System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18265
- **State**: PUBLISHED
- **Published Date**: May 09, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 21:13 UTC
- **Reserved Date**: May 09, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Prosody before 0.10.0 allows remote attackers to cause a denial of service (application crash), related to an incompatibility with certain versions of the LuaSocket library, such as the lua-socket package from Debian stretch. The attacker needs to trigger a stream error. A crash can be observed in, for example, the c2s module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-4198](https://www.debian.org/security/2018/dsa-4198)
2. [](https://hg.prosody.im/0.9/rev/176b7f4e4ac9)
3. [](https://hg.prosody.im/0.9/rev/adfffc5b4e2a)
4. [](https://prosody.im/issues/issue/987)
5. [](https://bugs.debian.org/875829) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30556, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30556
- **State**: PUBLISHED
- **Published Date**: April 18, 2023 at 22:35 UTC
- **Last Updated**: February 05, 2025 at 15:44 UTC
- **Reserved Date**: April 12, 2023 at 15:19 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Archery is an open source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to SQL injection in the `optimize_sqltuningadvisor` method of `sql_optimize.py`. User input coming from the `db_name` parameter value in `sql_optimize.py` is passed to the `sqltuningadvisor` method in `oracle.py`for execution. To mitigate escape the variables accepted via user input when used in `sql_optimize.py`. Users may also use prepared statements when dealing with SQL as a mitigation for this issue. This issue is also indexed as `GHSL-2022-107`.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**hhyo - Archery**
Affected versions:
- <= 1.9.0 (Status: affected)
### References
1. [https://github.com/hhyo/Archery/security/advisories/GHSA-6pv9-9gq7-hr68](https://github.com/hhyo/Archery/security/advisories/GHSA-6pv9-9gq7-hr68) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43789
- **State**: PUBLISHED
- **Published Date**: December 07, 2021 at 16:45 UTC
- **Last Updated**: August 04, 2024 at 04:03 UTC
- **Reserved Date**: November 16, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
PrestaShop is an Open Source e-commerce web application. Versions of PrestaShop prior to 1.7.8.2 are vulnerable to blind SQL injection using search filters with `orderBy` and `sortOrder` parameters. The problem is fixed in version 1.7.8.2.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**PrestaShop - PrestaShop**
Affected versions:
- >= 1.7.5.0, <= 1.7.8.1 (Status: affected)
### References
1. [](https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4)
2. [](https://github.com/PrestaShop/PrestaShop/issues/26623)
3. [](https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29985, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29985 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29985
- **State**: PUBLISHED
- **Published Date**: August 17, 2021 at 19:12 UTC
- **Last Updated**: August 03, 2024 at 22:24 UTC
- **Reserved Date**: April 01, 2021 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A use-after-free vulnerability in media channels could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 78.13, Thunderbird < 91, Firefox ESR < 78.13, and Firefox < 91.
### Affected Products
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2021-33/)
2. [](https://www.mozilla.org/security/advisories/mfsa2021-35/)
3. [](https://www.mozilla.org/security/advisories/mfsa2021-34/)
4. [](https://www.mozilla.org/security/advisories/mfsa2021-36/)
5. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1722083)
6. [GLSA-202202-03](https://security.gentoo.org/glsa/202202-03)
7. [GLSA-202208-14](https://security.gentoo.org/glsa/202208-14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4587, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4587
- **State**: PUBLISHED
- **Published Date**: September 04, 2023 at 11:23 UTC
- **Last Updated**: August 02, 2024 at 07:31 UTC
- **Reserved Date**: August 29, 2023 at 07:42 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
An IDOR vulnerability has been found in ZKTeco ZEM800 product affecting version 6.60. This vulnerability allows a local attacker to obtain registered user backup files or device configuration files over a local network or through a VPN server.
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**ZKTeco - ZEM800**
Affected versions:
- 6.60 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/insecure-direct-object-reference-zkteco-zem800)
### Credits
- David Utón Amaya (m3n0sd0n4ld) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21616, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21616
- **State**: PUBLISHED
- **Published Date**: October 18, 2022 at 00:00 UTC
- **Last Updated**: September 24, 2024 at 15:32 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle WebLogic Server executes to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server as well as unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data and unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 5.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H).
### CVSS Metrics
- **CVSS Base Score**: 5.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H`
### Affected Products
**Oracle Corporation - WebLogic Server**
Affected versions:
- 12.2.1.3.0 (Status: affected)
- 12.2.1.4.0 (Status: affected)
- 14.1.1.0.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36689, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36689 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36689
- **State**: PUBLISHED
- **Published Date**: March 03, 2023 at 00:00 UTC
- **Last Updated**: March 07, 2025 at 17:21 UTC
- **Reserved Date**: July 12, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue discovered in com.samourai.wallet.PinEntryActivity.java in Streetside Samourai Wallet 0.99.96i allows attackers to view sensitive information and decrypt data via a brute force attack that uses a recovered samourai.dat file. The PIN is 5 to 8 digits, which may be insufficient in this situation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://code.samourai.io/wallet/samourai-wallet-android/-/blob/develop/app/src/main/java/com/samourai/wallet/PinEntryActivity.java#L302)
2. [](https://vrls.ws/posts/2021/08/samourai-wallet-bitcoin-pin-authentication-bypass-crypto/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0630, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0630 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0630
- **State**: PUBLISHED
- **Published Date**: October 13, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:21 UTC
- **Reserved Date**: August 02, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IIS 4.0 and 5.0 allows remote attackers to obtain fragments of source code by appending a +.htr to the URL, a variant of the "File Fragment Reading via .HTR" vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1488](http://www.securityfocus.com/bid/1488)
2. [MS00-044](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-044)
3. [iis-htr-obtain-code(5104)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5104) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38166, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38166 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38166
- **State**: PUBLISHED
- **Published Date**: October 10, 2023 at 17:08 UTC
- **Last Updated**: April 14, 2025 at 22:46 UTC
- **Reserved Date**: July 12, 2023 at 23:41 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Layer 2 Tunneling Protocol Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38166) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10655
- **State**: REJECTED
- **Published Date**: August 29, 2018 at 21:00 UTC
- **Last Updated**: August 29, 2018 at 20:57 UTC
- **Reserved Date**: June 28, 2017 at 00:00 UTC
- **Assigned By**: netflix
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3242, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3242 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3242
- **State**: PUBLISHED
- **Published Date**: July 26, 2023 at 17:36 UTC
- **Last Updated**: October 23, 2024 at 15:31 UTC
- **Reserved Date**: June 14, 2023 at 11:28 UTC
- **Assigned By**: ABB
### Vulnerability Description
Improper initialization implementation in Portmapper used in B&R Industrial Automation Automation Runtime <G4.93 allows unauthenticated network-based attackers to cause permanent denial-of-service conditions.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
- CWE-665: Security Weakness
### Affected Products
**B&R Industrial Automation - B&R Automation Runtime**
Affected versions:
- <G4.93 (Status: affected)
### References
1. [](https://www.br-automation.com/downloads_br_productcatalogue/assets/1689787619746-en-original-1.0.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-20667, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-20667 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20667
- **State**: PUBLISHED
- **Published Date**: May 05, 2025 at 02:49 UTC
- **Last Updated**: May 12, 2025 at 17:50 UTC
- **Reserved Date**: November 01, 2024 at 01:21 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741.
### Weakness Classification (CWE)
- CWE-326: Security Weakness
### Affected Products
**MediaTek, Inc. - MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8675, MT8676, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8797**
Affected versions:
- Modem LR12A, LR13, NR15, NR16, NR17, NR17R (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/May-2025) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7360, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7360 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7360
- **State**: PUBLISHED
- **Published Date**: October 19, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:47 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The How To Boil Eggs (aka com.appmakr.app842173) application 251333 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
2. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
3. [VU#726377](http://www.kb.cert.org/vuls/id/726377) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12668
- **State**: PUBLISHED
- **Published Date**: August 07, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 18:43 UTC
- **Reserved Date**: August 07, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ImageMagick/ImageMagick/issues/575)
2. [](https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17190, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17190 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17190
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8658, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8658 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8658
- **State**: PUBLISHED
- **Published Date**: October 16, 2016 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 02:27 UTC
- **Reserved Date**: October 13, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3146-2](http://www.ubuntu.com/usn/USN-3146-2)
2. [](https://github.com/torvalds/linux/commit/ded89912156b1a47d940a0c954c43afbabd0c42c)
3. [USN-3146-1](http://www.ubuntu.com/usn/USN-3146-1)
4. [USN-3145-1](http://www.ubuntu.com/usn/USN-3145-1)
5. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ded89912156b1a47d940a0c954c43afbabd0c42c)
6. [[oss-security] 20161013 Re: CVE Request -- Broadcom Wifi Driver Brcmfmac brcmf_cfg80211_start_ap Buffer Overflow](http://www.openwall.com/lists/oss-security/2016/10/13/1)
7. [](https://bugzilla.redhat.com/show_bug.cgi?id=1384403)
8. [USN-3145-2](http://www.ubuntu.com/usn/USN-3145-2)
9. [93541](http://www.securityfocus.com/bid/93541)
10. [](http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12247, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12247 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12247
- **State**: PUBLISHED
- **Published Date**: December 05, 2024 at 15:20 UTC
- **Last Updated**: December 05, 2024 at 16:58 UTC
- **Reserved Date**: December 05, 2024 at 15:06 UTC
- **Assigned By**: Mattermost
### Vulnerability Description
Mattermost versions 9.7.x <= 9.7.5, 9.8.x <= 9.8.2 and 9.9.x <= 9.9.2 fail to properly propagate permission scheme updates across cluster nodes which allows a user to keep old permissions, even if the permission scheme has been updated.
### CVSS Metrics
- **CVSS Base Score**: 4.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**Mattermost - Mattermost**
Affected versions:
- 9.7.0 (Status: affected)
- 9.8.0 (Status: affected)
- 9.9.0 (Status: affected)
- 10.0.0 (Status: unaffected)
- 9.7.6 (Status: unaffected)
- 9.8.3 (Status: unaffected)
- 9.9.3 (Status: unaffected)
### References
1. [](https://mattermost.com/security-updates)
### Credits
- Leandro Chaves (brdoors3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1989, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1989 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1989
- **State**: PUBLISHED
- **Published Date**: May 20, 2010 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 02:17 UTC
- **Reserved Date**: May 20, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Opera 9.52 executes a mail application in situations where an IMG element has a SRC attribute that is a redirect to a mailto: URL, which allows remote attackers to cause a denial of service (excessive application launches) via an HTML document with many images, a related issue to CVE-2010-0181.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:11664](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11664)
2. [](http://websecurity.com.ua/4206/)
3. [20100518 DoS vulnerabilities in Firefox, Internet Explorer, Chrome, Opera and other browsers](http://www.securityfocus.com/archive/1/511327/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21975, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21975 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21975
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 15:47 UTC
- **Last Updated**: May 04, 2025 at 07:26 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: handle errors in mlx5_chains_create_table()
In mlx5_chains_create_table(), the return value of mlx5_get_fdb_sub_ns()
and mlx5_get_flow_namespace() must be checked to prevent NULL pointer
dereferences. If either function fails, the function should log error
message with mlx5_core_warn() and return error pointer.
### Affected Products
**Linux - Linux**
Affected versions:
- 39ac237ce00968545e7298faa9e07ecb7e440fb5 (Status: affected)
- 39ac237ce00968545e7298faa9e07ecb7e440fb5 (Status: affected)
- 39ac237ce00968545e7298faa9e07ecb7e440fb5 (Status: affected)
- 39ac237ce00968545e7298faa9e07ecb7e440fb5 (Status: affected)
- 39ac237ce00968545e7298faa9e07ecb7e440fb5 (Status: affected)
- 39ac237ce00968545e7298faa9e07ecb7e440fb5 (Status: affected)
- 39ac237ce00968545e7298faa9e07ecb7e440fb5 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.6 (Status: affected)
- 0 (Status: unaffected)
- 5.10.236 (Status: unaffected)
- 5.15.180 (Status: unaffected)
- 6.1.132 (Status: unaffected)
- 6.6.84 (Status: unaffected)
- 6.12.20 (Status: unaffected)
- 6.13.8 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/15bdd93728369b2c8942a8e5d549d4b5dc04a2d9)
2. [](https://git.kernel.org/stable/c/29c419c64e9b396baeda1d8713d2aa3ba7c0acf6)
3. [](https://git.kernel.org/stable/c/1598307c914ba3d2642a2b03d1ff11efbdb7c6c2)
4. [](https://git.kernel.org/stable/c/637105ef0d46fe5beac15aceb431da3ec832bb00)
5. [](https://git.kernel.org/stable/c/1d34296409a519b4027750e3e82d9e19553a7398)
6. [](https://git.kernel.org/stable/c/093b4aaec97ec048623e3fe1e516fc45a954d412)
7. [](https://git.kernel.org/stable/c/eab0396353be1c778eba1c0b5180176f04dd21ce) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40305, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40305 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40305
- **State**: PUBLISHED
- **Published Date**: September 09, 2022 at 04:23 UTC
- **Last Updated**: August 03, 2024 at 12:14 UTC
- **Reserved Date**: September 09, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Server-Side Request Forgery issue in Canto Cumulus through 11.1.3 allows attackers to enumerate the internal network, overload network resources, and possibly have unspecified other impact via the server parameter to the /cwc/login login form.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-023.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18319, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18319
- **State**: PUBLISHED
- **Published Date**: December 12, 2019 at 19:08 UTC
- **Last Updated**: August 05, 2024 at 01:54 UTC
- **Reserved Date**: October 23, 2019 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could cause a Denial-of-Service condition by sending specifically crafted objects via RMI. This vulnerability is independent from CVE-2019-18317 and CVE-2019-18318. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Siemens - SPPA-T3000 Application Server**
Affected versions:
- All versions < Service Pack R8.2 SP2 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0003, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0003 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0003
- **State**: PUBLISHED
- **Published Date**: January 11, 2011 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 21:36 UTC
- **Reserved Date**: December 07, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
MediaWiki before 1.16.1, when user or site JavaScript or CSS is enabled, allows remote attackers to conduct clickjacking attacks via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20110104 Re: (possible) CVE request: Clickjacking in Mediawiki](http://www.openwall.com/lists/oss-security/2011/01/04/12)
2. [ADV-2011-0017](http://www.vupen.com/english/advisories/2011/0017)
3. [](https://bugzilla.wikimedia.org/show_bug.cgi?id=26561)
4. [70272](http://www.osvdb.org/70272)
5. [FEDORA-2011-5807](http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html)
6. [[MediaWiki-announce] 20110104 MediaWiki security release 1.16.1](http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-January/000093.html)
7. [[oss-security] 20110104 (possible) CVE request: Clickjacking in Mediawiki](http://www.openwall.com/lists/oss-security/2011/01/04/6)
8. [42810](http://secunia.com/advisories/42810)
9. [FEDORA-2011-5848](http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html)
10. [mediawiki-frames-clickjacking(64476)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64476)
11. [FEDORA-2011-5812](http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27109, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27109 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27109
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 17:13 UTC
- **Last Updated**: August 02, 2024 at 00:27 UTC
- **Reserved Date**: February 19, 2024 at 15:22 UTC
- **Assigned By**: GEHC
### Vulnerability Description
Insufficiently protected credentials in GE HealthCare EchoPAC products
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-522: Security Weakness
### Affected Products
**GE HealthCare - EchoPAC Software Only**
Affected versions:
- 0 (Status: affected)
**GE HealthCare - ImageVault**
Affected versions:
- 0 (Status: affected)
**GE HealthCare - EchoPAC Turnkey**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://securityupdate.gehealthcare.com/)
### Credits
- Andrea Palanca and Gabriele Quagliarella of Nozomi Networks |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-5163, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-5163 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-5163
- **State**: PUBLISHED
- **Published Date**: August 25, 2012 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 17:53 UTC
- **Reserved Date**: August 25, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Race condition in Kaspersky Internet Security 2010 9.0.0.736 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20100505 KHOBE - 8.0 earthquake for Windows desktop security software](http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html)
2. [](http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/)
3. [39924](http://www.securityfocus.com/bid/39924)
4. [](http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php)
5. [20100505 KHOBE - 8.0 earthquake for Windows desktop security software](http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html)
6. [67660](http://www.osvdb.org/67660)
7. [](http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/)
8. [](http://www.f-secure.com/weblog/archives/00001949.html)
9. [](http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0296, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0296 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0296
- **State**: PUBLISHED
- **Published Date**: February 10, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:05 UTC
- **Reserved Date**: February 10, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NOTE: this issue has been disputed by the vendor. The error module in Novell GroupWise WebAccess allows remote attackers who have not authenticated to read potentially sensitive information, such as the version, via an incorrect login and a modified (1) error or (2) modify parameter that returns template files or the "about" information page. NOTE: the vendor has disputed this issue
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050127 NOVL-2005-10096251 GroupWise WebAccess error handling modules (report)](http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2005-01/0341.html)
2. [20050121 NOVL-2005-10096251 GroupWise WebAccess error handling modules (report)](http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2005-01/0771.html)
3. [13135](http://www.osvdb.org/13135)
4. [20050117 Novell GroupWise WebAccess error modules loading](http://marc.info/?l=bugtraq&m=110608203729814&w=2)
5. [](http://support.novell.com/servlet/tidfinder/10096251)
6. [groupwise-error-auth-bypass(18954)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18954)
7. [12285](http://www.securityfocus.com/bid/12285) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8908, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8908 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8908
- **State**: PUBLISHED
- **Published Date**: December 10, 2020 at 22:10 UTC
- **Last Updated**: August 04, 2024 at 10:12 UTC
- **Reserved Date**: February 12, 2020 at 00:00 UTC
- **Assigned By**: Google
### Vulnerability Description
A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @Deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-378: Security Weakness
### Affected Products
**Google LLC - Guava**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://github.com/google/guava/issues/4011)
2. [](https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40)
3. [](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415)
4. [[ws-commits] 20210104 [ws-wss4j] branch master updated: Updating Guava to 30.1 due to CVE-2020-8908](https://lists.apache.org/thread.html/r68d86f4b06c808204f62bcb254fcb5b0432528ee8d37a07ef4bc8222%40%3Ccommits.ws.apache.org%3E)
5. [[ws-commits] 20210104 [ws-wss4j] branch 2_3_x-fixes updated: Updating Guava to 30.1 due to CVE-2020-8908](https://lists.apache.org/thread.html/r215b3d50f56faeb2f9383505f3e62faa9f549bb23e8a9848b78a968e%40%3Ccommits.ws.apache.org%3E)
6. [[cxf-commits] 20210104 [cxf] 03/04: Updating Guava to 30.1 due to CVE-2020-8908](https://lists.apache.org/thread.html/rb8c0f1b7589864396690fe42a91a71dea9412e86eec66dc85bbacaaf%40%3Ccommits.cxf.apache.org%3E)
7. [[cxf-commits] 20210104 [cxf] 02/02: Updating Guava to 30.1 due to CVE-2020-8908](https://lists.apache.org/thread.html/r4776f62dfae4a0006658542f43034a7fc199350e35a66d4e18164ee6%40%3Ccommits.cxf.apache.org%3E)
8. [](https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3%40%3Ctorque-dev.db.apache.org%3E)
9. [[maven-issues] 20210122 [GitHub] [maven-indexer] akurtakov opened a new pull request #75: Remove guava dependency from indexer-core](https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba%40%3Cissues.maven.apache.org%3E)
10. [[db-torque-dev] 20210127 Re: Items for our (delayed) quarterly report to the board?](https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a%40%3Ctorque-dev.db.apache.org%3E)
11. [[db-torque-dev] 20210128 Antwort: Re: Items for our (delayed) quarterly report to the board?](https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604%40%3Ctorque-dev.db.apache.org%3E)
12. [[pulsar-commits] 20210406 [GitHub] [pulsar] lhotari opened a new pull request #10149: Upgrade jclouds to 2.3.0 to fix security vulnerabilities](https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748%40%3Ccommits.pulsar.apache.org%3E)
13. [[myfaces-dev] 20210506 [GitHub] [myfaces-tobago] lofwyr14 opened a new pull request #817: build: CVE fix](https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f9b3068f6ac1346594%40%3Cdev.myfaces.apache.org%3E)
14. [[arrow-github] 20210610 [GitHub] [arrow] projjal opened a new pull request #10501: ARROW-13032: Update guava version](https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95%40%3Cgithub.arrow.apache.org%3E)
15. [](https://www.oracle.com/security-alerts/cpuApr2021.html)
16. [[drill-dev] 20210618 [GitHub] [drill] ssainz edited a comment on issue #2260: CVE-2020-8908 in Guava v.28.2-jre, should upgrade to v.30.1.1](https://lists.apache.org/thread.html/r2fe45d96eea8434b91592ca08109118f6308d60f6d0e21d52438cfb4%40%3Cdev.drill.apache.org%3E)
17. [[drill-dev] 20210618 [GitHub] [drill] ssainz commented on issue #2260: CVE-2020-8908 in Guava v.28.2-jre, should upgrade to v.30.1.1](https://lists.apache.org/thread.html/r07ed3e4417ad043a27bee7bb33322e9bfc7d7e6d1719b8e3dfd95c14%40%3Cdev.drill.apache.org%3E)
18. [[drill-dev] 20210618 [GitHub] [drill] cgivre commented on issue #2260: CVE-2020-8908 in Guava v.28.2-jre, should upgrade to v.30.1.1](https://lists.apache.org/thread.html/r6874dfe26eefc41b7c9a5e4a0487846fc4accf8c78ff948b24a1104a%40%3Cdev.drill.apache.org%3E)
19. [[drill-dev] 20210619 [GitHub] [drill] luocooong commented on issue #2260: CVE-2020-8908 in Guava v.28.2-jre, should upgrade to v.30.1.1](https://lists.apache.org/thread.html/r161b87f8037bbaff400194a63cd2016c9a69f5949f06dcc79beeab54%40%3Cdev.drill.apache.org%3E)
20. [](https://www.oracle.com//security-alerts/cpujul2021.html)
21. [[hadoop-yarn-issues] 20211018 [jira] [Updated] (YARN-10980) fix CVE-2020-8908](https://lists.apache.org/thread.html/ra7ab308481ee729f998691e8e3e02e93b1dedfc98f6b1cd3d86923b3%40%3Cyarn-issues.hadoop.apache.org%3E)
22. [[hadoop-yarn-dev] 20211018 [jira] [Created] (YARN-10980) fix CVE-2020-8908](https://lists.apache.org/thread.html/rf00b688ffa620c990597f829ff85fdbba8bf73ee7bfb34783e1f0d4e%40%3Cyarn-dev.hadoop.apache.org%3E)
23. [[hadoop-common-issues] 20211018 [GitHub] [hadoop] lujiefsi opened a new pull request #3561: Yarn 10980](https://lists.apache.org/thread.html/r58a8775205ab1839dba43054b09a9ab3b25b423a4170b2413c4067ac%40%3Ccommon-issues.hadoop.apache.org%3E)
24. [[hadoop-yarn-issues] 20211018 [jira] [Created] (YARN-10980) fix CVE-2020-8908](https://lists.apache.org/thread.html/re120f6b3d2f8222121080342c5801fdafca2f5188ceeb3b49c8a1d27%40%3Cyarn-issues.hadoop.apache.org%3E)
25. [[hadoop-yarn-dev] 20211018 [jira] [Resolved] (YARN-10980) fix CVE-2020-8908](https://lists.apache.org/thread.html/r49549a8322f62cd3acfa4490d25bfba0be04f3f9ff4d14fe36199d27%40%3Cyarn-dev.hadoop.apache.org%3E)
26. [[hive-dev] 20211018 [jira] [Created] (HIVE-25617) fix CVE-2020-8908](https://lists.apache.org/thread.html/rcafc3a637d82bdc9a24036b2ddcad1e519dd0e6f848fcc3d606fd78f%40%3Cdev.hive.apache.org%3E)
27. [[hadoop-common-issues] 20211018 [GitHub] [hadoop] lujiefsi edited a comment on pull request #3561: YARN-10980:fix CVE-2020-8908](https://lists.apache.org/thread.html/r007add131977f4f576c232b25e024249a3d16f66aad14a4b52819d21%40%3Ccommon-issues.hadoop.apache.org%3E)
28. [[geode-issues] 20211018 [jira] [Updated] (GEODE-9744) fix CVE-2020-8908](https://lists.apache.org/thread.html/reebbd63c25bc1a946caa419cec2be78079f8449d1af48e52d47c9e85%40%3Cissues.geode.apache.org%3E)
29. [[hive-issues] 20211018 [jira] [Updated] (HIVE-25617) fix CVE-2020-8908](https://lists.apache.org/thread.html/r79e47ed555bdb1180e528420a7a2bb898541367a29a3bc6bbf0baf2c%40%3Cissues.hive.apache.org%3E)
30. [[hive-issues] 20211018 [jira] [Work logged] (HIVE-25617) fix CVE-2020-8908](https://lists.apache.org/thread.html/rd2704306ec729ccac726e50339b8a8f079515cc29ccb77713b16e7c5%40%3Cissues.hive.apache.org%3E)
31. [[hadoop-yarn-issues] 20211018 [jira] [Comment Edited] (YARN-10980) fix CVE-2020-8908](https://lists.apache.org/thread.html/r5d61b98ceb7bba939a651de5900dbd67be3817db6bfcc41c6e04e199%40%3Cyarn-issues.hadoop.apache.org%3E)
32. [[hadoop-yarn-issues] 20211018 [jira] [Resolved] (YARN-10980) fix CVE-2020-8908](https://lists.apache.org/thread.html/r7b0e81d8367264d6cad98766a469d64d11248eb654417809bfdacf09%40%3Cyarn-issues.hadoop.apache.org%3E)
33. [[hive-gitbox] 20211018 [GitHub] [hive] lujiefsi opened a new pull request #2725: HIVE-25617:fix CVE-2020-8908](https://lists.apache.org/thread.html/rb2364f4cf4d274eab5a7ecfaf64bf575cedf8b0173551997c749d322%40%3Cgitbox.hive.apache.org%3E)
34. [[hadoop-yarn-issues] 20211018 [jira] [Commented] (YARN-10980) fix CVE-2020-8908](https://lists.apache.org/thread.html/r294be9d31c0312d2c0837087204b5d4bf49d0552890e6eec716fa6a6%40%3Cyarn-issues.hadoop.apache.org%3E)
35. [[geode-issues] 20211018 [jira] [Created] (GEODE-9744) fix CVE-2020-8908](https://lists.apache.org/thread.html/rf9f0fa84b8ae1a285f0210bafec6de2a9eba083007d04640b82aa625%40%3Cissues.geode.apache.org%3E)
36. [[geode-issues] 20211018 [jira] [Updated] (GEODE-9744) bug like CVE-2020-8908](https://lists.apache.org/thread.html/r5b3d93dfdfb7708e796e8762ab40edbde8ff8add48aba53e5ea26f44%40%3Cissues.geode.apache.org%3E)
37. [[geode-issues] 20211018 [jira] [Updated] (GEODE-9744) bug CVE-2020-8908](https://lists.apache.org/thread.html/r3dd8881de891598d622227e9840dd7c2ef1d08abbb49e9690c7ae1bc%40%3Cissues.geode.apache.org%3E)
38. [[geode-issues] 20211018 [jira] [Updated] (GEODE-9744) like CVE-2020-8908](https://lists.apache.org/thread.html/rc607bc52f3507b8b9c28c6a747c3122f51ac24afe80af2a670785b97%40%3Cissues.geode.apache.org%3E)
39. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
40. [[pig-dev] 20211021 [GitHub] [pig] lujiefsi opened a new pull request #36: PIG-5417:Replace guava's Files.createTempDir()](https://lists.apache.org/thread.html/rd7e12d56d49d73e2b8549694974b07561b79b05455f7f781954231bf%40%3Cdev.pig.apache.org%3E)
41. [](https://www.oracle.com/security-alerts/cpujan2022.html)
42. [](https://www.oracle.com/security-alerts/cpuapr2022.html)
43. [](https://security.netapp.com/advisory/ntap-20220210-0003/)
### Credits
- Jonathan Leitschuh |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24145
- **State**: PUBLISHED
- **Published Date**: February 03, 2023 at 00:00 UTC
- **Last Updated**: March 26, 2025 at 18:40 UTC
- **Reserved Date**: January 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the plugin_version parameter in the setUnloadUserData function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setUnloadUserData/setUnloadUserData.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36622, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36622
- **State**: PUBLISHED
- **Published Date**: December 21, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 12:55 UTC
- **Reserved Date**: December 21, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in sah-comp bienlein and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The name of the patch is d7836a4f2b241e4745ede194f0f6fb47199cab6b. It is recommended to apply a patch to fix this issue. The identifier VDB-216473 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**sah-comp - bienlein**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sah-comp/bienlein/commit/d7836a4f2b241e4745ede194f0f6fb47199cab6b)
2. [](https://vuldb.com/?id.216473) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22939
- **State**: PUBLISHED
- **Published Date**: February 04, 2022 at 22:29 UTC
- **Last Updated**: August 03, 2024 at 03:28 UTC
- **Reserved Date**: January 10, 2022 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
VMware Cloud Foundation contains an information disclosure vulnerability due to logging of credentials in plain-text within multiple log files on the SDDC Manager. A malicious actor with root access on VMware Cloud Foundation SDDC Manager may be able to view credentials in plaintext within one or more log files.
### Affected Products
**n/a - VMware Cloud Foundation**
Affected versions:
- VMware Cloud Foundation 4.x (before 4.3.1.1) and 3.x (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2022-0003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9155, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9155 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9155
- **State**: PUBLISHED
- **Published Date**: April 12, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 07:17 UTC
- **Reserved Date**: March 31, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Open-AudIT Professional 2.1.1 allows remote attackers to inject arbitrary web script or HTML via a crafted name of a component, as demonstrated by the Admin->Logs section (with a logs?logs.type= URI) and the Manage->Attributes section (via the "Name (display)" field to the attributes/create URI).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44612](https://www.exploit-db.com/exploits/44612/)
2. [](https://docs.google.com/document/d/1ZG1qiwpECbVnv92yNckDn7yyuluKoC2_ON-eLhAY97Q/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20904, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20904
- **State**: PUBLISHED
- **Published Date**: July 21, 2022 at 03:50 UTC
- **Last Updated**: November 06, 2024 at 16:10 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Cisco - Cisco Small Business RV Series Router Firmware**
Affected versions:
- n/a (Status: affected)
### References
1. [20220720 Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28697, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28697 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28697
- **State**: PUBLISHED
- **Published Date**: August 27, 2021 at 18:37 UTC
- **Last Updated**: August 03, 2024 at 21:47 UTC
- **Reserved Date**: March 18, 2021 at 00:00 UTC
- **Assigned By**: XEN
### Vulnerability Description
grant table v2 status pages may remain accessible after de-allocation Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, get de-allocated when a guest switched (back) from v2 to v1. The freeing of such pages requires that the hypervisor know where in the guest these pages were mapped. The hypervisor tracks only one use within guest space, but racing requests from the guest to insert mappings of these pages may result in any of them to become mapped in multiple locations. Upon switching back from v2 to v1, the guest would then retain access to a page that was freed and perhaps re-used for other purposes.
### Affected Products
**Xen - xen**
Affected versions:
- xen-unstable (Status: affected)
**Xen - xen**
Affected versions:
- unspecified (Status: unknown)
- 4.13.x (Status: affected)
- next of 4.14.x (Status: unaffected)
**Xen - xen**
Affected versions:
- unspecified (Status: unknown)
- 4.11.x (Status: affected)
- next of 4.12.x (Status: unaffected)
**Xen - xen**
Affected versions:
- 4.15.x (Status: affected)
### References
1. [](https://xenbits.xenproject.org/xsa/advisory-379.txt)
2. [FEDORA-2021-4f129cc0c1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LPRVHW4J4ZCPPOHZEWP5MOJT7XDGFFPJ/)
3. [FEDORA-2021-d68ed12e46](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZCNPSRPGFCQRYE2BI4D4Q4SCE56ANV2/)
4. [DSA-4977](https://www.debian.org/security/2021/dsa-4977)
5. [FEDORA-2021-081f9bf5d2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2VQCFAPBNGBBAOMJZG6QBREOG5IIDZID/)
6. [GLSA-202208-23](https://security.gentoo.org/glsa/202208-23)
### Credits
- {'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'This issue was discovered by Jan Beulich of SUSE.'}]}}} |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0890, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0890 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0890
- **State**: PUBLISHED
- **Published Date**: March 22, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:55 UTC
- **Reserved Date**: December 08, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
iHTML Merchant allows remote attackers to obtain sensitive information or execute commands via a code parsing error.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ihtmlmerchant.com/support_patches_feedback.htm)
2. [694](http://www.securityfocus.com/bid/694) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23948, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23948 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23948
- **State**: PUBLISHED
- **Published Date**: January 22, 2025 at 14:29 UTC
- **Last Updated**: January 22, 2025 at 15:24 UTC
- **Reserved Date**: January 16, 2025 at 11:32 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WebArea Background animation blocks allows PHP Local File Inclusion. This issue affects Background animation blocks: from n/a through 2.1.5.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-98: Security Weakness
### Affected Products
**WebArea - Background animation blocks**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/background-animation-blocks/vulnerability/wordpress-background-animation-blocks-plugin-2-1-5-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42338
- **State**: REJECTED
- **Last Updated**: July 02, 2023 at 21:50 UTC
- **Reserved Date**: October 03, 2022 at 16:02 UTC
- **Assigned By**: XEN
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2433, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2433 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2433
- **State**: PUBLISHED
- **Published Date**: August 18, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:29 UTC
- **Reserved Date**: August 18, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the IsValidFile function in the ADM ActiveX control for Altnet Download Manager 4.0.0.4 and earlier, as used in Kazaa Media Desktop 1.3 through 2.6.4 and Grokkster 1.3 through 2.6, allows remote attackers to execute arbitrary code via a long bstrFilepath parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [12446](http://secunia.com/advisories/12446)
2. [12456](http://secunia.com/advisories/12456)
3. [11101](http://www.securityfocus.com/bid/11101)
4. [adm-bstrfilepath-bo(17221)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17221)
5. [9549](http://www.osvdb.org/9549)
6. [1011155](http://securitytracker.com/id?1011155) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23680, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23680 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23680
- **State**: PUBLISHED
- **Published Date**: May 22, 2023 at 08:31 UTC
- **Last Updated**: January 09, 2025 at 15:11 UTC
- **Reserved Date**: January 17, 2023 at 05:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Bob Goetz WP-TopBar plugin <= 5.36 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Bob Goetz - WP-TopBar**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-topbar/wordpress-wp-topbar-plugin-5-36-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- thiennv (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38437, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38437
- **State**: PUBLISHED
- **Published Date**: October 14, 2022 at 19:45 UTC
- **Last Updated**: April 23, 2025 at 16:47 UTC
- **Reserved Date**: August 18, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat Reader versions 22.002.20212 (and earlier) and 20.005.30381 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Adobe - Acrobat Reader**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb22-46.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0361, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0361 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0361
- **State**: PUBLISHED
- **Published Date**: January 20, 2010 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 02:01 UTC
- **Reserved Date**: January 20, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the WebDAV implementation in webservd in Sun Java System Web Server (aka SJWS) 7.0 Update 7 allows remote attackers to cause a denial of service (daemon crash) and possibly have unspecified other impact via a long URI in an HTTP OPTIONS request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70u7-webdav.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10304
- **State**: PUBLISHED
- **Published Date**: April 10, 2017 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 03:14 UTC
- **Reserved Date**: March 29, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The SAP EP-RUNTIME component in SAP NetWeaver AS JAVA 7.5 allows remote authenticated users to cause a denial of service (out-of-memory error and service instability) via a crafted serialized Java object, as demonstrated by serial.cc3, aka SAP Security Note 2315788.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://erpscan.io/advisories/erpscan-16-029-sap-netweaver-java-7-5-deserialization-untrusted-user-value-trustmanagementservlet/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-5201, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-5201 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-5201
- **State**: PUBLISHED
- **Published Date**: September 23, 2012 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 00:30 UTC
- **Reserved Date**: September 23, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in sign.php in tinyguestbook allow remote attackers to execute arbitrary SQL commands via the (1) name and (2) msg parameters. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [tinyguestbook-sign-sql-injection(72109)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72109)
2. [20120103 Re: Tinyguestbook XSS](http://archives.neohapsis.com/archives/bugtraq/2012-01/0015.html)
3. [51259](http://www.securityfocus.com/bid/51259)
4. [](http://code.google.com/p/tinyguestbook/issues/detail?id=3)
5. [47419](http://secunia.com/advisories/47419)
6. [78128](http://www.osvdb.org/78128) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6988, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6988 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6988
- **State**: PUBLISHED
- **Published Date**: October 16, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 12:31 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Quotes in Images (aka pt.lumberapps.imagensfrases) application 3.7.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
2. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
3. [VU#726201](http://www.kb.cert.org/vuls/id/726201) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21347, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21347 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21347
- **State**: PUBLISHED
- **Published Date**: October 30, 2023 at 16:56 UTC
- **Last Updated**: August 02, 2024 at 09:36 UTC
- **Reserved Date**: November 03, 2022 at 22:37 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
### References
1. [](https://source.android.com/docs/security/bulletin/android-14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40937, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40937 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40937
- **State**: PUBLISHED
- **Published Date**: July 12, 2024 at 12:25 UTC
- **Last Updated**: May 04, 2025 at 09:18 UTC
- **Reserved Date**: July 12, 2024 at 12:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
gve: Clear napi->skb before dev_kfree_skb_any()
gve_rx_free_skb incorrectly leaves napi->skb referencing an skb after it
is freed with dev_kfree_skb_any(). This can result in a subsequent call
to napi_get_frags returning a dangling pointer.
Fix this by clearing napi->skb before the skb is freed.
### Affected Products
**Linux - Linux**
Affected versions:
- 9b8dd5e5ea48bbb7532d20c4093a79d8283e4029 (Status: affected)
- 9b8dd5e5ea48bbb7532d20c4093a79d8283e4029 (Status: affected)
- 9b8dd5e5ea48bbb7532d20c4093a79d8283e4029 (Status: affected)
- 9b8dd5e5ea48bbb7532d20c4093a79d8283e4029 (Status: affected)
- 9b8dd5e5ea48bbb7532d20c4093a79d8283e4029 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.14 (Status: affected)
- 0 (Status: unaffected)
- 5.15.162 (Status: unaffected)
- 6.1.95 (Status: unaffected)
- 6.6.35 (Status: unaffected)
- 6.9.6 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/75afd8724739ee5ed8165acde5f6ac3988b485cc)
2. [](https://git.kernel.org/stable/c/d221284991118c0ab16480b53baecd857c0bc442)
3. [](https://git.kernel.org/stable/c/2ce5341c36993b776012601921d7688693f8c037)
4. [](https://git.kernel.org/stable/c/a68184d5b420ea4fc7e6b7ceb52bbc66f90d3c50)
5. [](https://git.kernel.org/stable/c/6f4d93b78ade0a4c2cafd587f7b429ce95abb02e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-18770, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-18770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-18770
- **State**: PUBLISHED
- **Published Date**: August 22, 2023 at 00:00 UTC
- **Last Updated**: October 04, 2024 at 16:39 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in function zzip_disk_entry_to_file_header in mmapped.c in zziplib 0.13.69, which will lead to a denial-of-service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gdraheim/zziplib/issues/69) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0897, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0897 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0897
- **State**: PUBLISHED
- **Published Date**: October 26, 2023 at 19:44 UTC
- **Last Updated**: January 16, 2025 at 21:27 UTC
- **Reserved Date**: February 17, 2023 at 21:23 UTC
- **Assigned By**: icscert
### Vulnerability Description
Sielco PolyEco1000 is vulnerable to a session hijack vulnerability due to the cookie being vulnerable to a brute force attack, lack of SSL, and the session being visible in requests.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-384: Security Weakness
### Affected Products
**Sielco - PolyEco1000**
Affected versions:
- CPU:2.0.6 FPGA:10.19 (Status: affected)
- CPU:1.9.4 FPGA:10.19 (Status: affected)
- CPU:1.9.3 FPGA:10.19 (Status: affected)
- CPU:1.7.0 FPGA:10.16 (Status: affected)
- CPU:2.0.2 FPGA:10.19 (Status: affected)
- CPU:2.0.0 FPGA:10.19 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07)
### Credits
- Gjoko Krstic |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9237, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9237 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9237
- **State**: PUBLISHED
- **Published Date**: September 27, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 21:38 UTC
- **Reserved Date**: February 28, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-121325979
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-44176, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-44176 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-44176
- **State**: PUBLISHED
- **Published Date**: May 12, 2025 at 00:00 UTC
- **Last Updated**: May 13, 2025 at 17:32 UTC
- **Reserved Date**: April 22, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda FH451 V1.0.0.9 is vulnerable to Remote Code Execution in the formSafeEmailFilter function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/xubeining/Cve_report/blob/main/Notification%20of%20Remote%20Code%20Execution%20Vulnerability%20in%20Tenda%20FH451%20Router%20%28Version%20V1.0.0.9%29%20by%20Shenzhen%20Jixiang%20Tenda%20Technology.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-39446, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-39446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-39446
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 18:55 UTC
- **Last Updated**: May 19, 2025 at 21:22 UTC
- **Reserved Date**: April 16, 2025 at 06:23 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pluggabl LLC Booster Plus for WooCommerce allows Reflected XSS.This issue affects Booster Plus for WooCommerce: from n/a through 7.2.4.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Pluggabl LLC - Booster Plus for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/booster-plus-for-woocommerce/vulnerability/wordpress-booster-plus-for-woocommerce-plugin-7-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Trương Hữu Phúc / truonghuuphuc (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2751, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2751
- **State**: PUBLISHED
- **Published Date**: November 01, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 22:45 UTC
- **Reserved Date**: August 30, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
memberd in Mac OS X 10.4 up to 10.4.2, in certain situations, does not quickly synchronize access control checks with changes in group membership, which could allow users to access files and other resources after they have been removed from a group.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [macos-memberd-unauthorized-access(44465)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44465)
2. [ADV-2005-2256](http://www.vupen.com/english/advisories/2005/2256)
3. [17368](http://secunia.com/advisories/17368)
4. [20429](http://www.osvdb.org/20429)
5. [APPLE-SA-2005-10-31](http://lists.apple.com/archives/security-announce/2005/Oct/msg00000.html)
6. [15252](http://www.securityfocus.com/bid/15252)
7. [1015125](http://securitytracker.com/id?1015125) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41946
- **State**: PUBLISHED
- **Published Date**: September 06, 2023 at 12:09 UTC
- **Last Updated**: September 26, 2024 at 19:47 UTC
- **Reserved Date**: September 05, 2023 at 16:39 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A cross-site request forgery (CSRF) vulnerability in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers to connect to Frugal Testing using attacker-specified credentials, and to retrieve test IDs and names from Frugal Testing, if a valid credential corresponds to the attacker-specified username.
### Affected Products
**Jenkins Project - Jenkins Frugal Testing Plugin**
Affected versions:
- 0 (Status: affected)
### References
1. [Jenkins Security Advisory 2023-09-06](https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3082)
2. [](http://www.openwall.com/lists/oss-security/2023/09/06/9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11892, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11892 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11892
- **State**: PUBLISHED
- **Published Date**: January 11, 2025 at 07:21 UTC
- **Last Updated**: January 13, 2025 at 17:11 UTC
- **Reserved Date**: November 27, 2024 at 16:05 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Accordion Slider Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'accordion_slider' shortcode in all versions up to, and including, 1.5.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**bqworks - Accordion Slider Lite**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/bb386ab5-1fb9-4649-99a6-0e3f971a02f8?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/accordion-slider-lite/tags/1.5.1/public/class-accordion-slider.php#L98)
3. [](https://plugins.trac.wordpress.org/browser/accordion-slider-lite/tags/1.5.1/public/class-accordion-slider.php#L445)
4. [](https://plugins.trac.wordpress.org/browser/accordion-slider-lite/tags/1.5.1/public/class-accordion-slider.php#L310)
5. [](https://plugins.trac.wordpress.org/browser/accordion-slider-lite/tags/1.5.1/public/class-accordion-renderer.php#L93)
6. [](https://plugins.trac.wordpress.org/browser/accordion-slider-lite/tags/1.5.1/public/class-accordion-renderer.php#L172)
### Credits
- muhammad yudha |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26482, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26482 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26482
- **State**: PUBLISHED
- **Published Date**: March 30, 2023 at 18:27 UTC
- **Last Updated**: February 11, 2025 at 18:54 UTC
- **Reserved Date**: February 23, 2023 at 23:22 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Nextcloud server is an open source home cloud implementation. In affected versions a missing scope validation allowed users to create workflows which are designed to be only available for administrators. Some workflows are designed to be RCE by invoking defined scripts, in order to generate PDFs, invoking webhooks or running scripts on the server. Due to this combination depending on the available apps the issue can result in a RCE at the end. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. Users unable to upgrade should disable app `workflow_scripts` and `workflow_pdf_converter` as a mitigation.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**nextcloud - security-advisories**
Affected versions:
- < 24.0.10 (Status: affected)
- >= 25.0.0, < 25.0.4 (Status: affected)
### References
1. [https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h3c9-cmh8-7qpj](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h3c9-cmh8-7qpj)
2. [https://github.com/nextcloud/server/commit/5a06b50b10cc9278bbe68bbf897a0c4aeb0c4e60](https://github.com/nextcloud/server/commit/5a06b50b10cc9278bbe68bbf897a0c4aeb0c4e60) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20336
- **State**: PUBLISHED
- **Published Date**: March 06, 2024 at 16:31 UTC
- **Last Updated**: August 01, 2024 at 21:59 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based user interface of Cisco Small Business 100, 300, and 500 Series Wireless APs could allow an authenticated, remote attacker to perform buffer overflow attacks against an affected device. In order to exploit this vulnerability, the attacker must have valid administrative credentials for the device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Cisco - Cisco Business Wireless Access Point Software**
Affected versions:
- 1.0.0.3 (Status: affected)
- 1.0.0.4 (Status: affected)
- 1.0.0.5 (Status: affected)
- 1.0.0.7 (Status: affected)
- 1.0.1.3 (Status: affected)
- 1.0.1.5 (Status: affected)
- 1.0.1.7 (Status: affected)
- 1.0.2.0 (Status: affected)
- 1.0.3.1 (Status: affected)
- 1.0.4.4 (Status: affected)
- 1.0.4.3 (Status: affected)
- 1.0.5.0 (Status: affected)
### References
1. [cisco-sa-sb-wap-multi-85G83CRB](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-85G83CRB) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36373, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36373 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36373
- **State**: PUBLISHED
- **Published Date**: July 14, 2021 at 06:20 UTC
- **Last Updated**: August 04, 2024 at 00:54 UTC
- **Reserved Date**: July 12, 2021 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
When reading a specially crafted TAR archive an Apache Ant build can be made to allocate large amounts of memory that finally leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Apache Ant prior to 1.9.16 and 1.10.11 were affected.
### Weakness Classification (CWE)
- CWE-130: Security Weakness
### Affected Products
**Apache Software Foundation - Apache Ant**
Affected versions:
- Apache Ant 1.9.x (Status: affected)
- Apache Ant 1.10.x (Status: affected)
- Apache Ant (Status: unaffected)
### References
1. [](https://ant.apache.org/security.html)
2. [](https://lists.apache.org/thread.html/r54afdab05e01de970649c2d91a993f68a6b00cd73e6e34e16c832d46%40%3Cuser.ant.apache.org%3E)
3. [[groovy-commits] 20210714 [groovy] 08/09: GROOVY-10169: Bump Ant version to 1.10.11 (incorporates CVE-2021-36373 and CVE-2021-36374)](https://lists.apache.org/thread.html/r27919fd4db07c487239c1d9771f480d89ce5ee2750aa9447309b709a%40%3Ccommits.groovy.apache.org%3E)
4. [[groovy-commits] 20210715 [groovy] 02/07: GROOVY-10169: Bump Ant version to 1.10.11 (incorporates CVE-2021-36373 and CVE-2021-36374)](https://lists.apache.org/thread.html/r544c9e8487431768465b8b2d13982c75123109bd816acf839d46010d%40%3Ccommits.groovy.apache.org%3E)
5. [[groovy-notifications] 20210715 [jira] [Resolved] (GROOVY-10169) Bump Ant version to 1.10.11 (incorporates CVE-2021-36373 and CVE-2021-36374)](https://lists.apache.org/thread.html/rad36f470647c5a7c02dd78c9973356d2840766d132b597b6444e373a%40%3Cnotifications.groovy.apache.org%3E)
6. [[myfaces-dev] 20210830 [GitHub] [myfaces-tobago] lofwyr14 opened a new pull request #1215: build: CVE fix](https://lists.apache.org/thread.html/rf4bb79751a02889623195715925e4fd8932dd3c97e0ade91395a96c6%40%3Cdev.myfaces.apache.org%3E)
7. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
8. [](https://security.netapp.com/advisory/ntap-20210819-0007/)
9. [](https://www.oracle.com/security-alerts/cpujan2022.html)
10. [](https://www.oracle.com/security-alerts/cpuapr2022.html)
11. [](https://www.oracle.com/security-alerts/cpujul2022.html)
### Credits
- This issue is similar to https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35517 present in Apache Commons Compress which has been detected by OSS Fuzz. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24414, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24414 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24414
- **State**: PUBLISHED
- **Published Date**: May 26, 2022 at 15:20 UTC
- **Last Updated**: September 17, 2024 at 00:55 UTC
- **Reserved Date**: February 04, 2022 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell EMC CloudLink 7.1.3 and all earlier versions, Auth Token is exposed in GET requests. These request parameters can get logged in reverse proxies and server logs. Attackers may potentially use these tokens to access CloudLink server. Tokens should not be used in request URL to avoid such attacks.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-598: Security Weakness
### Affected Products
**Dell - CloudLink**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000197425/dsa-2022-064-dell-emc-cloudlink-security-update-for-security-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1785, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1785 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1785
- **State**: PUBLISHED
- **Published Date**: March 31, 2023 at 20:00 UTC
- **Last Updated**: August 02, 2024 at 05:57 UTC
- **Reserved Date**: March 31, 2023 at 19:39 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Earnings and Expense Tracker App 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-224700.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Earnings and Expense Tracker App**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.224700)
2. [](https://vuldb.com/?ctiid.224700)
3. [](https://github.com/web-zxl/img/blob/main/4.png)
### Credits
- aallll (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0552, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0552 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0552
- **State**: PUBLISHED
- **Published Date**: August 29, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:21 UTC
- **Reserved Date**: July 18, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ovactiond in HP OpenView Network Node Manager (NNM) 6.1 and Tivoli Netview 5.x and 6.x allows remote attackers to execute arbitrary commands via shell metacharacters in a certain SNMP trap message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2845](http://www.securityfocus.com/bid/2845)
2. [20010608 HP Openview NNM6.1 ovactiond bin exploit](http://marc.info/?l=bugtraq&m=99201278704545&w=2)
3. [CA-2001-24](http://www.cert.org/advisories/CA-2001-24.html)
4. [VU#952171](http://www.kb.cert.org/vuls/id/952171) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1278, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1278 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1278
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:11 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
nlog CGI scripts do not properly filter shell metacharacters from the IP address argument, which could allow remote attackers to execute certain commands via (1) nlog-smb.pl or (2) rpc-nlog.pl.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19981226 Nlog 1.1b released - security holes fixed](http://marc.info/?l=bugtraq&m=91471400632145&w=2)
2. [19981225 Re: Nlog v1.0 Released - Nmap 2.x log management / analyzing tool](http://marc.info/?l=bugtraq&m=91470326629357&w=2)
3. [http-cgi-nlog-netbios(1550)](https://exchange.xforce.ibmcloud.com/vulnerabilities/1550)
4. [http-cgi-nlog-metachars(1549)](https://exchange.xforce.ibmcloud.com/vulnerabilities/1549) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15457
- **State**: REJECTED
- **Published Date**: January 23, 2018 at 17:00 UTC
- **Last Updated**: January 23, 2018 at 16:57 UTC
- **Reserved Date**: October 17, 2017 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10780, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10780 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10780
- **State**: PUBLISHED
- **Published Date**: November 28, 2024 at 09:47 UTC
- **Last Updated**: November 29, 2024 at 19:14 UTC
- **Reserved Date**: November 04, 2024 at 13:24 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Restaurant & Cafe Addon for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.5.9 via the 'narestaurant_elementor_template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**nicheaddons - Restaurant & Cafe Addon for Elementor**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a8c29cbd-6c39-4a54-a2a2-bc4c8feeeb70?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3197286%40restaurant-cafe-addon-for-elementor&new=3197286%40restaurant-cafe-addon-for-elementor&sfp_email=&sfph_mail=)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18648, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18648
- **State**: PUBLISHED
- **Published Date**: December 04, 2018 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 11:15 UTC
- **Reserved Date**: October 25, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It has Information Exposure Through an Error Message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab-ce/issues/50975)
2. [](https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40654, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40654
- **State**: PUBLISHED
- **Published Date**: October 08, 2023 at 03:36 UTC
- **Last Updated**: September 19, 2024 at 18:02 UTC
- **Reserved Date**: August 18, 2023 at 02:28 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In FW-PackageManager, there is a possible missing permission check. This could lead to local escalation of privilege with System execution privileges needed
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000**
Affected versions:
- Android11 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3843, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3843
- **State**: PUBLISHED
- **Published Date**: November 26, 2005 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 23:24 UTC
- **Reserved Date**: November 26, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in faq.php in Nicecoder iDesk 1.0 allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21117](http://www.osvdb.org/21117)
2. [15597](http://www.securityfocus.com/bid/15597)
3. [idesk-faq-sql-injection(23222)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23222)
4. [17729](http://secunia.com/advisories/17729)
5. [](http://pridels0.blogspot.com/2005/11/idesk-catid-sql-inj.html)
6. [ADV-2005-2590](http://www.vupen.com/english/advisories/2005/2590) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6040, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6040 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6040
- **State**: PUBLISHED
- **Published Date**: January 12, 2024 at 01:37 UTC
- **Last Updated**: February 13, 2025 at 17:26 UTC
- **Reserved Date**: November 08, 2023 at 20:12 UTC
- **Assigned By**: canonical
### Vulnerability Description
An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**The Linux Kernel Organization - linux**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6040)
2. [](https://www.openwall.com/lists/oss-security/2024/01/12/1)
3. [](http://www.openwall.com/lists/oss-security/2024/01/12/1)
4. [](http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html)
5. [](https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html)
6. [](https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html)
### Credits
- Lin Ma from Ant Security Light-Year Lab & ZJU |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2162, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2162 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2162
- **State**: PUBLISHED
- **Published Date**: May 02, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:06 UTC
- **Reserved Date**: February 25, 2014 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCud29566.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3120, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3120 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3120
- **State**: PUBLISHED
- **Published Date**: September 05, 2022 at 06:45 UTC
- **Last Updated**: April 14, 2025 at 15:58 UTC
- **Reserved Date**: September 04, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in SourceCodester Clinics Patient Management System. Affected by this vulnerability is an unknown functionality of the file index.php of the component Login. The manipulation of the argument user_name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-207847.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Clinics Patient Management System**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/joinia/webray.com.cn/blob/main/Clinic%27s-Patient-Management-System/cpms.md)
2. [](https://vuldb.com/?id.207847) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7002, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7002 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7002
- **State**: PUBLISHED
- **Published Date**: October 23, 2015 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 07:36 UTC
- **Reserved Date**: September 16, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2015-10-21-1](http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html)
2. [77267](http://www.securityfocus.com/bid/77267)
3. [](https://support.apple.com/HT205370)
4. [openSUSE-SU-2016:0761](http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html)
5. [](https://support.apple.com/HT205372)
6. [APPLE-SA-2015-10-21-3](http://lists.apple.com/archives/security-announce/2015/Oct/msg00004.html)
7. [APPLE-SA-2015-10-21-5](http://lists.apple.com/archives/security-announce/2015/Oct/msg00006.html)
8. [](https://support.apple.com/HT205377)
9. [1033929](http://www.securitytracker.com/id/1033929) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42669, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42669 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42669
- **State**: PUBLISHED
- **Published Date**: November 06, 2023 at 06:57 UTC
- **Last Updated**: November 23, 2024 at 02:00 UTC
- **Reserved Date**: September 13, 2023 at 04:22 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Unknown - Unknown**
Affected versions:
- 4.0.0 (Status: affected)
- 4.18.0 (Status: affected)
- 4.19.0 (Status: affected)
**Red Hat - Red Hat Enterprise Linux 8**
Affected versions:
- 0:4.18.6-2.el8_9 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8**
Affected versions:
- 0:4.18.6-2.el8_9 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.6 Extended Update Support**
Affected versions:
- 0:4.15.5-13.el8_6 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.8 Extended Update Support**
Affected versions:
- 0:4.17.5-4.el8_8 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:4.18.6-101.el9_3 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:4.18.6-101.el9_3 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.0 Extended Update Support**
Affected versions:
- 0:4.15.5-111.el9_0 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support**
Affected versions:
- 0:4.17.5-104.el9_2 (Status: unaffected)
**Red Hat - Red Hat Virtualization 4 for Red Hat Enterprise Linux 8**
Affected versions:
- 0:4.15.5-13.el8_6 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Storage 3**
### References
1. [RHSA-2023:6209](https://access.redhat.com/errata/RHSA-2023:6209)
2. [RHSA-2023:6744](https://access.redhat.com/errata/RHSA-2023:6744)
3. [RHSA-2023:7371](https://access.redhat.com/errata/RHSA-2023:7371)
4. [RHSA-2023:7408](https://access.redhat.com/errata/RHSA-2023:7408)
5. [RHSA-2023:7464](https://access.redhat.com/errata/RHSA-2023:7464)
6. [RHSA-2023:7467](https://access.redhat.com/errata/RHSA-2023:7467)
7. [](https://access.redhat.com/security/cve/CVE-2023-42669)
8. [RHBZ#2241884](https://bugzilla.redhat.com/show_bug.cgi?id=2241884)
9. [](https://bugzilla.samba.org/show_bug.cgi?id=15474)
10. [](https://www.samba.org/samba/security/CVE-2023-42669.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47191, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47191
- **State**: PUBLISHED
- **Published Date**: December 21, 2023 at 18:26 UTC
- **Last Updated**: August 02, 2024 at 21:01 UTC
- **Reserved Date**: October 31, 2023 at 14:57 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authorization Bypass Through User-Controlled Key vulnerability in KaineLabs Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress.This issue affects Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress: from n/a through 1.2.2.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**KaineLabs - Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/youzify/wordpress-youzify-plugin-1-2-2-insecure-direct-object-reference-idor-vulnerability?_s_id=cve)
### Credits
- lttn (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26429, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26429 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26429
- **State**: PUBLISHED
- **Published Date**: August 01, 2022 at 13:57 UTC
- **Last Updated**: August 03, 2024 at 05:03 UTC
- **Reserved Date**: March 04, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In cta, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07025415; Issue ID: ALPS07025415.
### Affected Products
**MediaTek, Inc. - MT6580, MT6735, MT6739, MT6757, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8168, MT8173, MT8185, MT8321, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797**
Affected versions:
- Android 11.0, 12.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/August-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37769
- **State**: PUBLISHED
- **Published Date**: July 17, 2023 at 00:00 UTC
- **Last Updated**: October 30, 2024 at 15:25 UTC
- **Reserved Date**: July 10, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
stress-test master commit e4c878 was discovered to contain a FPE vulnerability via the component combine_inner at /pixman-combine-float.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.freedesktop.org/pixman/pixman/-/issues/76) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23872, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23872 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23872
- **State**: PUBLISHED
- **Published Date**: May 12, 2021 at 09:00 UTC
- **Last Updated**: August 03, 2024 at 19:14 UTC
- **Reserved Date**: January 12, 2021 at 00:00 UTC
- **Assigned By**: trellix
### Vulnerability Description
Privilege Escalation vulnerability in the File Lock component of McAfee Total Protection (MTP) prior to 16.0.32 allows a local user to gain elevated privileges by manipulating a symbolic link in the IOCTL interface.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**McAfee,LLC - McAfee Total Protection (MTP)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](http://service.mcafee.com/FAQDocument.aspx?&id=TS103146) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12245, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12245 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12245
- **State**: PUBLISHED
- **Published Date**: November 29, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 08:30 UTC
- **Reserved Date**: June 12, 2018 at 00:00 UTC
- **Assigned By**: symantec
### Vulnerability Description
Symantec Endpoint Protection prior to 14.2 MP1 may be susceptible to a DLL Preloading vulnerability, which in this case is an issue that can occur when an application being installed unintentionally loads a DLL provided by a potential attacker. Note that this particular type of exploit only manifests at install time; no remediation is required for software that has already been installed. This issue only impacted the Trialware media for Symantec Endpoint Protection, which has since been updated.
### Affected Products
**Symantec Corporation - Symantec Endpoint Protection (SEP)**
Affected versions:
- Prior to 14.2 MP1 (Status: affected)
### References
1. [105919](http://www.securityfocus.com/bid/105919)
2. [](https://support.symantec.com/content/unifiedweb/en_US/article.SYMSA1468.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39086, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39086
- **State**: PUBLISHED
- **Published Date**: August 16, 2022 at 18:45 UTC
- **Last Updated**: September 16, 2024 at 19:45 UTC
- **Reserved Date**: August 16, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Sterling File Gateway 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 215889.
### Affected Products
**IBM - Sterling File Gateway**
Affected versions:
- 6.0.0.0 (Status: affected)
- 6.1.0.0 (Status: affected)
- 6.1.1.0 (Status: affected)
- 6.0.3.5 (Status: affected)
- 6.1.0.4 (Status: affected)
- 6.1.1.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6612537)
2. [ibm-sterling-cve202139086-info-disc (215889)](https://exchange.xforce.ibmcloud.com/vulnerabilities/215889) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0792
- **State**: PUBLISHED
- **Published Date**: April 07, 2016 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 22:30 UTC
- **Reserved Date**: December 16, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43375](https://www.exploit-db.com/exploits/43375/)
2. [RHSA-2016:0711](https://access.redhat.com/errata/RHSA-2016:0711)
3. [42394](https://www.exploit-db.com/exploits/42394/)
4. [](https://www.contrastsecurity.com/security-influencers/serialization-must-die-act-2-xstream)
5. [RHSA-2016:1773](http://rhn.redhat.com/errata/RHSA-2016-1773.html)
6. [](https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4154
- **State**: PUBLISHED
- **Published Date**: December 02, 2009 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 22:56 UTC
- **Reserved Date**: December 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in includes/feedcreator.class.php in Elxis CMS allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.org/0911-exploits/elxiscms-disclose.txt)
2. [37158](http://www.securityfocus.com/bid/37158) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28865, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28865
- **State**: PUBLISHED
- **Published Date**: August 08, 2024 at 00:00 UTC
- **Last Updated**: August 08, 2024 at 20:09 UTC
- **Reserved Date**: March 26, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR15, 4.0.0 SR05, 4.1.0 SR03, and 4.2.0 SR02 fails to validate the directory contents of certain directories (e.g., ensuring the expected hash sum) during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/)
2. [](https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1148, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1148
- **State**: PUBLISHED
- **Published Date**: January 13, 2021 at 21:38 UTC
- **Last Updated**: November 12, 2024 at 20:41 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on an affected device. Cisco has not released software updates that address these vulnerabilities.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Cisco - Cisco Small Business RV Series Router Firmware**
Affected versions:
- n/a (Status: affected)
### References
1. [20210113 Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Command Injection Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-LBdQ2KRN) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0507, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0507
- **State**: PUBLISHED
- **Published Date**: June 11, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:49 UTC
- **Reserved Date**: June 07, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An interaction between Microsoft Outlook Web Access (OWA) with RSA SecurID allows local users to bypass the SecurID authentication for a previous user via several submissions of an OWA Authentication request with the proper OWA password for the previous user, which is eventually accepted by OWA.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [exchange-owa-securid-bypass(8681)](http://www.iss.net/security_center/static/8681.php)
2. [20020328 Authentication with RSA SecurID and Outlook web access](http://online.securityfocus.com/archive/1/264705)
3. [4390](http://www.securityfocus.com/bid/4390) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1034, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1034
- **State**: PUBLISHED
- **Published Date**: June 02, 2008 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 08:08 UTC
- **Reserved Date**: February 26, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer underflow in Help Viewer in Apple Mac OS X before 10.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted help:topic URL that triggers a buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [macosx-helpviewer-bo(42716)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42716)
2. [1020138](http://securitytracker.com/id?1020138)
3. [TA08-150A](http://www.us-cert.gov/cas/techalerts/TA08-150A.html)
4. [30430](http://secunia.com/advisories/30430)
5. [APPLE-SA-2008-05-28](http://lists.apple.com/archives/security-announce/2008//May/msg00001.html)
6. [29483](http://www.securityfocus.com/bid/29483)
7. [ADV-2008-1697](http://www.vupen.com/english/advisories/2008/1697)
8. [VU#566875](http://www.kb.cert.org/vuls/id/566875)
9. [29412](http://www.securityfocus.com/bid/29412) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4028
- **State**: PUBLISHED
- **Published Date**: June 23, 2020 at 12:55 UTC
- **Last Updated**: September 16, 2024 at 16:48 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
Versions before 8.9.1, Various resources in Jira responded with a 404 instead of redirecting unauthenticated users to the login page, in some situations this may have allowed unauthorised attackers to determine if certain resources exist or not through an Information Disclosure vulnerability.
### Affected Products
**Atlassian - Jira Server and Data Center**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/JRASERVER-71175) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49215, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49215 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49215
- **State**: REJECTED
- **Published Date**: October 21, 2024 at 00:00 UTC
- **Last Updated**: December 09, 2024 at 22:36 UTC
- **Reserved Date**: October 14, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20665, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20665 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20665
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 19:03 UTC
- **Last Updated**: August 05, 2024 at 02:46 UTC
- **Reserved Date**: April 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by stored XSS. This affects RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK20 before 2.3.5.26, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK40 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and RBK50 before 2.3.5.30.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000061474/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-WiFi-Systems-PSV-2018-0556) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3816
- **State**: PUBLISHED
- **Published Date**: July 24, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 18:48 UTC
- **Reserved Date**: July 24, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Krusader 1.50-beta1 up to 1.70.0 stores passwords for remote connections in cleartext in the bookmark file (krbookmarks.xml), which allows attackers to steal passwords by obtaining the file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19194](http://www.securityfocus.com/bid/19194)
2. [](http://groups.google.com/group/krusader-news/browse_thread/thread/ec719041ed4a1a14)
3. [ADV-2006-2992](http://www.vupen.com/english/advisories/2006/2992)
4. [](http://krusader.sourceforge.net/phpBB/viewtopic.php?p=7965) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7848
- **State**: PUBLISHED
- **Published Date**: May 22, 2019 at 19:59 UTC
- **Last Updated**: August 05, 2024 at 06:37 UTC
- **Reserved Date**: March 08, 2018 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-200: Information Exposure vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause the disclosure of SNMP information when reading files from the controller over Modbus
### Affected Products
**n/a - Modicon M580 Modicon M340 Modicon Quantum Modicon Premium**
Affected versions:
- Modicon M580 Modicon M340 Modicon Quantum Modicon Premium (Status: affected)
### References
1. [](https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/)
2. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0740) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32091, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32091
- **State**: PUBLISHED
- **Published Date**: October 03, 2023 at 13:04 UTC
- **Last Updated**: September 20, 2024 at 13:18 UTC
- **Reserved Date**: May 02, 2023 at 11:32 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in POEditor plugin <= 0.9.4 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**POEditor - POEditor**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/poeditor/wordpress-poeditor-plugin-0-9-4-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- Elliot (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34725
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 20:11 UTC
- **Last Updated**: August 02, 2024 at 02:59 UTC
- **Reserved Date**: May 07, 2024 at 20:40 UTC
- **Assigned By**: google_android
### Vulnerability Description
In DevmemIntUnexportCtx of devicemem_server.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- Android SoC (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2024-07-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7057, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7057
- **State**: REJECTED
- **Published Date**: July 21, 2017 at 19:00 UTC
- **Last Updated**: July 21, 2017 at 18:57 UTC
- **Reserved Date**: August 23, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6015
- **State**: PUBLISHED
- **Published Date**: November 05, 2020 at 19:37 UTC
- **Last Updated**: August 04, 2024 at 08:47 UTC
- **Reserved Date**: January 07, 2020 at 00:00 UTC
- **Assigned By**: checkpoint
### Vulnerability Description
Check Point Endpoint Security for Windows before E84.10 can reach denial of service during clean install of the client which will prevent the storage of service log files in non-standard locations.
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**n/a - Check Point Endpoint Security for Windows**
Affected versions:
- before E84.10 (Status: affected)
### References
1. [](https://supportcontent.checkpoint.com/solutions?id=sk170117) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15580, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15580
- **State**: PUBLISHED
- **Published Date**: April 26, 2019 at 19:10 UTC
- **Last Updated**: August 05, 2024 at 10:01 UTC
- **Reserved Date**: August 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-Site Scripting (XSS) vulnerability in adm/contentformupdate.php in gnuboard5 before 5.3.1.6 allows remote attackers to inject arbitrary web script or HTML.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gnuboard/gnuboard5/commit/b1fc952c7600b825c4b02e2789ddafdea18c8d13#diff-4182a3e8b74f6eb325c45862f8f26e76) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3009, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3009 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3009
- **State**: PUBLISHED
- **Published Date**: December 10, 2008 at 13:33 UTC
- **Last Updated**: August 07, 2024 at 09:21 UTC
- **Reserved Date**: July 07, 2008 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Windows Media Player 6.4, Windows Media Format Runtime 7.1 through 11, and Windows Media Services 4.1, 9, and 2008 do not properly use the Service Principal Name (SPN) identifier when validating replies to authentication requests, which allows remote servers to execute arbitrary code via vectors that employ NTLM credential reflection, aka "SPN Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32653](http://www.securityfocus.com/bid/32653)
2. [1021372](http://www.securitytracker.com/id?1021372)
3. [oval:org.mitre.oval:def:5942](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5942)
4. [TA08-344A](http://www.us-cert.gov/cas/techalerts/TA08-344A.html)
5. [33058](http://secunia.com/advisories/33058)
6. [ADV-2008-3388](http://www.vupen.com/english/advisories/2008/3388)
7. [1021373](http://www.securitytracker.com/id?1021373)
8. [MS08-076](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-076) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2137, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2137 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2137
- **State**: PUBLISHED
- **Published Date**: April 28, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 13:39 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
ProSAFE Plus Configuration Utility prior to 2.3.29 allows remote attackers to bypass access restriction and change configurations of the switch via SOAP requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000038443/Security-Advisory-for-Insecure-SOAP-Access-in-ProSAFE-Plus-Configuration-Utility-PSV-2017-1997)
2. [JVN#08740778](http://jvn.jp/en/jp/JVN08740778/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0915, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0915 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0915
- **State**: PUBLISHED
- **Published Date**: May 16, 2019 at 18:17 UTC
- **Last Updated**: August 04, 2024 at 17:58 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
### Affected Products
**Microsoft - Microsoft Edge**
Affected versions:
- Windows 10 for 32-bit Systems (Status: affected)
- Windows 10 for x64-based Systems (Status: affected)
- Windows Server 2016 (Status: affected)
- Windows 10 Version 1607 for 32-bit Systems (Status: affected)
- Windows 10 Version 1607 for x64-based Systems (Status: affected)
- Windows 10 Version 1703 for 32-bit Systems (Status: affected)
- Windows 10 Version 1703 for x64-based Systems (Status: affected)
- Windows 10 Version 1709 for 32-bit Systems (Status: affected)
- Windows 10 Version 1709 for x64-based Systems (Status: affected)
- Windows 10 Version 1803 for 32-bit Systems (Status: affected)
- Windows 10 Version 1803 for x64-based Systems (Status: affected)
- Windows 10 Version 1803 for ARM64-based Systems (Status: affected)
- Windows 10 Version 1809 for 32-bit Systems (Status: affected)
- Windows 10 Version 1809 for x64-based Systems (Status: affected)
- Windows 10 Version 1809 for ARM64-based Systems (Status: affected)
- Windows Server 2019 (Status: affected)
- Windows 10 Version 1709 for ARM64-based Systems (Status: affected)
**Microsoft - Microsoft Edge on Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge on Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge on Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - ChakraCore**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0915) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5875
- **State**: PUBLISHED
- **Published Date**: July 06, 2018 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 02:36 UTC
- **Reserved Date**: January 19, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
While parsing an mp4 file, an integer overflow leading to a buffer overflow can occur in Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear.
### Affected Products
**Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear**
Affected versions:
- MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDX20 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43273, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43273 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43273
- **State**: PUBLISHED
- **Published Date**: November 14, 2021 at 20:48 UTC
- **Last Updated**: August 04, 2024 at 03:55 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An Out-of-bounds Read vulnerability exists in the DGN file reading procedure in Open Design Alliance Drawings SDK before 2022.11. Crafted data in a DGN file and lack of verification of input data can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.opendesign.com/security-advisories)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1281/)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1291/)
4. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1357/)
5. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1351/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35754, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35754
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 01:58 UTC
- **Last Updated**: September 18, 2024 at 18:29 UTC
- **Reserved Date**: June 15, 2023 at 20:23 UTC
- **Assigned By**: zdi
### Vulnerability Description
D-Link DAP-2622 DDP Set AG Profile NMS URL Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-20082.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**D-Link - DAP-2622**
Affected versions:
- 1.00 dated 16-12-2020 (Status: affected)
### References
1. [ZDI-23-1259](https://www.zerodayinitiative.com/advisories/ZDI-23-1259/)
2. [vendor-provided URL](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10349) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48264
- **State**: PUBLISHED
- **Published Date**: January 10, 2024 at 13:09 UTC
- **Last Updated**: April 17, 2025 at 15:48 UTC
- **Reserved Date**: November 13, 2023 at 13:44 UTC
- **Assigned By**: bosch
### Vulnerability Description
The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Rexroth - Nexo cordless nutrunner NXA015S-36V (0608842001)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA030S-36V (0608842002)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA050S-36V (0608842003)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXP012QD-36V (0608842005)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA015S-36V-B (0608842006)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA030S-36V-B (0608842007)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA050S-36V-B (0608842008)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXP012QD-36V-B (0608842010)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA011S-36V (0608842011)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA011S-36V-B (0608842012)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA065S-36V (0608842013)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA065S-36V-B (0608842014)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXV012T-36V (0608842015)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXV012T-36V-B (0608842016)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2272)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2301)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2514)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2515)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2666)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2673)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
### References
1. [https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html](https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27033, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27033 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27033
- **State**: PUBLISHED
- **Published Date**: December 15, 2020 at 16:02 UTC
- **Last Updated**: August 04, 2024 at 16:03 UTC
- **Reserved Date**: October 12, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In nfc_ncif_proc_get_routing of nfc_ncif.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153655153
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2020-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29814, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29814 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29814
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 12:02 UTC
- **Last Updated**: August 02, 2024 at 01:17 UTC
- **Reserved Date**: March 19, 2024 at 16:49 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CurrencyRate.Today Exchange Rates Widget allows Stored XSS.This issue affects Exchange Rates Widget: from n/a through 1.4.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**CurrencyRate.today - Exchange Rates Widget**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/exchange-rates-widget/wordpress-exchange-rates-widget-plugin-1-4-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- NGÔ THIÊN AN / ancorn_ from VNPT-VCI (Patchstack Alliance) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.