System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-39411, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-39411 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-39411
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 18:58 UTC
- **Last Updated**: May 19, 2025 at 21:22 UTC
- **Reserved Date**: April 16, 2025 at 06:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Indie_Plugins WhatsApp Click to Chat Plugin for WordPress.This issue affects WhatsApp Click to Chat Plugin for WordPress: from n/a through 2.2.12.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-98: Security Weakness
### Affected Products
**Indie_Plugins - WhatsApp Click to Chat Plugin for WordPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wpt-whatsapp/vulnerability/wordpress-whatsapp-click-to-chat-plugin-for-wordpress-plugin-2-2-12-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- Bonds (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2593, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2593 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2593
- **State**: PUBLISHED
- **Published Date**: August 12, 2014 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 23:08 UTC
- **Reserved Date**: June 29, 2011 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Integer overflow in the StartEpa method in the nsepacom ActiveX control (nsepa.exe) in Citrix Access Gateway Enterprise Edition Plug-in for Windows 9.x before 9.3-57.5 and 10.0 before 10.0-69.4 allows remote attackers to execute arbitrary code via a crafted Content-Length HTTP header, which triggers a heap-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45299](http://secunia.com/advisories/45299)
2. [](http://secunia.com/secunia_research/2012-26)
3. [](http://support.citrix.com/article/CTX134303)
4. [citrix-activex-bo(77317)](https://exchange.xforce.ibmcloud.com/vulnerabilities/77317) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1882, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1882 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1882
- **State**: PUBLISHED
- **Published Date**: April 26, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 04:54 UTC
- **Reserved Date**: February 19, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Multiple race conditions in IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 allow remote authenticated users to gain privileges by leveraging thread conflicts that result in Java code execution outside the context of the configured EJB Run-as user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [74222](http://www.securityfocus.com/bid/74222)
2. [1032190](http://www.securitytracker.com/id/1032190)
3. [PI33357](http://www-01.ibm.com/support/docview.wss?uid=swg1PI33357)
4. [](http://www-01.ibm.com/support/docview.wss?uid=swg21697368) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9260
- **State**: PUBLISHED
- **Published Date**: September 27, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 21:46 UTC
- **Reserved Date**: February 28, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Bluetooth, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113495295
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9189, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9189 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9189
- **State**: PUBLISHED
- **Published Date**: September 28, 2024 at 02:04 UTC
- **Last Updated**: September 30, 2024 at 15:45 UTC
- **Reserved Date**: September 25, 2024 at 20:38 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The EU/UK VAT Manager for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the alg_wc_eu_vat_exempt_vat_from_admin() function in all versions up to, and including, 2.12.12. This makes it possible for unauthenticated attackers to update the VAT status for any order.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**omardabbas - EU/UK VAT Manager for WooCommerce**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c6db680e-1fd4-420c-98f4-2b6dc5cf6781?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/eu-vat-for-woocommerce/tags/2.12.12/includes/class-alg-wc-eu-vat-ajax.php#L285)
3. [](https://plugins.trac.wordpress.org/changeset/3158296/)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20361, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20361 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20361
- **State**: PUBLISHED
- **Published Date**: May 22, 2024 at 16:54 UTC
- **Last Updated**: August 01, 2024 at 21:59 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Object Groups for Access Control Lists (ACLs) feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass configured access controls on managed devices that are running Cisco Firepower Threat Defense (FTD) Software. This vulnerability is due to the incorrect deployment of the Object Groups for ACLs feature from Cisco FMC Software to managed FTD devices in high-availability setups. After an affected device is rebooted following Object Groups for ACLs deployment, an attacker can exploit this vulnerability by sending traffic through the affected device. A successful exploit could allow the attacker to bypass configured access controls and successfully send traffic to devices that are expected to be protected by the affected device.
### CVSS Metrics
- **CVSS Base Score**: 5.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N`
### Affected Products
**Cisco - Cisco Firepower Management Center**
Affected versions:
- 7.1.0 (Status: affected)
- 7.1.0.1 (Status: affected)
- 7.1.0.2 (Status: affected)
- 7.1.0.3 (Status: affected)
- 7.2.0 (Status: affected)
- 7.2.1 (Status: affected)
- 7.2.2 (Status: affected)
- 7.2.0.1 (Status: affected)
- 7.2.3 (Status: affected)
- 7.2.3.1 (Status: affected)
- 7.3.0 (Status: affected)
- 7.3.1 (Status: affected)
**Cisco - Cisco Firepower Threat Defense Software**
Affected versions:
- N/A (Status: affected)
### References
1. [cisco-sa-fmc-object-bypass-fTH8tDjq](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-object-bypass-fTH8tDjq) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41911, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41911 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41911
- **State**: PUBLISHED
- **Published Date**: September 28, 2023 at 00:00 UTC
- **Last Updated**: September 23, 2024 at 19:29 UTC
- **Reserved Date**: September 05, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Samsung Mobile Processor Exynos 2200 allows a GPU Double Free (issue 1 of 2).
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:H/AV:L/A:H/C:N/I:N/PR:N/S:U/UI:R`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://semiconductor.samsung.com/support/quality-support/product-security-updates/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2706, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2706 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2706
- **State**: PUBLISHED
- **Published Date**: September 23, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:45 UTC
- **Reserved Date**: August 26, 2005 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Firefox before 1.0.7 and Mozilla before Suite 1.7.12 allows remote attackers to execute Javascript with chrome privileges via an about: page such as about:mozilla.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDKSA-2005:169](http://www.mandriva.com/security/advisories?name=MDKSA-2005:169)
2. [oval:org.mitre.oval:def:1443](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1443)
3. [DSA-868](http://www.debian.org/security/2005/dsa-868)
4. [ADV-2005-1824](http://www.vupen.com/english/advisories/2005/1824)
5. [FLSA-2006:168375](http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00004.html)
6. [SCOSA-2005.49](ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt)
7. [14920](http://www.securityfocus.com/bid/14920)
8. [19823](http://secunia.com/advisories/19823)
9. [15495](http://www.securityfocus.com/bid/15495)
10. [1014954](http://securitytracker.com/id?1014954)
11. [RHSA-2005:789](http://www.redhat.com/support/errata/RHSA-2005-789.html)
12. [oval:org.mitre.oval:def:11317](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11317)
13. [17026](http://secunia.com/advisories/17026)
14. [19648](http://www.osvdb.org/19648)
15. [RHSA-2005:791](http://www.redhat.com/support/errata/RHSA-2005-791.html)
16. [USN-200-1](http://www.ubuntu.com/usn/usn-200-1)
17. [17042](http://secunia.com/advisories/17042)
18. [DSA-866](http://www.debian.org/security/2005/dsa-866)
19. [mozilla-about-execute-code(22378)](https://exchange.xforce.ibmcloud.com/vulnerabilities/22378)
20. [](http://www.mozilla.org/security/announce/mfsa2005-58.html)
21. [17284](http://secunia.com/advisories/17284)
22. [17149](http://secunia.com/advisories/17149)
23. [17263](http://secunia.com/advisories/17263)
24. [16917](http://secunia.com/advisories/16917)
25. [DSA-838](http://www.debian.org/security/2005/dsa-838)
26. [17014](http://secunia.com/advisories/17014)
27. [RHSA-2005:785](http://www.redhat.com/support/errata/RHSA-2005-785.html)
28. [SUSE-SA:2005:058](http://www.novell.com/linux/security/advisories/2005_58_mozilla.html)
29. [SUSE-SA:2006:022](http://www.novell.com/linux/security/advisories/2006_04_25.html)
30. [MDKSA-2005:174](http://www.mandriva.com/security/advisories?name=MDKSA-2005:174)
31. [17090](http://secunia.com/advisories/17090)
32. [16911](http://secunia.com/advisories/16911)
33. [16977](http://secunia.com/advisories/16977)
34. [MDKSA-2005:170](http://www.mandriva.com/security/advisories?name=MDKSA-2005:170) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45150, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45150 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45150
- **State**: PUBLISHED
- **Published Date**: November 23, 2022 at 00:00 UTC
- **Last Updated**: April 25, 2025 at 19:29 UTC
- **Reserved Date**: November 11, 2022 at 00:00 UTC
- **Assigned By**: fedora
### Vulnerability Description
A reflected cross-site scripting vulnerability was discovered in Moodle. This flaw exists due to insufficient sanitization of user-supplied data in policy tool. An attacker can trick the victim to open a specially crafted link that executes an arbitrary HTML and script code in user's browser in context of vulnerable website. This vulnerability may allow an attacker to perform cross-site scripting (XSS) attacks to gain access potentially sensitive information and modification of web pages.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - Moodle**
Affected versions:
- Fixed in moodle 4.0.5, moodle 3.11.11, moodle 3.9.18 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2142773)
2. [](https://moodle.org/mod/forum/discuss.php?d=440770)
3. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76091)
4. [FEDORA-2022-f7fdcb1820](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/)
5. [FEDORA-2022-cb7084ae1c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/)
6. [FEDORA-2022-74a9c8e95f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-5256, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-5256 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-5256
- **State**: PUBLISHED
- **Published Date**: February 12, 2013 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 19:09 UTC
- **Reserved Date**: February 12, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the tooltips in LimeSurvey before 1.91+ Build 11379-20111116, when viewing survey results, allows remote attackers to inject arbitrary web script or HTML via unknown parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://limesurvey.svn.sourceforge.net/viewvc/limesurvey/source/limesurvey/docs/release_notes.txt?view=markup)
2. [46831](http://secunia.com/advisories/46831) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10353, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10353 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10353
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: May 02, 2017 at 00:00 UTC
- **Assigned By**: elastic
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0336
- **State**: PUBLISHED
- **Published Date**: January 15, 2010 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 04:03 UTC
- **Reserved Date**: January 15, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the kiddog_mysqldumper (kiddog_mysqldumper) extension 0.0.3 and earlier for TYPO3 allows remote attackers to obtain sensitive information via unknown attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-021/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38460, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38460
- **State**: PUBLISHED
- **Published Date**: September 23, 2022 at 14:27 UTC
- **Last Updated**: February 20, 2025 at 20:03 UTC
- **Reserved Date**: September 08, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in NOTICE BOARD plugin <= 1.1 at WordPress.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Jitendriya Tripathy - NOTICE BOARD (WordPress plugin)**
Affected versions:
- <= 1.1 (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/notice-board/wordpress-notice-board-plugin-1-1-authenticated-stored-cross-site-scripting-xss-vulnerability/_s_id=cve)
2. [](https://wordpress.org/plugins/notice-board/)
### Credits
- Vulnerability discovered by Ngo Van Thien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40960, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40960 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40960
- **State**: PUBLISHED
- **Published Date**: July 12, 2024 at 12:32 UTC
- **Last Updated**: May 04, 2025 at 09:18 UTC
- **Reserved Date**: July 12, 2024 at 12:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ipv6: prevent possible NULL dereference in rt6_probe()
syzbot caught a NULL dereference in rt6_probe() [1]
Bail out if __in6_dev_get() returns NULL.
[1]
Oops: general protection fault, probably for non-canonical address 0xdffffc00000000cb: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000658-0x000000000000065f]
CPU: 1 PID: 22444 Comm: syz-executor.0 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
RIP: 0010:rt6_probe net/ipv6/route.c:656 [inline]
RIP: 0010:find_match+0x8c4/0xf50 net/ipv6/route.c:758
Code: 14 fd f7 48 8b 85 38 ff ff ff 48 c7 45 b0 00 00 00 00 48 8d b8 5c 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 19
RSP: 0018:ffffc900034af070 EFLAGS: 00010203
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90004521000
RDX: 00000000000000cb RSI: ffffffff8990d0cd RDI: 000000000000065c
RBP: ffffc900034af150 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000002 R12: 000000000000000a
R13: 1ffff92000695e18 R14: ffff8880244a1d20 R15: 0000000000000000
FS: 00007f4844a5a6c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b31b27000 CR3: 000000002d42c000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
rt6_nh_find_match+0xfa/0x1a0 net/ipv6/route.c:784
nexthop_for_each_fib6_nh+0x26d/0x4a0 net/ipv4/nexthop.c:1496
__find_rr_leaf+0x6e7/0xe00 net/ipv6/route.c:825
find_rr_leaf net/ipv6/route.c:853 [inline]
rt6_select net/ipv6/route.c:897 [inline]
fib6_table_lookup+0x57e/0xa30 net/ipv6/route.c:2195
ip6_pol_route+0x1cd/0x1150 net/ipv6/route.c:2231
pol_lookup_func include/net/ip6_fib.h:616 [inline]
fib6_rule_lookup+0x386/0x720 net/ipv6/fib6_rules.c:121
ip6_route_output_flags_noref net/ipv6/route.c:2639 [inline]
ip6_route_output_flags+0x1d0/0x640 net/ipv6/route.c:2651
ip6_dst_lookup_tail.constprop.0+0x961/0x1760 net/ipv6/ip6_output.c:1147
ip6_dst_lookup_flow+0x99/0x1d0 net/ipv6/ip6_output.c:1250
rawv6_sendmsg+0xdab/0x4340 net/ipv6/raw.c:898
inet_sendmsg+0x119/0x140 net/ipv4/af_inet.c:853
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
sock_write_iter+0x4b8/0x5c0 net/socket.c:1160
new_sync_write fs/read_write.c:497 [inline]
vfs_write+0x6b6/0x1140 fs/read_write.c:590
ksys_write+0x1f8/0x260 fs/read_write.c:643
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
### Affected Products
**Linux - Linux**
Affected versions:
- 52e1635631b342803aecaf81a362c1464e3da2e5 (Status: affected)
- 52e1635631b342803aecaf81a362c1464e3da2e5 (Status: affected)
- 52e1635631b342803aecaf81a362c1464e3da2e5 (Status: affected)
- 52e1635631b342803aecaf81a362c1464e3da2e5 (Status: affected)
- 52e1635631b342803aecaf81a362c1464e3da2e5 (Status: affected)
- 52e1635631b342803aecaf81a362c1464e3da2e5 (Status: affected)
- 52e1635631b342803aecaf81a362c1464e3da2e5 (Status: affected)
- 52e1635631b342803aecaf81a362c1464e3da2e5 (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.17 (Status: affected)
- 0 (Status: unaffected)
- 4.19.317 (Status: unaffected)
- 5.4.279 (Status: unaffected)
- 5.10.221 (Status: unaffected)
- 5.15.162 (Status: unaffected)
- 6.1.96 (Status: unaffected)
- 6.6.36 (Status: unaffected)
- 6.9.7 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/f0cda984e4e634b221dbf9642b8ecc5b4806b41e)
2. [](https://git.kernel.org/stable/c/d66fc4826127c82f99c4033380f8e93833d331c7)
3. [](https://git.kernel.org/stable/c/1ed9849fdf9a1a617129346b11d2094ca26828dc)
4. [](https://git.kernel.org/stable/c/569c9d9ea6648d099187527b93982f406ddcebc0)
5. [](https://git.kernel.org/stable/c/51ee2f7c30790799d0ec30c0ce0c743e58f046f2)
6. [](https://git.kernel.org/stable/c/73e7c8ca6ad76f29b2c99c20845a6f3b203ff0c6)
7. [](https://git.kernel.org/stable/c/6eed6d3cd19ff3cfa83aeceed86da14abaf7417b)
8. [](https://git.kernel.org/stable/c/b86762dbe19a62e785c189f313cda5b989931f37) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21310, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21310
- **State**: PUBLISHED
- **Published Date**: October 30, 2023 at 16:56 UTC
- **Last Updated**: August 02, 2024 at 09:36 UTC
- **Reserved Date**: November 03, 2022 at 22:37 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Bluetooth, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
### References
1. [](https://source.android.com/docs/security/bulletin/android-14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1829, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1829 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1829
- **State**: PUBLISHED
- **Published Date**: June 02, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:06 UTC
- **Reserved Date**: June 02, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft Internet Explorer 6 SP2 allows remote attackers to cause a denial of service (infinite loop and application crash) via two embedded files that call each other.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050528 Microsoft Internet Explorer - Crash on processing embedded files with endless loop (05/28/2005)](http://marc.info/?l=bugtraq&m=111746441220149&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7055, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7055 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7055
- **State**: PUBLISHED
- **Published Date**: December 11, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 07:36 UTC
- **Reserved Date**: September 16, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
AppleMobileFileIntegrity in Apple iOS before 9.2 and tvOS before 9.1 does not prevent changes to access-control structures, which allows attackers to execute arbitrary code in a privileged context via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT205635)
2. [1034348](http://www.securitytracker.com/id/1034348)
3. [APPLE-SA-2015-12-08-1](http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html)
4. [](https://support.apple.com/HT205640)
5. [APPLE-SA-2015-12-08-2](http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2135
- **State**: PUBLISHED
- **Published Date**: May 08, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:06 UTC
- **Reserved Date**: February 25, 2014 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Buffer overflow in Cisco Advanced Recording Format (ARF) player T27 LD before SP32 EP16, T28 before T28.12, and T29 before T29.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted .arf file, aka Bug IDs CSCul87216 and CSCuj07603.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20140507 Multiple Vulnerabilities in the Cisco WebEx Recording Format and Advanced Recording Format Players](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140507-webex) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6017, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6017
- **State**: PUBLISHED
- **Published Date**: November 16, 2023 at 16:07 UTC
- **Last Updated**: August 02, 2024 at 08:21 UTC
- **Reserved Date**: November 08, 2023 at 09:12 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
H2O included a reference to an S3 bucket that no longer existed allowing an attacker to take over the S3 bucket URL.
### Weakness Classification (CWE)
- CWE-840: Security Weakness
### Affected Products
**h2oai - h2oai/h2o-3**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/6a69952f-a1ba-4dee-9d8c-e87f52508b58) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28391, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28391 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28391
- **State**: PUBLISHED
- **Published Date**: January 12, 2021 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 16:33 UTC
- **Reserved Date**: November 10, 2020 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-200RNA switch family (All versions < V3.2.7). Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic.
### Weakness Classification (CWE)
- CWE-321: Security Weakness
### Affected Products
**Siemens - SCALANCE X-200 switch family (incl. SIPLUS NET variants)**
Affected versions:
- All versions < V5.2.5 (Status: affected)
**Siemens - SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)**
Affected versions:
- All versions < V5.5.0 (Status: affected)
**Siemens - SCALANCE X-200RNA switch family**
Affected versions:
- All versions < V3.2.7 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf)
2. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-012-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34319, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34319
- **State**: PUBLISHED
- **Published Date**: July 13, 2021 at 11:03 UTC
- **Last Updated**: August 04, 2024 at 00:05 UTC
- **Reserved Date**: June 08, 2021 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The BMP_loader.dll library in affected applications lacks proper validation of user-supplied data when parsing SGI files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13404)
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Siemens - JT2Go**
Affected versions:
- All versions < V13.2 (Status: affected)
**Siemens - Teamcenter Visualization**
Affected versions:
- All versions < V13.2 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-855/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41672, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41672 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41672
- **State**: PUBLISHED
- **Published Date**: July 24, 2024 at 17:47 UTC
- **Last Updated**: August 02, 2024 at 04:46 UTC
- **Reserved Date**: July 18, 2024 at 15:21 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
DuckDB is a SQL database management system. In versions 1.0.0 and prior, content in filesystem is accessible for reading using `sniff_csv`, even with `enable_external_access=false`. This vulnerability provides an attacker with access to filesystem even when access is expected to be disabled and other similar functions do NOT provide access. There seem to be two vectors to this vulnerability. First, access to files that should otherwise not be allowed. Second, the content from a file can be read (e.g. `/etc/hosts`, `proc/self/environ`, etc) even though that doesn't seem to be the intent of the sniff_csv function. A fix for this issue is available in commit c9b7c98aa0e1cd7363fe8bb8543a95f38e980d8a and is expected to be part of version 1.1.0.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**duckdb - duckdb**
Affected versions:
- <= 1.0.0 (Status: affected)
### References
1. [https://github.com/duckdb/duckdb/security/advisories/GHSA-w2gf-jxc9-pf2q](https://github.com/duckdb/duckdb/security/advisories/GHSA-w2gf-jxc9-pf2q)
2. [https://github.com/duckdb/duckdb/pull/13133](https://github.com/duckdb/duckdb/pull/13133)
3. [https://github.com/duckdb/duckdb/commit/c9b7c98aa0e1cd7363fe8bb8543a95f38e980d8a](https://github.com/duckdb/duckdb/commit/c9b7c98aa0e1cd7363fe8bb8543a95f38e980d8a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0790, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0790 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0790
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: January 06, 2021 at 16:15 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36324, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36324 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36324
- **State**: PUBLISHED
- **Published Date**: November 12, 2021 at 22:15 UTC
- **Last Updated**: September 16, 2024 at 18:13 UTC
- **Reserved Date**: July 08, 2021 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Dell - CPG BIOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000192967) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3814, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3814 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3814
- **State**: PUBLISHED
- **Published Date**: November 26, 2005 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 23:24 UTC
- **Reserved Date**: November 26, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in SmartPPC Pro allow remote attackers to inject arbitrary web script or HTML via the username parameter in (1) directory.php, (2) frames.php, and (3) search.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://nightmaresecurity.net/index.php?showtopic=1015)
2. [](http://www.addict3d.org/index.php?page=viewarticle&type=security&ID=5359)
3. [1015259](http://securitytracker.com/id?1015259)
4. [ADV-2005-2581](http://www.vupen.com/english/advisories/2005/2581)
5. [15567](http://www.securityfocus.com/bid/15567)
6. [21092](http://www.osvdb.org/21092)
7. [17736](http://secunia.com/advisories/17736)
8. [21091](http://www.osvdb.org/21091)
9. [21090](http://www.osvdb.org/21090) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40603, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40603 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40603
- **State**: PUBLISHED
- **Published Date**: June 12, 2024 at 09:51 UTC
- **Last Updated**: August 14, 2024 at 16:24 UTC
- **Reserved Date**: August 17, 2023 at 10:47 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Gangesh Matta Simple Org Chart.This issue affects Simple Org Chart: from n/a through 2.3.4.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Gangesh Matta - Simple Org Chart**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/simple-org-chart/wordpress-simple-org-chart-plugin-2-3-4-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5068, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5068 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5068
- **State**: PUBLISHED
- **Published Date**: June 24, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 06:32 UTC
- **Reserved Date**: June 24, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
XML external entity (XXE) vulnerability in SAP Mobile Platform 3 allows remote attackers to read arbitrary files or possibly have other unspecified impact via a crafted XML request, aka SAP Security Note 2159601.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/133514/SAP-Mobile-Platform-3-XXE-Injection.html)
2. [75166](http://www.securityfocus.com/bid/75166)
3. [](https://erpscan.io/advisories/erpscan-15-014-sap-mobile-platform-3-xxe-in-add-repository/)
4. [](http://scn.sap.com/community/security/blog/2015/06/11/sap-security-notes-june-2015)
5. [20150910 [ERPSCAN-15-014] SAP Mobile Platform 3 - XXE in Add Repository](http://seclists.org/fulldisclosure/2015/Sep/36) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0108, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0108 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0108
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15400, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15400
- **State**: PUBLISHED
- **Published Date**: February 07, 2018 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 19:57 UTC
- **Reserved Date**: October 17, 2017 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient restriction of IPP filters in CUPS in Google Chrome OS prior to 62.0.3202.74 allowed a remote attacker to execute a command with the same privileges as the cups daemon via a crafted PPD file, aka a printer zeroconfig CRLF issue.
### Affected Products
**n/a - Google Chrome OS prior to 62.0.3202.74**
Affected versions:
- Google Chrome OS prior to 62.0.3202.74 (Status: affected)
### References
1. [DSA-4243](https://www.debian.org/security/2018/dsa-4243)
2. [](https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-chrome-os_27.html)
3. [](https://crbug.com/777215)
4. [GLSA-201908-08](https://security.gentoo.org/glsa/201908-08) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0505, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0505 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0505
- **State**: PUBLISHED
- **Published Date**: October 12, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:21 UTC
- **Reserved Date**: June 08, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple memory leaks in Microsoft Services for Unix 2.0 allow remote attackers to cause a denial of service (memory exhaustion) via a large number of malformed requests to (1) the Telnet service, or (2) the NFS service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [sfu-nfs-dos(6882)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6882)
2. [VU#994851](http://www.kb.cert.org/vuls/id/994851)
3. [VU#581603](http://www.kb.cert.org/vuls/id/581603)
4. [sfu-telnet-dos(6883)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6883)
5. [MS01-039](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-039)
6. [3089](http://www.securityfocus.com/bid/3089) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43224
- **State**: PUBLISHED
- **Published Date**: December 15, 2021 at 14:15 UTC
- **Last Updated**: August 04, 2024 at 03:55 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Common Log File System Driver Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43224) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5822, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5822 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5822
- **State**: PUBLISHED
- **Published Date**: April 03, 2018 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 22:09 UTC
- **Reserved Date**: January 19, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, compromised WLAN FW can potentially cause a buffer overwrite.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2018-04-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0942, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0942
- **State**: PUBLISHED
- **Published Date**: May 16, 2019 at 18:17 UTC
- **Last Updated**: August 04, 2024 at 17:59 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists in the Unified Write Filter (UWF) feature for Windows 10 when it improperly restricts access to the registry, aka 'Unified Write Filter Elevation of Privilege Vulnerability'.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 10 Version 1703 for 32-bit Systems (Status: affected)
- 10 Version 1703 for x64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0942) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36887, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36887 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36887
- **State**: PUBLISHED
- **Published Date**: July 27, 2022 at 14:22 UTC
- **Last Updated**: August 03, 2024 at 10:14 UTC
- **Reserved Date**: July 27, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A cross-site request forgery (CSRF) vulnerability in Jenkins Job Configuration History Plugin 1155.v28a_46a_cc06a_5 and earlier allows attackers to delete entries from job, agent, and system configuration history, or restore older versions of job, agent, and system configurations.
### Affected Products
**Jenkins project - Jenkins Job Configuration History Plugin**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2766)
2. [[oss-security] 20220727 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/07/27/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7000, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7000 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7000
- **State**: PUBLISHED
- **Published Date**: October 13, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 01:50 UTC
- **Reserved Date**: August 23, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036986](http://www.securitytracker.com/id/1036986)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb16-33.html)
3. [93496](http://www.securityfocus.com/bid/93496) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3122
- **State**: PUBLISHED
- **Published Date**: February 07, 2021 at 19:45 UTC
- **Last Updated**: August 03, 2024 at 16:45 UTC
- **Reserved Date**: January 11, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rdf2.alohaenterprise.com/client/CMCInst.zip)
2. [](https://www.tetradefense.com/incident-response-services/active-exploit-a-remote-code-execution-rce-vulnerability-for-ncr-aloha-point-of-sale/)
3. [](https://github.com/roughb8722/CVE-2021-3122-Details/blob/main/CVE-2021-3122) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29843, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29843
- **State**: PUBLISHED
- **Published Date**: April 14, 2024 at 23:48 UTC
- **Last Updated**: August 02, 2024 at 01:17 UTC
- **Reserved Date**: March 21, 2024 at 00:52 UTC
- **Assigned By**: directcyber
### Vulnerability Description
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on MOBILE_GET_USERS_LIST, allowing for an unauthenticated attacker to enumerate all users and their access levels
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
- CWE-284: Security Weakness
### Affected Products
**CS Technologies Australia - Evolution Controller**
Affected versions:
- 2.x (Status: affected)
### References
1. [](https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7698, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7698 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7698
- **State**: PUBLISHED
- **Published Date**: May 10, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 16:12 UTC
- **Reserved Date**: April 11, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Use After Free in the pdf2swf part of swftools 0.9.2 and earlier allows remote attackers to execute arbitrary code via a malformed PDF document, possibly a consequence of an error in Gfx.cc in Xpdf 3.02.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/matthiaskramm/swftools/pull/19) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48233, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48233 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48233
- **State**: PUBLISHED
- **Published Date**: November 16, 2023 at 22:55 UTC
- **Last Updated**: February 13, 2025 at 17:18 UTC
- **Reserved Date**: November 13, 2023 at 13:25 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `ac6378773` which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 2.8/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**vim - vim**
Affected versions:
- < 9.0.2108 (Status: affected)
### References
1. [https://github.com/vim/vim/security/advisories/GHSA-3xx4-hcq6-r2vj](https://github.com/vim/vim/security/advisories/GHSA-3xx4-hcq6-r2vj)
2. [https://github.com/vim/vim/commit/ac63787734fda2e294e477af52b3bd601517fa78](https://github.com/vim/vim/commit/ac63787734fda2e294e477af52b3bd601517fa78)
3. [](http://www.openwall.com/lists/oss-security/2023/11/16/1)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/)
6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/)
7. [](https://security.netapp.com/advisory/ntap-20231227-0003/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8538
- **State**: PUBLISHED
- **Published Date**: October 29, 2014 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 00:25 UTC
- **Reserved Date**: October 29, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Hijab Modern (aka com.Aisyaidea.HijabModern) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#200313](http://www.kb.cert.org/vuls/id/200313)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21818, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21818
- **State**: PUBLISHED
- **Published Date**: July 16, 2021 at 10:24 UTC
- **Last Updated**: August 03, 2024 at 18:23 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A hard-coded password vulnerability exists in the Zebra IP Routing Manager functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to a denial of service. An attacker can send a sequence of requests to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-259: Security Weakness
### Affected Products
**n/a - D-Link**
Affected versions:
- D-LINK DIR-3040 1.13B03 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1283) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35703, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35703 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35703
- **State**: PUBLISHED
- **Published Date**: January 08, 2024 at 14:48 UTC
- **Last Updated**: February 13, 2025 at 16:55 UTC
- **Reserved Date**: June 15, 2023 at 13:56 UTC
- **Assigned By**: talos
### Vulnerability Description
Multiple stack-based buffer overflow vulnerabilities exist in the FST LEB128 varint functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the fstReaderVarint64 function.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**GTKWave - GTKWave**
Affected versions:
- 3.3.115 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783)
2. [](https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html)
### Credits
- Discovered by Claudio Bozzato of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25059
- **State**: PUBLISHED
- **Published Date**: August 31, 2020 at 20:47 UTC
- **Last Updated**: August 04, 2024 at 15:26 UTC
- **Reserved Date**: August 31, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 software. A service crash may occur because of incorrect input validation. The LG ID is LVE-SMP-200013 (July 2020).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://lgsecurity.lge.com/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1787, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1787 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1787
- **State**: PUBLISHED
- **Published Date**: January 09, 2020 at 16:44 UTC
- **Last Updated**: August 04, 2024 at 06:46 UTC
- **Reserved Date**: November 29, 2019 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
HUAWEI Mate 20 smartphones versions earlier than 9.1.0.139(C00E133R3P1) have an improper authentication vulnerability. The system has a logic error under certain scenario, successful exploit could allow the attacker who gains the privilege of guest user to access to the host user's desktop in an instant, without unlocking the screen lock of the host user.
### Affected Products
**Huawei - HUAWEI Mate 20**
Affected versions:
- Versions earlier than 9.1.0.139(C00E133R3P1) (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-02-smartphone-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12212, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12212 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12212
- **State**: PUBLISHED
- **Published Date**: March 14, 2019 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 22:15 UTC
- **Reserved Date**: June 11, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Buffer overflow in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.
### Affected Products
**Intel Corporation - Intel(R) Graphics Driver for Windows**
Affected versions:
- Multiple versions. (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html)
2. [](https://support.lenovo.com/us/en/product_security/LEN-25084) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41219
- **State**: PUBLISHED
- **Published Date**: November 05, 2021 at 20:50 UTC
- **Last Updated**: August 04, 2024 at 03:08 UTC
- **Reserved Date**: September 15, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an open source platform for machine learning. In affected versions the code for sparse matrix multiplication is vulnerable to undefined behavior via binding a reference to `nullptr`. This occurs whenever the dimensions of `a` or `b` are 0 or less. In the case on one of these is 0, an empty output tensor should be allocated (to conserve the invariant that output tensors are always allocated when the operation is successful) but nothing should be written to it (that is, we should return early from the kernel implementation). Otherwise, attempts to write to this empty tensor would result in heap OOB access. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-824: Security Weakness
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- >= 2.6.0, < 2.6.1 (Status: affected)
- >= 2.5.0, < 2.5.2 (Status: affected)
- < 2.4.4 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4f99-p9c2-3j8x)
2. [](https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34772, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34772 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34772
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 10:03 UTC
- **Last Updated**: August 02, 2024 at 02:59 UTC
- **Reserved Date**: May 08, 2024 at 14:32 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 4). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Siemens - Solid Edge**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-589937.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3841, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3841
- **State**: PUBLISHED
- **Published Date**: July 25, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 18:48 UTC
- **Reserved Date**: July 25, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in WebScarab before 20060718-1904, when used with Microsoft Internet Explorer 6 SP2 or Konqueror 3.5.3, allows remote attackers to inject arbitrary web script or HTML via the URL, which is not sanitized before being returned in an error message when WebScarab is not able to access the URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1276](http://securityreason.com/securityalert/1276)
2. [19063](http://www.securityfocus.com/bid/19063)
3. [20060718 WebScarab <= 20060621-0003 cross site scripting](http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047995.html)
4. [](http://moritz-naumann.com/adv/0012/webscarabxss/0012.txt)
5. [20060718 WebScarab <= 20060621-0003 cross site scripting](http://www.securityfocus.com/archive/1/440441/100/0/threaded)
6. [webscarab-uri-xss(27797)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27797)
7. [ADV-2006-2878](http://www.vupen.com/english/advisories/2006/2878)
8. [21114](http://secunia.com/advisories/21114) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20632, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20632 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20632
- **State**: PUBLISHED
- **Published Date**: March 24, 2020 at 18:14 UTC
- **Last Updated**: August 05, 2024 at 02:46 UTC
- **Reserved Date**: March 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid pointer dereference in gf_odf_delete_descriptor in odf/desc_private.c that can cause a denial of service via a crafted MP4 file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gpac/gpac/issues/1271) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49242, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49242 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49242
- **State**: PUBLISHED
- **Published Date**: October 16, 2024 at 13:39 UTC
- **Last Updated**: October 16, 2024 at 14:16 UTC
- **Reserved Date**: October 14, 2024 at 10:39 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in Shafiq Digital Lottery allows Upload a Web Shell to a Web Server.This issue affects Digital Lottery: from n/a through 3.0.5.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Shafiq - Digital Lottery**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/digital-lottery/wordpress-digital-lottery-plugin-3-0-5-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- stealthcopter (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0550, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0550
- **State**: PUBLISHED
- **Published Date**: June 11, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:56 UTC
- **Reserved Date**: June 07, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Dynamic Guestbook 3.0 allows remote attackers to execute arbitrary code via shell metacharacters in the gbdaten parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [dynamic-guestbook-command-execution(8762)](http://www.iss.net/security_center/static/8762.php)
2. [20020403 Dynamic Guestbook V3.0 Cross Site Scripting and Arbitrary Command Execution under certain circumstances](http://archives.neohapsis.com/archives/bugtraq/2002-04/0052.html)
3. [4423](http://www.securityfocus.com/bid/4423) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1063, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1063
- **State**: PUBLISHED
- **Published Date**: February 28, 2008 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 08:08 UTC
- **Reserved Date**: February 28, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability index.php in the XM-Memberstats (xmmemberstats) module for XOOPS allows remote attackers to inject arbitrary web script or HTML via the sortby parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [xmmemberstats-sortby-xss(41001)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41001)
2. [](http://www.xssing.com/index.php?x=3&y=12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4103, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4103 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4103
- **State**: PUBLISHED
- **Published Date**: November 28, 2009 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 18:48 UTC
- **Reserved Date**: November 28, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Robo-FTP 3.6.17, and possibly other versions, allows remote FTP servers to cause a denial of service and possibly execute arbitrary code via unspecified FTP server responses. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [37452](http://secunia.com/advisories/37452)
2. [60513](http://osvdb.org/60513)
3. [37143](http://www.securityfocus.com/bid/37143) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28832, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28832 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28832
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 11:51 UTC
- **Last Updated**: January 28, 2025 at 18:42 UTC
- **Reserved Date**: March 24, 2023 at 15:17 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions >= V2.0 < V2.1). The web based management of affected devices does not properly validate user input, making it susceptible to command injection. This could allow an authenticated privileged remote attacker to execute arbitrary code with root privileges.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Siemens - SIMATIC Cloud Connect 7 CC712**
Affected versions:
- All versions >= V2.0 < V2.1 (Status: affected)
**Siemens - SIMATIC Cloud Connect 7 CC716**
Affected versions:
- All versions >= V2.0 < V2.1 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22737
- **State**: PUBLISHED
- **Published Date**: May 26, 2021 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 18:51 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
Insufficiently Protected Credentials vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior that could cause unauthorized access of when credentials are discovered after a brute force attack.
### Weakness Classification (CWE)
- CWE-307: Security Weakness
### Affected Products
**n/a - homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior**
Affected versions:
- homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior (Status: affected)
### References
1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-04) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6195
- **State**: PUBLISHED
- **Published Date**: February 14, 2020 at 17:10 UTC
- **Last Updated**: September 16, 2024 at 16:14 UTC
- **Reserved Date**: January 11, 2019 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
An authorization bypass exists in Lenovo XClarity Controller (XCC) versions prior to 3.08 CDI340V, 3.01 TEI392O, 1.71 PSI328N where a valid authenticated user with lesser privileges may be granted read-only access to higher-privileged information if 1) “LDAP Authentication Only with Local Authorization” mode is configured and used by XCC, and 2) a lesser privileged user logs into XCC within 1 minute of a higher privileged user logging out. The authorization bypass does not exist when “Local Authentication and Authorization” or “LDAP Authentication and Authorization” modes are configured and used by XCC.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**Lenovo - XClarity Controller (XCC)**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/product_security/LEN-29116) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3584, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3584 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3584
- **State**: PUBLISHED
- **Published Date**: May 30, 2024 at 12:33 UTC
- **Last Updated**: August 01, 2024 at 20:12 UTC
- **Reserved Date**: April 10, 2024 at 14:03 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
qdrant/qdrant version 1.9.0-dev is vulnerable to path traversal due to improper input validation in the `/collections/{name}/snapshots/upload` endpoint. By manipulating the `name` parameter through URL encoding, an attacker can upload a file to an arbitrary location on the system, such as `/root/poc.txt`. This vulnerability allows for the writing and overwriting of arbitrary files on the server, potentially leading to a full takeover of the system. The issue is fixed in version 1.9.0.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**qdrant - qdrant/qdrant**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/5c7c82e2-4873-40b7-a5f3-0f4a42642f73)
2. [](https://github.com/qdrant/qdrant/commit/15479a45ffa3b955485ae516696f7e933a8cce8a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5889, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5889 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5889
- **State**: PUBLISHED
- **Published Date**: January 12, 2009 at 19:27 UTC
- **Last Updated**: August 07, 2024 at 11:13 UTC
- **Reserved Date**: January 12, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in user.asp in Click&Rank allows remote attackers to inject arbitrary web script or HTML via the action parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [7486](https://www.exploit-db.com/exploits/7486)
2. [32855](http://www.securityfocus.com/bid/32855) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0895, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0895 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0895
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 15:12 UTC
- **Last Updated**: August 04, 2024 at 06:18 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'Windows VBScript Engine Remote Code Execution Vulnerability'.
### Affected Products
**Microsoft - Internet Explorer 9**
Affected versions:
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- Windows Server 2008 for x64-based Systems Service Pack 2 (Status: affected)
**Microsoft - Internet Explorer 11**
Affected versions:
- Windows 10 Version 1803 for 32-bit Systems (Status: affected)
- Windows 10 Version 1803 for x64-based Systems (Status: affected)
- Windows 10 Version 1803 for ARM64-based Systems (Status: affected)
- Windows 10 Version 1809 for 32-bit Systems (Status: affected)
- Windows 10 Version 1809 for x64-based Systems (Status: affected)
- Windows 10 Version 1809 for ARM64-based Systems (Status: affected)
- Windows Server 2019 (Status: affected)
- Windows 10 Version 1709 for 32-bit Systems (Status: affected)
- Windows 10 Version 1709 for x64-based Systems (Status: affected)
- Windows 10 Version 1709 for ARM64-based Systems (Status: affected)
- Windows 10 for 32-bit Systems (Status: affected)
- Windows 10 for x64-based Systems (Status: affected)
- Windows 10 Version 1607 for 32-bit Systems (Status: affected)
- Windows 10 Version 1607 for x64-based Systems (Status: affected)
- Windows Server 2016 (Status: affected)
- Windows 7 for 32-bit Systems Service Pack 1 (Status: affected)
- Windows 7 for x64-based Systems Service Pack 1 (Status: affected)
- Windows 8.1 for 32-bit systems (Status: affected)
- Windows 8.1 for x64-based systems (Status: affected)
- Windows RT 8.1 (Status: affected)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- Windows Server 2012 R2 (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows Server 2012**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0895) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30050, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30050 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30050
- **State**: PUBLISHED
- **Published Date**: May 16, 2022 at 16:40 UTC
- **Last Updated**: August 03, 2024 at 06:40 UTC
- **Reserved Date**: May 02, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Gnuboard 5.55 and 5.56 is vulnerable to Cross Site Scripting (XSS) via bbs/member_confirm.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gratis-herring-da5.notion.site/Gnuboard-Reflected-XSS-25d593d8a2b84a46a998bfd5816c54fc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29720
- **State**: PUBLISHED
- **Published Date**: May 18, 2023 at 00:00 UTC
- **Last Updated**: January 21, 2025 at 19:48 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SofaWiki <=3.8.9 is vulnerable to Cross Site Scripting (XSS) via index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/bellenuit/sofawiki/issues/26)
2. [](https://github.com/xul18/Showcase/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2753, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2753 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2753
- **State**: PUBLISHED
- **Published Date**: June 01, 2006 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 17:58 UTC
- **Reserved Date**: June 01, 2006 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-1092](http://www.debian.org/security/2006/dsa-1092)
2. [](http://lists.mysql.com/announce/364)
3. [mysql-ascii-sql-injection(26875)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26875)
4. [20712](http://secunia.com/advisories/20712)
5. [MDKSA-2006:097](http://www.mandriva.com/security/advisories?name=MDKSA-2006:097)
6. [20541](http://secunia.com/advisories/20541)
7. [TA07-072A](http://www.us-cert.gov/cas/techalerts/TA07-072A.html)
8. [20562](http://secunia.com/advisories/20562)
9. [2006-0034](http://www.trustix.org/errata/2006/0034/)
10. [APPLE-SA-2007-03-13](http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html)
11. [](http://docs.info.apple.com/article.html?artnum=305214)
12. [GLSA-200606-13](http://www.gentoo.org/security/en/glsa/glsa-200606-13.xml)
13. [20365](http://secunia.com/advisories/20365)
14. [20531](http://secunia.com/advisories/20531)
15. [oval:org.mitre.oval:def:10312](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10312)
16. [ADV-2006-2105](http://www.vupen.com/english/advisories/2006/2105)
17. [18219](http://www.securityfocus.com/bid/18219)
18. [20489](http://secunia.com/advisories/20489)
19. [1016216](http://securitytracker.com/id?1016216)
20. [USN-303-1](https://usn.ubuntu.com/303-1/)
21. [ADV-2007-0930](http://www.vupen.com/english/advisories/2007/0930)
22. [USN-288-3](http://www.ubuntu.com/usn/usn-288-3)
23. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735)
24. [20625](http://secunia.com/advisories/20625)
25. [RHSA-2006:0544](http://www.redhat.com/support/errata/RHSA-2006-0544.html)
26. [24479](http://secunia.com/advisories/24479) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10284, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10284 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10284
- **State**: PUBLISHED
- **Published Date**: April 04, 2019 at 15:38 UTC
- **Last Updated**: August 04, 2024 at 22:17 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Diawi Upload Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
### Affected Products
**Jenkins project - Jenkins Diawi Upload Plugin**
Affected versions:
- all versions as of 2019-04-03 (Status: affected)
### References
1. [107790](http://www.securityfocus.com/bid/107790)
2. [[oss-security] 20190413 Re: Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/04/12/2)
3. [](https://jenkins.io/security/advisory/2019-04-03/#SECURITY-947) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48298, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48298 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48298
- **State**: PUBLISHED
- **Published Date**: February 09, 2023 at 00:00 UTC
- **Last Updated**: March 25, 2025 at 13:28 UTC
- **Reserved Date**: January 29, 2023 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
The geofencing kernel code does not verify the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 2.0 (Status: affected)
- 3.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 12.0.1 (Status: affected)
### References
1. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474)
2. [](https://consumer.huawei.com/en/support/bulletin/2023/2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35860, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35860 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35860
- **State**: PUBLISHED
- **Published Date**: May 19, 2024 at 08:34 UTC
- **Last Updated**: May 04, 2025 at 09:07 UTC
- **Reserved Date**: May 17, 2024 at 13:50 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
bpf: support deferring bpf_link dealloc to after RCU grace period
BPF link for some program types is passed as a "context" which can be
used by those BPF programs to look up additional information. E.g., for
multi-kprobes and multi-uprobes, link is used to fetch BPF cookie values.
Because of this runtime dependency, when bpf_link refcnt drops to zero
there could still be active BPF programs running accessing link data.
This patch adds generic support to defer bpf_link dealloc callback to
after RCU GP, if requested. This is done by exposing two different
deallocation callbacks, one synchronous and one deferred. If deferred
one is provided, bpf_link_free() will schedule dealloc_deferred()
callback to happen after RCU GP.
BPF is using two flavors of RCU: "classic" non-sleepable one and RCU
tasks trace one. The latter is used when sleepable BPF programs are
used. bpf_link_free() accommodates that by checking underlying BPF
program's sleepable flag, and goes either through normal RCU GP only for
non-sleepable, or through RCU tasks trace GP *and* then normal RCU GP
(taking into account rcu_trace_implies_rcu_gp() optimization), if BPF
program is sleepable.
We use this for multi-kprobe and multi-uprobe links, which dereference
link during program run. We also preventively switch raw_tp link to use
deferred dealloc callback, as upcoming changes in bpf-next tree expose
raw_tp link data (specifically, cookie value) to BPF program at runtime
as well.
### Affected Products
**Linux - Linux**
Affected versions:
- 0dcac272540613d41c05e89679e4ddb978b612f1 (Status: affected)
- 0dcac272540613d41c05e89679e4ddb978b612f1 (Status: affected)
- 0dcac272540613d41c05e89679e4ddb978b612f1 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.18 (Status: affected)
- 0 (Status: unaffected)
- 6.6.26 (Status: unaffected)
- 6.8.5 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/876941f533e7b47fc69977fc4551c02f2d18af97)
2. [](https://git.kernel.org/stable/c/5d8d447777564b35f67000e7838e7ccb64d525c8)
3. [](https://git.kernel.org/stable/c/1a80dbcb2dbaf6e4c216e62e30fa7d3daa8001ce) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31021, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31021
- **State**: PUBLISHED
- **Published Date**: April 11, 2025 at 08:42 UTC
- **Last Updated**: April 11, 2025 at 13:54 UTC
- **Reserved Date**: March 26, 2025 at 09:23 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dolby_uk Mobile Smart allows Reflected XSS. This issue affects Mobile Smart: from n/a through v1.3.16.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**dolby_uk - Mobile Smart**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/mobile-smart/vulnerability/wordpress-mobile-smart-plugin-v1-3-16-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Nguyen Thi Huyen Trang - Skalucy (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0363, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0363 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0363
- **State**: PUBLISHED
- **Published Date**: January 17, 2013 at 01:30 UTC
- **Last Updated**: August 06, 2024 at 14:25 UTC
- **Reserved Date**: December 07, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Mobile Server component in Oracle Database Mobile/Lite Server (formerly Oracle Database Lite) 10.3.0.3 and 11.1.0.0 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2013-0362 and CVE-2013-0364.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html)
2. [57126](http://secunia.com/advisories/57126)
3. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150)
4. [HPSBST02955](http://marc.info/?l=bugtraq&m=139344343412337&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1650
- **State**: PUBLISHED
- **Published Date**: January 24, 2019 at 15:00 UTC
- **Last Updated**: November 20, 2024 at 17:28 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the save command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the save command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Cisco - Cisco SD-WAN Solution**
Affected versions:
- n/a (Status: affected)
### References
1. [106716](http://www.securityfocus.com/bid/106716)
2. [20190123 Cisco SD-WAN Solution Arbitrary File Overwrite Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-sdwan-file-write) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50599, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50599 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50599
- **State**: PUBLISHED
- **Published Date**: November 07, 2024 at 00:00 UTC
- **Last Updated**: November 08, 2024 at 15:59 UTC
- **Reserved Date**: October 27, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A reflected Cross-Site Scripting (XSS) vulnerability has been identified in Zimbra Collaboration Suite (ZCS) 8.8.15, affecting one of the webmail calendar endpoints. This arises from improper handling of user-supplied input, allowing an attacker to inject malicious code that is reflected back in the HTML response.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories)
2. [](https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P46#Security_Fixes) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4241
- **State**: PUBLISHED
- **Published Date**: April 26, 2024 at 21:00 UTC
- **Last Updated**: August 01, 2024 at 20:33 UTC
- **Reserved Date**: April 26, 2024 at 12:40 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been declared as critical. This vulnerability affects the function formQosManageDouble_auto. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack can be initiated remotely. The identifier of this vulnerability is VDB-262132. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Tenda - W9**
Affected versions:
- 1.0.0.7(4456) (Status: affected)
### References
1. [VDB-262132 | Tenda W9 formQosManageDouble_auto stack-based overflow](https://vuldb.com/?id.262132)
2. [VDB-262132 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.262132)
3. [Submit #319823 | Tenda W9 V1.0.0.7(4456) Buffer Overflow](https://vuldb.com/?submit.319823)
4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_user.md)
### Credits
- yhryhryhr_miemie (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5203, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5203 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5203
- **State**: PUBLISHED
- **Published Date**: March 09, 2013 at 11:01 UTC
- **Last Updated**: August 06, 2024 at 20:58 UTC
- **Reserved Date**: October 01, 2012 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP Intelligent Management Center (iMC) and Intelligent Management Center for Automated Network Manager (ANM) before 5.2 E0401 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, aka ZDI-CAN-1613.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT100881](http://marc.info/?l=bugtraq&m=136268852804156&w=2)
2. [HPSBGN02854](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03689276)
3. [SSRT101015](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03689276) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4730, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4730 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4730
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:43 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1321, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1321
- **State**: PUBLISHED
- **Published Date**: March 04, 2025 at 03:37 UTC
- **Last Updated**: March 04, 2025 at 15:34 UTC
- **Reserved Date**: February 14, 2025 at 23:24 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The teachPress plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the 'tpsearch' shortcode in all versions up to, and including, 9.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**winkm89 - teachPress**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/cb453fe3-ba89-437c-b3fb-9ec207eaa9f0?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3246754%40teachpress&new=3246754%40teachpress&sfp_email=&sfph_mail=#file6)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17541, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17541 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17541
- **State**: PUBLISHED
- **Published Date**: October 14, 2019 at 01:06 UTC
- **Last Updated**: August 05, 2024 at 01:40 UTC
- **Reserved Date**: October 14, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ImageMagick before 7.0.8-55 has a use-after-free in DestroyStringInfo in MagickCore/string.c because the error manager is mishandled in coders/jpeg.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ImageMagick/ImageMagick/issues/1641)
2. [](https://github.com/ImageMagick/ImageMagick/commit/39f226a9c137f547e12afde972eeba7551124493)
3. [](https://github.com/ImageMagick/ImageMagick/compare/7.0.8-54...7.0.8-55)
4. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15827) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5096, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5096 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5096
- **State**: PUBLISHED
- **Published Date**: September 29, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 19:41 UTC
- **Reserved Date**: September 29, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in index.php in VirtueMart (formerly known as mambo-phpShop) Joomla! eCommerce Edition CMS 1.0.11, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the Itemid parameter in a (1) com_contact or (2) subscribe action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22162](http://secunia.com/advisories/22162)
2. [1657](http://securityreason.com/securityalert/1657)
3. [20060927 VirtueMart Joomla eCommerce Edition CMS Multiple XSS Vulnerabilities](http://www.securityfocus.com/archive/1/447168/100/0/threaded)
4. [virtuemart-index-xss(29207)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29207)
5. [ADV-2006-3848](http://www.vupen.com/english/advisories/2006/3848)
6. [20236](http://www.securityfocus.com/bid/20236) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28751, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28751
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 07:11 UTC
- **Last Updated**: August 02, 2024 at 00:56 UTC
- **Reserved Date**: March 08, 2024 at 08:39 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
An high privileged remote attacker can enable telnet access that accepts hardcoded credentials.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**ifm - Smart PLC AC14xx Firmware**
Affected versions:
- 0 (Status: affected)
**ifm - Smart PLC AC4xxS Firmware**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert.vde.com/en/advisories/VDE-2024-012)
### Credits
- Logan Carpenter
- Dragos |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20699, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20699 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20699
- **State**: PUBLISHED
- **Published Date**: January 12, 2019 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 12:05 UTC
- **Reserved Date**: January 11, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Docker Engine before 18.09 allows attackers to cause a denial of service (dockerd memory consumption) via a large integer in a --cpuset-mems or --cpuset-cpus value, related to daemon/daemon_unix.go, pkg/parsers/parsers.go, and pkg/sysinfo/sysinfo.go.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/docker/engine/pull/70)
2. [](https://github.com/moby/moby/pull/37967)
3. [RHSA-2019:0487](https://access.redhat.com/errata/RHSA-2019:0487) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35252, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35252 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35252
- **State**: PUBLISHED
- **Published Date**: September 23, 2022 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 16:14 UTC
- **Reserved Date**: July 06, 2022 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - https://github.com/curl/curl**
Affected versions:
- Fixed in curl 7.85.0 (Status: affected)
### References
1. [](https://hackerone.com/reports/1613943)
2. [](https://security.netapp.com/advisory/ntap-20220930-0005/)
3. [GLSA-202212-01](https://security.gentoo.org/glsa/202212-01)
4. [](https://support.apple.com/kb/HT213603)
5. [](https://support.apple.com/kb/HT213604)
6. [20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3](http://seclists.org/fulldisclosure/2023/Jan/20)
7. [20230123 APPLE-SA-2023-01-23-6 macOS Big Sur 11.7.3](http://seclists.org/fulldisclosure/2023/Jan/21)
8. [[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update](https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3397, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3397 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3397
- **State**: PUBLISHED
- **Published Date**: June 03, 2019 at 13:44 UTC
- **Last Updated**: September 16, 2024 at 17:47 UTC
- **Reserved Date**: December 19, 2018 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
Atlassian Bitbucket Data Center licensed instances starting with version 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.15.x), from 5.16.0 before 5.16.3 (fixed version for 5.16.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) allow remote attackers who have admin permissions to achieve remote code execution on a Bitbucket server instance via path traversal through the Data Center migration tool.
### Affected Products
**Atlassian - Bitbucket Data Center**
Affected versions:
- 5.13.0 (Status: affected)
- unspecified (Status: affected)
- 5.14.0 (Status: affected)
- unspecified (Status: affected)
- 5.15.0 (Status: affected)
- unspecified (Status: affected)
- 6.0.0 (Status: affected)
- unspecified (Status: affected)
- 6.1.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/BSERV-11706) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6786, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6786 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6786
- **State**: PUBLISHED
- **Published Date**: September 21, 2024 at 04:14 UTC
- **Last Updated**: September 26, 2024 at 06:52 UTC
- **Reserved Date**: July 16, 2024 at 09:32 UTC
- **Assigned By**: Moxa
### Vulnerability Description
The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-24: Security Weakness
### Affected Products
**Moxa - MXview One Series**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series)
2. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-05)
### Credits
- Noam Moshe of Claroty Research - Team82 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48762, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48762 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48762
- **State**: PUBLISHED
- **Published Date**: June 20, 2024 at 11:13 UTC
- **Last Updated**: May 04, 2025 at 08:22 UTC
- **Reserved Date**: June 20, 2024 at 11:09 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
arm64: extable: fix load_unaligned_zeropad() reg indices
In ex_handler_load_unaligned_zeropad() we erroneously extract the data and
addr register indices from ex->type rather than ex->data. As ex->type will
contain EX_TYPE_LOAD_UNALIGNED_ZEROPAD (i.e. 4):
* We'll always treat X0 as the address register, since EX_DATA_REG_ADDR is
extracted from bits [9:5]. Thus, we may attempt to dereference an
arbitrary address as X0 may hold an arbitrary value.
* We'll always treat X4 as the data register, since EX_DATA_REG_DATA is
extracted from bits [4:0]. Thus we will corrupt X4 and cause arbitrary
behaviour within load_unaligned_zeropad() and its caller.
Fix this by extracting both values from ex->data as originally intended.
On an MTE-enabled QEMU image we are hitting the following crash:
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
Call trace:
fixup_exception+0xc4/0x108
__do_kernel_fault+0x3c/0x268
do_tag_check_fault+0x3c/0x104
do_mem_abort+0x44/0xf4
el1_abort+0x40/0x64
el1h_64_sync_handler+0x60/0xa0
el1h_64_sync+0x7c/0x80
link_path_walk+0x150/0x344
path_openat+0xa0/0x7dc
do_filp_open+0xb8/0x168
do_sys_openat2+0x88/0x17c
__arm64_sys_openat+0x74/0xa0
invoke_syscall+0x48/0x148
el0_svc_common+0xb8/0xf8
do_el0_svc+0x28/0x88
el0_svc+0x24/0x84
el0t_64_sync_handler+0x88/0xec
el0t_64_sync+0x1b4/0x1b8
Code: f8695a69 71007d1f 540000e0 927df12a (f940014a)
### Affected Products
**Linux - Linux**
Affected versions:
- 753b32368705c396000f95f33c3b7018474e33ad (Status: affected)
- 753b32368705c396000f95f33c3b7018474e33ad (Status: affected)
**Linux - Linux**
Affected versions:
- 5.16 (Status: affected)
- 0 (Status: unaffected)
- 5.16.5 (Status: unaffected)
- 5.17 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/47fe7a1c5e3e011eeb4ab79f2d54a794fdd1c3eb)
2. [](https://git.kernel.org/stable/c/3758a6c74e08bdc15ccccd6872a6ad37d165239a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15086, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15086
- **State**: PUBLISHED
- **Published Date**: September 20, 2019 at 13:41 UTC
- **Last Updated**: August 05, 2024 at 00:34 UTC
- **Reserved Date**: August 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in PRiSE adAS 1.7.0. The newentityID parameter is not properly escaped, leading to a reflected XSS in the error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.adas-sso.com/es/extra/download.php)
2. [](https://security-garage.com/index.php/cves/from-open-redirect-to-rce-in-adas) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2431, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2431 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2431
- **State**: PUBLISHED
- **Published Date**: May 02, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 13:42 UTC
- **Reserved Date**: May 01, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Dynamic variable evaluation vulnerability in shared/config/tce_config.php in TCExam 4.0.011 and earlier allows remote attackers to conduct cross-site scripting (XSS) and possibly other attacks by modifying critical variables such as $_SERVER, as demonstrated by injecting web script via the _SERVER[SCRIPT_NAME] parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25008](http://secunia.com/advisories/25008)
2. [](http://sourceforge.net/forum/forum.php?forum_id=690912)
3. [23704](http://www.securityfocus.com/bid/23704)
4. [20070501 TCExam - 'XSS' is dynamic variable evaluation; vendor patch](http://www.attrition.org/pipermail/vim/2007-May/001572.html)
5. [tcexam-server-xss(33957)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33957)
6. [3816](https://www.exploit-db.com/exploits/3816) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51012, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51012
- **State**: PUBLISHED
- **Published Date**: December 22, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 22:23 UTC
- **Reserved Date**: December 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the lanGateway parameter’ of the setLanConfig interface of the cstecgi .cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanGateway/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15115, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15115
- **State**: PUBLISHED
- **Published Date**: August 06, 2020 at 21:55 UTC
- **Last Updated**: August 04, 2024 at 13:08 UTC
- **Reserved Date**: June 25, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computational effort.
### CVSS Metrics
- **CVSS Base Score**: 5.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-521: Security Weakness
### Affected Products
**etcd-io - etcd**
Affected versions:
- < 3.3.23 (Status: affected)
- < 3.4.10 (Status: affected)
### References
1. [](https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh)
2. [FEDORA-2020-cd43b84c16](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0001
- **State**: PUBLISHED
- **Published Date**: January 10, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 18:09 UTC
- **Reserved Date**: November 09, 2011 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The kernel in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly load structured exception handling tables, which allows context-dependent attackers to bypass the SafeSEH security feature by leveraging a Visual C++ .NET 2003 application, aka "Windows Kernel SafeSEH Bypass Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:14758](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14758)
2. [51296](http://www.securityfocus.com/bid/51296)
3. [TA12-010A](http://www.us-cert.gov/cas/techalerts/TA12-010A.html)
4. [47356](http://secunia.com/advisories/47356)
5. [MS12-001](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-001)
6. [openSUSE-SU-2012:0917](http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html)
7. [1026493](http://www.securitytracker.com/id?1026493) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1532, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1532 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1532
- **State**: PUBLISHED
- **Published Date**: May 31, 2018 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 18:43 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM API Connect 5.0.0.0 through 5.0.8.2 does not properly update the SESSIONID with each request, which could allow a user to obtain the ID in further attacks against the system. IBM X-Force ID: 142430.
### Affected Products
**IBM - API Connect**
Affected versions:
- 5.0.1.0 (Status: affected)
- 5.0.0.0 (Status: affected)
- 5.0.2.0 (Status: affected)
- 5.0.5.0 (Status: affected)
- 5.0.6.0 (Status: affected)
- 5.0.6.1 (Status: affected)
- 5.0.6.2 (Status: affected)
- 5.0.7.0 (Status: affected)
- 5.0.7.1 (Status: affected)
- 5.0.3.0 (Status: affected)
- 5.0.4.0 (Status: affected)
- 5.0.7.2 (Status: affected)
- 5.0.6.3 (Status: affected)
- 5.0.6.4 (Status: affected)
- 5.0.8.0 (Status: affected)
- 5.0.8.1 (Status: affected)
- 5.0.6.5 (Status: affected)
- 5.0.6.6 (Status: affected)
- 5.0.8.2 (Status: affected)
### References
1. [ibm-api-cve20181532-info-disc(142430)](https://exchange.xforce.ibmcloud.com/vulnerabilities/142430)
2. [](http://www.ibm.com/support/docview.wss?uid=swg22015978) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4123, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4123 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4123
- **State**: PUBLISHED
- **Published Date**: May 22, 2025 at 07:44 UTC
- **Last Updated**: May 22, 2025 at 13:21 UTC
- **Reserved Date**: April 30, 2025 at 06:59 UTC
- **Assigned By**: GRAFANA
### Vulnerability Description
A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF.
The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**Grafana - Grafana**
Affected versions:
- 10.4.18+security-01 (Status: affected)
- 11.2.9+security-01 (Status: affected)
- 11.3.6+security-01 (Status: affected)
- 11.4.4+security-01 (Status: affected)
- 11.5.4+security-01 (Status: affected)
- 11.6.1+security-01 (Status: affected)
- 12.0.0+security-01 (Status: affected)
### References
1. [](https://grafana.com/security/security-advisories/cve-2025-4123/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5161, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5161 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5161
- **State**: PUBLISHED
- **Published Date**: September 28, 2013 at 01:00 UTC
- **Last Updated**: September 16, 2024 at 19:04 UTC
- **Reserved Date**: August 15, 2013 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Passcode Lock in Apple iOS before 7.0.2 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement, and open the Camera app or read the list of all recently opened apps, by leveraging unspecified transition errors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT5957)
2. [APPLE-SA-2013-09-26-1](http://lists.apple.com/archives/security-announce/2013/Sep/msg00009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1043, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1043
- **State**: PUBLISHED
- **Published Date**: February 20, 2024 at 18:56 UTC
- **Last Updated**: August 01, 2024 at 18:26 UTC
- **Reserved Date**: January 29, 2024 at 16:33 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'amppb_remove_saved_layout_data' function in all versions up to, and including, 1.0.93.1. This makes it possible for authenticated attackers, with contributor access and above, to delete arbitrary posts on the site.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**mohammed_kaludi - AMP for WP – Accelerated Mobile Pages**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/ffb70e82-355b-48f3-92d0-19659ed2550e?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/accelerated-mobile-pages/tags/1.0.93.1/pagebuilder/inc/adminAjaxContents.php#L134)
3. [](https://wordpress.org/plugins/accelerated-mobile-pages/)
4. [](https://plugins.trac.wordpress.org/changeset/3030425/accelerated-mobile-pages/tags/1.0.93.2/pagebuilder/inc/adminAjaxContents.php?old=3025105&old_path=accelerated-mobile-pages%2Ftags%2F1.0.93.1%2Fpagebuilder%2Finc%2FadminAjaxContents.php)
### Credits
- Sean Murphy |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-17128, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-17128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-17128
- **State**: PUBLISHED
- **Published Date**: December 09, 2020 at 23:36 UTC
- **Last Updated**: August 04, 2024 at 13:53 UTC
- **Reserved Date**: August 04, 2020 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Excel Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019 for Mac**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office Online Server**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Excel 2016**
Affected versions:
- 16.0.0.0 (Status: affected)
**Microsoft - Microsoft Office 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Excel 2010 Service Pack 2**
Affected versions:
- 13.0.0.0 (Status: affected)
**Microsoft - Microsoft Excel 2013 Service Pack 1**
Affected versions:
- 15.0.0.0 (Status: affected)
**Microsoft - Microsoft Office 2010 Service Pack 2**
Affected versions:
- 13.0.0.0 (Status: affected)
**Microsoft - Microsoft Office Web Apps 2013 Service Pack 1**
Affected versions:
- 15.0.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17128) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32597, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32597 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32597
- **State**: PUBLISHED
- **Published Date**: December 05, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 15:10 UTC
- **Reserved Date**: June 09, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In widevine, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446228; Issue ID: ALPS07446228.
### Affected Products
**MediaTek, Inc. - MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT8385, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797**
Affected versions:
- Android 10.0, 11.0, 12.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/December-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20363, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20363 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20363
- **State**: PUBLISHED
- **Published Date**: December 22, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 11:58 UTC
- **Reserved Date**: December 22, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LibRaw::raw2image in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [106299](http://www.securityfocus.com/bid/106299)
2. [](https://github.com/LibRaw/LibRaw/issues/193)
3. [USN-3989-1](https://usn.ubuntu.com/3989-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50063, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50063
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 19:39 UTC
- **Last Updated**: May 04, 2025 at 09:45 UTC
- **Reserved Date**: October 21, 2024 at 19:36 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
bpf: Prevent tail call between progs attached to different hooks
bpf progs can be attached to kernel functions, and the attached functions
can take different parameters or return different return values. If
prog attached to one kernel function tail calls prog attached to another
kernel function, the ctx access or return value verification could be
bypassed.
For example, if prog1 is attached to func1 which takes only 1 parameter
and prog2 is attached to func2 which takes two parameters. Since verifier
assumes the bpf ctx passed to prog2 is constructed based on func2's
prototype, verifier allows prog2 to access the second parameter from
the bpf ctx passed to it. The problem is that verifier does not prevent
prog1 from passing its bpf ctx to prog2 via tail call. In this case,
the bpf ctx passed to prog2 is constructed from func1 instead of func2,
that is, the assumption for ctx access verification is bypassed.
Another example, if BPF LSM prog1 is attached to hook file_alloc_security,
and BPF LSM prog2 is attached to hook bpf_lsm_audit_rule_known. Verifier
knows the return value rules for these two hooks, e.g. it is legal for
bpf_lsm_audit_rule_known to return positive number 1, and it is illegal
for file_alloc_security to return positive number. So verifier allows
prog2 to return positive number 1, but does not allow prog1 to return
positive number. The problem is that verifier does not prevent prog1
from calling prog2 via tail call. In this case, prog2's return value 1
will be used as the return value for prog1's hook file_alloc_security.
That is, the return value rule is bypassed.
This patch adds restriction for tail call to prevent such bypasses.
### Affected Products
**Linux - Linux**
Affected versions:
- f1b9509c2fb0ef4db8d22dac9aef8e856a5d81f6 (Status: affected)
- f1b9509c2fb0ef4db8d22dac9aef8e856a5d81f6 (Status: affected)
- f1b9509c2fb0ef4db8d22dac9aef8e856a5d81f6 (Status: affected)
- f1b9509c2fb0ef4db8d22dac9aef8e856a5d81f6 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.5 (Status: affected)
- 0 (Status: unaffected)
- 6.1.135 (Status: unaffected)
- 6.6.57 (Status: unaffected)
- 6.11.4 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/d9a807fb7cbfad4328824186e2e4bee28f72169b)
2. [](https://git.kernel.org/stable/c/5d5e3b4cbe8ee16b7bf96fd73a421c92a9da3ca1)
3. [](https://git.kernel.org/stable/c/88c2a10e6c176c2860cd0659f4c0e9d20b3f64d1)
4. [](https://git.kernel.org/stable/c/28ead3eaabc16ecc907cfb71876da028080f6356) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25508
- **State**: PUBLISHED
- **Published Date**: November 05, 2021 at 02:04 UTC
- **Last Updated**: August 03, 2024 at 20:11 UTC
- **Reserved Date**: January 19, 2021 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper privilege management vulnerability in API Key used in SmartThings prior to 1.7.73.22 allows an attacker to abuse the API key without limitation.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Samsung Mobile - SmartThings**
Affected versions:
- - (Status: affected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0699, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0699 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0699
- **State**: PUBLISHED
- **Published Date**: May 01, 2013 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 17:07 UTC
- **Reserved Date**: December 19, 2012 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
The Galil RIO-47100 Pocket PLC allows remote attackers to cause a denial of service via a session that includes "repeated requests."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://ics-cert.us-cert.gov/advisories/ICSA-13-116-01)
2. [](http://www.galilmc.com/support/downloads/firmware_rev/firm47xxx.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0294, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0294 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0294
- **State**: PUBLISHED
- **Published Date**: February 02, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 16:25 UTC
- **Reserved Date**: January 18, 2006 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Mozilla Firefox before 1.5.0.1, Thunderbird 1.5 if running Javascript in mail, and SeaMonkey before 1.0 allow remote attackers to execute arbitrary code by changing an element's style from position:relative to position:static, which causes Gecko to operate on freed memory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:1514](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1514)
2. [18704](http://secunia.com/advisories/18704)
3. [ADV-2006-3749](http://www.vupen.com/english/advisories/2006/3749)
4. [16476](http://www.securityfocus.com/bid/16476)
5. [ADV-2006-0413](http://www.vupen.com/english/advisories/2006/0413)
6. [1015570](http://securitytracker.com/id?1015570)
7. [18700](http://secunia.com/advisories/18700)
8. [mozilla-element-change-memory-corruption(24431)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24431)
9. [](https://bugzilla.mozilla.org/show_bug.cgi?id=317934)
10. [SSRT061236](http://www.securityfocus.com/archive/1/446657/100/200/threaded)
11. [HPSBUX02156](http://www.securityfocus.com/archive/1/446657/100/200/threaded)
12. [](http://www.mozilla.org/security/announce/2006/mfsa2006-02.html)
13. [22065](http://secunia.com/advisories/22065) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12743, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12743 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12743
- **State**: PUBLISHED
- **Published Date**: July 29, 2019 at 15:23 UTC
- **Last Updated**: August 04, 2024 at 23:32 UTC
- **Reserved Date**: June 05, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HumHub Social Network Kit Enterprise v1.3.13 allows remote attackers to find the user accounts existing on any Social Network Kits (including self-hosted ones) by brute-forcing the username after the /u/ initial URI substring, aka Response Discrepancy Information Exposure.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://humhub.org/en/news)
2. [](https://github.com/chanpu9/CVE/blob/master/2019-12743) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2202, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2202 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2202
- **State**: PUBLISHED
- **Published Date**: April 20, 2016 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 23:24 UTC
- **Reserved Date**: February 02, 2016 at 00:00 UTC
- **Assigned By**: symantec
### Vulnerability Description
The Inventory Solution component in the Management Agent in the client in Symantec Altiris IT Management Suite (ITMS) through 7.6 HF7 allows local users to bypass intended application-blacklist restrictions via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160407_00)
2. [85778](http://www.securityfocus.com/bid/85778) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7362
- **State**: PUBLISHED
- **Published Date**: March 31, 2017 at 04:26 UTC
- **Last Updated**: August 05, 2024 at 15:56 UTC
- **Reserved Date**: March 30, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pixie 1.0.4 allows an admin/index.php s=publish&m=dynamic&x= XSS attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [97268](http://www.securityfocus.com/bid/97268)
2. [](http://rungga.blogspot.co.id/2017/03/multiple-xss-vulnerability-on-pixie-104.html) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.