System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11290, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11290
- **State**: PUBLISHED
- **Published Date**: March 17, 2021 at 06:01 UTC
- **Last Updated**: August 04, 2024 at 11:28 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Use after free condition in msm ioctl events due to race between the ioctl register and deregister events in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables**
Affected versions:
- APQ8009, APQ8009W, APQ8017, APQ8053, AQT1000, AR8031, CSRA6620, CSRA6640, CSRB31024, FSM10055, FSM10056, MSM8909W, MSM8917, MSM8953, PM215, PM3003A, PM439, PM6125, PM6150, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8004, PM8005, PM8008, PM8009, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8953, PM8998, PMD9655, PME605, PMI632, PMI8937, PMI8952, PMI8998, PMK7350, PMK8002, PMK8350, PMM6155AU, PMM8155AU, PMM8195AU, PMM855AU, PMR525, PMR735A, PMR735B, PMW3100, PMX24, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT1500, QBT2000, QCA4020, QCA6174A, QCA6310, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA8337, QCA93 ...[truncated*] (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11303, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11303
- **State**: REJECTED
- **Published Date**: January 25, 2021 at 17:19 UTC
- **Last Updated**: January 25, 2021 at 17:19 UTC
- **Reserved Date**: April 18, 2019 at 00:00 UTC
- **Assigned By**: pivotal
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53423, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53423 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53423
- **State**: PUBLISHED
- **Published Date**: May 29, 2025 at 00:00 UTC
- **Last Updated**: May 29, 2025 at 18:28 UTC
- **Reserved Date**: November 20, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Open Network Foundation ONOS v2.7.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wiki.onosproject.org/pages/viewpage.action?pageId=16122675)
2. [](https://gist.github.com/kjw6855/abeecc798d138b49537393e1fd3a5e96) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2403, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2403
- **State**: PUBLISHED
- **Published Date**: March 13, 2024 at 18:05 UTC
- **Last Updated**: March 26, 2025 at 20:10 UTC
- **Reserved Date**: March 12, 2024 at 12:35 UTC
- **Assigned By**: DEVOLUTIONS
### Vulnerability Description
Improper cleanup in temporary file handling component in Devolutions Remote Desktop Manager 2024.1.12 and
earlier on Windows allows an attacker that compromised a user endpoint, under specific circumstances, to access sensitive information via residual files in the temporary directory.
### Affected Products
**Devolutions - Remote Desktop Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://devolutions.net/security/advisories/DEVO-2024-0004) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6521, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6521 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6521
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 04, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7012, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7012
- **State**: REJECTED
- **Published Date**: April 02, 2020 at 13:41 UTC
- **Last Updated**: April 02, 2020 at 13:41 UTC
- **Reserved Date**: January 28, 2019 at 00:00 UTC
- **Assigned By**: avaya
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3441, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3441 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3441
- **State**: PUBLISHED
- **Published Date**: August 25, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 20:05 UTC
- **Reserved Date**: June 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The database creation script (module/idoutils/db/scripts/create_mysqldb.sh) in Icinga 1.7.1 grants access to all databases to the icinga user, which allows icinga users to access other databases via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20120730 Re: CVE Request: icinga sample db creation scripts](http://www.openwall.com/lists/oss-security/2012/07/30/7)
2. [](https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=dcd45fb6931c4abf710829bee21af09f842bc281)
3. [](https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=712813d3118a5b9e5a496179cab81dbe91f69d63)
4. [[oss-security] 20120730 CVE Request: icinga sample db creation scripts](http://www.openwall.com/lists/oss-security/2012/07/30/6)
5. [icinga-database-sec-bypass(78874)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78874)
6. [](https://git.icinga.org/?p=icinga-doc.git%3Ba=commitdiff%3Bh=619a08ca1178144b8a3a5caafff32a2d3918edab)
7. [openSUSE-SU-2012:0968](http://lists.opensuse.org/opensuse-updates/2012-08/msg00012.html)
8. [](https://bugzilla.novell.com/show_bug.cgi?id=767319) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2172, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2172 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2172
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0950, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0950 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0950
- **State**: PUBLISHED
- **Published Date**: February 10, 2016 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 22:38 UTC
- **Reserved Date**: December 22, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Connect before 9.5.2 allows remote attackers to spoof the user interface via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/connect/apsb16-07.html)
2. [1034978](http://www.securitytracker.com/id/1034978) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5830
- **State**: PUBLISHED
- **Published Date**: March 03, 2017 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 15:11 UTC
- **Reserved Date**: February 01, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Revive Adserver before 4.0.1 allows remote attackers to execute arbitrary code via serialized data in the cookies related to the delivery scripts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20170202 Re: CVE request: multiples vulnerabilities in Revive Adserver](http://www.openwall.com/lists/oss-security/2017/02/02/3)
2. [](https://www.revive-adserver.com/security/revive-sa-2017-001/)
3. [95875](http://www.securityfocus.com/bid/95875) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14568, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14568
- **State**: PUBLISHED
- **Published Date**: July 15, 2020 at 17:34 UTC
- **Last Updated**: September 27, 2024 at 18:39 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.20 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2020.html)
2. [](https://security.netapp.com/advisory/ntap-20200717-0004/)
3. [USN-4441-1](https://usn.ubuntu.com/4441-1/)
4. [FEDORA-2020-9c27be9396](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/)
5. [FEDORA-2020-d5b2e71a17](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/)
6. [FEDORA-2020-77b95c868f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/)
7. [GLSA-202105-27](https://security.gentoo.org/glsa/202105-27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1912, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1912 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1912
- **State**: PUBLISHED
- **Published Date**: September 09, 2020 at 18:50 UTC
- **Last Updated**: August 04, 2024 at 06:54 UTC
- **Reserved Date**: December 02, 2019 at 00:00 UTC
- **Assigned By**: facebook
### Vulnerability Description
An out-of-bounds read/write vulnerability when executing lazily compiled inner generator functions in Facebook Hermes prior to commit 091835377369c8fd5917d9b87acffa721ad2a168 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Facebook - Hermes**
Affected versions:
- commit prior to 091835377369c8fd5917d9b87acffa721ad2a168 (Status: affected)
### References
1. [](https://www.facebook.com/security/advisories/cve-2020-1912)
2. [](https://github.com/facebook/hermes/commit/091835377369c8fd5917d9b87acffa721ad2a168) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4111, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4111 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4111
- **State**: PUBLISHED
- **Published Date**: August 14, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 18:57 UTC
- **Reserved Date**: August 14, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21466](http://secunia.com/advisories/21466)
2. [21749](http://secunia.com/advisories/21749)
3. [19454](http://www.securityfocus.com/bid/19454)
4. [ADV-2006-3237](http://www.vupen.com/english/advisories/2006/3237)
5. [](http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html)
6. [SUSE-SR:2006:021](http://www.novell.com/linux/security/advisories/2006_21_sr.html)
7. [](http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits)
8. [GLSA-200608-20](http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml)
9. [1016673](http://securitytracker.com/id?1016673) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52452, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52452 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52452
- **State**: PUBLISHED
- **Published Date**: February 22, 2024 at 16:21 UTC
- **Last Updated**: May 04, 2025 at 12:49 UTC
- **Reserved Date**: February 20, 2024 at 12:30 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix accesses to uninit stack slots
Privileged programs are supposed to be able to read uninitialized stack
memory (ever since 6715df8d5) but, before this patch, these accesses
were permitted inconsistently. In particular, accesses were permitted
above state->allocated_stack, but not below it. In other words, if the
stack was already "large enough", the access was permitted, but
otherwise the access was rejected instead of being allowed to "grow the
stack". This undesired rejection was happening in two places:
- in check_stack_slot_within_bounds()
- in check_stack_range_initialized()
This patch arranges for these accesses to be permitted. A bunch of tests
that were relying on the old rejection had to change; all of them were
changed to add also run unprivileged, in which case the old behavior
persists. One tests couldn't be updated - global_func16 - because it
can't run unprivileged for other reasons.
This patch also fixes the tracking of the stack size for variable-offset
reads. This second fix is bundled in the same commit as the first one
because they're inter-related. Before this patch, writes to the stack
using registers containing a variable offset (as opposed to registers
with fixed, known values) were not properly contributing to the
function's needed stack size. As a result, it was possible for a program
to verify, but then to attempt to read out-of-bounds data at runtime
because a too small stack had been allocated for it.
Each function tracks the size of the stack it needs in
bpf_subprog_info.stack_depth, which is maintained by
update_stack_depth(). For regular memory accesses, check_mem_access()
was calling update_state_depth() but it was passing in only the fixed
part of the offset register, ignoring the variable offset. This was
incorrect; the minimum possible value of that register should be used
instead.
This tracking is now fixed by centralizing the tracking of stack size in
grow_stack_state(), and by lifting the calls to grow_stack_state() to
check_stack_access_within_bounds() as suggested by Andrii. The code is
now simpler and more convincingly tracks the correct maximum stack size.
check_stack_range_initialized() can now rely on enough stack having been
allocated for the access; this helps with the fix for the first issue.
A few tests were changed to also check the stack depth computation. The
one that fails without this patch is verifier_var_off:stack_write_priv_vs_unpriv.
### Affected Products
**Linux - Linux**
Affected versions:
- 01f810ace9ed37255f27608a0864abebccf0aab3 (Status: affected)
- 01f810ace9ed37255f27608a0864abebccf0aab3 (Status: affected)
- 01f810ace9ed37255f27608a0864abebccf0aab3 (Status: affected)
- f3c4b01689d392373301e6e60d1b02c5b4020afc (Status: affected)
- d1b725ea5d104caea250427899f4e2e3ab15b4fc (Status: affected)
**Linux - Linux**
Affected versions:
- 5.12 (Status: affected)
- 0 (Status: unaffected)
- 6.6.14 (Status: unaffected)
- 6.7.2 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/0954982db8283016bf38e9db2da5adf47a102e19)
2. [](https://git.kernel.org/stable/c/fbcf372c8eda2290470268e0afb5ab5d5f5d5fde)
3. [](https://git.kernel.org/stable/c/6b4a64bafd107e521c01eec3453ce94a3fb38529) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1071, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1071 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1071
- **State**: PUBLISHED
- **Published Date**: February 22, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 12:43 UTC
- **Reserved Date**: February 22, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in the gifGetBandProc function in ImageIO in Apple Mac OS X 10.4.8 allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image that triggers the overflow during decompression. NOTE: this is a different issue than CVE-2006-3502 and CVE-2006-3503.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://security-protocols.com/sp-x39-advisory.php)
2. [22630](http://www.securityfocus.com/bid/22630)
3. [TA07-072A](http://www.us-cert.gov/cas/techalerts/TA07-072A.html)
4. [APPLE-SA-2007-03-13](http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html)
5. [](http://docs.info.apple.com/article.html?artnum=305214)
6. [34854](http://www.osvdb.org/34854)
7. [VU#559444](http://www.kb.cert.org/vuls/id/559444)
8. [ADV-2007-0930](http://www.vupen.com/english/advisories/2007/0930)
9. [1017758](http://www.securitytracker.com/id?1017758)
10. [24479](http://secunia.com/advisories/24479) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35996, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35996 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35996
- **State**: PUBLISHED
- **Published Date**: January 08, 2024 at 14:47 UTC
- **Last Updated**: June 03, 2025 at 14:35 UTC
- **Reserved Date**: June 20, 2023 at 19:41 UTC
- **Assigned By**: talos
### Vulnerability Description
Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta indexing when signal_lens is 0.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-129: Security Weakness
### Affected Products
**GTKWave - GTKWave**
Affected versions:
- 3.3.115 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791)
2. [](https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html)
### Credits
- Discovered by Claudio Bozzato of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3853, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3853 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3853
- **State**: PUBLISHED
- **Published Date**: November 04, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 06:45 UTC
- **Reserved Date**: November 04, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the client acceptor daemon (CAD) scheduler in the client in IBM Tivoli Storage Manager (TSM) 5.3 before 5.3.6.7, 5.4 before 5.4.3, 5.5 before 5.5.2.2, and 6.1 before 6.1.0.2, and TSM Express 5.3.3.0 through 5.3.6.6, allows remote attackers to execute arbitrary code via crafted data in a TCP packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1023136](http://securitytracker.com/id?1023136)
2. [ADV-2009-3132](http://www.vupen.com/english/advisories/2009/3132)
3. [IC61036](http://www-01.ibm.com/support/docview.wss?uid=swg1IC61036)
4. [20091104 Secunia Research: IBM Tivoli Storage Manager CAD Service Buffer Overflow](http://www.securityfocus.com/archive/1/507654/100/0/threaded)
5. [](http://www-01.ibm.com/support/docview.wss?uid=swg21405562)
6. [](http://secunia.com/secunia_research/2008-51/)
7. [32534](http://secunia.com/advisories/32534) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6933, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6933
- **State**: PUBLISHED
- **Published Date**: August 11, 2009 at 20:25 UTC
- **Last Updated**: August 07, 2024 at 11:49 UTC
- **Reserved Date**: August 11, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in index.php in MiniGal b13 (aka MG2) allows remote attackers to read the source code of .php files, and possibly the content of other files, via a .. (dot dot) in the list parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [minigal-index-directory-traversal(46635)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46635)
2. [32312](http://www.securityfocus.com/bid/32312)
3. [7130](https://www.exploit-db.com/exploits/7130) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36612, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36612 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36612
- **State**: PUBLISHED
- **Published Date**: August 28, 2022 at 23:58 UTC
- **Last Updated**: August 03, 2024 at 10:07 UTC
- **Reserved Date**: July 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK A950RG V4.1.2cu.5204_B20210112 was discovered to contain a hardcoded password for root at /etc/shadow.sample.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/whiter6666/CVE/blob/main/TOTOLINK_A950RG/hard_code.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4789
- **State**: PUBLISHED
- **Published Date**: September 10, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 15:08 UTC
- **Reserved Date**: September 10, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cisco Content Switching Modules (CSM) 4.2 before 4.2.7, and Cisco Content Switching Module with SSL (CSM-S) 2.1 before 2.1.6, when service termination is enabled, allow remote attackers to cause a denial of service (reboot) via unspecified vectors related to high network utilization, aka CSCsh57876.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070905 Denial of Service Vulnerabilities in Content Switching Module](http://www.cisco.com/warp/public/707/cisco-sa-20070905-csm.shtml)
2. [cisco-content-switching-dos(36453)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36453)
3. [37501](http://osvdb.org/37501)
4. [1018654](http://securitytracker.com/id?1018654)
5. [25547](http://www.securityfocus.com/bid/25547)
6. [26724](http://secunia.com/advisories/26724)
7. [ADV-2007-3062](http://www.vupen.com/english/advisories/2007/3062) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4384, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4384 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4384
- **State**: PUBLISHED
- **Published Date**: November 13, 2019 at 15:52 UTC
- **Last Updated**: August 06, 2024 at 20:35 UTC
- **Reserved Date**: August 21, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
letodms has multiple XSS issues: Reflected XSS in Login Page, Stored XSS in Document Owner/User name, Stored XSS in Calendar
### Affected Products
**letodms - letodms**
Affected versions:
- through 3.3.11 (Status: affected)
### References
1. [](http://www.openwall.com/lists/oss-security/2012/08/31/19)
2. [Debian](https://security-tracker.debian.org/tracker/CVE-2012-4384) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24175
- **State**: PUBLISHED
- **Published Date**: April 05, 2021 at 18:27 UTC
- **Last Updated**: August 03, 2024 at 19:21 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Plus Addons for Elementor Page Builder WordPress plugin before 4.1.7 was being actively exploited to by malicious actors to bypass authentication, allowing unauthenticated users to log in as any user (including admin) by just providing the related username, as well as create accounts with arbitrary roles, such as admin. These issues can be exploited even if registration is disabled, and the Login widget is not active.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Unknown - The Plus Addons for Elementor Page Builder**
Affected versions:
- 4.1.7 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/c311feef-7041-4c21-9525-132b9bd32f89)
2. [](https://www.wordfence.com/blog/2021/03/critical-0-day-in-the-plus-addons-for-elementor-allows-site-takeover/)
3. [](https://posimyth.ticksy.com/ticket/2713734/)
### Credits
- Ville Korhonen (Seravo), Antony Booker (WP Charged) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2741, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2741 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2741
- **State**: PUBLISHED
- **Published Date**: September 18, 2009 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 05:59 UTC
- **Reserved Date**: August 12, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the wberuntimeear application in the test servlet in IBM WebSphere Business Events 6.1 and 6.2 allows remote attackers to execute arbitrary code via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [websphere-be-wberuntimeear-code-execution(53189)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53189)
2. [IZ56367](http://www-01.ibm.com/support/docview.wss?uid=swg1IZ56367) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32130, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32130
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 09:59 UTC
- **Last Updated**: August 08, 2024 at 15:23 UTC
- **Reserved Date**: April 11, 2024 at 13:13 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paystack Payment Forms for Paystack allows Stored XSS.This issue affects Payment Forms for Paystack: from n/a through 3.4.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Paystack - Payment Forms for Paystack**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/payment-forms-for-paystack/wordpress-payment-forms-for-paystack-plugin-3-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- NGÔ THIÊN AN / ancorn_ from VNPT-VCI (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1000225, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1000225 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000225
- **State**: PUBLISHED
- **Published Date**: November 17, 2017 at 05:00 UTC
- **Last Updated**: September 17, 2024 at 00:37 UTC
- **Reserved Date**: November 16, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Reflected XSS in Relevanssi Premium version 1.14.8 when using relevanssi_didyoumean() could allow unauthenticated attacker to do almost anything an admin can
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.dxw.com/advisories/reflected-xss-in-relevanssi-premium-when-using-relevanssi_didyoumean-could-allow-unauthenticated-attacker-to-do-almost-anything-an-admin-can/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9227, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9227 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9227
- **State**: PUBLISHED
- **Published Date**: September 11, 2017 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 16:57 UTC
- **Reserved Date**: September 11, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in the get_file function in upload/admin2/controller/report_logs.php in AlegroCart 1.2.8 allows remote administrators to execute arbitrary PHP code via a URL in the file_path parameter to upload/admin2.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20151114 AlegroCart 1.2.8: LFI/RFI](http://seclists.org/fulldisclosure/2015/Nov/67)
2. [38728](https://www.exploit-db.com/exploits/38728/)
3. [](https://blog.curesec.com/article/blog/AlegroCart-128-LFIRFI-102.html)
4. [](http://packetstormsecurity.com/files/134361/AlegroCart-1.2.8-Local-Remote-File-Inclusion.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6187, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6187
- **State**: PUBLISHED
- **Published Date**: August 06, 2016 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 01:22 UTC
- **Reserved Date**: July 09, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/torvalds/linux/commit/30a46a4647fd1df9cf52e43bf467f0d9265096ca)
2. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30a46a4647fd1df9cf52e43bf467f0d9265096ca)
3. [](http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.5)
4. [[oss-security] 20160709 Re: CVE request: apparmor: oops in apparmor_setprocattr()](http://www.openwall.com/lists/oss-security/2016/07/09/2)
5. [[linux-kernel] 20160708 [GIT PULL] Fix for AppArmor oops in apparmor_setprocattr()](http://marc.info/?l=linux-kernel&m=146793642811929&w=2)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=1354383)
7. [91696](http://www.securityfocus.com/bid/91696) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14450, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14450
- **State**: PUBLISHED
- **Published Date**: July 20, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 09:29 UTC
- **Reserved Date**: July 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in libgig 4.1.0. There is an out-of-bounds read in the "update dimension region's chunks" feature of the function gig::Region::UpdateChunks in gig.cpp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/TeamSeri0us/pocs/blob/master/libgig/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37900, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37900
- **State**: PUBLISHED
- **Published Date**: November 03, 2022 at 18:56 UTC
- **Last Updated**: May 01, 2025 at 15:04 UTC
- **Reserved Date**: August 08, 2022 at 18:45 UTC
- **Assigned By**: hpe
### Vulnerability Description
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities results in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Hewlett Packard Enterprise - Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central**
Affected versions:
- ArubaOS 6.5.4.x: 6.5.4.23 and above; ArubaOS 8.6.x: 8.6.0.18 and above; ArubaOS 8.7.x: 8.7.1.10 and above; ArubaOS 8.10.x: 8.10.0.0 and above; ArubaOS 10.3.x: 10.3.0.1 and above; SD-WAN-2.3.0.x: 8.7.0.0-2.3.0.7 and above (Status: unaffected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6998, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6998 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6998
- **State**: REJECTED
- **Published Date**: January 17, 2019 at 17:00 UTC
- **Last Updated**: January 17, 2019 at 16:57 UTC
- **Reserved Date**: February 14, 2018 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33141, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33141 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33141
- **State**: PUBLISHED
- **Published Date**: June 23, 2023 at 01:25 UTC
- **Last Updated**: January 01, 2025 at 01:44 UTC
- **Reserved Date**: May 17, 2023 at 21:16 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Yet Another Reverse Proxy (YARP) Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Microsoft - YARP 1.0**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - YARP 2.0**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [Yet Another Reverse Proxy (YARP) Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33141) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0098, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0098 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0098
- **State**: PUBLISHED
- **Published Date**: June 09, 2021 at 19:04 UTC
- **Last Updated**: August 03, 2024 at 15:25 UTC
- **Reserved Date**: October 22, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper access control in the Intel Unite(R) Client for Windows before version 4.2.25031 may allow an authenticated user to potentially enable an escalation of privilege via local access.
### Affected Products
**n/a - Intel Unite(R) Client for Windows**
Affected versions:
- before version 4.2.25031 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00506.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-5084, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-5084 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-5084
- **State**: PUBLISHED
- **Published Date**: August 12, 2011 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 01:25 UTC
- **Reserved Date**: August 12, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM Tivoli Federated Identity Manager (TFIM) 6.2.0 before 6.2.0.2, when com.tivoli.am.fim.infocard.delegates.InfoCardSTSDelegate tracing is enabled, creates a cleartext log entry containing a password, which might allow local users to obtain sensitive information by reading the log data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [IZ44560](http://www-01.ibm.com/support/docview.wss?uid=swg1IZ44560)
2. [](http://www.ibm.com/support/docview.wss?uid=swg24029497) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0600, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0600
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 16:58 UTC
- **Last Updated**: August 04, 2024 at 06:11 UTC
- **Reserved Date**: October 28, 2019 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access.
### Affected Products
**n/a - Intel(R) NUC Firmware**
Affected versions:
- See provided reference (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13395, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13395 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13395
- **State**: PUBLISHED
- **Published Date**: August 28, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 16:42 UTC
- **Reserved Date**: July 06, 2018 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
Various resources in Atlassian Jira before version 7.6.8, from version 7.7.0 before version 7.7.5, from version 7.8.0 before version 7.8.5, from version 7.9.0 before version 7.9.3, from version 7.10.0 before version 7.10.3 and before version 7.11.1 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the epic colour field of an issue while an issue is being moved.
### Affected Products
**Atlassian - Jira**
Affected versions:
- unspecified (Status: affected)
- 7.7.0 (Status: affected)
- unspecified (Status: affected)
- 7.8.0 (Status: affected)
- unspecified (Status: affected)
- 7.9.0 (Status: affected)
- unspecified (Status: affected)
- 7.10.0 (Status: affected)
- unspecified (Status: affected)
- 7.11.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/JRASERVER-67848) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4722, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4722 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4722
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38156
- **State**: PUBLISHED
- **Published Date**: September 15, 2021 at 13:20 UTC
- **Last Updated**: August 04, 2024 at 01:37 UTC
- **Reserved Date**: August 06, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Nagios XI before 5.8.6, XSS exists in the dashboard page (/dashboards/#) when administrative users attempt to edit a dashboard.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nagios.com/downloads/nagios-xi/change-log/)
2. [](https://raxis.com/blog/cve-2021-38156) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1642, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1642
- **State**: PUBLISHED
- **Published Date**: March 06, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 23:02 UTC
- **Reserved Date**: January 12, 2016 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Multiple unspecified vulnerabilities in Google Chrome before 49.0.2623.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.chromium.org/p/chromium/issues/detail?id=563964)
2. [](https://bugs.chromium.org/p/chromium/issues/detail?id=582707)
3. [openSUSE-SU-2016:0664](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html)
4. [openSUSE-SU-2016:0684](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html)
5. [84008](http://www.securityfocus.com/bid/84008)
6. [DSA-3507](http://www.debian.org/security/2016/dsa-3507)
7. [](https://bugs.chromium.org/p/chromium/issues/detail?id=565416)
8. [1035185](http://www.securitytracker.com/id/1035185)
9. [](https://bugs.chromium.org/p/chromium/issues/detail?id=472147)
10. [](https://bugs.chromium.org/p/chromium/issues/detail?id=582697)
11. [](https://code.google.com/p/chromium/issues/detail?id=591402)
12. [](https://bugs.chromium.org/p/chromium/issues/detail?id=582701)
13. [openSUSE-SU-2016:0729](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html)
14. [SUSE-SU-2016:0665](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html)
15. [](https://bugs.chromium.org/p/chromium/issues/detail?id=565424)
16. [](https://bugs.chromium.org/p/chromium/issues/detail?id=582470)
17. [](https://bugs.chromium.org/p/chromium/issues/detail?id=589186)
18. [USN-2920-1](http://www.ubuntu.com/usn/USN-2920-1)
19. [](http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45466, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45466 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45466
- **State**: PUBLISHED
- **Published Date**: December 26, 2022 at 00:00 UTC
- **Last Updated**: April 14, 2025 at 15:45 UTC
- **Reserved Date**: December 23, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1107, attackers can make a crafted request to api/?api=add_server&DHCP= to add an authorized_keys text file in the /resources/ folder.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://control-webpanel.com/changelog)
2. [](https://octagon.net/blog/2022/01/22/cve-2021-45467-cwp-centos-web-panel-preauth-rce/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42659, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42659 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42659
- **State**: PUBLISHED
- **Published Date**: May 24, 2022 at 11:41 UTC
- **Last Updated**: August 04, 2024 at 03:38 UTC
- **Reserved Date**: October 18, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a buffer overflow vulnerability in the Web server httpd of the router in Tenda router devices such as Tenda AC9 V1.0 V15.03.02.19(6318) and Tenda AC9 V3.0 V15.03.06.42_multi. When setting the virtual service, the httpd program will crash and exit when the super-long list parameter occurs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Lyc-heng/routers/blob/main/routers/stack4.md)
2. [](https://www.cnvd.org.cn/flaw/show/CNVD-2021-24948) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37332, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37332 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37332
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 17:02 UTC
- **Last Updated**: May 05, 2025 at 17:00 UTC
- **Reserved Date**: June 05, 2024 at 20:19 UTC
- **Assigned By**: microsoft
### Vulnerability Description
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Microsoft - Microsoft SQL Server 2017 (GDR)**
Affected versions:
- 14.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2019 (GDR)**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2016 Service Pack 3 (GDR)**
Affected versions:
- 13.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2016 Service Pack 3 Azure Connect Feature Pack**
Affected versions:
- 13.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2017 (CU 31)**
Affected versions:
- 14.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2022 (GDR)**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2019 for x64-based Systems (CU 27)**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2022 for (CU 13)**
Affected versions:
- 16.0.0 (Status: affected)
### References
1. [SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37332) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31486, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31486 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31486
- **State**: PUBLISHED
- **Published Date**: April 28, 2023 at 00:00 UTC
- **Last Updated**: January 30, 2025 at 19:26 UTC
- **Reserved Date**: April 28, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/)
2. [](https://www.openwall.com/lists/oss-security/2023/04/18/14)
3. [](https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/)
4. [](https://hackeriet.github.io/cpan-http-tiny-overview/)
5. [[oss-security] 20230429 Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules](http://www.openwall.com/lists/oss-security/2023/04/29/1)
6. [[oss-security] 20230503 Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules](http://www.openwall.com/lists/oss-security/2023/05/03/3)
7. [[oss-security] 20230503 Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules](http://www.openwall.com/lists/oss-security/2023/05/03/5)
8. [](https://www.openwall.com/lists/oss-security/2023/05/03/4)
9. [[oss-security] 20230507 Re: Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules](http://www.openwall.com/lists/oss-security/2023/05/07/2)
10. [](https://github.com/chansen/p5-http-tiny/pull/153) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12845, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12845 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12845
- **State**: PUBLISHED
- **Published Date**: July 27, 2020 at 22:56 UTC
- **Last Updated**: August 04, 2024 at 12:04 UTC
- **Reserved Date**: May 14, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cherokee 0.4.27 to 1.2.104 is affected by a denial of service due to a NULL pointer dereferences. A remote unauthenticated attacker can crash the server by sending an HTTP request to protected resources using a malformed Authorization header that is mishandled during a cherokee_buffer_add call within cherokee_validator_parse_basic or cherokee_validator_parse_digest.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cherokee/webserver/releases)
2. [](http://cherokee-project.com/downloads.html)
3. [](https://github.com/cherokee/webserver/issues/1242)
4. [GLSA-202012-09](https://security.gentoo.org/glsa/202012-09) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2423, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2423 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2423
- **State**: PUBLISHED
- **Published Date**: May 23, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 08:58 UTC
- **Reserved Date**: May 23, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Interchange before 5.6.0 and before 5.5.2 allows remote attackers to cause a denial of service via crafted HTTP requests. NOTE: this might overlap CVE-2007-2635.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [interchange-unspec-dos(42801)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42801)
2. [](http://ftp.icdevgroup.org/pub/interchange/5.5/ANNOUNCEMENT-5.5.2.txt)
3. [](http://ftp.icdevgroup.org/interchange/5.6/ANNOUNCEMENT-5.6.0.txt)
4. [30346](http://secunia.com/advisories/30346)
5. [interchange-unspecified-dos(42120)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42120)
6. [interchange-http-post-dos(42580)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42580)
7. [ADV-2008-1621](http://www.vupen.com/english/advisories/2008/1621/references)
8. [28987](http://www.securityfocus.com/bid/28987)
9. [29334](http://www.securityfocus.com/bid/29334) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11652, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11652 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11652
- **State**: PUBLISHED
- **Published Date**: June 01, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 08:17 UTC
- **Reserved Date**: June 01, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CSV Injection vulnerability in Nikto 2.1.6 and earlier allows remote attackers to inject arbitrary OS commands via the Server field in an HTTP response header, which is directly injected into a CSV report.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sullo/nikto/commit/e759b3300aace5314fe3d30800c8bd83c81c29f7)
2. [44899](https://www.exploit-db.com/exploits/44899/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26419, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26419 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26419
- **State**: PUBLISHED
- **Published Date**: December 11, 2020 at 17:17 UTC
- **Last Updated**: August 04, 2024 at 15:56 UTC
- **Reserved Date**: October 01, 2020 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.
### CVSS Metrics
- **CVSS Base Score**: 3.1/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L`
### Affected Products
**The Wireshark Foundation - Wireshark**
Affected versions:
- 3.4.0 (Status: affected)
### References
1. [](https://www.wireshark.org/security/wnpa-sec-2020-19.html)
2. [](https://gitlab.com/wireshark/wireshark/-/issues/17032)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-26419.json)
4. [GLSA-202101-12](https://security.gentoo.org/glsa/202101-12)
5. [FEDORA-2021-f3011da665](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YHWDZPWQJMLK64VFDWJC5SEGPNH6Y72Z/)
6. [FEDORA-2021-138674557c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/)
7. [](https://www.oracle.com/security-alerts/cpuApr2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3385, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3385 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3385
- **State**: PUBLISHED
- **Published Date**: October 14, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:56 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The scripting engine in Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS16-118](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-118)
2. [1036992](http://www.securitytracker.com/id/1036992)
3. [93397](http://www.securityfocus.com/bid/93397)
4. [20161011 Microsoft Internet Explorer VBScript Join/Filter Function Type Confusion Vulnerability](https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1229) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9145
- **State**: PUBLISHED
- **Published Date**: April 14, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 13:33 UTC
- **Reserved Date**: November 29, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Fiyo CMS 2.0.1.8 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in an edit action to dapur/index.php; (2) cat, (3) user, or (4) level parameter to dapur/apps/app_article/controller/article_list.php; or (5) email parameter in an email action or (6) username parameter in a user action to dapur/apps/app_user/controller/check_user.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/131165/FiyoCMS-2.0.1.8-XSS-SQL-Injection-URL-Bypass.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0286, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0286 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0286
- **State**: PUBLISHED
- **Published Date**: January 27, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 04:31 UTC
- **Reserved Date**: January 27, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in upgrade/index.php in OpenGoo 1.1, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the form_data[script_class] parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33421](http://www.securityfocus.com/bid/33421)
2. [7863](https://www.exploit-db.com/exploits/7863)
3. [51635](http://osvdb.org/51635) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24424, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24424 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24424
- **State**: PUBLISHED
- **Published Date**: October 21, 2020 at 20:53 UTC
- **Last Updated**: September 17, 2024 at 04:04 UTC
- **Reserved Date**: August 19, 2020 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Premiere Pro version 14.4 (and earlier) is affected by an uncontrolled search path element that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**Adobe - Premiere**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/premiere_pro/apsb20-64.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57933, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57933
- **State**: PUBLISHED
- **Published Date**: January 21, 2025 at 12:01 UTC
- **Last Updated**: May 04, 2025 at 10:06 UTC
- **Reserved Date**: January 19, 2025 at 11:50 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
gve: guard XSK operations on the existence of queues
This patch predicates the enabling and disabling of XSK pools on the
existence of queues. As it stands, if the interface is down, disabling
or enabling XSK pools would result in a crash, as the RX queue pointer
would be NULL. XSK pool registration will occur as part of the next
interface up.
Similarly, xsk_wakeup needs be guarded against queues disappearing
while the function is executing, so a check against the
GVE_PRIV_FLAGS_NAPI_ENABLED flag is added to synchronize with the
disabling of the bit and the synchronize_net() in gve_turndown.
### Affected Products
**Linux - Linux**
Affected versions:
- fd8e40321a12391e6f554cc637d0c4b6109682a9 (Status: affected)
- fd8e40321a12391e6f554cc637d0c4b6109682a9 (Status: affected)
- fd8e40321a12391e6f554cc637d0c4b6109682a9 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.4 (Status: affected)
- 0 (Status: unaffected)
- 6.6.70 (Status: unaffected)
- 6.12.9 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/771d66f2bd8c4dba1286a9163ab982cecd825718)
2. [](https://git.kernel.org/stable/c/8e8d7037c89437af12725f454e2eaf40e8166c0f)
3. [](https://git.kernel.org/stable/c/40338d7987d810fcaa95c500b1068a52b08eec9b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29387, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29387 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29387
- **State**: PUBLISHED
- **Published Date**: March 14, 2025 at 00:00 UTC
- **Last Updated**: March 17, 2025 at 18:34 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Tenda AC9 v1.0 V15.03.05.14_multi, the wanSpeed parameter of /goform/AdvSetMacMtuWan has a stack overflow vulnerability, which can lead to remote arbitrary code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/shuqi233/loophole/blob/main/Tenda%20AC9/AdvSetMacMtuWan2.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6913, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6913 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6913
- **State**: PUBLISHED
- **Published Date**: July 22, 2024 at 21:00 UTC
- **Last Updated**: February 13, 2025 at 17:58 UTC
- **Reserved Date**: July 19, 2024 at 09:00 UTC
- **Assigned By**: CyberDanube
### Vulnerability Description
Execution with unnecessary privileges in PerkinElmer ProcessPlus allows an attacker to spawn a remote shell on the windows system.This issue affects ProcessPlus: through 1.11.6507.0.
### Weakness Classification (CWE)
- CWE-250: Security Weakness
### Affected Products
**PerkinElmer - ProcessPlus**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/)
2. [](http://seclists.org/fulldisclosure/2024/Jul/13)
### Credits
- S. Dietz (CyberDanube)
- T. Weber (CyberDanube) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0562, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0562
- **State**: PUBLISHED
- **Published Date**: June 22, 2021 at 11:00 UTC
- **Last Updated**: August 03, 2024 at 15:47 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In RasterIntraUpdate of motion_est.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-176084648
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2021-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4440, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4440 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4440
- **State**: PUBLISHED
- **Published Date**: June 27, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 00:32 UTC
- **Reserved Date**: May 02, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
arch/x86/kvm/vmx.c in the Linux kernel through 4.6.3 mishandles the APICv on/off state, which allows guest OS users to obtain direct APIC MSR access on the host OS, and consequently cause a denial of service (host OS crash) or possibly execute arbitrary code on the host OS, via x2APIC mode.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1337806)
2. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ce424e45411cf5a13105e0386b6ecf6eeb4f66f)
3. [[oss-security] 20160520 CVE-2016-4440 Kernel: kvm: vmx: incorrect state update leading to MSR access](http://www.openwall.com/lists/oss-security/2016/05/20/2)
4. [](https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16197, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16197
- **State**: PUBLISHED
- **Published Date**: January 09, 2019 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 30, 2018 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier allows an attacker on the same network segment to bypass access restriction to access the information and files stored on the affected device.
### Affected Products
**Toshiba Lighting & Technology Corporation - Toshiba Home gateway HEM-GW16A and Toshiba Home gateway HEM-GW26A**
Affected versions:
- (Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier) (Status: affected)
### References
1. [JVN#99810718](https://jvn.jp/en/jp/JVN99810718/index.html)
2. [](http://www.tlt.co.jp/tlt/information/seihin/notice/defect/20181219/20181219.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5402, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5402 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5402
- **State**: PUBLISHED
- **Published Date**: February 27, 2020 at 19:30 UTC
- **Last Updated**: September 16, 2024 at 17:03 UTC
- **Reserved Date**: January 03, 2020 at 00:00 UTC
- **Assigned By**: pivotal
### Vulnerability Description
In Cloud Foundry UAA, versions prior to 74.14.0, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function when authenticating with external identity providers.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Cloud Foundry - UAA**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.cloudfoundry.org/blog/cve-2020-5402) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10878, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10878
- **State**: PUBLISHED
- **Published Date**: June 05, 2020 at 13:27 UTC
- **Last Updated**: August 04, 2024 at 11:14 UTC
- **Reserved Date**: March 23, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-202006-03](https://security.gentoo.org/glsa/202006-03)
2. [FEDORA-2020-fd73c08076](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/)
3. [openSUSE-SU-2020:0850](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html)
4. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
5. [](https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3)
6. [](https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod)
7. [](https://security.netapp.com/advisory/ntap-20200611-0001/)
8. [](https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8)
9. [](https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c)
10. [](https://www.oracle.com/security-alerts/cpujan2021.html)
11. [](https://www.oracle.com/security-alerts/cpuApr2021.html)
12. [](https://www.oracle.com//security-alerts/cpujul2021.html)
13. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
14. [](https://www.oracle.com/security-alerts/cpujan2022.html)
15. [](https://www.oracle.com/security-alerts/cpuapr2022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1520, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1520 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1520
- **State**: PUBLISHED
- **Published Date**: September 12, 2017 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 17:37 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM DB2 9.7, 10,1, 10.5, and 11.1 is vulnerable to an unauthorized command that allows the database to be activated when authentication type is CLIENT. IBM X-Force ID: 129830.
### Affected Products
**IBM - DB2 for Linux, UNIX and Windows**
Affected versions:
- 10.5 (Status: affected)
- 10.1 (Status: affected)
- 9.7 (Status: affected)
- 11.1 (Status: affected)
### References
1. [1039308](http://www.securitytracker.com/id/1039308)
2. [100684](http://www.securityfocus.com/bid/100684)
3. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/129830)
4. [](http://www.ibm.com/support/docview.wss?uid=swg22007186) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50195
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:14 UTC
- **Last Updated**: August 02, 2024 at 22:09 UTC
- **Reserved Date**: December 05, 2023 at 16:15 UTC
- **Assigned By**: zdi
### Vulnerability Description
Trimble SketchUp Viewer SKP File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of SKP files.
The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21799.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Trimble - SketchUp Viewer**
Affected versions:
- 22.0.354 (Status: affected)
### References
1. [ZDI-23-1845](https://www.zerodayinitiative.com/advisories/ZDI-23-1845/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56621, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56621 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56621
- **State**: PUBLISHED
- **Published Date**: December 27, 2024 at 14:51 UTC
- **Last Updated**: May 04, 2025 at 10:00 UTC
- **Reserved Date**: December 27, 2024 at 14:03 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: ufs: core: Cancel RTC work during ufshcd_remove()
Currently, RTC work is only cancelled during __ufshcd_wl_suspend(). When
ufshcd is removed in ufshcd_remove(), RTC work is not cancelled. Due to
this, any further trigger of the RTC work after ufshcd_remove() would
result in a NULL pointer dereference as below:
Unable to handle kernel NULL pointer dereference at virtual address 00000000000002a4
Workqueue: events ufshcd_rtc_work
Call trace:
_raw_spin_lock_irqsave+0x34/0x8c
pm_runtime_get_if_active+0x24/0xb4
ufshcd_rtc_work+0x124/0x19c
process_scheduled_works+0x18c/0x2d8
worker_thread+0x144/0x280
kthread+0x11c/0x128
ret_from_fork+0x10/0x20
Since RTC work accesses the ufshcd internal structures, it should be cancelled
when ufshcd is removed. So do that in ufshcd_remove(), as per the order in
ufshcd_init().
### Affected Products
**Linux - Linux**
Affected versions:
- 06701a545e9a3c4e007cff6872a074bf97c40619 (Status: affected)
- 6bf999e0eb41850d5c857102535d5c53b2ede224 (Status: affected)
- 6bf999e0eb41850d5c857102535d5c53b2ede224 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.8 (Status: affected)
- 0 (Status: unaffected)
- 6.12.5 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/57479e37d3f69efee2f0678568274db773284bc8)
2. [](https://git.kernel.org/stable/c/2e7a3bb0331efb292e0fb022c36bc592137f0520)
3. [](https://git.kernel.org/stable/c/1695c4361d35b7bdadd7b34f99c9c07741e181e5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2488, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2488 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2488
- **State**: PUBLISHED
- **Published Date**: November 13, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 04:21 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
It is possible for a malware application installed on an Android device to send local push notifications with an empty message to SAP Fiori Client and cause the application to crash. SAP Fiori Client version 1.11.5 in Google Play store addresses these issues and users must update to that version.
### Affected Products
**SAP - SAP Fiori Client**
Affected versions:
- < 1.11.5 (Status: affected)
### References
1. [](https://launchpad.support.sap.com/#/notes/2691126)
2. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14101
- **State**: PUBLISHED
- **Published Date**: July 30, 2020 at 11:40 UTC
- **Last Updated**: August 05, 2024 at 00:12 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Out of bounds read can happen in diag event set mask command handler when user provided length in the command request is less than expected length in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8096, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCN7605, QCS404, QCS405, QCS605, QM215, Rennell, SA415M, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8009, APQ8096, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCN7605, QCS404, QCS405, QCS605, QM215, Rennell, SA415M, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/july-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14092, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14092
- **State**: PUBLISHED
- **Published Date**: July 02, 2020 at 15:20 UTC
- **Last Updated**: August 04, 2024 at 12:39 UTC
- **Reserved Date**: June 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The CodePeople Payment Form for PayPal Pro plugin before 1.1.65 for WordPress allows SQL Injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.dwbooster.com/forms/payment-form-for-paypal-pro)
2. [](https://wordpress.org/plugins/payment-form-for-paypal-pro/#developers)
3. [](https://wpvulndb.com/vulnerabilities/10287) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32461, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32461
- **State**: PUBLISHED
- **Published Date**: April 09, 2025 at 00:00 UTC
- **Last Updated**: April 09, 2025 at 19:25 UTC
- **Reserved Date**: April 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
wikiplugin_includetpl in lib/wiki-plugins/wikiplugin_includetpl.php in Tiki before 28.3 mishandles input to an eval. The fixed versions are 21.12, 24.8, 27.2, and 28.3.
### CVSS Metrics
- **CVSS Base Score**: 9.9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-1336: Security Weakness
### Affected Products
**Tiki - Tiki**
Affected versions:
- 0 (Status: affected)
- 22 (Status: affected)
- 25 (Status: affected)
- 28 (Status: affected)
### References
1. [](https://tiki.org/article517)
2. [](https://tiki.org/article518)
3. [](https://gitlab.com/tikiwiki/tiki/-/commit/be8dc1aa220fbceb07a7a5dc36416243afccd358)
4. [](https://gitlab.com/tikiwiki/tiki/-/commit/801ed912390c2aa6caf12b7b953e200f5d4bc0b1)
5. [](https://gitlab.com/tikiwiki/tiki/-/commit/406bea4f6c379a23903ecfd55e538d90fd669ab0)
6. [](https://gitlab.com/tikiwiki/tiki/-/commit/9ffb4ab21bd86837370666ecd6afd868f3d7877a)
7. [](https://gitlab.com/tikiwiki/tiki/-/commit/f3f36c1ac702479209acfcaec5789d2fd1f996bc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41976
- **State**: PUBLISHED
- **Published Date**: October 08, 2021 at 15:15 UTC
- **Last Updated**: September 17, 2024 at 01:21 UTC
- **Reserved Date**: October 04, 2021 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
Tad Uploader edit book list function is vulnerable to authorization bypass, thus remote attackers can use the function to amend the folder names in the book list without logging in.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**Tad - Uploader**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-5175-a2f8d-1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2761, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2761
- **State**: PUBLISHED
- **Published Date**: April 23, 2025 at 16:47 UTC
- **Last Updated**: April 23, 2025 at 18:21 UTC
- **Reserved Date**: March 24, 2025 at 19:41 UTC
- **Assigned By**: zdi
### Vulnerability Description
GIMP FLI File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of FLI files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25100.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**GIMP - GIMP**
Affected versions:
- 2.10.38 (Status: affected)
### References
1. [ZDI-25-204](https://www.zerodayinitiative.com/advisories/ZDI-25-204/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6643, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6643 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6643
- **State**: PUBLISHED
- **Published Date**: April 08, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 21:36 UTC
- **Reserved Date**: April 08, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in the update_counter function in includes/functions.php in ClipBucket 2.6 allow remote attackers to execute arbitrary SQL commands via the time parameter to (1) videos.php or (2) channels.php. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [51321](http://www.securityfocus.com/bid/51321)
2. [](http://packetstormsecurity.org/files/108489/clipbucket-sqlxss.txt)
3. [clipbucket-multiple-xss(72245)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72245)
4. [78201](http://osvdb.org/78201)
5. [78202](http://osvdb.org/78202)
6. [47474](http://secunia.com/advisories/47474) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7601, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7601 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7601
- **State**: PUBLISHED
- **Published Date**: August 21, 2024 at 16:06 UTC
- **Last Updated**: August 21, 2024 at 20:08 UTC
- **Reserved Date**: August 08, 2024 at 00:16 UTC
- **Assigned By**: zdi
### Vulnerability Description
Logsign Unified SecOps Platform Directory data_export_delete_all Traversal Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability.
The specific flaw exists within the HTTP API service, which listens on TCP port 443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of root. Was ZDI-CAN-25026.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Logsign - Unified SecOps Platform**
Affected versions:
- 6.4.20 (Status: affected)
### References
1. [ZDI-24-1106](https://www.zerodayinitiative.com/advisories/ZDI-24-1106/)
2. [vendor-provided URL](https://support.logsign.net/hc/en-us/articles/20617133769362-06-08-2024-Version-6-4-23-Release-Notes) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2210, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2210 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2210
- **State**: PUBLISHED
- **Published Date**: November 13, 2019 at 19:47 UTC
- **Last Updated**: August 04, 2024 at 18:42 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In load_logging_config of qmi_vs_service.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-139148442
### Affected Products
**n/a - Android**
Affected versions:
- Android-9 Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2019-11-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13757, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13757
- **State**: PUBLISHED
- **Published Date**: June 01, 2020 at 18:17 UTC
- **Last Updated**: August 04, 2024 at 12:25 UTC
- **Reserved Date**: June 01, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sybrenstuvel/python-rsa/issues/146)
2. [](https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667)
3. [FEDORA-2020-253ebe55ff](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2KILTHBHNSDUCYV22ODLOKTICJJ7JQIQ/)
4. [FEDORA-2020-5ed5627d2b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYB65VNILRBTXL6EITQTH2PZPK7I23MW/)
5. [USN-4478-1](https://usn.ubuntu.com/4478-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4273, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4273 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4273
- **State**: PUBLISHED
- **Published Date**: August 18, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 14:46 UTC
- **Reserved Date**: August 09, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allows local users to create arbitrary directories and execute arbitrary code via a "crafted localized message file" that enables a format string attack, possibly involving the (1) OSSEMEMDBG or (2) TRC_LOG_FILE environment variable in db2licd (db2licm).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [db2-message-file-format-string(36106)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36106)
2. [](http://www-1.ibm.com/support/docview.wss?uid=swg21255607)
3. [20070818 Recent DB2 Vulnerabilities](http://www.attrition.org/pipermail/vim/2007-August/001765.html)
4. [ADV-2007-2912](http://www.vupen.com/english/advisories/2007/2912)
5. [20070816 IBM DB2 Universal Database Directory Creation Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=581)
6. [25339](http://www.securityfocus.com/bid/25339)
7. [](http://www-1.ibm.com/support/docview.wss?uid=swg21255352)
8. [1018581](http://securitytracker.com/id?1018581)
9. [26471](http://secunia.com/advisories/26471)
10. [IY98101](http://www-1.ibm.com/support/docview.wss?uid=swg1IY98101)
11. [IY98011](http://www-1.ibm.com/support/docview.wss?uid=swg1IY98011) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1313, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1313 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1313
- **State**: PUBLISHED
- **Published Date**: June 13, 2006 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 17:03 UTC
- **Reserved Date**: March 20, 2006 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft JScript 5.1, 5.5, and 5.6 on Windows 2000 SP4, and 5.6 on Windows XP, Server 2003, Windows 98 and Windows Me, will "release objects early" in certain cases, which results in memory corruption and allows remote attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:1785](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1785)
2. [oval:org.mitre.oval:def:1644](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1644)
3. [1016283](http://securitytracker.com/id?1016283)
4. [ms-jscript-code-execution(26805)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26805)
5. [ADV-2006-2321](http://www.vupen.com/english/advisories/2006/2321)
6. [TA06-164A](http://www.us-cert.gov/cas/techalerts/TA06-164A.html)
7. [oval:org.mitre.oval:def:1067](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1067)
8. [VU#390044](http://www.kb.cert.org/vuls/id/390044)
9. [26434](http://www.osvdb.org/26434)
10. [MS06-023](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-023)
11. [18359](http://www.securityfocus.com/bid/18359)
12. [oval:org.mitre.oval:def:2003](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2003)
13. [20620](http://secunia.com/advisories/20620) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21377, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21377 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21377
- **State**: PUBLISHED
- **Published Date**: March 23, 2021 at 15:25 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 22, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites. OMERO.web 5.9.0 adds URL validation before redirecting. External URLs are not considered valid, unless specified in the omero.web.redirect_allowed_hosts setting.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**ome - omero-web**
Affected versions:
- < 5.9.0 (Status: affected)
### References
1. [](https://pypi.org/project/omero-web/)
2. [](https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021)
3. [](https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c)
4. [](https://github.com/ome/omero-web/security/advisories/GHSA-g4rf-pc26-6hmr)
5. [](https://www.openmicroscopy.org/security/advisories/2021-SV2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1186, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1186 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1186
- **State**: PUBLISHED
- **Published Date**: June 05, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 18:53 UTC
- **Reserved Date**: February 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Integer overflow in the SyncImageProfiles function in profile.c in ImageMagick 6.7.5-8 and earlier allows remote attackers to cause a denial of service (infinite loop) via crafted IOP tag offsets in the IFD in an image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0248.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2012:0692](http://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html)
2. [49043](http://secunia.com/advisories/49043)
3. [DSA-2462](http://www.debian.org/security/2012/dsa-2462)
4. [51957](http://www.securityfocus.com/bid/51957)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1186)
6. [imagemagick-syncimageprofiles-dos(76139)](https://exchange.xforce.ibmcloud.com/vulnerabilities/76139)
7. [[oss-security] 20120319 Subject: CVE-2012-1185 / CVE-2012-1186 assignment notification - incomplete ImageMagick fixes for CVE-2012-0247 / CVE-2012-0248](http://www.openwall.com/lists/oss-security/2012/03/19/5)
8. [](http://trac.imagemagick.org/changeset/6998/ImageMagick/branches/ImageMagick-6.7.5/magick/profile.c)
9. [47926](http://secunia.com/advisories/47926)
10. [USN-1435-1](http://ubuntu.com/usn/usn-1435-1)
11. [48974](http://secunia.com/advisories/48974)
12. [49317](http://secunia.com/advisories/49317)
13. [80555](http://www.osvdb.org/80555) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10940, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10940 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10940
- **State**: PUBLISHED
- **Published Date**: May 09, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 07:54 UTC
- **Reserved Date**: May 09, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3676-1](https://usn.ubuntu.com/3676-1/)
2. [RHSA-2018:3083](https://access.redhat.com/errata/RHSA-2018:3083)
3. [[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html)
4. [USN-3695-1](https://usn.ubuntu.com/3695-1/)
5. [USN-3695-2](https://usn.ubuntu.com/3695-2/)
6. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9de4ee40547fd315d4a0ed1dd15a2fa3559ad707)
7. [[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html)
8. [[debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update](https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html)
9. [](https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.6)
10. [USN-3754-1](https://usn.ubuntu.com/3754-1/)
11. [[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package](https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html)
12. [RHSA-2018:2948](https://access.redhat.com/errata/RHSA-2018:2948)
13. [](https://github.com/torvalds/linux/commit/9de4ee40547fd315d4a0ed1dd15a2fa3559ad707)
14. [USN-3676-2](https://usn.ubuntu.com/3676-2/)
15. [104154](http://www.securityfocus.com/bid/104154)
16. [RHSA-2018:3096](https://access.redhat.com/errata/RHSA-2018:3096) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22750, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22750 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22750
- **State**: PUBLISHED
- **Published Date**: February 28, 2023 at 16:09 UTC
- **Last Updated**: March 07, 2025 at 20:47 UTC
- **Reserved Date**: January 06, 2023 at 15:24 UTC
- **Assigned By**: hpe
### Vulnerability Description
There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Hewlett Packard Enterprise (HPE) - Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central**
Affected versions:
- ArubaOS 8.6.x.x: 8.6.0.19 and below (Status: affected)
- ArubaOS 8.10.x.x: 8.10.0.4 and below (Status: affected)
- ArubaOS 10.3.x.x: 10.3.1.0 and below (Status: affected)
- SD-WAN 8.7.0.0-2.3.0.x: 8.7.0.0-2.3.0.8 and below (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt)
### Credits
- Erik de Jong (bugcrowd.com/erikdejong) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10897, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10897 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10897
- **State**: PUBLISHED
- **Published Date**: December 08, 2017 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 17:50 UTC
- **Reserved Date**: July 04, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Input validation issue in Buffalo BBR-4HG and and BBR-4MG broadband routers with firmware 1.00 to 1.48 and 2.00 to 2.07 allows an attacker to cause the device to become unresponsive via unspecified vectors.
### Affected Products
**BUFFALO INC. - BBR-4HG**
Affected versions:
- firmware 1.00 to 1.48 (Status: affected)
- firmware 2.00 to 2.07 (Status: affected)
**BUFFALO INC. - BBR-4MG**
Affected versions:
- firmware 1.00 to 1.48 (Status: affected)
- firmware 2.00 to 2.07 (Status: affected)
### References
1. [JVN#65994435](https://jvn.jp/en/jp/JVN65994435/index.html)
2. [](http://buffalo.jp/support_s/s20171201.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29747, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29747
- **State**: PUBLISHED
- **Published Date**: May 17, 2021 at 17:10 UTC
- **Last Updated**: September 17, 2024 at 00:01 UTC
- **Reserved Date**: March 31, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain highly sensitive information due to a vulnerability in the authentication mechanism. IBM X-Force ID: 201775.
### Affected Products
**IBM - InfoSphere Information Server**
Affected versions:
- 11.7 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6453437)
2. [ibm-infosphere-cve202129747-info-disc (201775)](https://exchange.xforce.ibmcloud.com/vulnerabilities/201775) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3776, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3776 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3776
- **State**: PUBLISHED
- **Published Date**: December 10, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 03:18 UTC
- **Reserved Date**: October 05, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SA:2011:003](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html)
2. [FEDORA-2010-18775](http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052022.html)
3. [](http://www.mozilla.org/security/announce/2010/mfsa2010-74.html)
4. [MDVSA-2010:258](http://www.mandriva.com/security/advisories?name=MDVSA-2010:258)
5. [MDVSA-2010:251](http://www.mandriva.com/security/advisories?name=MDVSA-2010:251)
6. [](http://support.avaya.com/css/P8/documents/100124650)
7. [](https://bugzilla.mozilla.org/show_bug.cgi?id=601699)
8. [RHSA-2010:0968](http://www.redhat.com/support/errata/RHSA-2010-0968.html)
9. [RHSA-2010:0966](http://www.redhat.com/support/errata/RHSA-2010-0966.html)
10. [USN-1019-1](http://www.ubuntu.com/usn/USN-1019-1)
11. [RHSA-2010:0969](http://www.redhat.com/support/errata/RHSA-2010-0969.html)
12. [](https://bugzilla.mozilla.org/show_bug.cgi?id=604843)
13. [42818](http://secunia.com/advisories/42818)
14. [oval:org.mitre.oval:def:12389](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12389)
15. [1024846](http://www.securitytracker.com/id?1024846)
16. [FEDORA-2010-18778](http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052220.html)
17. [DSA-2132](http://www.debian.org/security/2010/dsa-2132)
18. [1024848](http://www.securitytracker.com/id?1024848)
19. [FEDORA-2010-18920](http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052504.html)
20. [FEDORA-2010-18777](http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052110.html)
21. [ADV-2011-0030](http://www.vupen.com/english/advisories/2011/0030)
22. [RHSA-2010:0967](http://www.redhat.com/support/errata/RHSA-2010-0967.html)
23. [FEDORA-2010-18890](http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052502.html)
24. [](https://bugzilla.mozilla.org/show_bug.cgi?id=569162)
25. [](https://bugzilla.mozilla.org/show_bug.cgi?id=599166)
26. [](https://bugzilla.mozilla.org/show_bug.cgi?id=605307)
27. [](https://bugzilla.mozilla.org/show_bug.cgi?id=468563)
28. [42716](http://secunia.com/advisories/42716)
29. [USN-1020-1](http://www.ubuntu.com/usn/USN-1020-1)
30. [45347](http://www.securityfocus.com/bid/45347)
31. [](https://bugzilla.mozilla.org/show_bug.cgi?id=571995)
32. [FEDORA-2010-18773](http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052032.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1346, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1346 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1346
- **State**: PUBLISHED
- **Published Date**: April 28, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:44 UTC
- **Reserved Date**: April 28, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple Symantec AntiVirus products, including Norton AntiVirus 2005 11.0.0, Web Security Web Security 3.0.1.72, Mail Security for SMTP 4.0.5.66, AntiVirus Scan Engine 4.3.7.27, SAV/Filter for Domino NT 3.1.1.87, and Mail Security for Exchange 4.5.4.743, when running on Windows, allows remote attackers to cause a denial of service (component crash) and avoid detection via a crafted RAR file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://securityresponse.symantec.com/avcenter/security/Content/2005.04.27.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23721, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23721 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23721
- **State**: PUBLISHED
- **Published Date**: March 20, 2024 at 00:00 UTC
- **Last Updated**: August 28, 2024 at 14:33 UTC
- **Reserved Date**: January 20, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Directory Traversal issue was discovered in process_post on Draytek Vigor3910 4.3.2.5 devices. When sending a certain POST request, it calls the function and exports information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://draytek.com)
2. [](https://gist.github.com/rrrrrrri/8e9cac08eb4d9c01ab258bd5b0f8f7d8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25095, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25095 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25095
- **State**: PUBLISHED
- **Published Date**: July 06, 2023 at 14:53 UTC
- **Last Updated**: November 14, 2024 at 19:57 UTC
- **Reserved Date**: February 02, 2023 at 20:42 UTC
- **Assigned By**: talos
### Vulnerability Description
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the rule_name variable with two possible format strings that represent negated commands.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Milesight - UR32L**
Affected versions:
- v32.3.0.5 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716)
### Credits
- Discovered by Francesco Benvenuto of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34876
- **State**: PUBLISHED
- **Published Date**: January 13, 2022 at 21:43 UTC
- **Last Updated**: August 04, 2024 at 00:26 UTC
- **Reserved Date**: June 17, 2021 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14828.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Bentley - View**
Affected versions:
- 10.15.0.75 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1464/)
2. [](https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47561, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47561 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47561
- **State**: PUBLISHED
- **Published Date**: June 09, 2025 at 15:54 UTC
- **Last Updated**: June 09, 2025 at 17:23 UTC
- **Reserved Date**: May 07, 2025 at 09:40 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Incorrect Privilege Assignment vulnerability in RomanCode MapSVG allows Privilege Escalation. This issue affects MapSVG: from n/a through 8.5.34.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-266: Security Weakness
### Affected Products
**RomanCode - MapSVG**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/mapsvg/vulnerability/wordpress-mapsvg-8-5-34-privilege-escalation-vulnerability?_s_id=cve)
### Credits
- Anhchangmutrang (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9788, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9788 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9788
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 02, 2016 at 00:00 UTC
- **Assigned By**: isc
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0859
- **State**: PUBLISHED
- **Published Date**: April 13, 2010 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 01:06 UTC
- **Reserved Date**: March 03, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 11.5.10.2 ATG RUP6 allows remote attackers to affect confidentiality and integrity via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA10-103B](http://www.us-cert.gov/cas/techalerts/TA10-103B.html)
2. [1023859](http://www.securitytracker.com/id?1023859)
3. [39441](http://secunia.com/advisories/39441)
4. [](http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13397, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13397 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13397
- **State**: PUBLISHED
- **Published Date**: January 31, 2025 at 02:24 UTC
- **Last Updated**: January 31, 2025 at 16:53 UTC
- **Reserved Date**: January 14, 2025 at 17:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WPRadio – WordPress Radio Streaming Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpradio_player' shortcode in all versions up to, and including, 1.0.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**casterfm - WPRadio – WordPress Radio Streaming Plugin**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/f153174a-1226-4c16-ba8b-637be1d7e742?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/wpradio/trunk/Frontend/Frontend.php#L140)
### Credits
- zakaria |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3548, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3548 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3548
- **State**: PUBLISHED
- **Published Date**: July 29, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:50 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allow remote attackers to inject arbitrary web script or HTML via vectors that trigger an AJAX exception dialog.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20140721 Moodle security notifications public](http://openwall.com/lists/oss-security/2014/07/21/1)
2. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-45471)
3. [68766](http://www.securityfocus.com/bid/68766)
4. [](https://moodle.org/mod/forum/discuss.php?d=264270) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16040, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16040 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16040
- **State**: PUBLISHED
- **Published Date**: June 04, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 19:14 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
gfe-sass is a library for promises (CommonJS/Promises/A,B,D) gfe-sass downloads resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**HackerOne - gfe-sass node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/291) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6428, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6428 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6428
- **State**: PUBLISHED
- **Published Date**: December 18, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 07:22 UTC
- **Reserved Date**: August 17, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco DPQ3925 devices with EDVA r1 Base allow remote attackers to obtain sensitive information via a crafted HTTP request, aka Bug ID CSCuv03958.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [79594](http://www.securityfocus.com/bid/79594)
2. [20151217 Cisco Model DPQ3925 Wireless Residential Gateway Information Disclosure Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151217-gateway)
3. [1034487](http://www.securitytracker.com/id/1034487) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2392, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2392
- **State**: PUBLISHED
- **Published Date**: April 28, 2023 at 20:31 UTC
- **Last Updated**: August 02, 2024 at 06:19 UTC
- **Reserved Date**: April 28, 2023 at 11:48 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been classified as problematic. Affected is an unknown function of the file scgi-bin/platform.cgi?page=time_zone.htm of the component Web Management Interface. The manipulation of the argument ManualDate.minutes leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-227670 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 2.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Netgear - SRX5308**
Affected versions:
- 4.3.5-3 (Status: affected)
### References
1. [](https://vuldb.com/?id.227670)
2. [](https://vuldb.com/?ctiid.227670)
3. [](https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/12)
### Credits
- leetsun (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27003, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27003 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27003
- **State**: PUBLISHED
- **Published Date**: March 15, 2022 at 21:56 UTC
- **Last Updated**: September 12, 2024 at 12:53 UTC
- **Reserved Date**: March 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Totolink routers s X5000R V9.1.0u.6118_B20201102 and A7000R V9.1.0u.6115_B20201022 were discovered to contain a command injection vulnerability in the Tunnel 6rd function via the relay6rd parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wudipjq/my_vuln/blob/main/totolink/vuln_32/32.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9110, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9110 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9110
- **State**: PUBLISHED
- **Published Date**: May 21, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 16:55 UTC
- **Reserved Date**: May 21, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In OpenEXR 2.2.0, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.openwall.com/lists/oss-security/2017/05/12/5)
2. [](https://github.com/openexr/openexr/releases/tag/v2.2.1)
3. [](https://github.com/openexr/openexr/issues/232)
4. [](https://github.com/openexr/openexr/pull/233)
5. [USN-4148-1](https://usn.ubuntu.com/4148-1/)
6. [[debian-lts-announce] 20200830 [SECURITY] [DLA 2358-1] openexr security update](https://lists.debian.org/debian-lts-announce/2020/08/msg00056.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11785, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11785 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11785
- **State**: PUBLISHED
- **Published Date**: October 13, 2017 at 13:00 UTC
- **Last Updated**: September 17, 2024 at 02:32 UTC
- **Reserved Date**: July 31, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11765, CVE-2017-11784, and CVE-2017-11814.
### Affected Products
**Microsoft Corporation - Windows Kernel**
Affected versions:
- Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 (Status: affected)
### References
1. [1039526](http://www.securitytracker.com/id/1039526)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11785)
3. [43001](https://www.exploit-db.com/exploits/43001/)
4. [101149](http://www.securityfocus.com/bid/101149) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37759, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37759 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37759
- **State**: PUBLISHED
- **Published Date**: July 31, 2021 at 17:35 UTC
- **Last Updated**: August 04, 2024 at 01:30 UTC
- **Reserved Date**: July 31, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Session ID leak in the DEBUG log file in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.graylog.org/post/announcing-graylog-v4-1-2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42232, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42232 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42232
- **State**: PUBLISHED
- **Published Date**: August 07, 2024 at 15:14 UTC
- **Last Updated**: May 04, 2025 at 09:24 UTC
- **Reserved Date**: July 30, 2024 at 07:40 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
libceph: fix race between delayed_work() and ceph_monc_stop()
The way the delayed work is handled in ceph_monc_stop() is prone to
races with mon_fault() and possibly also finish_hunting(). Both of
these can requeue the delayed work which wouldn't be canceled by any of
the following code in case that happens after cancel_delayed_work_sync()
runs -- __close_session() doesn't mess with the delayed work in order
to avoid interfering with the hunting interval logic. This part was
missed in commit b5d91704f53e ("libceph: behave in mon_fault() if
cur_mon < 0") and use-after-free can still ensue on monc and objects
that hang off of it, with monc->auth and monc->monmap being
particularly susceptible to quickly being reused.
To fix this:
- clear monc->cur_mon and monc->hunting as part of closing the session
in ceph_monc_stop()
- bail from delayed_work() if monc->cur_mon is cleared, similar to how
it's done in mon_fault() and finish_hunting() (based on monc->hunting)
- call cancel_delayed_work_sync() after the session is closed
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.19.318 (Status: unaffected)
- 5.4.280 (Status: unaffected)
- 5.10.222 (Status: unaffected)
- 5.15.163 (Status: unaffected)
- 6.1.100 (Status: unaffected)
- 6.6.41 (Status: unaffected)
- 6.9.10 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/1177afeca833174ba83504688eec898c6214f4bf)
2. [](https://git.kernel.org/stable/c/63e5d035e3a7ab7412a008f202633c5e6a0a28ea)
3. [](https://git.kernel.org/stable/c/34b76d1922e41da1fa73d43b764cddd82ac9733c)
4. [](https://git.kernel.org/stable/c/20cf67dcb7db842f941eff1af6ee5e9dc41796d7)
5. [](https://git.kernel.org/stable/c/2d33654d40a05afd91ab24c9a73ab512a0670a9a)
6. [](https://git.kernel.org/stable/c/9525af1f58f67df387768770fcf6d6a8f23aee3d)
7. [](https://git.kernel.org/stable/c/33d38c5da17f8db2d80e811b7829d2822c10625e)
8. [](https://git.kernel.org/stable/c/69c7b2fe4c9cc1d3b1186d1c5606627ecf0de883) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23842, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23842 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23842
- **State**: PUBLISHED
- **Published Date**: July 26, 2023 at 14:53 UTC
- **Last Updated**: October 23, 2024 at 15:35 UTC
- **Reserved Date**: January 18, 2023 at 22:55 UTC
- **Assigned By**: SolarWinds
### Vulnerability Description
The SolarWinds Network Configuration Manager was susceptible to the Directory Traversal Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**SolarWinds - Network Configuration Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-23842)
2. [](https://documentation.solarwinds.com/en/success_center/ncm/content/release_notes/ncm_2023-3_release_notes.htm)
### Credits
- SolarWinds would like to thank Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative for reporting on the issue in a responsible manner. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2864, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2864 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2864
- **State**: PUBLISHED
- **Published Date**: August 26, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 02:46 UTC
- **Reserved Date**: July 27, 2010 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C6 of a certain file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1024361](http://www.securitytracker.com/id?1024361)
2. [](http://www.adobe.com/support/security/bulletins/apsb10-20.html)
3. [20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2864](http://www.securityfocus.com/archive/1/513334/100/0/threaded)
4. [oval:org.mitre.oval:def:11913](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913)
5. [ADV-2010-2176](http://www.vupen.com/english/advisories/2010/2176) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19262, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19262 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19262
- **State**: REJECTED
- **Published Date**: January 08, 2019 at 20:00 UTC
- **Last Updated**: January 08, 2019 at 19:57 UTC
- **Reserved Date**: November 13, 2018 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
No description available |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.