System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8875
- **State**: PUBLISHED
- **Published Date**: October 31, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 02:35 UTC
- **Reserved Date**: October 21, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ConvertToPDF plugin in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted TIFF image, aka "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at ConvertToPDF_x86!CreateFXPDFConvertor."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [93608](http://www.securityfocus.com/bid/93608)
2. [](https://www.foxitsoftware.com/support/security-bulletins.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35720
- **State**: PUBLISHED
- **Published Date**: January 11, 2021 at 02:55 UTC
- **Last Updated**: August 04, 2024 at 17:09 UTC
- **Reserved Date**: December 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stored XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to store malicious code in multiple fields (first name, last name, and logon name) when creating or modifying a user via the submitUser.jsp file. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://un4gi.io/blog/multiple-vulnerabilities-in-quest-policy-authority-for-unified-communications)
2. [](https://clandestinelabs.io/security-advisories/advisory-multiple-vulnerabilities-in-quest-policy-authority-for-unified-communications) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3394
- **State**: PUBLISHED
- **Published Date**: November 01, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:10 UTC
- **Reserved Date**: November 01, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in forum.php in oaboard forum 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) channel parameter in the topics module and (2) topic parameter in the posting module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2005-2258](http://www.vupen.com/english/advisories/2005/2258)
2. [17373](http://secunia.com/advisories/17373)
3. [20420](http://www.osvdb.org/20420)
4. [20051030 SQL IN FORUM.PHP](http://www.securityfocus.com/archive/1/415299)
5. [oaboard-forum-script-sql-injection(22932)](https://exchange.xforce.ibmcloud.com/vulnerabilities/22932)
6. [15245](http://www.securityfocus.com/bid/15245) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3799, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3799 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3799
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:40 UTC
- **Reserved Date**: October 07, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3101
- **State**: PUBLISHED
- **Published Date**: May 16, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 23:22 UTC
- **Reserved Date**: August 09, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Google Chrome before 19.0.1084.46 on Linux does not properly mitigate an unspecified flaw in an NVIDIA driver, which has unknown impact and attack vectors. NOTE: see CVE-2012-3105 for the related MFSA 2012-34 issue in Mozilla products.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201205-03](http://security.gentoo.org/glsa/glsa-201205-03.xml)
2. [chrome-nvidia-code-exec(75606)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75606)
3. [MDVSA-2012:088](http://www.mandriva.com/security/advisories?name=MDVSA-2012:088)
4. [openSUSE-SU-2012:0656](http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00017.html)
5. [1027067](http://www.securitytracker.com/id?1027067)
6. [RHSA-2012:0710](http://rhn.redhat.com/errata/RHSA-2012-0710.html)
7. [SUSE-SU-2012:0746](http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html)
8. [openSUSE-SU-2012:0760](http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html)
9. [](http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html)
10. [53540](http://www.securityfocus.com/bid/53540)
11. [](http://code.google.com/p/chromium/issues/detail?id=118970)
12. [RHSA-2012:0715](http://rhn.redhat.com/errata/RHSA-2012-0715.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11345
- **State**: PUBLISHED
- **Published Date**: February 13, 2025 at 18:46 UTC
- **Last Updated**: February 13, 2025 at 19:19 UTC
- **Reserved Date**: November 18, 2024 at 16:10 UTC
- **Assigned By**: Lexmark
### Vulnerability Description
A heap-based memory vulnerability has been identified in the Postscript interpreter in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Lexmark International - CX, XC, CS, MS, MX, XM, et. al.**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
### References
1. [](https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41291, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41291
- **State**: PUBLISHED
- **Published Date**: April 26, 2024 at 15:01 UTC
- **Last Updated**: August 12, 2024 at 19:34 UTC
- **Reserved Date**: August 28, 2023 at 09:45 UTC
- **Assigned By**: qnap
### Vulnerability Description
A path traversal vulnerability has been reported to affect QuFirewall. If exploited, the vulnerability could allow authenticated administrators to read the contents of unexpected files and expose sensitive data via a network.
We have already fixed the vulnerability in the following version:
QuFirewall 2.4.1 ( 2024/02/01 ) and later
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**QNAP Systems Inc. - QuFirewall**
Affected versions:
- 2.4.x (Status: affected)
### References
1. [](https://www.qnap.com/en/security-advisory/qsa-24-17)
### Credits
- lebr0nli (Alan Li), working with DEVCORE Internship Program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47525
- **State**: PUBLISHED
- **Published Date**: October 01, 2024 at 20:27 UTC
- **Last Updated**: October 02, 2024 at 13:01 UTC
- **Reserved Date**: September 25, 2024 at 21:46 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Alert Rules" feature allows authenticated users to inject arbitrary JavaScript through the "Title" field. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. This vulnerability is fixed in 24.9.0.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**librenms - librenms**
Affected versions:
- < 24.9.0 (Status: affected)
### References
1. [https://github.com/librenms/librenms/security/advisories/GHSA-j2j9-7pr6-xqwv](https://github.com/librenms/librenms/security/advisories/GHSA-j2j9-7pr6-xqwv)
2. [https://github.com/librenms/librenms/commit/7620d220e48563938d869da7689b8ac3f7721490](https://github.com/librenms/librenms/commit/7620d220e48563938d869da7689b8ac3f7721490)
3. [https://github.com/librenms/librenms/blob/9455173edce6971777cf6666d540eeeaf6201920/includes/html/print-alert-rules.php#L405](https://github.com/librenms/librenms/blob/9455173edce6971777cf6666d540eeeaf6201920/includes/html/print-alert-rules.php#L405) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1197, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1197
- **State**: PUBLISHED
- **Published Date**: March 15, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:44 UTC
- **Reserved Date**: March 15, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
klprfax_filter in KDE2 KDEUtils allows local users to overwrite arbitrary files via a symlink attack on the klprfax.filter temporary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [kdeutils-klprfax-symlink(7700)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7700)
2. [20011214 klprfax_filter symlink vulnerability](http://www.securityfocus.com/archive/1/245500)
3. [3694](http://www.securityfocus.com/bid/3694)
4. [20011214 Re: klprfax_filter symlink vulnerability](http://marc.info/?l=bugtraq&m=100837486611350&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20729, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20729 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20729
- **State**: PUBLISHED
- **Published Date**: May 03, 2022 at 03:16 UTC
- **Last Updated**: November 06, 2024 at 16:18 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to inject XML into the command parser. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including crafted input in commands. A successful exploit could allow the attacker to inject XML into the command parser, which could result in unexpected processing of the command and unexpected command output.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-91: Security Weakness
### Affected Products
**Cisco - Cisco Firepower Threat Defense Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20220427 Cisco Firepower Threat Defense Software XML Injection Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-xmlinj-8GWjGzKe) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14092, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14092
- **State**: PUBLISHED
- **Published Date**: December 15, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 19:13 UTC
- **Reserved Date**: August 31, 2017 at 00:00 UTC
- **Assigned By**: trendmicro
### Vulnerability Description
The absence of Anti-CSRF tokens in Trend Micro ScanMail for Exchange 12.0 web interface forms could allow an attacker to submit authenticated requests when an authenticated user browses an attacker-controlled domain.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://success.trendmicro.com/solution/1118486)
2. [](https://www.coresecurity.com/advisories/trend-micro-scanmail-microsoft-exchange-multiple-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1302
- **State**: PUBLISHED
- **Published Date**: November 11, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 04:40 UTC
- **Reserved Date**: January 21, 2015 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The PDF viewer in Google Chrome before 46.0.2490.86 does not properly restrict scripting messages and API exposure, which allows remote attackers to bypass the Same Origin Policy via an unintended embedder or unintended plugin loading, related to pdf.js and out_of_process_instance.cc.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2015:2069](http://lists.opensuse.org/opensuse-updates/2015-11/msg00121.html)
2. [RHSA-2015:1841](http://rhn.redhat.com/errata/RHSA-2015-1841.html)
3. [](https://code.google.com/p/chromium/issues/detail?id=520422)
4. [openSUSE-SU-2015:2068](http://lists.opensuse.org/opensuse-updates/2015-11/msg00120.html)
5. [](https://codereview.chromium.org/1316803003)
6. [1034132](http://www.securitytracker.com/id/1034132)
7. [GLSA-201603-09](https://security.gentoo.org/glsa/201603-09)
8. [](http://googlechromereleases.blogspot.com/2015/11/stable-channel-update.html)
9. [DSA-3415](http://www.debian.org/security/2015/dsa-3415)
10. [77537](http://www.securityfocus.com/bid/77537) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39059
- **State**: PUBLISHED
- **Published Date**: August 28, 2023 at 00:00 UTC
- **Last Updated**: October 02, 2024 at 16:03 UTC
- **Reserved Date**: July 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in ansible semaphore v.2.8.90 allows a remote attacker to execute arbitrary code via a crafted payload to the extra variables parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.alevsk.com/2023/07/a-quick-story-of-security-pitfalls-with-execcommand-in-software-integrations/)
2. [](https://gist.github.com/Alevsk/1757da24c5fb8db735d392fd4146ca3a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0340, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0340
- **State**: PUBLISHED
- **Published Date**: March 20, 2023 at 15:52 UTC
- **Last Updated**: February 26, 2025 at 18:49 UTC
- **Reserved Date**: January 17, 2023 at 15:34 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Custom Content Shortcode WordPress plugin through 4.0.2 does not validate one of its shortcode attribute, which could allow users with a contributor role and above to include arbitrary files via a traversal attack. This could also allow them to read non PHP files and retrieve their content. RCE could also be achieved if the attacker manage to upload a malicious image containing PHP code, and then include it via the affected attribute, on a default WP install, authors could easily achieve that given that they have the upload_file capability.
### Weakness Classification (CWE)
- CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'): Path Traversal
### Affected Products
**Unknown - Custom Content Shortcode**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/71956598-90aa-4557-947a-c4716674543d)
### Credits
- Erwan LR (WPScan)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23765, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23765
- **State**: PUBLISHED
- **Published Date**: January 16, 2025 at 20:06 UTC
- **Last Updated**: January 17, 2025 at 19:11 UTC
- **Reserved Date**: January 16, 2025 at 11:29 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in W3speedster W3SPEEDSTER allows Cross Site Request Forgery.This issue affects W3SPEEDSTER: from n/a through 7.33.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**W3speedster - W3SPEEDSTER**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/w3speedster-wp/vulnerability/wordpress-w3speedster-plugin-7-33-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- thiennv (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4262, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4262 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4262
- **State**: PUBLISHED
- **Published Date**: July 17, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 11:12 UTC
- **Reserved Date**: June 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-2987](http://www.debian.org/security/2014/dsa-2987)
2. [60129](http://secunia.com/advisories/60129)
3. [](http://www.vmware.com/security/advisories/VMSA-2014-0012.html)
4. [HPSBUX03091](http://marc.info/?l=bugtraq&m=140852886808946&w=2)
5. [DSA-2980](http://www.debian.org/security/2014/dsa-2980)
6. [1030577](http://www.securitytracker.com/id/1030577)
7. [59987](http://secunia.com/advisories/59987)
8. [SSRT101667](http://marc.info/?l=bugtraq&m=140852886808946&w=2)
9. [HPSBUX03092](http://marc.info/?l=bugtraq&m=140852974709252&w=2)
10. [60812](http://secunia.com/advisories/60812)
11. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://www.securityfocus.com/archive/1/534161/100/0/threaded)
12. [SUSE-SU-2015:0376](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html)
13. [59986](http://secunia.com/advisories/59986)
14. [68599](http://www.securityfocus.com/bid/68599)
15. [RHSA-2015:0264](http://rhn.redhat.com/errata/RHSA-2015-0264.html)
16. [60245](http://secunia.com/advisories/60245)
17. [oracle-cpujul2014-cve20144262(94595)](https://exchange.xforce.ibmcloud.com/vulnerabilities/94595)
18. [60817](http://secunia.com/advisories/60817)
19. [59924](http://secunia.com/advisories/59924)
20. [61577](http://secunia.com/advisories/61577)
21. [RHSA-2014:0908](https://access.redhat.com/errata/RHSA-2014:0908)
22. [SUSE-SU-2015:0392](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html)
23. [SSRT101668](http://marc.info/?l=bugtraq&m=140852974709252&w=2)
24. [](http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html)
25. [60485](http://secunia.com/advisories/60485)
26. [59680](http://secunia.com/advisories/59680)
27. [](http://www-01.ibm.com/support/docview.wss?uid=swg21686383)
28. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://seclists.org/fulldisclosure/2014/Dec/23)
29. [](http://www-01.ibm.com/support/docview.wss?uid=swg21680334)
30. [60622](http://secunia.com/advisories/60622)
31. [60081](http://secunia.com/advisories/60081)
32. [RHSA-2014:0902](https://access.redhat.com/errata/RHSA-2014:0902)
33. [59985](http://secunia.com/advisories/59985)
34. [61640](http://secunia.com/advisories/61640)
35. [](http://www-01.ibm.com/support/docview.wss?uid=swg21686824)
36. [GLSA-201502-12](http://security.gentoo.org/glsa/glsa-201502-12.xml)
37. [60317](http://secunia.com/advisories/60317)
38. [SUSE-SU-2015:0344](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html)
39. [59404](http://secunia.com/advisories/59404) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21758, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21758 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21758
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 02:18 UTC
- **Last Updated**: May 04, 2025 at 07:20 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ipv6: mcast: add RCU protection to mld_newpack()
mld_newpack() can be called without RTNL or RCU being held.
Note that we no longer can use sock_alloc_send_skb() because
ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep.
Instead use alloc_skb() and charge the net->ipv6.igmp_sk
socket under RCU protection.
### Affected Products
**Linux - Linux**
Affected versions:
- b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 (Status: affected)
- b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 (Status: affected)
- b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 (Status: affected)
- b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 (Status: affected)
- b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 (Status: affected)
- b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.26 (Status: affected)
- 0 (Status: unaffected)
- 5.15.179 (Status: unaffected)
- 6.1.129 (Status: unaffected)
- 6.6.79 (Status: unaffected)
- 6.12.16 (Status: unaffected)
- 6.13.4 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/29fa42197f26a97cde29fa8c40beddf44ea5c8f3)
2. [](https://git.kernel.org/stable/c/e8af3632a7f2da83e27b083f787bced1faba00b1)
3. [](https://git.kernel.org/stable/c/1b91c597b0214b1b462eb627ec02658c944623f2)
4. [](https://git.kernel.org/stable/c/25195f9d5ffcc8079ad743a50c0409dbdc48d98a)
5. [](https://git.kernel.org/stable/c/d60d493b0e65647e0335e6a7c4547abcea7df8e9)
6. [](https://git.kernel.org/stable/c/a527750d877fd334de87eef81f1cb5f0f0ca3373) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13757, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13757
- **State**: PUBLISHED
- **Published Date**: August 29, 2017 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 19:05 UTC
- **Reserved Date**: August 29, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the PLT section size, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to elf_i386_get_synthetic_symtab in elf32-i386.c and elf_x86_64_get_synthetic_symtab in elf64-x86-64.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=90efb6422939ca031804266fba669f77c22a274a)
2. [100532](http://www.securityfocus.com/bid/100532)
3. [](https://sourceware.org/bugzilla/show_bug.cgi?id=22018) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46554
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 00:00 UTC
- **Last Updated**: September 11, 2024 at 15:18 UTC
- **Reserved Date**: October 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formMapDel.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36)
2. [](https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/20/1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21890, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21890 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21890
- **State**: PUBLISHED
- **Published Date**: January 17, 2023 at 23:35 UTC
- **Last Updated**: September 17, 2024 at 13:39 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Communications Converged Application Server product of Oracle Communications (component: Core). Supported versions that are affected are 7.1.0 and 8.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via UDP to compromise Oracle Communications Converged Application Server. Successful attacks of this vulnerability can result in takeover of Oracle Communications Converged Application Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Oracle Corporation - Communications Converged Application Server**
Affected versions:
- 7.1.0 (Status: affected)
- 8.0.0 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2023.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9767
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 02, 2016 at 00:00 UTC
- **Assigned By**: rapid7
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8725
- **State**: REJECTED
- **Last Updated**: March 22, 2023 at 00:00 UTC
- **Reserved Date**: February 06, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13378, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13378 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13378
- **State**: PUBLISHED
- **Published Date**: January 17, 2025 at 09:36 UTC
- **Last Updated**: February 12, 2025 at 20:31 UTC
- **Reserved Date**: January 13, 2025 at 21:31 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘style_settings’ parameter in versions 2.9.0.1 up to, and including, 2.9.1.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The attack is only successful in the Chrome web browser, and requires directly browsing the media file via the attachment post.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Gravity Forms - Gravity Forms**
Affected versions:
- 2.9.0.1 (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/f884ea43-e1a5-4b44-8a24-f68f71b0fcfb?source=cve)
2. [](https://docs.gravityforms.com/gravityforms-change-log/)
### Credits
- Michael Mazzolini |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45518, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45518 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45518
- **State**: PUBLISHED
- **Published Date**: October 22, 2024 at 00:00 UTC
- **Last Updated**: October 22, 2024 at 18:10 UTC
- **Reserved Date**: September 01, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Zimbra Collaboration (ZCS) 10.1.x before 10.1.1, 10.0.x before 10.0.9, 9.0.0 before Patch 41, and 8.8.15 before Patch 46. It allows authenticated users to exploit Server-Side Request Forgery (SSRF) due to improper input sanitization and misconfigured domain whitelisting. This issue permits unauthorized HTTP requests to be sent to internal services, which can lead to Remote Code Execution (RCE) by chaining Command Injection within the internal service. When combined with existing XSS vulnerabilities, this SSRF issue can further facilitate Remote Code Execution (RCE).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories)
2. [](https://wiki.zimbra.com/wiki/Security_Center)
3. [](https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy)
4. [](https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes)
5. [](https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes)
6. [](https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P41#Security_Fixes)
7. [](https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P46#Security_Fixes) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38028
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 17:03 UTC
- **Last Updated**: May 05, 2025 at 17:01 UTC
- **Reserved Date**: June 11, 2024 at 18:18 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38028) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10904, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10904
- **State**: PUBLISHED
- **Published Date**: April 06, 2019 at 19:40 UTC
- **Last Updated**: August 04, 2024 at 22:40 UTC
- **Reserved Date**: April 06, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Roundup 1.6 allows XSS via the URI because frontends/roundup.cgi and roundup/cgi/wsgi_handler.py mishandle 404 errors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/python/bugs.python.org/issues/34)
2. [](https://bugs.python.org/issue36391)
3. [](https://www.openwall.com/lists/oss-security/2019/04/05/1)
4. [[oss-security] 20190407 Re: XSS in roundup bug tracker 404 page](http://www.openwall.com/lists/oss-security/2019/04/07/1)
5. [[debian-lts-announce] 20190407 [SECURITY] [DLA 1750-1] roundup security update](https://lists.debian.org/debian-lts-announce/2019/04/msg00009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48918, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48918
- **State**: PUBLISHED
- **Published Date**: August 22, 2024 at 01:32 UTC
- **Last Updated**: May 04, 2025 at 08:26 UTC
- **Reserved Date**: August 21, 2024 at 06:06 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
iwlwifi: mvm: check debugfs_dir ptr before use
When "debugfs=off" is used on the kernel command line, iwiwifi's
mvm module uses an invalid/unchecked debugfs_dir pointer and causes
a BUG:
BUG: kernel NULL pointer dereference, address: 000000000000004f
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP
CPU: 1 PID: 503 Comm: modprobe Tainted: G W 5.17.0-rc5 #7
Hardware name: Dell Inc. Inspiron 15 5510/076F7Y, BIOS 2.4.1 11/05/2021
RIP: 0010:iwl_mvm_dbgfs_register+0x692/0x700 [iwlmvm]
Code: 69 a0 be 80 01 00 00 48 c7 c7 50 73 6a a0 e8 95 cf ee e0 48 8b 83 b0 1e 00 00 48 c7 c2 54 73 6a a0 be 64 00 00 00 48 8d 7d 8c <48> 8b 48 50 e8 15 22 07 e1 48 8b 43 28 48 8d 55 8c 48 c7 c7 5f 73
RSP: 0018:ffffc90000a0ba68 EFLAGS: 00010246
RAX: ffffffffffffffff RBX: ffff88817d6e3328 RCX: ffff88817d6e3328
RDX: ffffffffa06a7354 RSI: 0000000000000064 RDI: ffffc90000a0ba6c
RBP: ffffc90000a0bae0 R08: ffffffff824e4880 R09: ffffffffa069d620
R10: ffffc90000a0ba00 R11: ffffffffffffffff R12: 0000000000000000
R13: ffffc90000a0bb28 R14: ffff88817d6e3328 R15: ffff88817d6e3320
FS: 00007f64dd92d740(0000) GS:ffff88847f640000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000000004f CR3: 000000016fc79001 CR4: 0000000000770ee0
PKRU: 55555554
Call Trace:
<TASK>
? iwl_mvm_mac_setup_register+0xbdc/0xda0 [iwlmvm]
iwl_mvm_start_post_nvm+0x71/0x100 [iwlmvm]
iwl_op_mode_mvm_start+0xab8/0xb30 [iwlmvm]
_iwl_op_mode_start+0x6f/0xd0 [iwlwifi]
iwl_opmode_register+0x6a/0xe0 [iwlwifi]
? 0xffffffffa0231000
iwl_mvm_init+0x35/0x1000 [iwlmvm]
? 0xffffffffa0231000
do_one_initcall+0x5a/0x1b0
? kmem_cache_alloc+0x1e5/0x2f0
? do_init_module+0x1e/0x220
do_init_module+0x48/0x220
load_module+0x2602/0x2bc0
? __kernel_read+0x145/0x2e0
? kernel_read_file+0x229/0x290
__do_sys_finit_module+0xc5/0x130
? __do_sys_finit_module+0xc5/0x130
__x64_sys_finit_module+0x13/0x20
do_syscall_64+0x38/0x90
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f64dda564dd
Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 1b 29 0f 00 f7 d8 64 89 01 48
RSP: 002b:00007ffdba393f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f64dda564dd
RDX: 0000000000000000 RSI: 00005575399e2ab2 RDI: 0000000000000001
RBP: 000055753a91c5e0 R08: 0000000000000000 R09: 0000000000000002
R10: 0000000000000001 R11: 0000000000000246 R12: 00005575399e2ab2
R13: 000055753a91ceb0 R14: 0000000000000000 R15: 000055753a923018
</TASK>
Modules linked in: btintel(+) btmtk bluetooth vfat snd_hda_codec_hdmi fat snd_hda_codec_realtek snd_hda_codec_generic iwlmvm(+) snd_sof_pci_intel_tgl mac80211 snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence soundwire_bus snd_sof_intel_hda snd_sof_pci snd_sof snd_sof_xtensa_dsp snd_soc_hdac_hda snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi snd_soc_core btrfs snd_compress snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec raid6_pq iwlwifi snd_hda_core snd_pcm snd_timer snd soundcore cfg80211 intel_ish_ipc(+) thunderbolt rfkill intel_ishtp ucsi_acpi wmi i2c_hid_acpi i2c_hid evdev
CR2: 000000000000004f
---[ end trace 0000000000000000 ]---
Check the debugfs_dir pointer for an error before using it.
[change to make both conditional]
### Affected Products
**Linux - Linux**
Affected versions:
- 8c082a99edb997d7999eb7cdb648e47a2bf4a638 (Status: affected)
- 8c082a99edb997d7999eb7cdb648e47a2bf4a638 (Status: affected)
- 8c082a99edb997d7999eb7cdb648e47a2bf4a638 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.12 (Status: affected)
- 0 (Status: unaffected)
- 5.15.27 (Status: unaffected)
- 5.16.13 (Status: unaffected)
- 5.17 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/7de1ed755e1ace30d97a724bad32452ed86b653b)
2. [](https://git.kernel.org/stable/c/fe51975ff13831e794e1bcd0039b305dcad3d7ba)
3. [](https://git.kernel.org/stable/c/5a6248c0a22352f09ea041665d3bd3e18f6f872c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-21333, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-21333 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-21333
- **State**: PUBLISHED
- **Published Date**: July 09, 2021 at 16:41 UTC
- **Last Updated**: August 04, 2024 at 14:22 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vulnerability in PublicCMS 4.0 to get an admin cookie when the Administrator reviews submit case.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sanluan/PublicCMS/issues/27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16178, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16178 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16178
- **State**: PUBLISHED
- **Published Date**: January 09, 2019 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 30, 2018 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cybozu Garoon 3.0.0 to 4.10.0 allows remote attackers to bypass access restriction to view information available only for a sign-on user via Single sign-on function.
### Affected Products
**Cybozu, Inc. - Cybozu Garoon**
Affected versions:
- 3.0.0 to 4.10.0 (Status: affected)
### References
1. [JVN#25385698](https://jvn.jp/en/jp/JVN25385698/index.html)
2. [](https://kb.cybozu.support/article/35265) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10897, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10897 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10897
- **State**: PUBLISHED
- **Published Date**: April 22, 2020 at 20:50 UTC
- **Last Updated**: August 04, 2024 at 11:14 UTC
- **Reserved Date**: March 24, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.1.29511. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-10193.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Foxit - PhantomPDF**
Affected versions:
- 9.7.1.29511 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-525/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5309, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5309 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5309
- **State**: PUBLISHED
- **Published Date**: December 02, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 10:49 UTC
- **Reserved Date**: December 01, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in NetArt Media Real Estate Portal 1.2 allows remote attackers to execute arbitrary SQL commands via the ad_id parameter in the re_send_email module to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32445](http://www.securityfocus.com/bid/32445)
2. [7208](https://www.exploit-db.com/exploits/7208)
3. [realestateportal-index-sql-injection(46808)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46808)
4. [4675](http://securityreason.com/securityalert/4675) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13680, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13680 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13680
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:07 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for LexitToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/LexitToken)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0315, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0315
- **State**: PUBLISHED
- **Published Date**: September 18, 2020 at 15:25 UTC
- **Last Updated**: August 04, 2024 at 05:55 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Zen Mode, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-155642026
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38443, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38443 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38443
- **State**: PUBLISHED
- **Published Date**: May 05, 2022 at 15:16 UTC
- **Last Updated**: April 16, 2025 at 16:23 UTC
- **Reserved Date**: August 10, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Eclipse CycloneDDS versions prior to 0.8.0 improperly handle invalid structures, which may allow an attacker to write arbitrary values in the XML parser.
### CVSS Metrics
- **CVSS Base Score**: 6.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-228: Path Traversal
### Affected Products
**Eclipse - CycloneDDS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02)
2. [](https://projects.eclipse.org/projects/iot.cyclonedds)
### Credits
- Federico Maggi (Trend Micro Research), Ta-Lun Yen, and Chizuru Toyama (TXOne Networks, Trend Micro) reported these vulnerabilities to CISA. In addition, Patrick Kuo, Mars Cheng (TXOne Networks, Trend Micro), Víctor Mayoral-Vilches (Alias Robotics), and Erik Boasson (ADLINK Technology) also contributed to this research. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4237, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4237 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4237
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0269, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0269 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0269
- **State**: PUBLISHED
- **Published Date**: January 26, 2009 at 15:05 UTC
- **Last Updated**: August 07, 2024 at 04:24 UTC
- **Reserved Date**: January 26, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel before 2.6.28.1 allows local users to cause a denial of service (fault or memory corruption), or possibly have unspecified other impact, via a readlink call that results in an error, leading to use of a -1 return value as an array index.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35390](http://secunia.com/advisories/35390)
2. [34502](http://secunia.com/advisories/34502)
3. [RHSA-2009:0326](http://www.redhat.com/support/errata/RHSA-2009-0326.html)
4. [MDVSA-2009:118](http://www.mandriva.com/security/advisories?name=MDVSA-2009:118)
5. [SUSE-SA:2009:010](http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html)
6. [37471](http://secunia.com/advisories/37471)
7. [RHSA-2009:0360](http://www.redhat.com/support/errata/RHSA-2009-0360.html)
8. [[ecryptfs-devel] 20081222 Re: [PATCH, v5] eCryptfs: check readlink result was not an error before using it](https://lists.launchpad.net/ecryptfs-devel/msg00010.html)
9. [](http://www.vmware.com/security/advisories/VMSA-2009-0016.html)
10. [DSA-1749](http://www.debian.org/security/2009/dsa-1749)
11. [33758](http://secunia.com/advisories/33758)
12. [SUSE-SA:2009:030](http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html)
13. [USN-751-1](http://www.ubuntu.com/usn/usn-751-1)
14. [[ecryptfs-devel] 20081222 Re: [PATCH, v5] eCryptfs: check readlink result was not an error before using it](https://lists.launchpad.net/ecryptfs-devel/msg00011.html)
15. [oval:org.mitre.oval:def:8169](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8169)
16. [20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components](http://www.securityfocus.com/archive/1/507985/100/0/threaded)
17. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.1)
18. [SUSE-SA:2009:031](http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html)
19. [](http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=a17d5232de7b53d34229de79ec22f4bb04adb7e4)
20. [34981](http://secunia.com/advisories/34981)
21. [34394](http://secunia.com/advisories/34394)
22. [DSA-1787](http://www.debian.org/security/2009/dsa-1787)
23. [linux-kernel-readlink-bo(48188)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48188)
24. [oval:org.mitre.oval:def:8944](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8944)
25. [33412](http://www.securityfocus.com/bid/33412)
26. [ADV-2009-3316](http://www.vupen.com/english/advisories/2009/3316)
27. [35394](http://secunia.com/advisories/35394) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1357, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1357
- **State**: PUBLISHED
- **Published Date**: March 03, 2016 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 22:55 UTC
- **Reserved Date**: January 04, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The password-management administration component in Cisco Policy Suite (CPS) 7.0.1.3, 7.0.2, 7.0.2-att, 7.0.3-att, 7.0.4-att, and 7.5.0 allows remote attackers to bypass intended RBAC restrictions and read unspecified data via unknown vectors, aka Bug ID CSCut85211.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20160302 Cisco Policy Suite Confidential Information Disclosure Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-psc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30418, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30418
- **State**: PUBLISHED
- **Published Date**: April 07, 2024 at 08:19 UTC
- **Last Updated**: August 22, 2024 at 15:04 UTC
- **Reserved Date**: March 27, 2024 at 03:38 UTC
- **Assigned By**: huawei
### Vulnerability Description
Vulnerability of insufficient permission verification in the app management module.
Impact: Successful exploitation of this vulnerability will affect availability.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 4.0.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 13.0.0 (Status: affected)
- 12.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/4/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2254, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2254 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2254
- **State**: PUBLISHED
- **Published Date**: June 30, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 05:44 UTC
- **Reserved Date**: June 29, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zen Cart 1.3.8a, 1.3.8, and earlier does not require administrative authentication for admin/sqlpatch.php, which allows remote attackers to execute arbitrary SQL commands via the query_string parameter in an execute action, in conjunction with a PATH_INFO of password_forgotten.php, related to a "SQL Execution" issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [55343](http://www.osvdb.org/55343)
2. [](http://www.zen-cart.com/forum/showthread.php?t=130161)
3. [35468](http://www.securityfocus.com/bid/35468)
4. [](http://www.zen-cart.com/forum/attachment.php?attachmentid=5965)
5. [9005](http://www.exploit-db.com/exploits/9005)
6. [35550](http://secunia.com/advisories/35550)
7. [zencart-sqlpatch-sql-injection(51317)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51317) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34391, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34391 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34391
- **State**: PUBLISHED
- **Published Date**: August 31, 2023 at 15:31 UTC
- **Last Updated**: October 01, 2024 at 17:02 UTC
- **Reserved Date**: June 02, 2023 at 17:18 UTC
- **Assigned By**: SEL
### Vulnerability Description
Insecure Inherited Permissions vulnerability in Schweitzer Engineering Laboratories SEL-5033 AcSELerator RTAC Software on Windows allows Leveraging/Manipulating Configuration File Search Paths.
See Instruction Manual Appendix A [Cybersecurity] tag dated 20230522 for more details.
This issue affects SEL-5033 AcSELerator RTAC Software: before 1.35.151.21000.
### CVSS Metrics
- **CVSS Base Score**: 7.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-277: Security Weakness
### Affected Products
**Schweitzer Engineering Laboratories - SEL-5033 AcSELerator RTAC Software**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://selinc.com/support/security-notifications/external-reports/)
2. [](https://dragos.com)
### Credits
- Reid Wightman of Dragos |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28319, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28319
- **State**: PUBLISHED
- **Published Date**: March 29, 2023 at 00:00 UTC
- **Last Updated**: February 18, 2025 at 17:35 UTC
- **Reserved Date**: March 31, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.034. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DM files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16340.
### Weakness Classification (CWE)
- CWE-457: Security Weakness
### Affected Products
**Bentley - MicroStation CONNECT**
Affected versions:
- 10.16.02.034 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-22-591/)
2. [](https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0002)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12939
- **State**: PUBLISHED
- **Published Date**: June 24, 2019 at 15:06 UTC
- **Last Updated**: August 04, 2024 at 23:32 UTC
- **Reserved Date**: June 24, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LiveZilla Server before 8.0.1.1 is vulnerable to SQL Injection in server.php via the p_ext_rse parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://forums.livezilla.net/index.php?/topic/10980-fg-vd-19-082-livezilla-server-is-vulnerable-to-sql-injection/)
2. [108890](http://www.securityfocus.com/bid/108890) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31469, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31469 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31469
- **State**: PUBLISHED
- **Published Date**: June 23, 2023 at 07:07 UTC
- **Last Updated**: October 09, 2024 at 15:11 UTC
- **Reserved Date**: April 28, 2023 at 19:12 UTC
- **Assigned By**: apache
### Vulnerability Description
A REST interface in Apache StreamPipes (versions 0.69.0 to 0.91.0) was not properly restricted to admin-only access. This allowed a non-admin user with valid login credentials to elevate privileges beyond the initially assigned roles.
The issue is resolved by upgrading to StreamPipes 0.92.0.
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Apache Software Foundation - Apache StreamPipes**
Affected versions:
- 0.69.0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/c4y8kf9bzpf36v4bottfmd8tc9cxo19m)
### Credits
- Xun Bai, LJQC Open Source Security Institute |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6492, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6492 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6492
- **State**: PUBLISHED
- **Published Date**: January 12, 2017 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 01:29 UTC
- **Reserved Date**: July 28, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The MT6573FDVT_SetRegHW function in camera_fdvt.c in the MediaTek driver for Linux allows local users to gain privileges via a crafted application that makes an MT6573FDVTIOC_T_SET_FDCONF_CMD IOCTL call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92207](http://www.securityfocus.com/bid/92207)
2. [](https://source.android.com/security/bulletin/2016-12-01.html)
3. [20160730 Elevation of Privilege Vulnerability in MediaTek Driver ( CVE-2016-6492)](http://www.securityfocus.com/archive/1/539058/100/0/threaded)
4. [](http://packetstormsecurity.com/files/138113/MediaTek-Driver-Privilege-Escalation.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4404, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4404
- **State**: PUBLISHED
- **Published Date**: November 30, 2006 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 19:06 UTC
- **Reserved Date**: August 28, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Installer application in Apple Mac OS X 10.4.8 and earlier, when used by a user with Admin credentials, does not authenticate the user before installing certain software requiring system privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-4750](http://www.vupen.com/english/advisories/2006/4750)
2. [](http://docs.info.apple.com/article.html?artnum=304829)
3. [21335](http://www.securityfocus.com/bid/21335)
4. [1017304](http://securitytracker.com/id?1017304)
5. [30733](http://www.osvdb.org/30733)
6. [23155](http://secunia.com/advisories/23155)
7. [APPLE-SA-2006-11-28](http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html)
8. [TA06-333A](http://www.us-cert.gov/cas/techalerts/TA06-333A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21398, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21398 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21398
- **State**: PUBLISHED
- **Published Date**: March 30, 2021 at 15:25 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 22, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
PrestaShop is a fully scalable open source e-commerce solution. In PrestaShop before version 1.7.7.3, an attacker can inject HTML when the Grid Column Type DataColumn is badly used. The problem is fixed in 1.7.7.3
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**PrestaShop - PrestaShop**
Affected versions:
- >= 1.7.7.0, < 1.7.7.3 (Status: affected)
### References
1. [](https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-fhhq-4x46-qx77)
2. [](https://github.com/PrestaShop/PrestaShop/commit/aaaba8177f3b3c510461b5e3249e30e60f900205)
3. [](https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.7.3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52147, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52147
- **State**: PUBLISHED
- **Published Date**: June 04, 2024 at 12:38 UTC
- **Last Updated**: August 14, 2024 at 16:27 UTC
- **Reserved Date**: December 28, 2023 at 20:16 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in All In One WP Security & Firewall Team All In One WP Security & Firewall allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects All In One WP Security & Firewall: from n/a through 5.2.4.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**All In One WP Security & Firewall Team - All In One WP Security & Firewall**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/all-in-one-wp-security-and-firewall/wordpress-all-in-one-security-aios-plugin-5-2-4-secret-login-page-location-disclosure-on-multisites-vulnerability?_s_id=cve)
### Credits
- Naveen Muthusamy (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1564, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1564
- **State**: PUBLISHED
- **Published Date**: March 21, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 12:59 UTC
- **Reserved Date**: March 21, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The FTP protocol implementation in Konqueror 3.5.5 allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2007:0909](http://www.redhat.com/support/errata/RHSA-2007-0909.html)
2. [](https://issues.rpath.com/browse/RPL-1201)
3. [24889](http://secunia.com/advisories/24889)
4. [USN-447-1](http://www.ubuntu.com/usn/usn-447-1)
5. [oval:org.mitre.oval:def:10646](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10646)
6. [SUSE-SR:2007:006](http://www.novell.com/linux/security/advisories/2007_6_sr.html)
7. [](http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf)
8. [](http://www.kde.org/info/security/advisory-20070326-1.txt)
9. [27108](http://secunia.com/advisories/27108)
10. [1017801](http://securitytracker.com/id?1017801)
11. [23091](http://www.securityfocus.com/bid/23091)
12. [ADV-2007-1076](http://www.vupen.com/english/advisories/2007/1076)
13. [MDKSA-2007:072](http://www.mandriva.com/security/advisories?name=MDKSA-2007:072) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1169
- **State**: PUBLISHED
- **Published Date**: November 14, 2019 at 16:26 UTC
- **Last Updated**: August 06, 2024 at 18:53 UTC
- **Reserved Date**: February 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Moodle before 2.2.2 has Personal information disclosure, when administrative setting users name display is set to first name only full names are shown in page breadcrumbs.
### Affected Products
**Moodle - Moodle**
Affected versions:
- 2.2 to 2.2.1+ (Status: affected)
- 2.1 to 2.1.4+ (Status: affected)
- 2.0 to 2.0.7+ (Status: affected)
### References
1. [](http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078209.html)
2. [](http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081047.html)
3. [](http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078210.html)
4. [](https://security-tracker.debian.org/tracker/CVE-2012-1169)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1169)
6. [](https://access.redhat.com/security/cve/cve-2012-1169)
7. [](http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077635.html)
8. [](http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080712.html)
9. [](https://moodle.org/mod/forum/discuss.php?d=198625) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16040, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16040 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16040
- **State**: PUBLISHED
- **Published Date**: January 08, 2021 at 17:54 UTC
- **Last Updated**: August 04, 2024 at 13:37 UTC
- **Reserved Date**: July 27, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient data validation in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2020/12/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1150649)
3. [](http://packetstormsecurity.com/files/162087/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html)
4. [](http://packetstormsecurity.com/files/162106/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html)
5. [](http://packetstormsecurity.com/files/162144/Google-Chrome-SimplfiedLowering-Integer-Overflow.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36307, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36307 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36307
- **State**: PUBLISHED
- **Published Date**: August 16, 2022 at 00:32 UTC
- **Last Updated**: August 03, 2024 at 10:00 UTC
- **Reserved Date**: July 19, 2022 at 00:00 UTC
- **Assigned By**: facebook
### Vulnerability Description
The AirVelocity 1500 prints SNMP credentials on its physically accessible serial port during boot. This was fixed in AirVelocity 1500 software version 15.18.00.2511 and may affect other AirVelocity and AirSpeed models.
### Weakness Classification (CWE)
- CWE-522: Security Weakness
### Affected Products
**Airspan - AirVelocity**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://helpdesk.airspan.com/browse/TRN3-1693)
2. [](https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8j75-qh6c-wpc5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8820, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8820
- **State**: PUBLISHED
- **Published Date**: March 04, 2016 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 08:29 UTC
- **Reserved Date**: March 01, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption) via crafted MPEG-4 data, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, CVE-2015-8455, CVE-2015-8652, CVE-2015-8654, CVE-2015-8656, CVE-2015-8657, and CVE-2015-8658.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-15-661)
2. [](https://helpx.adobe.com/security/products/flash-player/apsb15-32.html)
3. [84160](http://www.securityfocus.com/bid/84160) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4691, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4691 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4691
- **State**: PUBLISHED
- **Published Date**: December 18, 2012 at 11:00 UTC
- **Last Updated**: May 23, 2025 at 18:26 UTC
- **Reserved Date**: August 28, 2012 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Memory leak in Siemens Automation License Manager (ALM) 4.x and 5.x before 5.2 allows remote attackers to cause a denial of service (memory consumption) via crafted packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.us-cert.gov/control_systems/pdf/ICSA-12-349-01.pdf)
2. [](http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-783261.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24460, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24460
- **State**: PUBLISHED
- **Published Date**: August 02, 2021 at 10:32 UTC
- **Last Updated**: August 03, 2024 at 19:35 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The get_fb_likeboxes() function in the Popup Like box – Page Plugin WordPress plugin before 3.5.3 did not use whitelist or validate the orderby parameter before using it in SQL statements passed to the get_results() DB calls, leading to SQL injection issues in the admin dashboard
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Ays Pro - Popup Like box – Page Plugin**
Affected versions:
- 3.5.3 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/9c0164f2-464b-4876-a48f-c0ebd63cf397)
### Credits
- To Quang Duong |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11785, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11785 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11785
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 16:07 UTC
- **Last Updated**: August 04, 2024 at 11:41 UTC
- **Reserved Date**: April 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, RBK50 before 2.3.5.30, XR500 before 2.3.2.56, and XR700 before 1.0.1.10.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000061745/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0534) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11616, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11616
- **State**: PUBLISHED
- **Published Date**: April 30, 2019 at 19:40 UTC
- **Last Updated**: August 04, 2024 at 22:55 UTC
- **Reserved Date**: April 30, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
doorGets 7.0 has a sensitive information disclosure vulnerability in /setup/temp/admin.php and /setup/temp/database.php. A remote unauthenticated attacker could exploit this vulnerability to obtain the administrator password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/itodaro/doorGets_cve) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53136, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53136 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53136
- **State**: PUBLISHED
- **Published Date**: December 04, 2024 at 14:20 UTC
- **Last Updated**: May 04, 2025 at 09:53 UTC
- **Reserved Date**: November 19, 2024 at 17:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
mm: revert "mm: shmem: fix data-race in shmem_getattr()"
Revert d949d1d14fa2 ("mm: shmem: fix data-race in shmem_getattr()") as
suggested by Chuck [1]. It is causing deadlocks when accessing tmpfs over
NFS.
As Hugh commented, "added just to silence a syzbot sanitizer splat: added
where there has never been any practical problem".
### Affected Products
**Linux - Linux**
Affected versions:
- 9fb9703cd43ee20a6de8ccdef991677b7274cec0 (Status: affected)
- 7cc30ada84323be19395094d567579536e0d187e (Status: affected)
- bda1a99a0dd644f31a87d636ac624eeb975cb65a (Status: affected)
- 3d9528484480e8f4979b3a347930ed383be99f89 (Status: affected)
- 82cae1e30bd940253593c2d4f16d88343d1358f4 (Status: affected)
- edd1f905050686fdc4cfe233d818469fdf7d5ff8 (Status: affected)
- ffd56612566bc23877c8f45def2801f3324a222a (Status: affected)
- d949d1d14fa281ace388b1de978e8f2cd52875cf (Status: affected)
**Linux - Linux**
Affected versions:
- 4.19.323 (Status: affected)
- 5.4.285 (Status: affected)
- 5.10.229 (Status: affected)
- 5.15.171 (Status: affected)
- 6.1.116 (Status: affected)
- 6.6.60 (Status: affected)
- 6.11.7 (Status: affected)
### References
1. [](https://git.kernel.org/stable/c/36b537e8f302f670c7cf35d88a3a294443e32d52)
2. [](https://git.kernel.org/stable/c/a3c65022d89d5baa2cea8e87a6de983ea305f14c)
3. [](https://git.kernel.org/stable/c/57cc8d253099d1b8627f0fb487ee011d9158ccc9)
4. [](https://git.kernel.org/stable/c/d3f9d88c2c03b2646ace336236adca19f7697bd3)
5. [](https://git.kernel.org/stable/c/5874c1150e77296565ad6e495ef41fbf87570d14)
6. [](https://git.kernel.org/stable/c/64e67e8694252c1bf01b802ee911be3fee62c36b)
7. [](https://git.kernel.org/stable/c/901dc2ad7c3789fa87dc3956f6697c5d62d5cf7e)
8. [](https://git.kernel.org/stable/c/d1aa0c04294e29883d65eac6c2f72fe95cc7c049) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6439, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6439
- **State**: PUBLISHED
- **Published Date**: December 10, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 20:26 UTC
- **Reserved Date**: December 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Xerox WorkCentre and WorkCentre Pro before 12.050.03.000, 13.x before 13.050.03.000, and 14.x before 14.050.03.000 allows remote attackers to download the audit log and obtain potentially sensitive information via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23265](http://secunia.com/advisories/23265)
2. [](http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2116, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2116 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2116
- **State**: PUBLISHED
- **Published Date**: March 29, 2024 at 06:43 UTC
- **Last Updated**: August 01, 2024 at 19:03 UTC
- **Reserved Date**: March 01, 2024 at 20:07 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Christmas Greetings plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the code parameter in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**technocrackers - Christmas Greetings**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/466d6087-1e4d-4010-b3c7-87e9e2d64f06?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/christmas-greetings/trunk/christmas/christmas.php#L8)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6034, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6034
- **State**: PUBLISHED
- **Published Date**: February 04, 2014 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 17:29 UTC
- **Reserved Date**: October 04, 2013 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The firmware on GateHouse; Harris BGAN RF-7800B-VU204 and BGAN RF-7800B-DU204; Hughes Network Systems 9201, 9450, and 9502; Inmarsat; Japan Radio JUE-250 and JUE-500; and Thuraya IP satellite terminals has hardcoded credentials, which makes it easier for attackers to obtain unspecified login access via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#250358](http://www.kb.cert.org/vuls/id/250358) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3559
- **State**: PUBLISHED
- **Published Date**: July 04, 2007 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 14:21 UTC
- **Reserved Date**: July 04, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in infusions/shoutbox_panel/shoutbox_panel.php in PHP-Fusion 6.01.10 and 6.01.9, when guest posts are enabled, allows remote authenticated users to inject arbitrary web script or HTML via the URI, related to the FUSION_QUERY constant.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.xssed.com/advisory/60/PHP-FUSION_FUSION_QUERY_Cross-Site_Scripting_Vulnerability/)
2. [phpfusion-shoutboxpanel-xss(35225)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35225)
3. [36342](http://osvdb.org/36342)
4. [25907](http://secunia.com/advisories/25907)
5. [24733](http://www.securityfocus.com/bid/24733) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3154
- **State**: PUBLISHED
- **Published Date**: October 16, 2012 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 19:57 UTC
- **Reserved Date**: June 06, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Agile PLM Framework component in Oracle Supply Chain Products Suite 9.3.1.0 allows remote authenticated users to affect confidentiality, related to ATTACH.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [50998](http://secunia.com/advisories/50998)
2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html)
3. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2467, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2467 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2467
- **State**: PUBLISHED
- **Published Date**: October 09, 2018 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 04:21 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
In the Software Development Kit in SAP BusinessObjects BI Platform Servers, versions 4.1 and 4.2, using the specially crafted URL in a Web Browser such as Chrome the system returns an error with the path of the used application server.
### Affected Products
**SAP - SAP BusinessObjects BI Platform Servers (Software Development Kit)**
Affected versions:
- 4.1 (Status: affected)
- 4.2 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095)
2. [](https://launchpad.support.sap.com/#/notes/2623618)
3. [105544](http://www.securityfocus.com/bid/105544) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0848
- **State**: PUBLISHED
- **Published Date**: October 09, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:05 UTC
- **Reserved Date**: October 08, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in main.c of slocate 2.6, and possibly other versions, may allow local users to gain privileges via a modified slocate database that causes a negative "pathlen" value to be used.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [CSSA-2004-001.0](ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2004-001.0/CSSA-2004-001.0.txt)
2. [20040202-01-U](ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc)
3. [RHSA-2004:040](http://rhn.redhat.com/errata/RHSA-2004-040.html)
4. [20040201-01-U](ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc)
5. [RHSA-2004:041](http://www.redhat.com/support/errata/RHSA-2004-041.html)
6. [](http://www.ebitech.sk/patrik/SA/SA-20031006-A.txt)
7. [10720](http://secunia.com/advisories/10720)
8. [10686](http://secunia.com/advisories/10686)
9. [10722](http://secunia.com/advisories/10722)
10. [MDKSA-2004:004](http://www.mandriva.com/security/advisories?name=MDKSA-2004:004)
11. [10702](http://secunia.com/advisories/10702)
12. [](http://www.ebitech.sk/patrik/SA/SA-20031006.txt)
13. [DSA-428](http://www.debian.org/security/2004/dsa-428)
14. [20031011 SA-20031006 slocate buffer overflow - exploitation proof](http://marc.info/?l=bugtraq&m=106589631819348&w=2)
15. [10683](http://secunia.com/advisories/10683)
16. [9962](http://secunia.com/advisories/9962/)
17. [FEDORA-2004-059](http://www.redhat.com/archives/fedora-announce-list/2004-January/msg00009.html)
18. [oval:org.mitre.oval:def:11033](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11033)
19. [10670](http://secunia.com/advisories/10670)
20. [20031006 SA-20031006 slocate vulnerability](http://marc.info/?l=bugtraq&m=106546447321274&w=2)
21. [10698](http://secunia.com/advisories/10698)
22. [2004-0005](http://www.trustix.org/errata/misc/2004/TSL-2004-0005-slocate.asc.txt)
23. [oval:org.mitre.oval:def:821](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A821) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12992, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12992 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12992
- **State**: PUBLISHED
- **Published Date**: June 29, 2018 at 12:00 UTC
- **Last Updated**: August 05, 2024 at 08:52 UTC
- **Reserved Date**: June 29, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered CMS MaeloStore V.1.5.0. There is stored XSS in the Telephone field of the admin interface.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/lzlzh2016/MaeloStore/blob/master/ccXSS.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57876
- **State**: PUBLISHED
- **Published Date**: January 11, 2025 at 14:49 UTC
- **Last Updated**: May 04, 2025 at 13:01 UTC
- **Reserved Date**: January 11, 2025 at 14:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/dp_mst: Fix resetting msg rx state after topology removal
If the MST topology is removed during the reception of an MST down reply
or MST up request sideband message, the
drm_dp_mst_topology_mgr::up_req_recv/down_rep_recv states could be reset
from one thread via drm_dp_mst_topology_mgr_set_mst(false), racing with
the reading/parsing of the message from another thread via
drm_dp_mst_handle_down_rep() or drm_dp_mst_handle_up_req(). The race is
possible since the reader/parser doesn't hold any lock while accessing
the reception state. This in turn can lead to a memory corruption in the
reader/parser as described by commit bd2fccac61b4 ("drm/dp_mst: Fix MST
sideband message body length check").
Fix the above by resetting the message reception state if needed before
reading/parsing a message. Another solution would be to hold the
drm_dp_mst_topology_mgr::lock for the whole duration of the message
reception/parsing in drm_dp_mst_handle_down_rep() and
drm_dp_mst_handle_up_req(), however this would require a bigger change.
Since the fix is also needed for stable, opting for the simpler solution
in this patch.
### Affected Products
**Linux - Linux**
Affected versions:
- b30fcedeba643ca16eaa6212c1245598b7cd830d (Status: affected)
- 1d082618bbf3b6755b8cc68c0a8122af2842d593 (Status: affected)
- 1d082618bbf3b6755b8cc68c0a8122af2842d593 (Status: affected)
- 1d082618bbf3b6755b8cc68c0a8122af2842d593 (Status: affected)
- ee4a4282d78d96e07e714c28ca54679713fa2157 (Status: affected)
- db35e49413a4d03ea0c003598803e49956f59324 (Status: affected)
- a579ed4613b5a64074963988ad481e43cf3b917b (Status: affected)
**Linux - Linux**
Affected versions:
- 6.3 (Status: affected)
- 0 (Status: unaffected)
- 6.1.120 (Status: unaffected)
- 6.6.66 (Status: unaffected)
- 6.12.5 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/94b33b2d7640e807869451384eb88321dd0ffbd4)
2. [](https://git.kernel.org/stable/c/d834d20d2e86c52ed5cab41763fa61e6071680ef)
3. [](https://git.kernel.org/stable/c/be826b4451fd187a7c0b04be4f8243d5df6e0450)
4. [](https://git.kernel.org/stable/c/a6fa67d26de385c3c7a23c1e109a0e23bfda4ec7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24561, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24561 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24561
- **State**: PUBLISHED
- **Published Date**: September 15, 2020 at 20:00 UTC
- **Last Updated**: August 04, 2024 at 15:19 UTC
- **Reserved Date**: August 20, 2020 at 00:00 UTC
- **Assigned By**: trendmicro
### Vulnerability Description
A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.
### Affected Products
**Trend Micro - Trend Micro ServerProtect for Linux**
Affected versions:
- 3.0 (Status: affected)
### References
1. [](https://success.trendmicro.com/solution/000268419) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4505, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4505 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4505
- **State**: PUBLISHED
- **Published Date**: May 31, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:32 UTC
- **Reserved Date**: May 05, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Resource Data Management (RDM) Intuitive 650 TDB Controller devices before 2.1.24 allow remote authenticated users to modify arbitrary passwords via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-140-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0427, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0427
- **State**: PUBLISHED
- **Published Date**: April 13, 2021 at 18:23 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In parseExclusiveStateAnnotation of LogEvent.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-174488848
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-04-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1465, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1465 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1465
- **State**: PUBLISHED
- **Published Date**: December 07, 2017 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 23:51 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM TRIRIGA 3.2, 3.3, 3.4, and 3.5 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 128464.
### Affected Products
**IBM - TRIRIGA Application Platform**
Affected versions:
- 3.3 (Status: affected)
- 3.3.1 (Status: affected)
- 3.3.2 (Status: affected)
- 3.4 (Status: affected)
- 3.4.1 (Status: affected)
- 3.4.2 (Status: affected)
- 3.5 (Status: affected)
- 3.5.1 (Status: affected)
- 3.5.2 (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/128464)
2. [](http://www.ibm.com/support/docview.wss?uid=swg22006184) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5547
- **State**: PUBLISHED
- **Published Date**: March 16, 2020 at 01:25 UTC
- **Last Updated**: August 04, 2024 at 08:30 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
### Affected Products
**Mitsubishi Electric Corporation - Mitsubishi Electric MELQIC IU1 series**
Affected versions:
- IU1-1M20-D firmware version 1.0.7 and earlier (Status: affected)
### References
1. [](https://jvn.jp/en/vu/JVNVU92370624/index.html)
2. [](https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1068, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1068 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1068
- **State**: PUBLISHED
- **Published Date**: August 31, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:12 UTC
- **Reserved Date**: August 30, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The web server for D-Link DP-300 print server allows remote attackers to cause a denial of service (hang) via a large HTTP POST request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5330](http://www.securityfocus.com/bid/5330)
2. [20020727 Phenoelit Advisory #0815 ++-+ dp_300 (DLINK)](http://marc.info/?l=vuln-dev&m=102779425117680&w=2)
3. [dlink-dp-post-dos(9703)](http://www.iss.net/security_center/static/9703.php)
4. [20020727 Phenoelit Advisory #0815 ++-+ dp_300 (DLINK)](http://archives.neohapsis.com/archives/bugtraq/2002-07/0341.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6856, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6856 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6856
- **State**: PUBLISHED
- **Published Date**: September 08, 2024 at 06:00 UTC
- **Last Updated**: September 09, 2024 at 19:50 UTC
- **Reserved Date**: July 17, 2024 at 20:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP MultiTasking WordPress plugin through 0.1.12 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
### Weakness Classification (CWE)
- CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - WP MultiTasking**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/9700845e-89ca-4f9b-95f0-4b46a975b662/)
### Credits
- Norbert Hofmann
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2974, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2974 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2974
- **State**: PUBLISHED
- **Published Date**: January 29, 2014 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 15:52 UTC
- **Reserved Date**: April 12, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The BIRT viewer in IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.2.1.x before 7.2.1.5 allows remote authenticated users to bypass authorization checks and obtain report-administration privileges, and consequently create or delete reports or conduct SQL injection attacks, via crafted parameters to the BIRT reporting URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg21662955)
2. [ibm-taddm-cve20132974-auth(83877)](https://exchange.xforce.ibmcloud.com/vulnerabilities/83877) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000108, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000108 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000108
- **State**: PUBLISHED
- **Published Date**: March 13, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 20:06 UTC
- **Reserved Date**: March 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting vulnerability exists in Jenkins CppNCSS Plugin 1.1 and earlier in AbstractProjectAction/index.jelly that allow an attacker to craft links to Jenkins URLs that run arbitrary JavaScript in the user's browser when accessed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2018-02-26/#SECURITY-712) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40721, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40721 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40721
- **State**: PUBLISHED
- **Published Date**: October 15, 2021 at 14:22 UTC
- **Last Updated**: April 23, 2025 at 19:24 UTC
- **Reserved Date**: September 08, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Connect version 11.2.3 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Connect**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/connect/apsb21-91.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3936, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3936 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3936
- **State**: PUBLISHED
- **Published Date**: May 22, 2025 at 12:20 UTC
- **Last Updated**: May 22, 2025 at 17:29 UTC
- **Reserved Date**: April 25, 2025 at 15:21 UTC
- **Assigned By**: Honeywell
### Vulnerability Description
Incorrect Permission Assignment for Critical Resource vulnerability in Tridium Niagara Framework on Windows, Tridium Niagara Enterprise Security on Windows allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-732: Security Weakness
### Affected Products
**Tridium - Niagara Framework**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
**Tridium - Niagara Enterprise Security**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
### References
1. [](https://docs.niagara-community.com/category/tech_bull)
2. [](https://www.honeywell.com/us/en/product-security#security-notices)
### Credits
- Andrea Palanca and team at Nozomi Networks |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6538
- **State**: PUBLISHED
- **Published Date**: July 06, 2018 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 01:36 UTC
- **Reserved Date**: August 03, 2016 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The TrackR Bravo mobile app stores the account password used to authenticate to the cloud API in cleartext in the cache.db file. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541.
### Weakness Classification (CWE)
- CWE-313: Security Weakness
### Affected Products
**TrackR - Bravo Mobile Application**
Affected versions:
- 5.1.6 (Status: unaffected)
**TrackR - Bravo Mobile Application**
Affected versions:
- 2.2.5 (Status: unaffected)
### References
1. [93874](http://www.securityfocus.com/bid/93874)
2. [](https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ)
3. [](https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/)
4. [VU#617567](https://www.kb.cert.org/vuls/id/617567)
### Credits
- Thanks to Deral Heiland and Adam Compton of Rapid7, Inc. for reporting this vulnerability. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3458
- **State**: PUBLISHED
- **Published Date**: April 24, 2017 at 19:00 UTC
- **Last Updated**: October 07, 2024 at 16:19 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.7.17 and earlier (Status: affected)
### References
1. [1038287](http://www.securitytracker.com/id/1038287)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html)
3. [97837](http://www.securityfocus.com/bid/97837)
4. [RHSA-2017:2886](https://access.redhat.com/errata/RHSA-2017:2886) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2566, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2566
- **State**: PUBLISHED
- **Published Date**: June 06, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: June 06, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in PHP Address Book 3.1.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the group parameter to (1) index.php or (2) the default URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30540](http://secunia.com/advisories/30540)
2. [phpaddressbook-group-xss(42856)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42856)
3. [5739](https://www.exploit-db.com/exploits/5739)
4. [phpaddressbook-grouppara-xss(99624)](https://exchange.xforce.ibmcloud.com/vulnerabilities/99624)
5. [](http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12900, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12900
- **State**: PUBLISHED
- **Published Date**: November 15, 2021 at 15:27 UTC
- **Last Updated**: September 17, 2024 at 02:21 UTC
- **Reserved Date**: May 15, 2020 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.
### Affected Products
**AMD - AMD Radeon Software**
Affected versions:
- Radeon Software (Status: affected)
- Radeon Pro Software for Enterprise (Status: affected)
### References
1. [](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0949, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0949
- **State**: PUBLISHED
- **Published Date**: January 29, 2013 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 14:41 UTC
- **Reserved Date**: January 10, 2013 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple iOS before 6.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-01-28-1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT5642)
2. [APPLE-SA-2013-03-14-2](http://lists.apple.com/archives/security-announce/2013/Mar/msg00003.html)
3. [APPLE-SA-2013-01-28-1](http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37277, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37277
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 14:18 UTC
- **Last Updated**: November 01, 2024 at 18:01 UTC
- **Reserved Date**: June 04, 2024 at 19:25 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authorization Bypass Through User-Controlled Key vulnerability in Paid Memberships Pro allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Paid Memberships Pro: from n/a through 3.0.4.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**Paid Memberships Pro - Paid Memberships Pro**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/paid-memberships-pro/wordpress-paid-memberships-pro-plugin-3-0-4-insecure-direct-object-references-idor-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5829, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5829 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5829
- **State**: PUBLISHED
- **Published Date**: November 21, 2012 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 21:21 UTC
- **Reserved Date**: November 05, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the nsWindow::OnExposeEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-1638-3](http://www.ubuntu.com/usn/USN-1638-3)
2. [51370](http://secunia.com/advisories/51370)
3. [USN-1638-2](http://www.ubuntu.com/usn/USN-1638-2)
4. [SUSE-SU-2013:0048](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html)
5. [openSUSE-SU-2012:1586](http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html)
6. [USN-1636-1](http://www.ubuntu.com/usn/USN-1636-1)
7. [openSUSE-SU-2013:0175](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html)
8. [oval:org.mitre.oval:def:16849](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16849)
9. [RHSA-2012:1483](http://rhn.redhat.com/errata/RHSA-2012-1483.html)
10. [openSUSE-SU-2013:0131](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html)
11. [DSA-2584](http://www.debian.org/security/2012/dsa-2584)
12. [](http://www.mozilla.org/security/announce/2013/mfsa2013-02.html)
13. [](https://bugzilla.mozilla.org/show_bug.cgi?id=792305)
14. [RHSA-2012:1482](http://rhn.redhat.com/errata/RHSA-2012-1482.html)
15. [87608](http://osvdb.org/87608)
16. [51434](http://secunia.com/advisories/51434)
17. [openSUSE-SU-2012:1583](http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html)
18. [USN-1681-4](http://www.ubuntu.com/usn/USN-1681-4)
19. [51439](http://secunia.com/advisories/51439)
20. [51440](http://secunia.com/advisories/51440)
21. [USN-1638-1](http://www.ubuntu.com/usn/USN-1638-1)
22. [56636](http://www.securityfocus.com/bid/56636)
23. [SUSE-SU-2013:0049](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html)
24. [USN-1681-1](http://www.ubuntu.com/usn/USN-1681-1)
25. [SUSE-SU-2012:1592](http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html)
26. [51359](http://secunia.com/advisories/51359)
27. [MDVSA-2012:173](http://www.mandriva.com/security/advisories?name=MDVSA-2012:173)
28. [openSUSE-SU-2013:0149](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html)
29. [openSUSE-SU-2012:1585](http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html)
30. [firefox-onexposeevent-bo(80195)](https://exchange.xforce.ibmcloud.com/vulnerabilities/80195)
31. [51381](http://secunia.com/advisories/51381)
32. [DSA-2583](http://www.debian.org/security/2012/dsa-2583)
33. [USN-1681-2](http://www.ubuntu.com/usn/USN-1681-2)
34. [51369](http://secunia.com/advisories/51369)
35. [](http://www.mozilla.org/security/announce/2012/mfsa2012-105.html)
36. [51360](http://secunia.com/advisories/51360)
37. [DSA-2588](http://www.debian.org/security/2012/dsa-2588) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12893, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12893
- **State**: PUBLISHED
- **Published Date**: June 19, 2019 at 21:36 UTC
- **Last Updated**: August 04, 2024 at 23:32 UTC
- **Reserved Date**: June 19, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Alternate Pic View 2.600 has a User Mode Write AV starting at PicViewer!PerfgrapFinalize+0x00000000000a8868.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://code610.blogspot.com/2019/05/crashing-alternate-pic-view.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9000, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9000 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9000
- **State**: PUBLISHED
- **Published Date**: November 20, 2014 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 22:30 UTC
- **Reserved Date**: November 19, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mule Enterprise Management Console (MMC) does not properly restrict access to handler/securityService.rpc, which allows remote authenticated users to gain administrator privileges and execute arbitrary code via a crafted request that adds a new user. NOTE: this issue was originally reported for ESB Runtime 3.5.1, but it originates in MMC.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20141024 Re: Mulesoft ESB Authenticated Privilege Escalation](http://seclists.org/fulldisclosure/2014/Oct/107)
2. [20141022 Mulesoft ESB Authenticated Privilege Escalation](http://seclists.org/fulldisclosure/2014/Oct/98)
3. [](http://packetstormsecurity.com/files/128799)
4. [](http://www.mulesoft.org/documentation/display/current/Mule+Enterprise+Management+Console+Security+Update) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11717, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11717 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11717
- **State**: PUBLISHED
- **Published Date**: July 16, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 08:17 UTC
- **Reserved Date**: June 04, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Zoho ManageEngine Desktop Central before 100251. By leveraging access to a log file, a context-dependent attacker can obtain (depending on the modules configured) the Base64 encoded Password/Username of AD accounts, the cleartext Password/Username and mail settings of the EAS account (an AD account used to send mail), the cleartext password of recovery_password of Android devices, the cleartext password of account "set", the location of devices enrolled in the platform (with UUID and information related to the name of the person at the location), critical information about all enrolled devices such as Serial Number, UUID, Model, Name, and auth_session_token (usable to spoof a terminal identity on the platform), etc.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.netxp.fr/manageengine-deep-exploitation/)
2. [](https://www.manageengine.com/products/desktop-central/vulnerability-in-log-files.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2282, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2282
- **State**: PUBLISHED
- **Published Date**: September 23, 2020 at 13:10 UTC
- **Last Updated**: August 04, 2024 at 07:01 UTC
- **Reserved Date**: December 05, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Implied Labels Plugin 0.6 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to configure the plugin.
### Affected Products
**Jenkins project - Jenkins Implied Labels Plugin**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-2004)
2. [[oss-security] 20200923 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2020/09/23/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5208, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5208 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5208
- **State**: PUBLISHED
- **Published Date**: January 06, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 05:26 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Irssi before 1.0.6, a calculation error in the completion code could cause a heap buffer overflow when completing certain strings.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-4162](https://www.debian.org/security/2018/dsa-4162)
2. [](https://irssi.org/security/irssi_sa_2018_01.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4336
- **State**: PUBLISHED
- **Published Date**: August 14, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the Live Picture Corporation DXSurface.LivePicture.FlashPix.1 (DirectTransform FlashPix) ActiveX control in DXTLIPI.DLL 6.0.2.827, as packaged in Microsoft DirectX Media 6.0 SDK, allows remote attackers to execute arbitrary code via a long SourceUrl property value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [directx-dxtlipi-bo(35970)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35970)
2. [4279](https://www.exploit-db.com/exploits/4279)
3. [ADV-2007-2857](http://www.vupen.com/english/advisories/2007/2857)
4. [VU#466601](http://www.kb.cert.org/vuls/id/466601)
5. [25279](http://www.securityfocus.com/bid/25279)
6. [26426](http://secunia.com/advisories/26426)
7. [36399](http://osvdb.org/36399)
8. [1018551](http://www.securitytracker.com/id?1018551) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0619, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0619
- **State**: PUBLISHED
- **Published Date**: January 23, 2025 at 11:07 UTC
- **Last Updated**: February 12, 2025 at 20:41 UTC
- **Reserved Date**: January 21, 2025 at 14:07 UTC
- **Assigned By**: M-Files Corporation
### Vulnerability Description
Unsafe password recovery from configuration in M-Files Server before 25.1 allows a highly privileged user to recover external connector passwords
### Weakness Classification (CWE)
- CWE-522: Security Weakness
### Affected Products
**M-Files Corporation - M-Files Server**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://product.m-files.com/security-advisories/cve-2025-0619/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0368, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0368 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0368
- **State**: PUBLISHED
- **Published Date**: October 08, 2019 at 19:17 UTC
- **Last Updated**: August 04, 2024 at 17:44 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Customer Relationship Management (Email Management), versions: S4CRM before 1.0 and 2.0, BBPCRM before 7.0, 7.01, 7.02, 7.12, 7.13 and 7.14, does not sufficiently encode user-controlled inputs within the mail client resulting in Cross-Site Scripting vulnerability.
### Affected Products
**SAP SE - SAP Customer Relationship Management (Email Management - S4CRM)**
Affected versions:
- < 1.0 (Status: affected)
- < 2.0 (Status: affected)
**SAP SE - SAP Customer Relationship Management (Email Management - BBPCRM)**
Affected versions:
- < 7.0 (Status: affected)
- < 7.01 (Status: affected)
- < 7.02 (Status: affected)
- < 7.12 (Status: affected)
- < 7.13 (Status: affected)
- < 7.14 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050)
2. [](https://launchpad.support.sap.com/#/notes/2751806) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1256, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1256 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1256
- **State**: PUBLISHED
- **Published Date**: March 19, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 17:03 UTC
- **Reserved Date**: March 18, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in guestbook.php in Soren Boysen (SkullSplitter) PHP Guestbook 2.6 allows remote attackers to inject arbitrary web script or HTML via the url parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [650](http://securityreason.com/securityalert/650)
2. [](http://evuln.com/vulns/104/summary.html)
3. [23941](http://www.osvdb.org/23941)
4. [ADV-2006-0974](http://www.vupen.com/english/advisories/2006/0974)
5. [20060318 Vendor ACK for Skull-Splitter Guestbook XSS](http://attrition.org/pipermail/vim/2006-March/000613.html)
6. [](http://www.boysen.be/en/)
7. [20060329 [eVuln] Skull-Splitter's PHP Guestbook XSS Vulnerability](http://www.securityfocus.com/archive/1/429254/100/0/threaded)
8. [19268](http://secunia.com/advisories/19268)
9. [17136](http://www.securityfocus.com/bid/17136)
10. [skullsplitter-guestbook-xss(25293)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25293) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5779, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5779 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5779
- **State**: REJECTED
- **Last Updated**: June 12, 2024 at 07:27 UTC
- **Reserved Date**: June 08, 2024 at 14:27 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13612, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13612 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13612
- **State**: REJECTED
- **Published Date**: March 23, 2021 at 22:30 UTC
- **Last Updated**: March 23, 2021 at 22:30 UTC
- **Reserved Date**: May 26, 2020 at 00:00 UTC
- **Assigned By**: zephyr
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29269, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29269 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29269
- **State**: PUBLISHED
- **Published Date**: April 10, 2024 at 00:00 UTC
- **Last Updated**: August 27, 2024 at 17:44 UTC
- **Reserved Date**: March 19, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wutalent/CVE-2024-29269/blob/main/index.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10805, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10805
- **State**: PUBLISHED
- **Published Date**: May 08, 2018 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 07:46 UTC
- **Reserved Date**: May 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ImageMagick version 7.0.7-28 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ImageMagick/ImageMagick/issues/1054)
2. [USN-3681-1](https://usn.ubuntu.com/3681-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5490, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5490
- **State**: PUBLISHED
- **Published Date**: March 21, 2019 at 18:25 UTC
- **Last Updated**: August 04, 2024 at 19:54 UTC
- **Reserved Date**: January 07, 2019 at 00:00 UTC
- **Assigned By**: netapp
### Vulnerability Description
Certain versions between 2.x to 5.x (refer to advisory) of the NetApp Service Processor firmware were shipped with a default account enabled that could allow unauthorized arbitrary command execution. Any platform listed in the advisory Impact section may be affected and should be upgraded to a fixed version of Service Processor firmware IMMEDIATELY.
### Affected Products
**NetApp, Inc. - NetApp Service Processor**
Affected versions:
- 2.x-5.x - refer to advisory (Status: affected)
### References
1. [](https://security.netapp.com/advisory/ntap-20190305-0001/)
2. [](http://support.lenovo.com/us/en/solutions/LEN-26771) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21232, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21232 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21232
- **State**: PUBLISHED
- **Published Date**: April 30, 2021 at 20:15 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 21, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Dev Tools in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html)
2. [](https://crbug.com/1175058)
3. [GLSA-202104-08](https://security.gentoo.org/glsa/202104-08)
4. [DSA-4911](https://www.debian.org/security/2021/dsa-4911)
5. [FEDORA-2021-c3754414e7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/)
6. [FEDORA-2021-ff893e12c5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/)
7. [FEDORA-2021-35d2bb4627](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0081, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0081
- **State**: PUBLISHED
- **Published Date**: April 05, 2024 at 18:13 UTC
- **Last Updated**: August 01, 2024 at 17:41 UTC
- **Reserved Date**: December 02, 2023 at 00:41 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA NeMo framework for Ubuntu contains a vulnerability in tools/asr_webapp where an attacker may cause an allocation of resources without limits or throttling. A successful exploit of this vulnerability may lead to a server-side denial of service.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**NVIDIA - NeMo**
Affected versions:
- NVIDIA Neural Modules 1.22.0 (Status: affected)
### References
1. [](https://github.com/NVIDIA/NeMo/security/advisories/GHSA-x392-p65g-4rxx) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.