. [20190212 KSA-Dev-003:CVE-2019-7383 : Remote Code Execution Via shell upload in all systorme ISG products](http://seclists.org/fulldisclosure/2019/Feb/32)
3. [107035](http://www.securityfocus.com/bid/107035)
4. [](https://s3curityb3ast.github.io/KSA-Dev-003.md)
5. [](https://www.breakthesec.com/2019/02/cve-2019-7383-remote-code-execution-via.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3545, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3545 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3545
- **State**: PUBLISHED
- **Published Date**: July 13, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 18:30 UTC
- **Reserved Date**: July 12, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft Internet Explorer 7.0 Beta allows remote attackers to cause a denial of service (application crash) via a web page with multiple empty APPLET start tags. NOTE: a third party has disputed this issue, stating that the crash does not occur with Microsoft Internet Explorer 7.0 Beta3
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18736](http://www.securityfocus.com/bid/18736)
2. [20060630 Re: Msie 7.0 beta Crash](http://www.securityfocus.com/archive/1/438865/100/0/threaded)
3. [20060629 Msie 7.0 beta Crash](http://www.securityfocus.com/archive/1/438754/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3148, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3148
- **State**: PUBLISHED
- **Published Date**: July 10, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 16:00 UTC
- **Reserved Date**: April 17, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3153.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS13-055](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-055)
2. [TA13-190A](http://www.us-cert.gov/ncas/alerts/TA13-190A)
3. [oval:org.mitre.oval:def:17034](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17034) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6425, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6425 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6425
- **State**: PUBLISHED
- **Published Date**: January 23, 2008 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 16:02 UTC
- **Reserved Date**: December 18, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in HP-UX B.11.31, when running ARPA Transport, allows remote attackers to cause a denial of service via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1019260](http://www.securitytracker.com/id?1019260)
2. [oval:org.mitre.oval:def:5436](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5436)
3. [ADV-2008-0262](http://www.vupen.com/english/advisories/2008/0262)
4. [HPSBUX02306](http://www.securityfocus.com/archive/1/486852/100/0/threaded)
5. [SSRT071463](http://www.securityfocus.com/archive/1/486852/100/0/threaded)
6. [28612](http://secunia.com/advisories/28612)
7. [hpux-arpa-transport-dos(39858)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39858) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11092, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11092
- **State**: PUBLISHED
- **Published Date**: June 13, 2019 at 15:36 UTC
- **Last Updated**: August 04, 2024 at 22:40 UTC
- **Reserved Date**: April 11, 2019 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access.
### Affected Products
**n/a - Open Cloud Integrity Technology and OpenAttestation**
Affected versions:
- All versions of Open CIT and OpenAttestation. (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28536, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28536
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 11:31 UTC
- **Last Updated**: December 09, 2024 at 18:44 UTC
- **Reserved Date**: March 17, 2023 at 11:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Acato Branded Social Images allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Branded Social Images: from n/a through 1.1.0.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Acato - Branded Social Images**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/branded-social-images/vulnerability/wordpress-branded-social-images-plugin-1-1-0-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Yuki Haruma (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0854, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0854 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0854
- **State**: PUBLISHED
- **Published Date**: August 14, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:03 UTC
- **Reserved Date**: August 12, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflows in ISDN Point to Point Protocol (PPP) daemon (ipppd) in the i4l package on SuSE 7.3, 8.0, and possibly other operating systems, may allow local users to gain privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SuSE-SA:2002:030](https://lists.opensuse.org/opensuse-security-announce/2002-08/msg00006.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11101
- **State**: PUBLISHED
- **Published Date**: December 26, 2022 at 00:00 UTC
- **Last Updated**: April 14, 2025 at 16:20 UTC
- **Reserved Date**: March 30, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sierra Wireless AirLink Mobility Manager (AMM) before 2.17 mishandles sessions and thus an unauthenticated attacker can obtain a login session with administrator privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sierrawireless.com/company/security/)
2. [](https://source.sierrawireless.com/-/media/support_downloads/security-bulletins/pdf/swi-psa-2020-007---amm-unauthenticated-login.ashx) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1578, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1578 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1578
- **State**: PUBLISHED
- **Published Date**: April 02, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 17:19 UTC
- **Reserved Date**: April 02, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Keystone Digital Library Suite (DLS) 1.5.4 and earlier allow remote attackers to execute arbitrary SQL commands via the subject_type_id parameter in (1) the index page and (2) the search module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [keystonedls-subjecttypeid-sql-injection(25571)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25571)
2. [](http://pridels0.blogspot.com/2006/03/keystone-dls-sql-vuln.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5057, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5057
- **State**: PUBLISHED
- **Published Date**: August 29, 2024 at 14:04 UTC
- **Last Updated**: August 29, 2024 at 14:27 UTC
- **Reserved Date**: May 17, 2024 at 10:11 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Easy Digital Downloads allows SQL Injection.This issue affects Easy Digital Downloads: from n/a through 3.2.12.
### CVSS Metrics
- **CVSS Base Score**: 9.3/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Easy Digital Downloads - Easy Digital Downloads**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/easy-digital-downloads/wordpress-easy-digital-downloads-plugin-3-2-12-sql-injection-vulnerability?_s_id=cve)
### Credits
- justakazh (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1175
- **State**: REJECTED
- **Published Date**: May 16, 2013 at 01:00 UTC
- **Last Updated**: June 04, 2013 at 09:00 UTC
- **Reserved Date**: January 11, 2013 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4418, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4418
- **State**: PUBLISHED
- **Published Date**: August 18, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 18, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM DB2 UDB 8 before Fixpak 15 does not properly check authorization, which allows remote authenticated users with a certain SELECT privilege to have an unknown impact via unspecified vectors. NOTE: this issue is probably related to CVE-2007-1089, but this is uncertain due to lack of details.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JR25940](http://www-1.ibm.com/support/docview.wss?uid=swg1JR25940)
2. [20070818 Recent DB2 Vulnerabilities](http://www.attrition.org/pipermail/vim/2007-August/001765.html)
3. [ADV-2007-2912](http://www.vupen.com/english/advisories/2007/2912)
4. [25339](http://www.securityfocus.com/bid/25339)
5. [db2-select-unspecified(36109)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36109)
6. [](http://www-1.ibm.com/support/docview.wss?uid=swg21255352)
7. [26471](http://secunia.com/advisories/26471) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0137, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0137 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0137
- **State**: PUBLISHED
- **Published Date**: May 14, 2025 at 18:09 UTC
- **Last Updated**: May 14, 2025 at 20:49 UTC
- **Reserved Date**: December 20, 2024 at 23:24 UTC
- **Assigned By**: palo_alto
### Vulnerability Description
An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator.
The attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
### Weakness Classification (CWE)
- CWE-83: Security Weakness
### Affected Products
**Palo Alto Networks - Cloud NGFW**
Affected versions:
- All (Status: unaffected)
**Palo Alto Networks - PAN-OS**
Affected versions:
- 11.2.0 (Status: affected)
- 11.1.0 (Status: affected)
- 10.2.0 (Status: affected)
- 10.1.0 (Status: affected)
### References
1. [](https://security.paloaltonetworks.com/CVE-2025-0137)
### Credits
- Jasper Westerman, Harm Blankers and Yanick de Pater of REQON B.V.
- a customer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4015
- **State**: PUBLISHED
- **Published Date**: September 25, 2012 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 02:57 UTC
- **Reserved Date**: July 12, 2012 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the management screen in myLittleTools myLittleAdmin for SQL Server 2000 allows remote attackers to inject arbitrary web script or HTML via vectors that trigger a crafted database entry.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVN#56373673](http://jvn.jp/en/jp/JVN56373673/index.html)
2. [JVNDB-2012-000087](http://jvndb.jvn.jp/jvndb/JVNDB-2012-000087) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5526
- **State**: PUBLISHED
- **Published Date**: June 01, 2018 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 03:07 UTC
- **Reserved Date**: January 12, 2018 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
Under certain conditions, on F5 BIG-IP ASM 13.1.0-13.1.0.5, Behavioral DOS (BADOS) protection may fail during an attack.
### Affected Products
**F5 Networks, Inc. - BIG-IP (ASM)**
Affected versions:
- 13.1.0-13.1.0.5 (Status: affected)
### References
1. [1041019](http://www.securitytracker.com/id/1041019)
2. [104470](http://www.securityfocus.com/bid/104470)
3. [](https://support.f5.com/csp/article/K62201098) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36583, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36583 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36583
- **State**: PUBLISHED
- **Published Date**: September 01, 2022 at 17:50 UTC
- **Last Updated**: August 03, 2024 at 10:07 UTC
- **Reserved Date**: July 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DedeCMS V5.7.97 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities at /dede/co_do.php via the dopost, rpok, and aid parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.csdn.net/weixin_45996361/article/details/125882580) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4280, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4280
- **State**: PUBLISHED
- **Published Date**: August 21, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 19:06 UTC
- **Reserved Date**: August 21, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in anjel.index.php in ANJEL (formerly MaMML) Component (com_anjel) for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. NOTE: this issue has been disputed by a third party, who says that $mosConfig_absolute_path is set in a configuration file
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060818 Re: anjel Mambo Component Remote File Include](http://archives.neohapsis.com/archives/bugtraq/2006-08/0441.html)
2. [20060817 anjel Mambo Component Remote File Include](http://www.securityfocus.com/archive/1/443627/100/0/threaded)
3. [28084](http://www.osvdb.org/28084)
4. [anjel-index-file-include(28449)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28449) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2248, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2248 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2248
- **State**: PUBLISHED
- **Published Date**: July 08, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 08:58 UTC
- **Reserved Date**: May 16, 2008 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) for Exchange Server 2003 SP2 allows remote attackers to inject arbitrary web script or HTML via unspecified HTML, a different vulnerability than CVE-2008-2247.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:5695](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5695)
2. [ADV-2008-2021](http://www.vupen.com/english/advisories/2008/2021/references)
3. [1020439](http://www.securitytracker.com/id?1020439)
4. [MS08-039](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-039)
5. [exchange-owa-html-xss(43329)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43329)
6. [30964](http://secunia.com/advisories/30964)
7. [TA08-190A](http://www.us-cert.gov/cas/techalerts/TA08-190A.html)
8. [30078](http://www.securityfocus.com/bid/30078) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7254, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7254 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7254
- **State**: PUBLISHED
- **Published Date**: March 12, 2020 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 20:37 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: trellix
### Vulnerability Description
Privilege Escalation vulnerability in the command line interface in McAfee Advanced Threat Defense (ATD) 4.x prior to 4.8.2 allows local users to execute arbitrary code via improper access controls on the sudo command.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H`
### Weakness Classification (CWE)
- CWE-264: Security Weakness
- CWE-269: Security Weakness
### Affected Products
**McAfee, LLC - McAfee Advanced Threat Defense (ATD)**
Affected versions:
- 4.x (Status: affected)
### References
1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10311)
### Credits
- McAfee credits Jerome Nokin from NCIA for responsibly reporting CVE-2020-7254 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3376, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3376 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3376
- **State**: PUBLISHED
- **Published Date**: January 27, 2017 at 22:01 UTC
- **Last Updated**: October 08, 2024 at 20:21 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
### Affected Products
**Oracle - Advanced Outbound Telephony**
Affected versions:
- 12.1.1 (Status: affected)
- 12.1.2 (Status: affected)
- 12.1.3 (Status: affected)
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
### References
1. [95531](http://www.securityfocus.com/bid/95531)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2334, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2334
- **State**: PUBLISHED
- **Published Date**: July 20, 2021 at 22:43 UTC
- **Last Updated**: September 26, 2024 at 14:06 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Database - Enterprise Edition Data Redaction component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via Oracle Net to compromise Oracle Database - Enterprise Edition Data Redaction. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database - Enterprise Edition Data Redaction accessible data. CVSS 3.1 Base Score 3.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Affected Products
**Oracle Corporation - Database - Enterprise Edition**
Affected versions:
- 12.1.0.2 (Status: affected)
- 12.2.0.1 (Status: affected)
- 19c (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37559
- **State**: PUBLISHED
- **Published Date**: July 21, 2024 at 06:48 UTC
- **Last Updated**: August 02, 2024 at 03:57 UTC
- **Reserved Date**: June 09, 2024 at 18:17 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Echenley Counterpoint allows Reflected XSS.This issue affects Counterpoint: from n/a through 1.8.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Echenley - Counterpoint**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/counterpoint/wordpress-counterpoint-theme-1-8-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- justakazh (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26272, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26272 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26272
- **State**: PUBLISHED
- **Published Date**: January 28, 2021 at 18:25 UTC
- **Last Updated**: May 27, 2025 at 15:20 UTC
- **Reserved Date**: October 01, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
The Electron framework lets users write cross-platform desktop applications using JavaScript, HTML and CSS. In versions of Electron IPC prior to 9.4.0, 10.2.0, 11.1.0, and 12.0.0-beta.9, messages sent from the main process to a subframe in the renderer process, through webContents.sendToFrame, event.reply or when using the remote module, can in some cases be delivered to the wrong frame. If your app uses remote, calls webContents.sendToFrame, or calls event.reply in an IPC message handler then it is impacted by this issue. This has been fixed in versions 9.4.0, 10.2.0, 11.1.0, and 12.0.0-beta.9. There are no known workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-668: Security Weakness
### Affected Products
**electron - electron**
Affected versions:
- < 9.4.0 (Status: affected)
- >= 10.0.0, < 10.2.0 (Status: affected)
- >= 11.0.0, < 11.1.0 (Status: affected)
### References
1. [https://github.com/electron/electron/security/advisories/GHSA-hvf8-h2qh-37m9](https://github.com/electron/electron/security/advisories/GHSA-hvf8-h2qh-37m9)
2. [https://github.com/electron/electron/pull/26875](https://github.com/electron/electron/pull/26875)
3. [https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c](https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c)
4. [https://github.com/electron/electron/commit/0bbd268eb4caf35604443df5ff196980dd49e208](https://github.com/electron/electron/commit/0bbd268eb4caf35604443df5ff196980dd49e208)
5. [https://github.com/electron/electron/commit/36c695ce2a7e22c07fe1e30c61c00d20371daee2](https://github.com/electron/electron/commit/36c695ce2a7e22c07fe1e30c61c00d20371daee2)
6. [https://github.com/electron/electron/commit/429400040ecb16a21d19936658579e65a797e4cc](https://github.com/electron/electron/commit/429400040ecb16a21d19936658579e65a797e4cc)
7. [https://github.com/electron/electron/commit/5c8e7e8b7f485ceafa8b271086d7b87e1de9dedd](https://github.com/electron/electron/commit/5c8e7e8b7f485ceafa8b271086d7b87e1de9dedd)
8. [https://github.com/electron/electron/releases/tag/v9.4.0](https://github.com/electron/electron/releases/tag/v9.4.0)
9. [https://www.electronjs.org/releases/stable?version=9#9.4.0](https://www.electronjs.org/releases/stable?version=9#9.4.0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11039, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11039
- **State**: PUBLISHED
- **Published Date**: June 25, 2018 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 22:08 UTC
- **Reserved Date**: May 14, 2018 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack.
### Affected Products
**Pivotal - Spring Framework**
Affected versions:
- 5.0.x (Status: affected)
- 4.3.x (Status: affected)
### References
1. [107984](http://www.securityfocus.com/bid/107984)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html)
3. [](https://www.oracle.com/security-alerts/cpujul2020.html)
4. [](https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html)
5. [](https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html)
6. [](https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html)
7. [](https://www.oracle.com/security-alerts/cpujan2020.html)
8. [](https://pivotal.io/security/cve-2018-11039)
9. [[debian-lts-announce] 20210423 [SECURITY] [DLA 2635-1] libspring-java security update](https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html)
10. [](https://www.oracle.com/security-alerts/cpuoct2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3880, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3880 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3880
- **State**: PUBLISHED
- **Published Date**: April 16, 2024 at 19:00 UTC
- **Last Updated**: August 01, 2024 at 20:26 UTC
- **Reserved Date**: April 16, 2024 at 10:49 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in Tenda W30E 1.0.1.25(633) and classified as critical. This vulnerability affects the function formWriteFacMac of the file /goform/WriteFacMac. The manipulation of the argument mac leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260914 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Tenda - W30E**
Affected versions:
- 1.0.1.25(633) (Status: affected)
### References
1. [VDB-260914 | Tenda W30E WriteFacMac formWriteFacMac os command injection](https://vuldb.com/?id.260914)
2. [VDB-260914 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.260914)
3. [Submit #312823 | Tenda W30Ev1.0 V1.0.1.25(633) command injection](https://vuldb.com/?submit.312823)
4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md)
### Credits
- wxhwxhwxh_mie (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15878, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15878
- **State**: PUBLISHED
- **Published Date**: May 13, 2020 at 15:38 UTC
- **Last Updated**: August 05, 2024 at 01:03 UTC
- **Reserved Date**: September 03, 2019 at 00:00 UTC
- **Assigned By**: freebsd
### Vulnerability Description
In FreeBSD 12.1-STABLE before r352509, 11.3-STABLE before r352509, and 11.3-RELEASE before p9, an unprivileged local user can trigger a use-after-free situation due to improper checking in SCTP when an application tries to update an SCTP-AUTH shared key.
### Affected Products
**n/a - FreeBSD**
Affected versions:
- FreeBSD 11.3-RELEASE before p9 (Status: affected)
### References
1. [](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:14.sctp.asc)
2. [](https://security.netapp.com/advisory/ntap-20200518-0007/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36528, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36528 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36528
- **State**: PUBLISHED
- **Published Date**: December 13, 2024 at 14:23 UTC
- **Last Updated**: December 13, 2024 at 20:44 UTC
- **Reserved Date**: June 22, 2023 at 14:28 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in FeedbackWP kk Star Ratings allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects kk Star Ratings: from n/a through 5.4.3.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**FeedbackWP - kk Star Ratings**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/kk-star-ratings/vulnerability/wordpress-kk-star-ratings-plugin-5-4-3-rate-manipulation-due-to-ip-spoofing-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0591, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0591
- **State**: PUBLISHED
- **Published Date**: November 12, 2020 at 17:55 UTC
- **Last Updated**: August 04, 2024 at 06:11 UTC
- **Reserved Date**: October 28, 2019 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper buffer restrictions in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
### Affected Products
**n/a - Intel(R) Processors**
Affected versions:
- See references (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00358)
2. [](https://security.netapp.com/advisory/ntap-20201113-0001/)
3. [](https://cert-portal.siemens.com/productcert/pdf/ssa-501073.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5269, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5269 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5269
- **State**: PUBLISHED
- **Published Date**: April 20, 2020 at 16:45 UTC
- **Last Updated**: August 04, 2024 at 08:22 UTC
- **Reserved Date**: January 02, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
In PrestaShop between versions 1.7.6.1 and 1.7.6.5, there is a reflected XSS on AdminFeatures page by using the `id_feature` parameter. The problem is fixed in 1.7.6.5
### CVSS Metrics
- **CVSS Base Score**: 4.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**PrestaShop - PrestaShop**
Affected versions:
- >= 1.7.6.1, < 1.7.6.5 (Status: affected)
### References
1. [](https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-87jh-7xpg-6v93)
2. [](https://github.com/PrestaShop/PrestaShop/commit/9efca621a0b74b82dafa91e6b955120036e31334) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1746, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1746 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1746
- **State**: PUBLISHED
- **Published Date**: June 21, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:34 UTC
- **Reserved Date**: June 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vtun 2.5b1 allows remote attackers to inject data into user sessions by sniffing and replaying packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020109 Security weaknesses of VTun](http://seclists.org/bugtraq/2002/Jan/0119.html)
2. [vpn-replay-attack(7870)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7870) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0275, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0275 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0275
- **State**: PUBLISHED
- **Published Date**: January 15, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 07:39 UTC
- **Reserved Date**: January 15, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Atom 4.7 before 4.7.x-1.0 and 5.x before 5.x-1.0 module for Drupal does not properly manage permissions for node (1) titles, (2) teasers, and (3) bodies, which might allow remote attackers to gain access to syndicated content.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://drupal.org/node/208527)
2. [drupal-atom-security-bypass(39607)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39607) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0309, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0309 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0309
- **State**: PUBLISHED
- **Published Date**: January 11, 2021 at 21:47 UTC
- **Last Updated**: August 03, 2024 at 15:32 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In onCreate of grantCredentialsPermissionActivity, there is a confused deputy. This could lead to local information disclosure and account access with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-158480899.
### Affected Products
**n/a - Android**
Affected versions:
- Android-8.1 (Status: affected)
- Android-9 (Status: affected)
- Android-10 (Status: affected)
- Android-11 (Status: affected)
- Android-8.0 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-01-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000626, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000626 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000626
- **State**: PUBLISHED
- **Published Date**: December 28, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 12:40 UTC
- **Reserved Date**: July 27, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Battelle V2I Hub 2.5.1 could allow a remote attacker to bypass security restrictions, caused by the lack of requirement to change the default API key. An attacker could exploit this vulnerability using all available API functions containing an unchanged API key to gain unauthorized access to the system.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/147303) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17944, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17944 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17944
- **State**: PUBLISHED
- **Published Date**: March 12, 2019 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 11:01 UTC
- **Reserved Date**: October 03, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
On certain Lexmark devices that communicate with an LDAP or SMTP server, a malicious administrator can discover LDAP or SMTP credentials by changing that server's hostname to one that they control, and then capturing the credentials that are sent there. This occurs because stored credentials are not automatically deleted upon that type of hostname change.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.lexmark.com/index?page=content&id=TE909) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34414, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34414 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34414
- **State**: PUBLISHED
- **Published Date**: March 16, 2023 at 11:37 UTC
- **Last Updated**: February 26, 2025 at 15:48 UTC
- **Reserved Date**: June 23, 2022 at 18:55 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Dell - PowerEdge Platform**
Affected versions:
- 14G,15G (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26373, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26373 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26373
- **State**: PUBLISHED
- **Published Date**: May 11, 2022 at 16:27 UTC
- **Last Updated**: September 16, 2024 at 16:32 UTC
- **Reserved Date**: January 29, 2021 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
Insufficient bound checks in the System Management Unit (SMU) may result in a system voltage malfunction that could result in denial of resources and/or possibly denial of service.
### Affected Products
**AMD - EPYC™ Processors**
Affected versions:
- various (Status: affected)
**AMD - Ryzen™ Series**
Affected versions:
- various (Status: affected)
**AMD - Athlon™ Series**
Affected versions:
- various (Status: affected)
### References
1. [](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027)
2. [](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6182
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11138, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11138 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11138
- **State**: REJECTED
- **Last Updated**: February 28, 2023 at 00:00 UTC
- **Reserved Date**: April 11, 2019 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49124, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49124 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49124
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 01:55 UTC
- **Last Updated**: May 04, 2025 at 08:30 UTC
- **Reserved Date**: February 26, 2025 at 01:49 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
x86/mce: Work around an erratum on fast string copy instructions
A rare kernel panic scenario can happen when the following conditions
are met due to an erratum on fast string copy instructions:
1) An uncorrected error.
2) That error must be in first cache line of a page.
3) Kernel must execute page_copy from the page immediately before that
page.
The fast string copy instructions ("REP; MOVS*") could consume an
uncorrectable memory error in the cache line _right after_ the desired
region to copy and raise an MCE.
Bit 0 of MSR_IA32_MISC_ENABLE can be cleared to disable fast string
copy and will avoid such spurious machine checks. However, that is less
preferable due to the permanent performance impact. Considering memory
poison is rare, it's desirable to keep fast string copy enabled until an
MCE is seen.
Intel has confirmed the following:
1. The CPU erratum of fast string copy only applies to Skylake,
Cascade Lake and Cooper Lake generations.
Directly return from the MCE handler:
2. Will result in complete execution of the "REP; MOVS*" with no data
loss or corruption.
3. Will not result in another MCE firing on the next poisoned cache line
due to "REP; MOVS*".
4. Will resume execution from a correct point in code.
5. Will result in the same instruction that triggered the MCE firing a
second MCE immediately for any other software recoverable data fetch
errors.
6. Is not safe without disabling the fast string copy, as the next fast
string copy of the same buffer on the same CPU would result in a PANIC
MCE.
This should mitigate the erratum completely with the only caveat that
the fast string copy is disabled on the affected hyper thread thus
performance degradation.
This is still better than the OS crashing on MCEs raised on an
irrelevant process due to "REP; MOVS*' accesses in a kernel context,
e.g., copy_page.
Injected errors on 1st cache line of 8 anonymous pages of process
'proc1' and observed MCE consumption from 'proc2' with no panic
(directly returned).
Without the fix, the host panicked within a few minutes on a
random 'proc2' process due to kernel access from copy_page.
[ bp: Fix comment style + touch ups, zap an unlikely(), improve the
quirk function's readability. ]
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.17.3 (Status: unaffected)
- 5.18 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/ba37c73be3d5632f6fb9fa20b250ce45560ca85d)
2. [](https://git.kernel.org/stable/c/8ca97812c3c830573f965a07bbd84223e8c5f5bd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2349, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2349
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3277, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3277
- **State**: PUBLISHED
- **Published Date**: June 19, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 14:14 UTC
- **Reserved Date**: June 19, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the localization before 1.2 module for WIKINDX allows attackers to access certain administrative capabilities via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25709](http://secunia.com/advisories/25709)
2. [24508](http://www.securityfocus.com/bid/24508)
3. [](http://sourceforge.net/project/shownotes.php?release_id=516776)
4. [37514](http://osvdb.org/37514)
5. [wikindx-localization-security-bypass(34922)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34922) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7229
- **State**: PUBLISHED
- **Published Date**: June 24, 2019 at 17:15 UTC
- **Last Updated**: August 04, 2024 at 20:46 UTC
- **Reserved Date**: January 30, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software components: "Utilization of USB/SD Card to flash the device" and "Remote provisioning process via ABB Panel Builder 600 over FTP." Neither of these transmission methods implements any form of encryption or authenticity checks against the new firmware HMI software binary files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20190624 XL-19-005 - ABB HMI Absence of Signature Verification Vulnerability](http://seclists.org/fulldisclosure/2019/Jun/34)
2. [](http://seclists.org/fulldisclosure/2019/Jun/34)
3. [](https://www.darkmatter.ae/xen1thlabs/abb-hmi-absence-of-signature-verification-vulnerability-xl-19-005/)
4. [](https://search.abb.com/library/Download.aspx?DocumentID=3ADR010376&LanguageCode=en&DocumentPartId=&Action=Launch)
5. [](https://search.abb.com/library/Download.aspx?DocumentID=3ADR010402&LanguageCode=en&DocumentPartId=&Action=Launch)
6. [](http://packetstormsecurity.com/files/153387/ABB-HMI-Missing-Signature-Verification.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14753, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14753 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14753
- **State**: PUBLISHED
- **Published Date**: October 21, 2020 at 14:04 UTC
- **Last Updated**: September 26, 2024 at 20:29 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality Reporting and Analytics product of Oracle Food and Beverage Applications (component: Installation). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Hospitality Reporting and Analytics executes to compromise Oracle Hospitality Reporting and Analytics. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Hospitality Reporting and Analytics, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Reporting and Analytics accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N`
### Affected Products
**Oracle Corporation - Hospitality Reporting and Analytics**
Affected versions:
- 9.1.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1647
- **State**: PUBLISHED
- **Published Date**: August 28, 2012 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 19:01 UTC
- **Reserved Date**: March 12, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the "stand alone PHP application for the OSM Player," as used in the MediaFront module 6.x-1.x before 6.x-1.5 and 7.x-1.x before 7.x-1.5 for Drupal, allow remote attackers to inject arbitrary web script or HTML via (1) $_SERVER['HTTP_HOST'] or (2) $_SERVER['SCRIPT_NAME'] to players/osmplayer/player/OSMPlayer.php, (3) playlist parameter to players/osmplayer/player/getplaylist.php, and possibly other vectors related to $_SESSION.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://drupal.org/node/1461424)
2. [](http://drupalcode.org/project/mediafront.git/commitdiff/b3857aa)
3. [](http://drupalcode.org/project/mediafront.git/commitdiff/6300750)
4. [](https://drupal.org/node/1460892)
5. [[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)](http://www.openwall.com/lists/oss-security/2012/04/07/1)
6. [52229](http://www.securityfocus.com/bid/52229)
7. [](https://drupal.org/node/1460894)
8. [79684](http://www.osvdb.org/79684)
9. [mediafront-phplibrary-xss(73606)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73606) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0374, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0374
- **State**: PUBLISHED
- **Published Date**: July 18, 2018 at 23:00 UTC
- **Last Updated**: November 29, 2024 at 14:51 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Policy Builder database of Cisco Policy Suite before 18.2.0 could allow an unauthenticated, remote attacker to connect directly to the Policy Builder database. The vulnerability is due to a lack of authentication. An attacker could exploit this vulnerability by connecting directly to the Policy Builder database. A successful exploit could allow the attacker to access and change any data in the Policy Builder database. Cisco Bug IDs: CSCvh06134.
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**n/a - Cisco Policy Suite unknown**
Affected versions:
- Cisco Policy Suite unknown (Status: affected)
### References
1. [104851](http://www.securityfocus.com/bid/104851)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-policy-unauth-access) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5765, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5765
- **State**: PUBLISHED
- **Published Date**: June 06, 2025 at 12:31 UTC
- **Last Updated**: June 06, 2025 at 13:42 UTC
- **Reserved Date**: June 05, 2025 at 22:05 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in code-projects Laundry System 1.0. It has been classified as problematic. This affects an unknown part of the file /data/edit_laundry.php. The manipulation of the argument Customer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**code-projects - Laundry System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-311307 | code-projects Laundry System edit_laundry.php cross site scripting](https://vuldb.com/?id.311307)
2. [VDB-311307 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311307)
3. [Submit #590809 | code-projects Laundry System 1.0 Cross Site Scripting](https://vuldb.com/?submit.590809)
4. [](https://github.com/tuooo/CVE/issues/6)
5. [](https://code-projects.org/)
### Credits
- DS_Leo (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46972, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46972 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46972
- **State**: PUBLISHED
- **Published Date**: February 27, 2024 at 18:47 UTC
- **Last Updated**: May 04, 2025 at 07:01 UTC
- **Reserved Date**: February 27, 2024 at 18:42 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ovl: fix leaked dentry
Since commit 6815f479ca90 ("ovl: use only uppermetacopy state in
ovl_lookup()"), overlayfs doesn't put temporary dentry when there is a
metacopy error, which leads to dentry leaks when shutting down the related
superblock:
overlayfs: refusing to follow metacopy origin for (/file0)
...
BUG: Dentry (____ptrval____){i=3f33,n=file3} still in use (1) [unmount of overlay overlay]
...
WARNING: CPU: 1 PID: 432 at umount_check.cold+0x107/0x14d
CPU: 1 PID: 432 Comm: unmount-overlay Not tainted 5.12.0-rc5 #1
...
RIP: 0010:umount_check.cold+0x107/0x14d
...
Call Trace:
d_walk+0x28c/0x950
? dentry_lru_isolate+0x2b0/0x2b0
? __kasan_slab_free+0x12/0x20
do_one_tree+0x33/0x60
shrink_dcache_for_umount+0x78/0x1d0
generic_shutdown_super+0x70/0x440
kill_anon_super+0x3e/0x70
deactivate_locked_super+0xc4/0x160
deactivate_super+0xfa/0x140
cleanup_mnt+0x22e/0x370
__cleanup_mnt+0x1a/0x30
task_work_run+0x139/0x210
do_exit+0xb0c/0x2820
? __kasan_check_read+0x1d/0x30
? find_held_lock+0x35/0x160
? lock_release+0x1b6/0x660
? mm_update_next_owner+0xa20/0xa20
? reacquire_held_locks+0x3f0/0x3f0
? __sanitizer_cov_trace_const_cmp4+0x22/0x30
do_group_exit+0x135/0x380
__do_sys_exit_group.isra.0+0x20/0x20
__x64_sys_exit_group+0x3c/0x50
do_syscall_64+0x45/0x70
entry_SYSCALL_64_after_hwframe+0x44/0xae
...
VFS: Busy inodes after unmount of overlay. Self-destruct in 5 seconds. Have a nice day...
This fix has been tested with a syzkaller reproducer.
### Affected Products
**Linux - Linux**
Affected versions:
- 6815f479ca90ee7fd2e28b2a420f796b974155fe (Status: affected)
- 6815f479ca90ee7fd2e28b2a420f796b974155fe (Status: affected)
- 6815f479ca90ee7fd2e28b2a420f796b974155fe (Status: affected)
- 6815f479ca90ee7fd2e28b2a420f796b974155fe (Status: affected)
**Linux - Linux**
Affected versions:
- 5.8 (Status: affected)
- 0 (Status: unaffected)
- 5.10.35 (Status: unaffected)
- 5.11.19 (Status: unaffected)
- 5.12.2 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/71d58457a8afc650da5d3292a7f7029317654d95)
2. [](https://git.kernel.org/stable/c/cf3e3330bc5719fa9d658e3e2f596bde89344a94)
3. [](https://git.kernel.org/stable/c/d587cfaef72b1b6f4b2774827123bce91f497cc8)
4. [](https://git.kernel.org/stable/c/eaab1d45cdb4bb0c846bd23c3d666d5b90af7b41) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52669, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52669 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52669
- **State**: PUBLISHED
- **Published Date**: May 17, 2024 at 14:01 UTC
- **Last Updated**: May 04, 2025 at 07:41 UTC
- **Reserved Date**: March 07, 2024 at 14:49 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
crypto: s390/aes - Fix buffer overread in CTR mode
When processing the last block, the s390 ctr code will always read
a whole block, even if there isn't a whole block of data left. Fix
this by using the actual length left and copy it into a buffer first
for processing.
### Affected Products
**Linux - Linux**
Affected versions:
- 0200f3ecc19660bebeabbcbaf212957fcf1dbf8f (Status: affected)
- 0200f3ecc19660bebeabbcbaf212957fcf1dbf8f (Status: affected)
- 0200f3ecc19660bebeabbcbaf212957fcf1dbf8f (Status: affected)
- 0200f3ecc19660bebeabbcbaf212957fcf1dbf8f (Status: affected)
- 0200f3ecc19660bebeabbcbaf212957fcf1dbf8f (Status: affected)
- 0200f3ecc19660bebeabbcbaf212957fcf1dbf8f (Status: affected)
**Linux - Linux**
Affected versions:
- 3.0 (Status: affected)
- 0 (Status: unaffected)
- 5.10.210 (Status: unaffected)
- 5.15.149 (Status: unaffected)
- 6.1.76 (Status: unaffected)
- 6.6.15 (Status: unaffected)
- 6.7.3 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/cd51e26a3b89706beec64f2d8296cfb1c34e0c79)
2. [](https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285)
3. [](https://git.kernel.org/stable/c/dbc9a791a70ea47be9f2acf251700fe254a2ab23)
4. [](https://git.kernel.org/stable/c/d68ac38895e84446848b7647ab9458d54cacba3e)
5. [](https://git.kernel.org/stable/c/e78f1a43e72daf77705ad5b9946de66fc708b874)
6. [](https://git.kernel.org/stable/c/d07f951903fa9922c375b8ab1ce81b18a0034e3b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4727, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4727 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4727
- **State**: PUBLISHED
- **Published Date**: June 06, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 16:52 UTC
- **Reserved Date**: June 29, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DDSN Interactive cm3 Acora CMS 6.0.6/1a, 6.0.2/1a, 5.5.7/12b, 5.5.0/1b-p1, and possibly other versions, allows remote attackers to obtain sensitive information via a request to Admin/top.aspx.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.digitalsec.net/stuff/explt+advs/CM3.AcoraCMS.v6.txt)
2. [96666](http://osvdb.org/96666) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5214
- **State**: PUBLISHED
- **Published Date**: June 06, 2019 at 14:18 UTC
- **Last Updated**: August 04, 2024 at 19:47 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There is a use after free vulnerability on certain driver component in Huawei Mate10 smartphones versions earlier than ALP-AL00B 9.0.0.167(C00E85R2P20T8). An attacker tricks the user into installing a malicious application, which make the software to reference memory after it has been freed. Successful exploit could cause a denial of service condition.
### Affected Products
**Huawei - Huawei Mate10**
Affected versions:
- Versions earlier than ALP-AL00B 9.0.0.167(C00E85R2P20T8) (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190109-01-smartphone-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0605, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0605 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0605
- **State**: PUBLISHED
- **Published Date**: January 22, 2024 at 18:23 UTC
- **Last Updated**: August 01, 2024 at 18:11 UTC
- **Reserved Date**: January 16, 2024 at 16:14 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Using a javascript: URI with a setTimeout race condition, an attacker can execute unauthorized scripts on top origin sites in urlbar. This bypasses security measures, potentially leading to arbitrary code execution or unauthorized actions within the user's loaded webpage. This vulnerability affects Focus for iOS < 122.
### Affected Products
**Mozilla - Focus for iOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1855575)
2. [](https://www.mozilla.org/security/advisories/mfsa2024-03/)
### Credits
- James Lee |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8996, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8996 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8996
- **State**: PUBLISHED
- **Published Date**: November 20, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 13:33 UTC
- **Reserved Date**: November 19, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Nibbleblog before 4.0.2 allow remote attackers to inject arbitrary web script or HTML via the (1) author_name or (2) content parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://blog.nibbleblog.com/post/nibbleblog-v4.0.2-coffee/)
2. [](http://packetstormsecurity.com/files/129133/Nibbleblog-4.0.1-Cross-Site-Scripting.html)
3. [nibbleblog-index-xss(98738)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98738)
4. [71111](http://www.securityfocus.com/bid/71111)
5. [20141117 Reflected XSS in Nibbleblog <= v4.0.1](http://seclists.org/fulldisclosure/2014/Nov/38) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15979, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15979 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15979
- **State**: PUBLISHED
- **Published Date**: November 29, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 10:10 UTC
- **Reserved Date**: August 28, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.008.20080 and earlier, 2017.011.30105 and earlier, and 2015.006.30456 and earlier have a ntlm sso hash theft vulnerability. Successful exploitation could lead to information disclosure.
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.008.20080 and earlier, 2017.011.30105 and earlier, and 2015.006.30456 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb18-40.html)
2. [105907](http://www.securityfocus.com/bid/105907)
3. [1042099](http://www.securitytracker.com/id/1042099) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36429, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36429 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36429
- **State**: PUBLISHED
- **Published Date**: March 21, 2023 at 17:41 UTC
- **Last Updated**: August 03, 2024 at 10:07 UTC
- **Reserved Date**: August 23, 2022 at 17:55 UTC
- **Assigned By**: talos
### Vulnerability Description
A command execution vulnerability exists in the ubus backend communications functionality of Netgear Orbi Satellite RBS750 4.6.8.5. A specially-crafted JSON object can lead to arbitrary command execution. An attacker can send a sequence of malicious packets to trigger this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-912: Security Weakness
### Affected Products
**Netgear - Orbi Satellite RBS750**
Affected versions:
- 4.6.8.5 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2022-1597](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1597)
2. [https://kb.netgear.com/000065424/Security-Advisory-for-Command-Injection-on-Some-Orbi-WiFi-Systems-PSV-2022-0188](https://kb.netgear.com/000065424/Security-Advisory-for-Command-Injection-on-Some-Orbi-WiFi-Systems-PSV-2022-0188) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51625, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51625 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51625
- **State**: PUBLISHED
- **Published Date**: November 09, 2024 at 08:47 UTC
- **Last Updated**: November 12, 2024 at 20:15 UTC
- **Reserved Date**: October 30, 2024 at 15:04 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in EDC Team (E-Da`wah Committee) Quran Shortcode allows Blind SQL Injection.This issue affects Quran Shortcode: from n/a through 1.5.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**EDC Team (E-Da`wah Committee) - Quran Shortcode**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/quran-shortcode/wordpress-quran-shortcode-plugin-1-5-sql-injection-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13105, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13105 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13105
- **State**: PUBLISHED
- **Published Date**: August 06, 2019 at 19:02 UTC
- **Last Updated**: August 04, 2024 at 23:41 UTC
- **Reserved Date**: June 30, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Das U-Boot versions 2019.07-rc1 through 2019.07-rc4 can double-free a cached block of data when listing files in a crafted ext4 filesystem.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/u-boot/u-boot/commits/master)
2. [](https://lists.denx.de/pipermail/u-boot/2019-July/375513.html)
3. [](https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3444, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3444
- **State**: PUBLISHED
- **Published Date**: July 21, 2016 at 10:00 UTC
- **Last Updated**: October 11, 2024 at 20:57 UTC
- **Reserved Date**: March 17, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Retail Integration Bus component in Oracle Retail Applications 13.0, 13.1, 13.2, 14.0, 14.1, and 15.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Install.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html)
2. [1036397](http://www.securitytracker.com/id/1036397)
3. [91787](http://www.securityfocus.com/bid/91787)
4. [91883](http://www.securityfocus.com/bid/91883) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11193, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11193 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11193
- **State**: PUBLISHED
- **Published Date**: June 01, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 08:01 UTC
- **Reserved Date**: May 16, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Quest DR Series Disk Backup software version before 4.0.3.1 allows privilege escalation (issue 5 of 6).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20180531 [CORE-2018-0002] - Quest DR Series Disk Backup Multiple Vulnerabilities](http://seclists.org/fulldisclosure/2018/May/71)
2. [](http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html)
3. [](https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9684, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9684 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9684
- **State**: PUBLISHED
- **Published Date**: February 24, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 13:55 UTC
- **Reserved Date**: February 19, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them before the uploads finish, a different vulnerability than CVE-2015-1881.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[openstack-announce] 20150223 [OSSA 2015-004] Glance import task leaks image in backend (CVE-2014-9684, CVE-2015-1881)](http://lists.openstack.org/pipermail/openstack-announce/2015-February/000336.html)
2. [](https://bugs.launchpad.net/glance/+bug/1371118)
3. [RHSA-2015:0938](http://rhn.redhat.com/errata/RHSA-2015-0938.html)
4. [72692](http://www.securityfocus.com/bid/72692) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1917, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1917
- **State**: PUBLISHED
- **Published Date**: March 15, 2024 at 00:02 UTC
- **Last Updated**: August 27, 2024 at 19:58 UTC
- **Reserved Date**: February 27, 2024 at 06:32 UTC
- **Assigned By**: Mitsubishi
### Vulnerability Description
Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**Mitsubishi Electric Corporation - MELSEC-Q Series Q03UDECPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q04UDEHCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q06UDEHCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q10UDEHCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q13UDEHCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q20UDEHCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q26UDEHCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q50UDEHCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q100UDEHCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q03UDVCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q04UDVCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q06UDVCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q13UDVCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q26UDVCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q04UDPVCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q06UDPVCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q13UDPVCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-Q Series Q26UDPVCPU**
Affected versions:
- The first 5 digits of serial No. "26061" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-L Series L02CPU**
Affected versions:
- The first 5 digits of serial No. "26041" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-L Series L06CPU**
Affected versions:
- The first 5 digits of serial No. "26041" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-L Series L26CPU**
Affected versions:
- The first 5 digits of serial No. "26041" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-L Series L02CPU-P**
Affected versions:
- The first 5 digits of serial No. "26041" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-L Series L06CPU-P**
Affected versions:
- The first 5 digits of serial No. "26041" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-L Series L26CPU-P**
Affected versions:
- The first 5 digits of serial No. "26041" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-L Series L26CPU-BT**
Affected versions:
- The first 5 digits of serial No. "26041" and prior (Status: affected)
**Mitsubishi Electric Corporation - MELSEC-L Series L26CPU-PBT**
Affected versions:
- The first 5 digits of serial No. "26041" and prior (Status: affected)
### References
1. [](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf)
2. [](https://jvn.jp/vu/JVNVU99690199/)
3. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5835, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5835 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5835
- **State**: PUBLISHED
- **Published Date**: October 16, 2013 at 17:31 UTC
- **Last Updated**: August 06, 2024 at 17:22 UTC
- **Reserved Date**: September 18, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Open_UI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [63042](http://www.securityfocus.com/bid/63042)
2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28437, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28437
- **State**: PUBLISHED
- **Published Date**: April 21, 2022 at 19:04 UTC
- **Last Updated**: August 03, 2024 at 05:56 UTC
- **Reserved Date**: April 04, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=type&userrole=Admin&userid=3.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/janobe/baby-care-system/SQLi-18.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47660
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:05 UTC
- **Last Updated**: May 04, 2025 at 07:15 UTC
- **Reserved Date**: February 26, 2025 at 02:04 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Fix some memory leaks in an error handling path of 'log_replay()'
All error handling paths lead to 'out' where many resources are freed.
Do it as well here instead of a direct return, otherwise 'log', 'ra' and
'log->one_page_buf' (at least) will leak.
### Affected Products
**Linux - Linux**
Affected versions:
- b46acd6a6a627d876898e1c84d3f84902264b445 (Status: affected)
- b46acd6a6a627d876898e1c84d3f84902264b445 (Status: affected)
- b46acd6a6a627d876898e1c84d3f84902264b445 (Status: affected)
- b46acd6a6a627d876898e1c84d3f84902264b445 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15 (Status: affected)
- 0 (Status: unaffected)
- 5.15.46 (Status: unaffected)
- 5.17.14 (Status: unaffected)
- 5.18.3 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/d8be98ab88250dc12a98efdb703792a537b0eac3)
2. [](https://git.kernel.org/stable/c/bc4a1d384a04c6dba9312e1421a9f9f7c03339a4)
3. [](https://git.kernel.org/stable/c/2c97519ed6b4239594c58ddacf3d0d576cf070cc)
4. [](https://git.kernel.org/stable/c/e589f9b7078e1c0191613cd736f598e81d2390de) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0955, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0955 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0955
- **State**: PUBLISHED
- **Published Date**: December 02, 2020 at 00:50 UTC
- **Last Updated**: September 16, 2024 at 17:14 UTC
- **Reserved Date**: February 01, 2012 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
software-properties was vulnerable to a person-in-the-middle attack due to incorrect TLS certificate validation in softwareproperties/ppa.py. software-properties didn't check TLS certificates under python2 and only checked certificates under python3 if a valid certificate bundle was provided. Fixed in software-properties version 0.92.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-295: Security Weakness
### Affected Products
**Canonical - software-properties**
Affected versions:
- 0.92 (Status: affected)
### References
1. [](https://launchpad.net/bugs/1036839)
2. [](https://code.launchpad.net/~cyphermox/software-properties/lp1036839/+merge/119753)
### Credits
- Marc Deslauriers |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42198
- **State**: PUBLISHED
- **Published Date**: May 31, 2022 at 17:19 UTC
- **Last Updated**: August 04, 2024 at 03:30 UTC
- **Reserved Date**: October 11, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in swftools through 20201222. A NULL pointer dereference exists in the function swf_GetBits() located in rfxswf.c. It allows an attacker to cause Denial of Service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/matthiaskramm/swftools/issues/168) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31347, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31347 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31347
- **State**: PUBLISHED
- **Published Date**: February 13, 2024 at 19:18 UTC
- **Last Updated**: March 17, 2025 at 17:46 UTC
- **Reserved Date**: April 27, 2023 at 15:25 UTC
- **Assigned By**: AMD
### Vulnerability Description
Due to a code bug in
Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a
guest to observe an incorrect TSC when Secure TSC is enabled potentially
resulting in a loss of guest integrity.
### Affected Products
**AMD - 3rd Gen AMD EPYC™ Processors**
Affected versions:
- various (Status: affected)
** AMD - 4th Gen AMD EPYC™ Processors **
Affected versions:
- various (Status: affected)
### References
1. [](https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1002023, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1002023 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1002023
- **State**: PUBLISHED
- **Published Date**: September 14, 2017 at 13:00 UTC
- **Last Updated**: September 17, 2024 at 02:52 UTC
- **Reserved Date**: September 14, 2017 at 00:00 UTC
- **Assigned By**: larry_cashdollar
### Vulnerability Description
Vulnerability in wordpress plugin Easy Team Manager v1.3.2, The code does not sanitize id before making it part of an SQL statement in file ./easy-team-manager/inc/easy_team_manager_desc_edit.php
### Affected Products
**Daisy Themes - Easy Team Manager**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://wordpress.org/plugins/easy-team-manager/)
2. [](http://www.vapidlabs.com/advisory.php?v=194) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29446, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29446
- **State**: PUBLISHED
- **Published Date**: April 21, 2025 at 00:00 UTC
- **Last Updated**: May 12, 2025 at 14:17 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
open-webui v0.5.16 is vulnerable to SSRF in routers/ollama.py in function verify_connection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jcxj/jcxj/blob/master/source/_posts/open-webui-ssrf%E6%BC%8F%E6%B4%9E.md)
2. [](https://github.com/l1uyi/cve-list/blob/main/cve-list/open-webui-ssrf.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16656, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16656 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16656
- **State**: PUBLISHED
- **Published Date**: May 14, 2019 at 19:58 UTC
- **Last Updated**: August 05, 2024 at 10:32 UTC
- **Reserved Date**: September 07, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DoBox_CstmBox_Info.model.htm on Kyocera TASKalfa 4002i and 6002i devices allows remote attackers to read the documents of arbitrary users via a modified HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://mars-cheng.github.io/blog/2019/CVE-2018-16656) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4381, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4381
- **State**: PUBLISHED
- **Published Date**: September 08, 2016 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 00:25 UTC
- **Reserved Date**: April 29, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HPE XP7 Command View Advanced Edition (CVAE) Suite 6.x through 8.x before 8.4.1-02, when Replication Manager (RepMgr) and Device Manager (DevMgr) are enabled, allows local users to bypass intended access restrictions via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05257711)
2. [92733](http://www.securityfocus.com/bid/92733) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1479, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1479 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1479
- **State**: PUBLISHED
- **Published Date**: August 22, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 22:55 UTC
- **Reserved Date**: January 04, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco IP Phone 8800 devices with software 11.0(1) allow remote attackers to cause a denial of service (memory corruption) via a crafted HTTP request, aka Bug ID CSCuz03038.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036646](http://www.securitytracker.com/id/1036646)
2. [92515](http://www.securityfocus.com/bid/92515)
3. [20160817 Cisco IP Phone 8800 Series Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-ipp) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1074, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1074 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1074
- **State**: PUBLISHED
- **Published Date**: February 08, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:12 UTC
- **Reserved Date**: February 08, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in newtask for Solaris 9 allows local users to gain root privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [N-069](http://www.ciac.org/ciac/bulletins/n-069.shtml)
2. [7252](http://www.securityfocus.com/bid/7252)
3. [solaris-newtask-root-access(11657)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11657)
4. [8454](http://secunia.com/advisories/8454/)
5. [52111](http://sunsolve.sun.com/search/document.do?assetkey=1-26-52111-1)
6. [1006411](http://www.securitytracker.com/id?1006411) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0547
- **State**: PUBLISHED
- **Published Date**: February 12, 2009 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 04:40 UTC
- **Reserved Date**: February 12, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Evolution 2.22.3.1 checks S/MIME signatures against a copy of the e-mail text within a signed-data blob, not the copy of the e-mail text displayed to the user, which allows remote attackers to spoof a signature by modifying the latter copy, a different vulnerability than CVE-2008-5077.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35357](http://secunia.com/advisories/35357)
2. [33720](http://www.securityfocus.com/bid/33720)
3. [ADV-2010-1107](http://www.vupen.com/english/advisories/2010/1107)
4. [FEDORA-2009-2792](https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00672.html)
5. [SUSE-SR:2010:011](http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=484925)
7. [34339](http://secunia.com/advisories/34339)
8. [[oss-security] 20090210 CVE Request -- evolution](http://openwall.com/lists/oss-security/2009/02/10/7)
9. [34363](http://secunia.com/advisories/34363)
10. [RHSA-2009:0355](http://www.redhat.com/support/errata/RHSA-2009-0355.html)
11. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508479)
12. [SUSE-SR:2010:006](http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html)
13. [](http://bugzilla.gnome.org/show_bug.cgi?id=564465)
14. [DSA-1813](http://www.debian.org/security/2009/dsa-1813)
15. [SUSE-SR:2010:012](http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html)
16. [RHSA-2009:0354](http://www.redhat.com/support/errata/RHSA-2009-0354.html)
17. [oval:org.mitre.oval:def:9619](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9619)
18. [34338](http://secunia.com/advisories/34338)
19. [FEDORA-2009-2784](https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00666.html)
20. [MDVSA-2009:078](http://www.mandriva.com/security/advisories?name=MDVSA-2009:078)
21. [38915](http://secunia.com/advisories/38915)
22. [33848](http://secunia.com/advisories/33848) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4519, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4519 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4519
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5427, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5427
- **State**: PUBLISHED
- **Published Date**: December 11, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 10:56 UTC
- **Reserved Date**: December 11, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Norton Antivirus in Norton Internet Security 15.5.0.23 does not properly handle (1) multipart/mixed e-mail messages with many MIME parts and possibly (2) e-mail messages with many "Content-type: message/rfc822;" headers, which allows remote attackers to cause a denial of service (stack consumption or other resource consumption) via a large e-mail message, a related issue to CVE-2006-1173.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://mime.recurity.com/cgi-bin/twiki/view/Main/AttackIntro)
2. [4721](http://securityreason.com/securityalert/4721)
3. [20081208 DoS attacks on MIME-capable software via complex MIME emails](http://www.securityfocus.com/archive/1/499038/100/0/threaded)
4. [20081209 Re: DoS attacks on MIME-capable software via complex MIME emails](http://www.securityfocus.com/archive/1/499045/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15841, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15841
- **State**: PUBLISHED
- **Published Date**: July 20, 2020 at 01:06 UTC
- **Last Updated**: August 04, 2024 at 13:30 UTC
- **Reserved Date**: July 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Liferay Portal before 7.3.0, and Liferay DXP 7.0 before fix pack 89, 7.1 before fix pack 17, and 7.2 before fix pack 4, does not safely test a connection to a LDAP server, which allows remote attackers to obtain the LDAP server's password via the Test LDAP Connection feature.
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:R`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119317439)
2. [](https://issues.liferay.com/browse/LPE-16928) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51946
- **State**: PUBLISHED
- **Published Date**: January 19, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 22:48 UTC
- **Reserved Date**: December 26, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple reflected cross-site scripting (XSS) vulnerabilities in nasSvr.php in actidata actiNAS-SL-2U-8 3.2.03-SP1 allow remote attackers to inject arbitrary web script or HTML.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://actidata.com)
2. [](https://www.actidata.com/index.php/de-de/actinas-plus-sl-2u-8-rdx)
3. [](https://github.com/saw-your-packet/CVEs/blob/main/CVE-2023-51946/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36482, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36482 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36482
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 00:00 UTC
- **Last Updated**: October 17, 2024 at 14:20 UTC
- **Reserved Date**: June 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Samsung NFC S3NRN4V, S3NSN4V, S3NSEN4, SEN82AB, and S3NRN82. A buffer copy without checking its input size can cause an NFC service restart.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://semiconductor.samsung.com/support/quality-support/product-security-updates/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30336
- **State**: PUBLISHED
- **Published Date**: April 02, 2024 at 20:10 UTC
- **Last Updated**: August 02, 2024 at 01:32 UTC
- **Reserved Date**: March 26, 2024 at 18:52 UTC
- **Assigned By**: zdi
### Vulnerability Description
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Doc objects in AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22642.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - PDF Reader**
Affected versions:
- 2023.2.0.21408 (Status: affected)
### References
1. [ZDI-24-303](https://www.zerodayinitiative.com/advisories/ZDI-24-303/)
2. [vendor-provided URL](https://www.foxit.com/support/security-bulletins.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2968, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2968
- **State**: PUBLISHED
- **Published Date**: August 12, 2012 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 00:50 UTC
- **Reserved Date**: May 30, 2012 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Directory traversal vulnerability in Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to create files in arbitrary directories via a .. (dot dot) in a pathname within an HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#309979](http://www.kb.cert.org/vuls/id/309979)
2. [](http://en.securitylab.ru/lab/)
3. [](http://en.securitylab.ru/lab/PT-2012-05)
4. [](http://caucho.com/resin-4.0/changes/changes.xtp) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6571, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6571 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6571
- **State**: PUBLISHED
- **Published Date**: January 21, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 12:17 UTC
- **Reserved Date**: September 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle HTTP Server component in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Web Listener, a different vulnerability than CVE-2011-1944.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13079, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13079
- **State**: PUBLISHED
- **Published Date**: October 17, 2017 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 18:58 UTC
- **Reserved Date**: August 22, 2017 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
### Weakness Classification (CWE)
- CWE-323: Security Weakness
### Affected Products
**Wi-Fi Alliance - Wi-Fi Protected Access (WPA and WPA2)**
Affected versions:
- WPA (Status: affected)
- WPA2 (Status: affected)
### References
1. [1039581](http://www.securitytracker.com/id/1039581)
2. [101274](http://www.securityfocus.com/bid/101274)
3. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html)
4. [SUSE-SU-2017:2745](http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html)
5. [DSA-3999](http://www.debian.org/security/2017/dsa-3999)
6. [1039578](http://www.securitytracker.com/id/1039578)
7. [](https://access.redhat.com/security/vulnerabilities/kracks)
8. [20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa)
9. [](https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt)
10. [](http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt)
11. [1039577](http://www.securitytracker.com/id/1039577)
12. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us)
13. [openSUSE-SU-2017:2755](http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html)
14. [](https://source.android.com/security/bulletin/2017-11-01)
15. [GLSA-201711-03](https://security.gentoo.org/glsa/201711-03)
16. [](https://support.lenovo.com/us/en/product_security/LEN-17420)
17. [FreeBSD-SA-17:07](https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc)
18. [](https://www.krackattacks.com/)
19. [1039573](http://www.securitytracker.com/id/1039573)
20. [SUSE-SU-2017:2752](http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html)
21. [1039576](http://www.securitytracker.com/id/1039576)
22. [1039585](http://www.securitytracker.com/id/1039585)
23. [VU#228519](http://www.kb.cert.org/vuls/id/228519)
24. [[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html)
25. [](https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf)
26. [](https://cert.vde.com/en-us/advisories/vde-2017-005)
27. [USN-3455-1](http://www.ubuntu.com/usn/USN-3455-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2453, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2453 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2453
- **State**: PUBLISHED
- **Published Date**: September 05, 2023 at 14:39 UTC
- **Last Updated**: September 27, 2024 at 13:52 UTC
- **Reserved Date**: May 01, 2023 at 16:45 UTC
- **Assigned By**: SNPS
### Vulnerability Description
There is insufficient sanitization of tainted file names that are directly concatenated with a path that is subsequently passed to a ‘require_once’ statement. This allows arbitrary files with the ‘.php’ extension for which the absolute path is known to be included and executed. There are no known means in PHPFusion through which an attacker can upload and target a ‘.php’ file payload.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-829: Security Weakness
### Affected Products
**PHPFusion - PHPFusion**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.synopsys.com/blogs/software-security/cyrc-vulnerability-advisory-cve-2023-2453/)
### Credits
- Matthew Hogg |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3411, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3411 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3411
- **State**: PUBLISHED
- **Published Date**: May 16, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 05:47 UTC
- **Reserved Date**: April 24, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2015:1187](http://rhn.redhat.com/errata/RHSA-2015-1187.html)
2. [1032709](http://www.securitytracker.com/id/1032709)
3. [RHSA-2015:1186](http://rhn.redhat.com/errata/RHSA-2015-1186.html)
4. [](https://bugs.php.net/bug.php?id=69353)
5. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html)
6. [](http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=4435b9142ff9813845d5c97ab29a5d637bedb257)
7. [](http://php.net/ChangeLog-5.php)
8. [75255](http://www.securityfocus.com/bid/75255)
9. [RHSA-2015:1135](http://rhn.redhat.com/errata/RHSA-2015-1135.html)
10. [RHSA-2015:1218](http://rhn.redhat.com/errata/RHSA-2015-1218.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0900, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0900
- **State**: PUBLISHED
- **Published Date**: February 07, 2011 at 20:19 UTC
- **Last Updated**: August 06, 2024 at 22:05 UTC
- **Reserved Date**: February 07, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the tsc_launch_remote function (src/support.c) in Terminal Server Client (tsclient) 0.150, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a .RDP file with a long hostname argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43120](http://secunia.com/advisories/43120)
2. [16095](http://www.exploit-db.com/exploits/16095)
3. [terminal-server-hostname-bo(65100)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65100)
4. [46099](http://www.securityfocus.com/bid/46099)
5. [70749](http://osvdb.org/70749) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45236
- **State**: PUBLISHED
- **Published Date**: August 24, 2024 at 00:00 UTC
- **Last Updated**: March 26, 2025 at 20:02 UTC
- **Reserved Date**: August 24, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a signed object containing an empty signedAttributes field. Fort accesses the set's elements without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://nicmx.github.io/FORT-validator/CVE.html) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.