System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47637, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47637
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 01:54 UTC
- **Last Updated**: May 04, 2025 at 07:15 UTC
- **Reserved Date**: February 26, 2025 at 01:48 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ubifs: Fix deadlock in concurrent rename whiteout and inode writeback
Following hung tasks:
[ 77.028764] task:kworker/u8:4 state:D stack: 0 pid: 132
[ 77.028820] Call Trace:
[ 77.029027] schedule+0x8c/0x1b0
[ 77.029067] mutex_lock+0x50/0x60
[ 77.029074] ubifs_write_inode+0x68/0x1f0 [ubifs]
[ 77.029117] __writeback_single_inode+0x43c/0x570
[ 77.029128] writeback_sb_inodes+0x259/0x740
[ 77.029148] wb_writeback+0x107/0x4d0
[ 77.029163] wb_workfn+0x162/0x7b0
[ 92.390442] task:aa state:D stack: 0 pid: 1506
[ 92.390448] Call Trace:
[ 92.390458] schedule+0x8c/0x1b0
[ 92.390461] wb_wait_for_completion+0x82/0xd0
[ 92.390469] __writeback_inodes_sb_nr+0xb2/0x110
[ 92.390472] writeback_inodes_sb_nr+0x14/0x20
[ 92.390476] ubifs_budget_space+0x705/0xdd0 [ubifs]
[ 92.390503] do_rename.cold+0x7f/0x187 [ubifs]
[ 92.390549] ubifs_rename+0x8b/0x180 [ubifs]
[ 92.390571] vfs_rename+0xdb2/0x1170
[ 92.390580] do_renameat2+0x554/0x770
, are caused by concurrent rename whiteout and inode writeback processes:
rename_whiteout(Thread 1) wb_workfn(Thread2)
ubifs_rename
do_rename
lock_4_inodes (Hold ui_mutex)
ubifs_budget_space
make_free_space
shrink_liability
__writeback_inodes_sb_nr
bdi_split_work_to_wbs (Queue new wb work)
wb_do_writeback(wb work)
__writeback_single_inode
ubifs_write_inode
LOCK(ui_mutex)
↑
wb_wait_for_completion (Wait wb work) <-- deadlock!
Reproducer (Detail program in [Link]):
1. SYS_renameat2("/mp/dir/file", "/mp/dir/whiteout", RENAME_WHITEOUT)
2. Consume out of space before kernel(mdelay) doing budget for whiteout
Fix it by doing whiteout space budget before locking ubifs inodes.
BTW, it also fixes wrong goto tag 'out_release' in whiteout budget
error handling path(It should at least recover dir i_size and unlock
4 ubifs inodes).
### Affected Products
**Linux - Linux**
Affected versions:
- 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798 (Status: affected)
- 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798 (Status: affected)
- 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798 (Status: affected)
- 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798 (Status: affected)
- 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798 (Status: affected)
- 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798 (Status: affected)
- 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.9 (Status: affected)
- 0 (Status: unaffected)
- 4.19.238 (Status: unaffected)
- 5.4.189 (Status: unaffected)
- 5.10.110 (Status: unaffected)
- 5.15.33 (Status: unaffected)
- 5.16.19 (Status: unaffected)
- 5.17.2 (Status: unaffected)
- 5.18 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/9dddc8211430fb851ddf0b168e3a00c6f66cc185)
2. [](https://git.kernel.org/stable/c/37bdf1ad592555ecda1d55b89f6e393e4c0589d1)
3. [](https://git.kernel.org/stable/c/83e42a78428fc354f5e2049935b84c8d8d29b787)
4. [](https://git.kernel.org/stable/c/c58af8564a7b08757173009030b74baf4b2b762b)
5. [](https://git.kernel.org/stable/c/70e9090acc32348cedc5def0cd6d5c126efc97b9)
6. [](https://git.kernel.org/stable/c/8b278c8dcfb565cb65eceb62a38cbf7a7c326db5)
7. [](https://git.kernel.org/stable/c/afd427048047e8efdedab30e8888044e2be5aa9c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5862, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5862 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5862
- **State**: PUBLISHED
- **Published Date**: October 16, 2013 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 17:22 UTC
- **Reserved Date**: September 18, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Solaris 10 and 11.1 allows local users to affect availability via vectors related to CPU performance counters (CPC) drivers, a different vulnerability than CVE-2014-4215.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [63072](http://www.securityfocus.com/bid/63072)
2. [oval:org.mitre.oval:def:18970](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18970)
3. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html)
4. [98497](http://osvdb.org/98497) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1940, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1940 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1940
- **State**: PUBLISHED
- **Published Date**: June 05, 2024 at 05:33 UTC
- **Last Updated**: August 01, 2024 at 18:56 UTC
- **Reserved Date**: February 27, 2024 at 17:39 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Brizy – Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post content in all versions up to, and including, 2.4.41 due to insufficient input sanitization performed only on the client side and insufficient output escaping. This makes it possible for authenticated attackers, with contributor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L`
### Affected Products
**themefusecom - Brizy – Page Builder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/e056dcb5-a66b-4cd3-9a73-37f226015e09?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055256%40brizy&new=3055256%40brizy&sfp_email=&sfph_mail=)
### Credits
- Matthew Rollings |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6573, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6573 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6573
- **State**: PUBLISHED
- **Published Date**: March 09, 2017 at 09:26 UTC
- **Last Updated**: August 05, 2024 at 15:33 UTC
- **Reserved Date**: March 09, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQL injection issue is exploitable, with WordPress admin access, in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects ./inc/lists/edit-list.php with the GET Parameter: id.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [96783](http://www.securityfocus.com/bid/96783)
2. [](https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3413, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3413 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3413
- **State**: PUBLISHED
- **Published Date**: January 18, 2017 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 23:56 UTC
- **Reserved Date**: March 17, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Zimbra Collaboration before 8.7.0 allows remote attackers to affect integrity via unknown vectors, aka bug 103996.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [95895](http://www.securityfocus.com/bid/95895)
2. [](https://wiki.zimbra.com/wiki/Zimbra_Releases/8.7.0)
3. [](https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50960, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50960 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50960
- **State**: PUBLISHED
- **Published Date**: April 15, 2025 at 00:00 UTC
- **Last Updated**: April 18, 2025 at 13:25 UTC
- **Reserved Date**: October 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A command injection vulnerability in the Nmap diagnostic tool in the admin web console of Extron SMP 111 <=3.01, SMP 351 <=2.16, SMP 352 <= 2.16, and SME 211 <= 3.02, allows a remote authenticated attacker to execute arbitrary commands as root on the underlying operating system.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.extron.com/article/smp)
2. [](https://ryanmroth.com/articles/exploiting-extron-smp-command-injection)
3. [](https://github.com/layer8secure/extron-smp-inject/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1000049, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1000049 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000049
- **State**: REJECTED
- **Published Date**: July 13, 2017 at 20:00 UTC
- **Last Updated**: July 20, 2017 at 20:57 UTC
- **Reserved Date**: July 10, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31310, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31310
- **State**: PUBLISHED
- **Published Date**: August 13, 2024 at 16:54 UTC
- **Last Updated**: October 31, 2024 at 14:14 UTC
- **Reserved Date**: April 27, 2023 at 15:25 UTC
- **Assigned By**: AMD
### Vulnerability Description
Improper input validation in Power Management Firmware (PMFW) may allow an attacker with privileges to send a malformed input for the "set temperature input selection" command, potentially resulting in a loss of integrity and/or availability.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L`
### Affected Products
**AMD - AMD Radeon™ RX 6000 Series Graphics Cards**
Affected versions:
- AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01) (Status: unaffected)
**AMD - AMD Radeon™ PRO W6000 Series Graphics Cards**
Affected versions:
- AMD Software: PRO Edition 23.Q4 (23.30.13.03) (Status: unaffected)
### References
1. [](https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20050, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20050 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20050
- **State**: PUBLISHED
- **Published Date**: March 09, 2022 at 17:02 UTC
- **Last Updated**: August 03, 2024 at 01:55 UTC
- **Reserved Date**: October 12, 2021 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In connsyslogger, there is a possible symbolic link following due to improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06335038; Issue ID: ALPS06335038.
### Affected Products
**MediaTek, Inc. - MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6891, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8696, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797**
Affected versions:
- Android 11.0, 12.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/March-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4383, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4383
- **State**: PUBLISHED
- **Published Date**: June 15, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 06:11 UTC
- **Reserved Date**: June 05, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the Decisions module for Drupal allows remote attackers to hijack the authentication of arbitrary users for requests that remove individual voters via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)](http://www.openwall.com/lists/oss-security/2015/04/25/6)
2. [](https://www.drupal.org/node/2459349)
3. [74344](http://www.securityfocus.com/bid/74344) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32737
- **State**: PUBLISHED
- **Published Date**: July 02, 2021 at 17:55 UTC
- **Last Updated**: August 03, 2024 at 23:33 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Sulu is an open-source PHP content management system based on the Symfony framework. In versions of Sulu prior to 1.6.41, it is possible for a logged in admin user to add a script injection (cross-site-scripting) in the collection title. The problem is patched in version 1.6.41. As a workaround, one may manually patch the affected JavaScript files in lieu of updating.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**sulu - sulu**
Affected versions:
- < 1.6.41 (Status: affected)
### References
1. [](https://github.com/sulu/sulu/security/advisories/GHSA-gm2x-6475-g9r8)
2. [](https://github.com/sulu/sulu/releases/tag/1.6.41) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44210, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44210 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44210
- **State**: PUBLISHED
- **Published Date**: October 04, 2023 at 19:53 UTC
- **Last Updated**: September 19, 2024 at 15:43 UTC
- **Reserved Date**: September 26, 2023 at 20:08 UTC
- **Assigned By**: Acronis
### Vulnerability Description
Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 29258.
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Acronis - Acronis Agent**
Affected versions:
- unspecified (Status: affected)
### References
1. [SEC-2159](https://security-advisory.acronis.com/advisories/SEC-2159)
2. [SEC-5528](https://security-advisory.acronis.com/SEC-5528) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-1076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-1076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-1076
- **State**: PUBLISHED
- **Published Date**: November 29, 2000 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:45 UTC
- **Reserved Date**: November 29, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netscape (iPlanet) Certificate Management System 4.2 and Directory Server 4.12 stores the administrative password in plaintext, which could allow local and possibly remote attackers to gain administrative privileges on the server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20001026 [CORE SDI ADVISORY] iPlanet Certificate Management System 4.2 path traversal bug](http://archives.neohapsis.com/archives/bugtraq/2000-10/0383.html)
2. [iplanet-netscape-plaintext-password(5422)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5422) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0439, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0439
- **State**: PUBLISHED
- **Published Date**: July 17, 2023 at 13:29 UTC
- **Last Updated**: October 30, 2024 at 14:02 UTC
- **Reserved Date**: January 23, 2023 at 12:47 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The NEX-Forms WordPress plugin before 8.4.4 does not escape its form name, which could lead to Stored Cross-Site Scripting issues. By default only SuperAdmins (in multisite) / admins (in single site) can create forms, however there is a settings allowing them to give lower roles access to such feature.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - NEX-Forms**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/04cea9aa-b21c-49f8-836b-2d312253e09a)
### Credits
- Felipe Restrepo Rodriguez and Edison Poveda
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11013, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11013 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11013
- **State**: PUBLISHED
- **Published Date**: November 16, 2017 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 22:14 UTC
- **Reserved Date**: July 07, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, countOffset (in function UnpackCore) is increased for each loop, while there is no boundary check against "pIe->arraybound".
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [101774](http://www.securityfocus.com/bid/101774)
2. [](https://source.android.com/security/bulletin/2017-11-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9686, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9686 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9686
- **State**: PUBLISHED
- **Published Date**: October 10, 2017 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 01:26 UTC
- **Reserved Date**: June 15, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, there is a possible double free/use after free in the SPS driver when debugfs logging is used.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2017-10-01)
2. [101160](http://www.securityfocus.com/bid/101160) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40599, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40599 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40599
- **State**: PUBLISHED
- **Published Date**: July 06, 2024 at 00:00 UTC
- **Last Updated**: March 20, 2025 at 20:36 UTC
- **Reserved Date**: July 06, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the GuMaxDD skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phabricator.wikimedia.org/T361448) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3446, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3446
- **State**: PUBLISHED
- **Published Date**: May 01, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 05:47 UTC
- **Reserved Date**: April 28, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Framework Daemon in AlienVault Unified Security Management before 4.15 allows remote attackers to execute arbitrary Python code via a crafted plugin configuration file (.cfg).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-15-161/)
2. [](https://www.alienvault.com/forums/discussion/4415/)
3. [74403](http://www.securityfocus.com/bid/74403) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27795, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27795 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27795
- **State**: PUBLISHED
- **Published Date**: May 11, 2022 at 17:18 UTC
- **Last Updated**: September 17, 2024 at 00:26 UTC
- **Reserved Date**: March 23, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the acroform event that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Adobe - Acrobat Reader**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb22-16.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2404, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2404
- **State**: PUBLISHED
- **Published Date**: June 03, 2023 at 04:35 UTC
- **Last Updated**: December 20, 2024 at 23:57 UTC
- **Reserved Date**: April 28, 2023 at 16:01 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The CRM and Lead Management by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 2.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**vcita - CRM and Lead Management by vcita**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/e26ccd06-22e0-4d91-a53a-df6ead8a8e3b?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/crm-customer-relationship-management-by-vcita/trunk/vcita-callback.php)
3. [](https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita)
### Credits
- Jonas Höbenreich |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6526
- **State**: PUBLISHED
- **Published Date**: January 21, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 12:17 UTC
- **Reserved Date**: September 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Directory Server Enterprise Edition component in Oracle Fusion Middleware 7.0 allows remote attackers to affect integrity via unknown vectors related to Admin Console.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38751, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38751
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 12:01 UTC
- **Last Updated**: January 02, 2025 at 16:24 UTC
- **Reserved Date**: June 19, 2024 at 11:17 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Magazine3 Google Adsense & Banner Ads by AdsforWP allows Cross Site Request Forgery.This issue affects Google Adsense & Banner Ads by AdsforWP: from n/a through 1.9.28.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Magazine3 - Google Adsense & Banner Ads by AdsforWP**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/ads-for-wp/vulnerability/wordpress-adsforwp-plugin-1-9-28-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Majed Refaea (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24811, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24811 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24811
- **State**: PUBLISHED
- **Published Date**: February 22, 2023 at 19:13 UTC
- **Last Updated**: March 10, 2025 at 21:06 UTC
- **Reserved Date**: January 30, 2023 at 14:43 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Misskey is an open source, decentralized social media platform. In versions prior to 13.3.2 the URL preview function is subject to a cross site scripting vulnerability due to insufficient URL validation. Arbitrary JavaScript is executed when a malicious URL is loaded in the `View in Player` or `View in Window` preview. This has been fixed in version 13.3.2. Users are advised to upgrade. Users unable to upgrade should avoid usage of the `View in Player` or `View in Window` functions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**misskey-dev - misskey**
Affected versions:
- < 13.3.2 (Status: affected)
### References
1. [https://github.com/misskey-dev/misskey/security/advisories/GHSA-vc39-c453-67g3](https://github.com/misskey-dev/misskey/security/advisories/GHSA-vc39-c453-67g3)
2. [https://github.com/misskey-dev/misskey/commit/38f9d1e76428bea47c5944c440eab25428c7d99e](https://github.com/misskey-dev/misskey/commit/38f9d1e76428bea47c5944c440eab25428c7d99e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13401, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13401 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13401
- **State**: PUBLISHED
- **Published Date**: January 17, 2025 at 04:30 UTC
- **Last Updated**: February 12, 2025 at 20:31 UTC
- **Reserved Date**: January 14, 2025 at 18:19 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Payment Button for PayPal plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_paypal_checkout' shortcode in all versions up to, and including, 1.2.3.35 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**naa986 - Payment Button for PayPal**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/20fc675c-08a4-4d77-9872-335d23146906?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/wp-paypal/trunk/main.php#L72)
3. [](https://plugins.trac.wordpress.org/browser/wp-paypal/trunk/wp-paypal-checkout.php#L3)
4. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3223257%40wp-paypal&new=3223257%40wp-paypal&sfp_email=&sfph_mail=)
### Credits
- muhammad yudha |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45261, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45261 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45261
- **State**: PUBLISHED
- **Published Date**: October 24, 2024 at 00:00 UTC
- **Last Updated**: October 28, 2024 at 19:19 UTC
- **Reserved Date**: August 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The SID generated for a specific user is not tied to that user itself, which allows other users to potentially use it for authentication. Once an attacker bypasses the application's authentication procedures, they can generate a valid SID, escalate privileges, and gain full control.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Bypassing%20Login%20Mechanism%20with%20Passwordless%20User%20Login.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26887, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26887 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26887
- **State**: PUBLISHED
- **Published Date**: March 29, 2022 at 16:37 UTC
- **Last Updated**: April 16, 2025 at 16:35 UTC
- **Reserved Date**: March 17, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in DIAE_loopmapHandler.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Delta Electronics - DIAEnergie**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-081-01)
### Credits
- Michael Heinzl and Dusan Stevanovic of Trend Micro’s Zero Day Initiative reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1645, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1645 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1645
- **State**: PUBLISHED
- **Published Date**: May 31, 2011 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 22:37 UTC
- **Reserved Date**: April 05, 2011 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The web management interface on the Cisco RVS4000 Gigabit Security Router with software 1.x before 1.3.3.4 and 2.x before 2.0.2.7, and the WRVS4400N Gigabit Security Router with software before 2.0.2.1, allows remote attackers to read the backup configuration file, and consequently execute arbitrary code, via unspecified vectors, aka Bug ID CSCtn23871.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [47988](http://www.securityfocus.com/bid/47988)
2. [20110525 Cisco RVS4000 and WRVS4400N Web Management Interface Vulnerabilities](http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f190.shtml)
3. [1025565](http://www.securitytracker.com/id?1025565) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8994, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8994
- **State**: PUBLISHED
- **Published Date**: October 10, 2017 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 22:03 UTC
- **Reserved Date**: May 15, 2017 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A input validation vulnerability in HPE Operations Orchestration product all versions prior to 10.80, allows for the execution of code remotely.
### Affected Products
**Micro Focus - HPE Operations Orchestration**
Affected versions:
- All versions prior to 10.80 (Status: affected)
### References
1. [](https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03767en_us)
2. [](https://www.tenable.com/security/research/tra-2017-28)
3. [](https://www.tenable.com/security/research/tra-2017-25)
4. [100588](http://www.securityfocus.com/bid/100588) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4328, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4328
- **State**: PUBLISHED
- **Published Date**: December 17, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:38 UTC
- **Reserved Date**: December 17, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in webglimpse.cgi in Webglimpse 2.14.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the ID parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15916](http://www.securityfocus.com/bid/15916)
2. [](http://pridels0.blogspot.com/2005/12/webglimpse-xss-vuln.html)
3. [ADV-2005-2966](http://www.vupen.com/english/advisories/2005/2966)
4. [21791](http://www.osvdb.org/21791)
5. [18076](http://secunia.com/advisories/18076) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4725
- **State**: PUBLISHED
- **Published Date**: February 03, 2011 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 22:10 UTC
- **Reserved Date**: February 03, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31818, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31818
- **State**: PUBLISHED
- **Published Date**: June 17, 2021 at 13:22 UTC
- **Last Updated**: August 03, 2024 at 23:10 UTC
- **Reserved Date**: April 26, 2021 at 00:00 UTC
- **Assigned By**: Octopus
### Vulnerability Description
Affected versions of Octopus Server are prone to an authenticated SQL injection vulnerability in the Events REST API because user supplied data in the API request isn’t parameterised correctly. Exploiting this vulnerability could allow unauthorised access to database tables.
### Affected Products
**Octopus Deploy - Octopus Server**
Affected versions:
- 2018.9.17 (Status: affected)
- unspecified (Status: affected)
- 2021.1.7149 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://advisories.octopus.com/adv/2021-04---SQL-Injection-in-the-Events-REST-API-%28CVE-2021-31818%29.2013233248.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25703, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25703 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25703
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 11:31 UTC
- **Last Updated**: December 09, 2024 at 18:42 UTC
- **Reserved Date**: February 13, 2023 at 04:13 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Meta slider and carousel with lightbox allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Meta slider and carousel with lightbox: from n/a through 1.6.2.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**WP OnlineSupport, Essential Plugin - Meta slider and carousel with lightbox**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/meta-slider-and-carousel-with-lightbox/vulnerability/wordpress-meta-slider-and-carousel-with-lightbox-plugin-1-6-2-broken-access-control?_s_id=cve)
### Credits
- Cat (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39843, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39843
- **State**: PUBLISHED
- **Published Date**: September 23, 2024 at 00:00 UTC
- **Last Updated**: September 23, 2024 at 19:49 UTC
- **Reserved Date**: June 29, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQL injection vulnerability in Centreon 24.04.2 allows a remote high-privileged attacker to execute arbitrary SQL command via create user form inputs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/centreon/centreon/releases)
2. [](https://thewatch.centreon.com/latest-security-bulletins-64/security-bulletin-for-centreon-web-3809) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46286, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46286 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46286
- **State**: PUBLISHED
- **Published Date**: March 21, 2023 at 22:26 UTC
- **Last Updated**: January 17, 2025 at 18:54 UTC
- **Reserved Date**: December 21, 2022 at 17:02 UTC
- **Assigned By**: icscert
### Vulnerability Description
Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.
### Affected Products
**VISAM - VBASE**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-05) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8262, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8262 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8262
- **State**: PUBLISHED
- **Published Date**: March 03, 2025 at 14:25 UTC
- **Last Updated**: March 10, 2025 at 07:36 UTC
- **Reserved Date**: August 28, 2024 at 13:34 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Proliz Software OBS allows Path Traversal.This issue affects OBS: before 24.0927.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Proliz Software - OBS**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-25-0049)
### Credits
- Mustafa Anil YILDIRIM |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24772, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24772 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24772
- **State**: PUBLISHED
- **Published Date**: February 28, 2024 at 11:26 UTC
- **Last Updated**: February 12, 2025 at 09:27 UTC
- **Reserved Date**: January 30, 2024 at 09:30 UTC
- **Assigned By**: apache
### Vulnerability Description
A guest user could exploit a chart data REST API and send arbitrary SQL statements that on error could leak information from the underlying analytics database.This issue affects Apache Superset: before 3.0.4, from 3.1.0 before 3.1.1.
Users are recommended to upgrade to version 3.1.1 or 3.0.4, which fixes the issue.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Apache Software Foundation - Apache Superset**
Affected versions:
- 0 (Status: affected)
- 3.1.0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5)
### Credits
- Beto Ferreira De Almeida
- Linden Haynes |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3678, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3678 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3678
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 23, 2011 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25602, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25602 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25602
- **State**: PUBLISHED
- **Published Date**: March 18, 2022 at 18:00 UTC
- **Last Updated**: February 20, 2025 at 20:30 UTC
- **Reserved Date**: February 21, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Nonce token leak vulnerability leading to arbitrary file upload, theme deletion, plugin settings change discovered in Responsive Menu WordPress plugin (versions <= 4.1.7).
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**ExpressTech - Responsive Menu (WordPress plugin)**
Affected versions:
- <= 4.1.7 (Status: affected)
### References
1. [](https://wordpress.org/plugins/responsive-menu/#developers)
2. [](https://patchstack.com/database/vulnerability/responsive-menu/wordpress-responsive-menu-plugin-4-1-7-nonce-token-leak-leading-to-arbitrary-file-upload-theme-deletion-plugin-settings-change-vulnerability)
### Credits
- Vulnerability discovered by Dave Jong (Patchstack). |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0593, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0593 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0593
- **State**: PUBLISHED
- **Published Date**: January 31, 2023 at 09:31 UTC
- **Last Updated**: March 27, 2025 at 14:37 UTC
- **Reserved Date**: January 31, 2023 at 09:26 UTC
- **Assigned By**: ONEKEY
### Vulnerability Description
A path traversal vulnerability affects yaffshiv YAFFS filesystem extractor. By crafting a malicious YAFFS file, an attacker could force yaffshiv to write outside of the extraction directory.
This issue affects yaffshiv up to version 0.1 included, which is the most recent at time of publication.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**devttys0 - yaffshiv**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/)
2. [](https://github.com/devttys0/yaffshiv/pull/3/files)
### Credits
- Quentin Kaiser from ONEKEY Research Labs |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37165
- **State**: PUBLISHED
- **Published Date**: August 02, 2021 at 10:48 UTC
- **Last Updated**: August 04, 2024 at 01:16 UTC
- **Reserved Date**: July 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A buffer overflow issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. When a message is sent to the HMI TCP socket, it is forwarded to the hmiProcessMsg function through the pendingQ, and may lead to remote code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.swisslog-healthcare.com)
2. [](https://www.armis.com/PwnedPiper)
3. [](https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37165-bulletin---overflow-in-hmiprocessmsg.pdf?rev=2e2678dab62b41ba999cd6d1e03974ca&hash=F465ACE2C7FAED826B52FE996E36ACEC)
4. [](https://www.swisslog-healthcare.com/en-us/customer-care/security-information/cve-disclosures#:~:text=CVE%20Disclosures%20%20%20%20Vulnerability%20Name%20%2C%20%20CVE-2021-37164%20%204%20more%20rows%20) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26986, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26986 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26986
- **State**: PUBLISHED
- **Published Date**: April 10, 2023 at 00:00 UTC
- **Last Updated**: February 11, 2025 at 17:18 UTC
- **Reserved Date**: February 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in China Mobile OA Mailbox PC v2.9.23 allows remote attackers to execute arbitrary commands on a victim host via user interaction with a crafted EML file sent to their OA mailbox.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/YZLCQX/Mailbox-remote-command-execution)
2. [](https://gist.github.com/YZLCQX/0da0a438292a5479470c52dad8210462) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41442
- **State**: PUBLISHED
- **Published Date**: November 15, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 19:01 UTC
- **Reserved Date**: August 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Kloudq Technologies Limited Tor Equip 1.0, Tor Loco Mini 1.0 through 3.1 allows a remote attacker to execute arbitrary code via a crafted request to the MQTT component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://writeups.ayyappan.me/v/tor-iot-mqtt/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11596, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11596 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11596
- **State**: PUBLISHED
- **Published Date**: November 21, 2024 at 09:30 UTC
- **Last Updated**: November 22, 2024 at 15:41 UTC
- **Reserved Date**: November 21, 2024 at 09:30 UTC
- **Assigned By**: GitLab
### Vulnerability Description
ECMP dissector crash in Wireshark 4.4.0 to 4.4.1 and 4.2.0 to 4.2.8 allows denial of service via packet injection or crafted capture file
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**Wireshark Foundation - Wireshark**
Affected versions:
- 4.4.0 (Status: affected)
- 4.2.0 (Status: affected)
### References
1. [](https://www.wireshark.org/security/wnpa-sec-2024-15.html)
2. [GitLab Issue #20214](https://gitlab.com/wireshark/wireshark/-/issues/20214)
### Credits
- Ivan Nardi |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1349, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1349
- **State**: PUBLISHED
- **Published Date**: July 01, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 09:34 UTC
- **Reserved Date**: January 08, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Use-after-free vulnerability in Safari in Apple iOS before 7.1.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an invalid URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [68276](http://www.securityfocus.com/bid/68276)
2. [APPLE-SA-2014-06-30-3](http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html)
3. [1030500](http://www.securitytracker.com/id/1030500) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14641, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14641 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14641
- **State**: PUBLISHED
- **Published Date**: September 21, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 19:34 UTC
- **Reserved Date**: September 21, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A NULL pointer dereference was discovered in the AP4_DataAtom class in MetaData/Ap4MetaData.cpp in Bento4 version 1.5.0-617. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/axiomatic-systems/Bento4/issues/184)
2. [](https://blogs.gentoo.org/ago/2017/09/14/bento4-null-pointer-dereference-in-ap4_dataatomap4_dataatom-ap4metadata-cpp/)
3. [](https://github.com/axiomatic-systems/Bento4/commit/41cad602709436628f07b4c4f64e9ff7a611f687) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4229
- **State**: PUBLISHED
- **Published Date**: June 30, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 06:11 UTC
- **Reserved Date**: June 04, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The web framework in Cisco Unified Communications Domain Manager 8.1(4)ER1 allows remote attackers to obtain sensitive information by visiting a bvsmweb URL, aka Bug ID CSCuq22589.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032749](http://www.securitytracker.com/id/1032749)
2. [75473](http://www.securityfocus.com/bid/75473)
3. [20150629 Cisco Unified Communications Domain Manager Information Disclosure Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=39557) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3374, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3374
- **State**: PUBLISHED
- **Published Date**: October 31, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:43 UTC
- **Reserved Date**: May 07, 2014 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the CCM admin interface in the Server in Cisco Unified Communications Manager allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuq90582.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [cisco-ucm-cve20143374-xss(98407)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98407)
2. [70849](http://www.securityfocus.com/bid/70849)
3. [20141030 Cisco Unified Communications Manager Admin Interface Reflected Cross-Site Scripting Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3374)
4. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=36295)
5. [1031162](http://www.securitytracker.com/id/1031162)
6. [59696](http://secunia.com/advisories/59696) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-7256, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-7256 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-7256
- **State**: PUBLISHED
- **Published Date**: August 30, 2024 at 23:44 UTC
- **Last Updated**: September 03, 2024 at 20:07 UTC
- **Reserved Date**: April 11, 2024 at 15:02 UTC
- **Assigned By**: Tcpdump
### Vulnerability Description
In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-415: Security Weakness
### Affected Products
**The Tcpdump Group - libpcap**
Affected versions:
- 1.8.x (Status: affected)
- 1.9.x (Status: affected)
- 1.10.x (Status: affected)
### References
1. [](https://github.com/the-tcpdump-group/libpcap/commit/262e4f34979872d822ccedf9f318ed89c4d31c03)
2. [](https://github.com/the-tcpdump-group/libpcap/commit/2aa69b04d8173b18a0e3492e0c8f2f7fabdf642d)
### Credits
- Dora Sweet |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24673, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24673 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24673
- **State**: PUBLISHED
- **Published Date**: January 24, 2025 at 17:24 UTC
- **Last Updated**: January 24, 2025 at 18:56 UTC
- **Reserved Date**: January 23, 2025 at 14:52 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in AyeCode Ltd Ketchup Shortcodes allows Stored XSS. This issue affects Ketchup Shortcodes: from n/a through 0.1.2.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**AyeCode Ltd - Ketchup Shortcodes**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/ketchup-shortcodes-pack/vulnerability/wordpress-ketchup-shortcodes-plugin-0-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- zaim (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6214
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: August 14, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2336
- **State**: PUBLISHED
- **Published Date**: August 17, 2022 at 20:07 UTC
- **Last Updated**: April 16, 2025 at 16:13 UTC
- **Reserved Date**: July 06, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Softing Secure Integration Server, edgeConnector, and edgeAggregator software ships with the default administrator credentials as `admin` and password as `admin`. This allows Softing to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the `admin` password. There is no warning or prompt to ask the user to change the default password, and to change the password, many steps are required.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Softing - Secure Integration Server**
Affected versions:
- V1.22 (Status: affected)
**Softing - edgeConnector Siemens**
Affected versions:
- V3.10 (Status: affected)
**Softing - edgeConnector 840D**
Affected versions:
- V3.10 (Status: affected)
**Softing - edgeConnector Modbus**
Affected versions:
- V3.10 (Status: affected)
**Softing - edgeAggregator**
Affected versions:
- V3.10 (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04)
2. [](https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-6.html)
### Credits
- Pedro Ribeiro and Radek Domanski, working with Trend Micro Zero Day Initiative, reported these vulnerabilities to Softing and CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13184, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13184 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13184
- **State**: PUBLISHED
- **Published Date**: January 12, 2018 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 17:18 UTC
- **Reserved Date**: August 23, 2017 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In the enableVSyncInjections function of SurfaceFlinger, there is a possible use after free of mVSyncInjector. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-65483324.
### Affected Products
**Google Inc. - Android**
Affected versions:
- 8.0 (Status: affected)
- 8.1 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-01-01)
2. [1040106](http://www.securitytracker.com/id/1040106)
3. [102414](http://www.securityfocus.com/bid/102414) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40433, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40433 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40433
- **State**: PUBLISHED
- **Published Date**: July 26, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 04:33 UTC
- **Reserved Date**: July 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Insecure Permissions vulnerability in Tencent wechat v.8.0.37 allows an attacker to escalate privileges via the web-view component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/yikaikkk/CookieShareInWebView/blob/master/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46387, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46387 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46387
- **State**: PUBLISHED
- **Published Date**: November 30, 2023 at 00:00 UTC
- **Last Updated**: November 26, 2024 at 19:22 UTC
- **Reserved Date**: October 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LOYTEC electronics GmbH LINX-212 and LINX-151 devices (all versions) are vulnerable to Incorrect Access Control via dpal_config.zml file. This vulnerability allows remote attackers to disclose sensitive information on Loytec device data point configuration.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20231127 [CVE-2023-46386, CVE-2023-46387, CVE-2023-46388, CVE-2023-46389] Multiple vulnerabilities in Loytec products (3)](http://seclists.org/fulldisclosure/2023/Nov/7)
2. [](http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html)
3. [](https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/)
4. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44311, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44311 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44311
- **State**: PUBLISHED
- **Published Date**: November 08, 2022 at 00:00 UTC
- **Last Updated**: May 01, 2025 at 18:16 UTC
- **Reserved Date**: October 30, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
html2xhtml v1.3 was discovered to contain an Out-Of-Bounds read in the function static void elm_close(tree_node_t *nodo) at procesador.c. This vulnerability allows attackers to access sensitive files or cause a Denial of Service (DoS) via a crafted html file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jfisteus/html2xhtml/issues/19) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1177
- **State**: PUBLISHED
- **Published Date**: March 29, 2010 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 19:56 UTC
- **Reserved Date**: March 29, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Safari on Apple iPhone OS 3.1.3 for iPod touch allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving document.write calls with long crafted strings.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://nishantdaspatnaik.yolasite.com/ipodpoc2.php)
2. [38994](http://www.securityfocus.com/bid/38994) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20151, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20151 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20151
- **State**: PUBLISHED
- **Published Date**: April 05, 2023 at 00:00 UTC
- **Last Updated**: October 25, 2024 at 15:58 UTC
- **Reserved Date**: October 27, 2022 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Cisco - Cisco Small Business RV Series Router Firmware **
Affected versions:
- n/a (Status: affected)
### References
1. [20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4282, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4282
- **State**: PUBLISHED
- **Published Date**: December 16, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:38 UTC
- **Reserved Date**: December 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Zaygo DomainCart 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML, possibly via the root parameter to zaygo.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15893](http://www.securityfocus.com/bid/15893)
2. [ADV-2005-2917](http://www.vupen.com/english/advisories/2005/2917)
3. [](http://pridels0.blogspot.com/2005/12/domaincart-xss.html)
4. [18035](http://secunia.com/advisories/18035)
5. [21729](http://www.osvdb.org/21729) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8021, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8021
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 19:46 UTC
- **Last Updated**: August 04, 2024 at 21:02 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-41.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24910, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24910 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24910
- **State**: PUBLISHED
- **Published Date**: May 12, 2022 at 17:01 UTC
- **Last Updated**: April 15, 2025 at 19:03 UTC
- **Reserved Date**: February 22, 2022 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A buffer overflow vulnerability exists in the httpd parse_ping_result API functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted file can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**InHand Networks - InRouter302**
Affected versions:
- V3.5.4 (Status: affected)
### References
1. [](https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf)
2. [](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1471) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38998, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38998 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38998
- **State**: PUBLISHED
- **Published Date**: August 09, 2023 at 00:00 UTC
- **Last Updated**: October 10, 2024 at 18:33 UTC
- **Reserved Date**: July 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An open redirect in the Login page of OPNsense Community Edition before 23.7 and Business Edition before 23.4.2 allows attackers to redirect a victim user to an arbitrary web site via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/opnsense/core/commit/6bc025af1705dcdd8ef22ff5d4fcb986fa4e45f8)
2. [](https://logicaltrust.net/blog/2023/08/opnsense.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0856, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0856 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0856
- **State**: PUBLISHED
- **Published Date**: November 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:37 UTC
- **Reserved Date**: November 22, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Common Cryptographic Architecture (CCA) in IBM 4758 allows an attacker with physical access to the system and Combine_Key_Parts permissions, to steal DES and 3DES keys by using a brute force attack to create a 3DES exporter key.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20011109 Extracting a 3DES key from an IBM 4758](http://marc.info/?l=bugtraq&m=100533053219673&w=2)
2. [](http://www.cl.cam.ac.uk/~rnc1/descrack/attack.html)
3. [3524](http://www.securityfocus.com/bid/3524)
4. [](http://www.cl.cam.ac.uk/~rnc1/descrack/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15953, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15953
- **State**: PUBLISHED
- **Published Date**: October 28, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 20:13 UTC
- **Reserved Date**: October 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
bchunk (related to BinChunker) 1.2.0 and 1.2.1 is vulnerable to a heap-based buffer overflow and crash when processing a malformed CUE (.cue) file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/extramaster/bchunk/issues/2)
2. [](https://github.com/hessu/bchunk/issues/1)
3. [[debian-lts-announce] 20171102 [SECURITY] [DLA 1158-1] bchunk security update](https://lists.debian.org/debian-lts-announce/2017/11/msg00001.html)
4. [DSA-4026](https://www.debian.org/security/2017/dsa-4026) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3547
- **State**: PUBLISHED
- **Published Date**: November 16, 2005 at 07:37 UTC
- **Last Updated**: August 07, 2024 at 23:17 UTC
- **Reserved Date**: November 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Invision Power Board 2.1 allows remote attackers to inject arbitrary web script or HTML via the (1) adsess, (2) name, and (3) description parameters in admin.php, and the (4) ACP Notes, (5) Member Name, (6) Password, (7) Email Address, (8) Components, and multiple other input fields.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20051104 Failles dans Invision Power Board 2.1 [xss]](http://www.securityfocus.com/archive/1/415801/30/0/threaded)
2. [invision-powerboard-admin-xss(22999)](https://exchange.xforce.ibmcloud.com/vulnerabilities/22999)
3. [20520](http://osvdb.org/20520)
4. [20519](http://osvdb.org/20519)
5. [15344](http://www.securityfocus.com/bid/15344)
6. [17443](http://secunia.com/advisories/17443)
7. [20518](http://osvdb.org/20518)
8. [20516](http://osvdb.org/20516)
9. [20517](http://osvdb.org/20517)
10. [15345](http://www.securityfocus.com/bid/15345)
11. [20521](http://osvdb.org/20521)
12. [](http://benji.redkod.org/audits/ipb.2.1.pdf)
13. [20522](http://osvdb.org/20522) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21120, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21120 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21120
- **State**: PUBLISHED
- **Published Date**: April 16, 2024 at 21:26 UTC
- **Last Updated**: October 31, 2024 at 13:09 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Core). Supported versions that are affected are 8.5.6 and 8.5.7. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Outside In Technology executes to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. CVSS 3.1 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Affected Products
**Oracle Corporation - Outside In Technology**
Affected versions:
- 8.5.6 (Status: affected)
- 8.5.7 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15884, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15884 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15884
- **State**: PUBLISHED
- **Published Date**: August 28, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 10:10 UTC
- **Reserved Date**: August 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
RICOH MP C4504ex devices allow HTML Injection via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/149082/RICOH-MP-C4504ex-Cross-Site-Request-Forgery.html)
2. [45264](https://www.exploit-db.com/exploits/45264/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0160, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0160 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0160
- **State**: PUBLISHED
- **Published Date**: February 28, 2025 at 19:02 UTC
- **Last Updated**: February 28, 2025 at 19:50 UTC
- **Reserved Date**: December 31, 2024 at 19:09 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1) could allow a remote attacker with access to the system to execute arbitrary Java code due to improper restrictions in the RPCAdapter service.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-114: Security Weakness
### Affected Products
**IBM - Storage Virtualize**
Affected versions:
- 8.5.0.0 (Status: affected)
- 8.5.1.0 (Status: affected)
- 8.5.2.0 (Status: affected)
- 8.5.3.0 (Status: affected)
- 8.5.4.0 (Status: affected)
- 8.6.0.0 (Status: affected)
- 8.6.1.0 (Status: affected)
- 8.6.2.0 (Status: affected)
- 8.6.3.0 (Status: affected)
- 8.7.1.0 (Status: affected)
- 8.7.2.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7184182) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1122
- **State**: PUBLISHED
- **Published Date**: February 13, 2013 at 23:00 UTC
- **Last Updated**: September 17, 2024 at 00:06 UTC
- **Reserved Date**: January 11, 2013 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco NX-OS on the Nexus 7000, when a certain Overlay Transport Virtualization (OTV) configuration is used, allows remote attackers to cause a denial of service (M1-Series module reload) via crafted packets, aka Bug ID CSCud15673.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130206 Cisco Nexus 7000 M1-Series Modules Crafted Packet Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1122) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5000, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5000 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5000
- **State**: PUBLISHED
- **Published Date**: June 04, 2024 at 08:54 UTC
- **Last Updated**: August 01, 2024 at 20:55 UTC
- **Reserved Date**: May 16, 2024 at 12:09 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
An unauthenticated remote attacker can use a malicious OPC UA client to send a crafted request to affected CODESYS products which can cause a DoS due to incorrect calculation of buffer size.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-131: Security Weakness
### Affected Products
**CODESYS - CODESYS Control for BeagleBone SL**
Affected versions:
- 0 (Status: affected)
**CODESYS - CODESYS Control for emPC-A/iMX6 SL**
Affected versions:
- 0 (Status: affected)
**CODESYS - CODESYS Control for IOT2000 SL**
Affected versions:
- 0 (Status: affected)
**CODESYS - CODESYS Control for Linux ARM SL**
Affected versions:
- 0 (Status: affected)
**CODESYS - CODESYS Control for Linux SL**
Affected versions:
- 0 (Status: affected)
**CODESYS - CODESYS Control for PFC100 SL**
Affected versions:
- 0 (Status: affected)
**CODESYS - CODESYS Control for PFC200 SL**
Affected versions:
- 0 (Status: affected)
**CODESYS - CODESYS Control for PLCnext SL**
Affected versions:
- 0 (Status: affected)
**CODESYS - CODESYS Control for Raspberry Pi SL**
Affected versions:
- 0 (Status: affected)
**CODESYS - CODESYS Control for WAGO Touch Panels 600 SL**
Affected versions:
- 0 (Status: affected)
**CODESYS - CODESYS Control RTE (for Beckhoff CX) SL**
Affected versions:
- 0 (Status: affected)
**CODESYS - CODESYS Control RTE (SL)**
Affected versions:
- 0 (Status: affected)
**CODESYS - CODESYS Runtime Toolkit**
Affected versions:
- 0 (Status: affected)
**CODESYS - CODESYS Control Win (SL)**
Affected versions:
- 0 (Status: affected)
**CODESYS - CODESYS HMI (SL)**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert.vde.com/en/advisories/VDE-2024-026)
2. [](https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=18355&token=e3e5a937ce72602bec39718ddc2f4ba6d983ccd1&download=)
### Credits
- ABB Schweiz AG. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54020
- **State**: PUBLISHED
- **Published Date**: May 28, 2025 at 07:55 UTC
- **Last Updated**: May 28, 2025 at 14:21 UTC
- **Reserved Date**: November 27, 2024 at 15:20 UTC
- **Assigned By**: fortinet
### Vulnerability Description
A missing authorization in Fortinet FortiManager versions 7.2.0 through 7.2.1, and versions 7.0.0 through 7.0.7 may allow an authenticated attacker to overwrite global threat feeds via crafted update requests.
### CVSS Metrics
- **CVSS Base Score**: 2.1/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Fortinet - FortiManager**
Affected versions:
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
### References
1. [https://fortiguard.fortinet.com/psirt/FG-IR-24-023](https://fortiguard.fortinet.com/psirt/FG-IR-24-023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52794, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52794 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52794
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 15:31 UTC
- **Last Updated**: May 04, 2025 at 07:43 UTC
- **Reserved Date**: May 21, 2024 at 15:19 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
thermal: intel: powerclamp: fix mismatch in get function for max_idle
KASAN reported this
[ 444.853098] BUG: KASAN: global-out-of-bounds in param_get_int+0x77/0x90
[ 444.853111] Read of size 4 at addr ffffffffc16c9220 by task cat/2105
...
[ 444.853442] The buggy address belongs to the variable:
[ 444.853443] max_idle+0x0/0xffffffffffffcde0 [intel_powerclamp]
There is a mismatch between the param_get_int and the definition of
max_idle. Replacing param_get_int with param_get_byte resolves this
issue.
### Affected Products
**Linux - Linux**
Affected versions:
- ebf519710218814cf827adbf9111af081344c969 (Status: affected)
- ebf519710218814cf827adbf9111af081344c969 (Status: affected)
- ebf519710218814cf827adbf9111af081344c969 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.3 (Status: affected)
- 0 (Status: unaffected)
- 6.5.13 (Status: unaffected)
- 6.6.3 (Status: unaffected)
- 6.7 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/6a3866dbdcf39ac93e98708e6abced511733dc18)
2. [](https://git.kernel.org/stable/c/0a8585281b11e3a0723bba8d8085d61f0b55f37c)
3. [](https://git.kernel.org/stable/c/fae633cfb729da2771b5433f6b84ae7e8b4aa5f7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0289, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0289 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0289
- **State**: PUBLISHED
- **Published Date**: May 17, 2018 at 03:00 UTC
- **Last Updated**: November 29, 2024 at 15:09 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the logs component of Cisco Identity Services Engine could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks. The vulnerability is due to improper validation of requests stored in logs in the application management interface. An attacker could exploit this vulnerability by sending malicious requests to the targeted system. An exploit could allow the attacker to conduct cross-site scripting attacks when an administrator views the log files. Cisco Bug IDs: CSCvh11308.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - Cisco Identity Services Engine**
Affected versions:
- Cisco Identity Services Engine (Status: affected)
### References
1. [1040925](http://www.securitytracker.com/id/1040925)
2. [104196](http://www.securityfocus.com/bid/104196)
3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-ise-xss) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16700, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16700
- **State**: PUBLISHED
- **Published Date**: October 16, 2019 at 18:37 UTC
- **Last Updated**: August 05, 2024 at 01:17 UTC
- **Reserved Date**: September 22, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The slub_events (aka SLUB: Event Registration) extension through 3.0.2 for TYPO3 allows uploading of arbitrary files to the webserver. For versions 1.2.2 and below, this results in Remote Code Execution. In versions later than 1.2.2, this can result in Denial of Service, since the web space can be filled up with arbitrary files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://extensions.typo3.org/extension/slub_events)
2. [](https://typo3.org/security/advisory/typo3-ext-sa-2019-017/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5698, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5698 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5698
- **State**: PUBLISHED
- **Published Date**: June 05, 2025 at 22:00 UTC
- **Last Updated**: June 09, 2025 at 14:51 UTC
- **Reserved Date**: June 04, 2025 at 20:29 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in Brilliance Golden Link Secondary System up to 20250424. Affected is an unknown function of the file /sysframework/logSelect.htm. The manipulation of the argument nodename leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**Brilliance - Golden Link Secondary System**
Affected versions:
- 20250424 (Status: affected)
### References
1. [VDB-311214 | Brilliance Golden Link Secondary System logSelect.htm sql injection](https://vuldb.com/?id.311214)
2. [VDB-311214 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311214)
3. [Submit #588324 | BRILLIANCE TECH Golden Link Secondary System 20250424 SQL Injection](https://vuldb.com/?submit.588324)
4. [](https://github.com/K-mxredo/MXdocument/blob/K-mxredo-blob/%E9%BB%84%E9%87%91%E9%80%9Asysframework-logSelect.htm.md)
### Credits
- SecHZredo (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29510, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29510 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29510
- **State**: PUBLISHED
- **Published Date**: July 03, 2024 at 00:00 UTC
- **Last Updated**: August 19, 2024 at 07:47 UTC
- **Reserved Date**: March 19, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.ghostscript.com/show_bug.cgi?id=707662)
2. [](https://www.openwall.com/lists/oss-security/2024/07/03/7)
3. [](https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16693
- **State**: REJECTED
- **Published Date**: December 20, 2021 at 22:47 UTC
- **Last Updated**: December 20, 2021 at 22:47 UTC
- **Reserved Date**: August 04, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3787, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3787 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3787
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:40 UTC
- **Reserved Date**: June 19, 2012 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31211, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31211 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31211
- **State**: PUBLISHED
- **Published Date**: July 17, 2022 at 22:43 UTC
- **Last Updated**: August 03, 2024 at 07:11 UTC
- **Reserved Date**: May 19, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Infiray IRAY-A8Z3 1.0.957. There is a blank root password for TELNET by default.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11156
- **State**: PUBLISHED
- **Published Date**: November 02, 2020 at 06:21 UTC
- **Last Updated**: August 04, 2024 at 11:28 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
u'Buffer over-read issue in Bluetooth estack due to lack of check for invalid length of L2cap packet received from peer device.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in QCA6390, QCN7605, QCS404, SA415M, SA515M, SC8180X, SDX55, SM8250
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- QCA6390, QCN7605, QCS404, SA415M, SA515M, SC8180X, SDX55, SM8250 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0803, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0803 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0803
- **State**: PUBLISHED
- **Published Date**: July 31, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:03 UTC
- **Reserved Date**: July 29, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, allows remote attackers to display restricted products and components via a direct HTTP request to queryhelp.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A05.asc)
2. [FreeBSD-SN-02:05](ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:05.asc)
3. [4964](http://www.securityfocus.com/bid/4964)
4. [](http://bugzilla.mozilla.org/show_bug.cgi?id=126801)
5. [20020608 [BUGZILLA] Security Advisory For Versions of Bugzilla 2.14 Prior To 2.14.2, 2.16 Prior To 2.16rc2](http://archives.neohapsis.com/archives/bugtraq/2002-06/0054.html)
6. [bugzilla-queryhelp-obtain-information(9300)](http://www.iss.net/security_center/static/9300.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28561, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28561 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28561
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 09:15 UTC
- **Last Updated**: August 02, 2024 at 13:43 UTC
- **Reserved Date**: March 17, 2023 at 11:41 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption in QESL while processing payload from external ESL device to firmware.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- QCN7606 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6472, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6472 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6472
- **State**: PUBLISHED
- **Published Date**: December 20, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 16:11 UTC
- **Reserved Date**: December 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in phpMyRealty (PMR) 1.0.9 allow (1) remote attackers to execute arbitrary SQL commands via the type parameter to search.php and (2) remote authenticated administrators to execute arbitrary SQL commands via the listing_updated_days parameter to admin/findlistings.php. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [phpmyrealty-findlistings-sql-injection(39122)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39122)
2. [39267](http://www.osvdb.org/39267)
3. [4750](https://www.exploit-db.com/exploits/4750)
4. [26932](http://www.securityfocus.com/bid/26932)
5. [28155](http://secunia.com/advisories/28155)
6. [phpmyrealty-search-sql-injection(39121)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39121) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3512, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3512
- **State**: PUBLISHED
- **Published Date**: July 11, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 18:30 UTC
- **Reserved Date**: July 11, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Internet Explorer 6 on Windows XP allows remote attackers to cause a denial of service (crash) by setting the Enabled property of a DXTFilter ActiveX object to true, which triggers a null dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ie-dxtfilter-dos(27623)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27623)
2. [18903](http://www.securityfocus.com/bid/18903)
3. [ADV-2006-2732](http://www.vupen.com/english/advisories/2006/2732)
4. [27014](http://www.osvdb.org/27014) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38290, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38290
- **State**: PUBLISHED
- **Published Date**: August 09, 2021 at 10:58 UTC
- **Last Updated**: August 04, 2024 at 01:37 UTC
- **Reserved Date**: August 09, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A host header attack vulnerability exists in FUEL CMS 1.5.0 through fuel/modules/fuel/config/fuel_constants.php and fuel/modules/fuel/libraries/Asset.php. An attacker can use a man in the middle attack such as phishing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/daylightstudio/FUEL-CMS/issues/580)
2. [](https://github.com/daylightstudio/FUEL-CMS/commit/8a0d88ad6869623c90e24b3b2ea33352049d39a7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13053
- **State**: PUBLISHED
- **Published Date**: July 02, 2018 at 12:00 UTC
- **Last Updated**: August 05, 2024 at 08:52 UTC
- **Reserved Date**: July 02, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3821-1](https://usn.ubuntu.com/3821-1/)
2. [](https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=5f936e19cc0ef97dbe3a56e9498922ad5ba1edef)
3. [](https://bugzilla.kernel.org/show_bug.cgi?id=200303)
4. [USN-3821-2](https://usn.ubuntu.com/3821-2/)
5. [[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html)
6. [104671](http://www.securityfocus.com/bid/104671)
7. [[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html)
8. [[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update](https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html)
9. [RHSA-2019:0831](https://access.redhat.com/errata/RHSA-2019:0831)
10. [RHSA-2019:2043](https://access.redhat.com/errata/RHSA-2019:2043)
11. [RHSA-2019:2029](https://access.redhat.com/errata/RHSA-2019:2029)
12. [USN-4094-1](https://usn.ubuntu.com/4094-1/)
13. [USN-4118-1](https://usn.ubuntu.com/4118-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1584, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1584 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1584
- **State**: PUBLISHED
- **Published Date**: April 22, 2019 at 15:35 UTC
- **Last Updated**: September 17, 2024 at 03:22 UTC
- **Reserved Date**: January 12, 2016 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
In all versions of Unity8 a running but not active application on a large-screen device could talk with Maliit and consume keyboard input.
### Affected Products
**Ubuntu - Unity8**
Affected versions:
- all (Status: affected)
### References
1. [](https://bazaar.launchpad.net/~mir-team/qtmir/trunk/revision/521) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1189, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1189 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1189
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:19 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in Nokia IPSO 3.7, configured as IP Clusters, allows remote attackers to cause a denial of service via unknown attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1007992](http://securitytracker.com/id?1007992)
2. [8928](http://www.securityfocus.com/bid/8928)
3. [nokia-ipso-ipcluster-dos(13539)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13539)
4. [10083](http://secunia.com/advisories/10083)
5. [2724](http://www.osvdb.org/2724) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24218, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24218 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24218
- **State**: PUBLISHED
- **Published Date**: October 06, 2020 at 13:10 UTC
- **Last Updated**: August 04, 2024 at 15:12 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can log in as root via the password that is hard-coded in the executable file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.kb.cert.org/vuls/id/896979)
2. [](https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2895, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2895 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2895
- **State**: PUBLISHED
- **Published Date**: September 26, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 19:50 UTC
- **Reserved Date**: May 19, 2012 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The PDF functionality in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger out-of-bounds write operations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://code.google.com/p/chromium/issues/detail?id=145029)
2. [](https://code.google.com/p/chromium/issues/detail?id=145157)
3. [](http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html)
4. [](https://code.google.com/p/chromium/issues/detail?id=146460)
5. [oval:org.mitre.oval:def:15773](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15773) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33287, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33287
- **State**: PUBLISHED
- **Published Date**: May 31, 2023 at 00:00 UTC
- **Last Updated**: January 10, 2025 at 15:29 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross-site scripting (XSS) vulnerability in the Inline Table Editing application before 3.8.0 for Confluence allows attackers to store and execute arbitrary JavaScript via a crafted payload injected into the tables.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://marketplace.atlassian.com/apps/1217271/inline-table-editing/version-history)
2. [](https://actonic.de/produkte/inline-table-editing/)
3. [](https://marketplace.atlassian.com/apps/1217271/inline-table-editing?hosting=server&tab=versions) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40058
- **State**: PUBLISHED
- **Published Date**: March 07, 2022 at 13:49 UTC
- **Last Updated**: August 04, 2024 at 02:27 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability.
### Affected Products
**Huawei - EMUI**
Affected versions:
- 10.1.1 (Status: affected)
- 10.1.0 (Status: affected)
**Huawei - Magic UI**
Affected versions:
- 3.1.1 (Status: affected)
- 3.1.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2022/3/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000671, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000671
- **State**: PUBLISHED
- **Published Date**: September 06, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 12:40 UTC
- **Reserved Date**: August 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
sympa version 6.2.16 and later contains a CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability in The "referer" parameter of the wwsympa.fcgi login action. that can result in Open redirection and reflected XSS via data URIs. This attack appear to be exploitable via Victim's browser must follow a URL supplied by the attacker. This vulnerability appears to have been fixed in none available.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sympa-community/sympa/issues/268)
2. [[debian-lts-announce] 20180921 [SECURITY] [DLA 1512-1] sympa security update](https://lists.debian.org/debian-lts-announce/2018/09/msg00023.html)
3. [USN-4442-1](https://usn.ubuntu.com/4442-1/)
4. [[debian-lts-announce] 20201109 [SECURITY] [DLA 2441-1] sympa security update](https://lists.debian.org/debian-lts-announce/2020/11/msg00015.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1711, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1711 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1711
- **State**: PUBLISHED
- **Published Date**: June 21, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:34 UTC
- **Reserved Date**: June 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BasiliX 1.1.0 saves attachments in a world readable /tmp/BasiliX directory, which allows local users to read other users' attachments.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [basilix-webmail-view-attachments(9387)](https://exchange.xforce.ibmcloud.com/vulnerabilities/9387)
2. [20020619 [VulnWatch] BasiliX multiple vulnerabilities](http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0117.html)
3. [5065](http://www.securityfocus.com/bid/5065)
4. [20020618 BasiliX multiple vulnerabilities](http://online.securityfocus.com/archive/1/277710) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0222, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0222 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0222
- **State**: PUBLISHED
- **Published Date**: January 10, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 07:39 UTC
- **Reserved Date**: January 10, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unrestricted file upload vulnerability in ajaxfilemanager.php in the Wp-FileManager 1.2 plugin for WordPress allows remote attackers to upload and execute arbitrary PHP code via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27151](http://www.securityfocus.com/bid/27151)
2. [4844](https://www.exploit-db.com/exploits/4844)
3. [wordpress-wpfilemanager-file-upload(39462)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39462) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6241
- **State**: PUBLISHED
- **Published Date**: March 07, 2017 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 01:22 UTC
- **Reserved Date**: July 17, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in the amap_alloc1 function in OpenBSD 5.8 and 5.9 allows local users to execute arbitrary code with kernel privileges via a large size value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036318](http://www.securitytracker.com/id/1036318)
2. [](http://www.openbsd.org/errata59.html)
3. [[oss-security] 20160714 Multiple Bugs in OpenBSD Kernel](http://www.openwall.com/lists/oss-security/2016/07/14/5)
4. [[oss-security] 20160717 ReL Multiple Bugs in OpenBSD Kernel](http://www.openwall.com/lists/oss-security/2016/07/17/7)
5. [](http://www.openbsd.org/errata58.html)
6. [91805](http://www.securityfocus.com/bid/91805) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2363, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2363 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2363
- **State**: PUBLISHED
- **Published Date**: July 20, 2021 at 22:43 UTC
- **Last Updated**: September 26, 2024 at 14:01 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Public Sector Financials (International) product of Oracle E-Business Suite (component: Authorization). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Public Sector Financials (International). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Public Sector Financials (International) accessible data as well as unauthorized access to critical data or complete access to all Oracle Public Sector Financials (International) accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Oracle Corporation - Public Sector Financials (International)**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3321, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3321
- **State**: PUBLISHED
- **Published Date**: January 27, 2017 at 22:01 UTC
- **Last Updated**: October 08, 2024 at 20:29 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: General). Supported versions that are affected are 7.2.19 and earlier, 7.3.8 and earlier and 7.4.5 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS v3.0 Base Score 3.7 (Availability impacts).
### Affected Products
**Oracle - MySQL Cluster**
Affected versions:
- 7.2.19 and earlier (Status: affected)
- 7.3.8 and earlier (Status: affected)
- 7.4.5 and earlier (Status: affected)
### References
1. [95562](http://www.securityfocus.com/bid/95562)
2. [1037640](http://www.securitytracker.com/id/1037640)
3. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7203, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7203 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7203
- **State**: PUBLISHED
- **Published Date**: December 18, 2020 at 22:17 UTC
- **Last Updated**: August 04, 2024 at 09:25 UTC
- **Reserved Date**: January 16, 2020 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A potential security vulnerability has been identified in HPE iLO Amplifier Pack server version 1.70. The vulnerability could be exploited to allow remote code execution.
### Affected Products
**n/a - iLO Amplifier Pack**
Affected versions:
- Ver 1.70 (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04067en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14796, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14796 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14796
- **State**: PUBLISHED
- **Published Date**: September 20, 2018 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 02:21 UTC
- **Reserved Date**: August 01, 2018 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Tec4Data SmartCooler, all versions prior to firmware 180806, the device responds to a remote unauthenticated reboot command that may be used to perform a denial of service attack.
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**Tec4Data - SmartCooler**
Affected versions:
- all versions prior to firmware 180806 (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-263-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26225, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26225 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26225
- **State**: PUBLISHED
- **Published Date**: November 16, 2020 at 21:35 UTC
- **Last Updated**: August 04, 2024 at 15:49 UTC
- **Reserved Date**: October 01, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
In PrestaShop Product Comments before version 4.2.0, an attacker could inject malicious web code into the users' web browsers by creating a malicious link. The problem was introduced in version 4.0.0 and is fixed in 4.2.0
### CVSS Metrics
- **CVSS Base Score**: 8.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**PrestaShop - productcomments**
Affected versions:
- >= 4.0.0, < 4.2.0 (Status: affected)
### References
1. [](https://github.com/PrestaShop/productcomments/security/advisories/GHSA-58w4-w77w-qv3w)
2. [](https://github.com/PrestaShop/productcomments/commit/c56e3e9495c4a0a9c1e7dc43e1bb0fcad2796dbf) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.