System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6507, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6507 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6507 - **State**: PUBLISHED - **Published Date**: December 20, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 20:26 UTC - **Reserved Date**: December 13, 2006 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Mozilla Firefox 2.0 before 2.0.0.1 allows remote attackers to bypass Cross-Site Scripting (XSS) protection via vectors related to a Function.prototype regression error. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [21668](http://www.securityfocus.com/bid/21668) 2. [23672](http://secunia.com/advisories/23672) 3. [ADV-2006-5068](http://www.vupen.com/english/advisories/2006/5068) 4. [1017422](http://securitytracker.com/id?1017422) 5. [23282](http://secunia.com/advisories/23282) 6. [HPSBUX02153](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742) 7. [23614](http://secunia.com/advisories/23614) 8. [](http://www.mozilla.org/security/announce/2006/mfsa2006-76.html) 9. [USN-398-1](http://www.ubuntu.com/usn/usn-398-1) 10. [ADV-2008-0083](http://www.vupen.com/english/advisories/2008/0083) 11. [SUSE-SA:2006:080](http://www.novell.com/linux/security/advisories/2006_80_mozilla.html) 12. [23545](http://secunia.com/advisories/23545) 13. [TA06-354A](http://www.us-cert.gov/cas/techalerts/TA06-354A.html) 14. [23589](http://secunia.com/advisories/23589) 15. [SSRT061181](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742) 16. [SUSE-SA:2007:006](http://www.novell.com/linux/security/advisories/2007_06_mozilla.html) 17. [GLSA-200701-02](http://security.gentoo.org/glsa/glsa-200701-02.xml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-50044, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-50044 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-50044 - **State**: PUBLISHED - **Published Date**: December 20, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 22:09 UTC - **Reserved Date**: December 04, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cesanta MJS 2.20.0 has a getprop_builtin_foreign out-of-bounds read if a Built-in API name occurs in a substring of an input string. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/cesanta/mjs/issues/254) 2. [](https://github.com/cesanta/mjs/pull/255)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7439, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7439 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7439 - **State**: PUBLISHED - **Published Date**: March 20, 2019 at 20:05 UTC - **Last Updated**: August 04, 2024 at 20:46 UTC - **Reserved Date**: February 05, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description cgi-bin/qcmap_web_cgi on JioFi 4G M2S 1.0.2 devices allows a DoS (Hang) via the mask POST parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gkaim.com/cve-2019-7439-vikas-chaudhary/) 2. [46752](https://www.exploit-db.com/exploits/46752/) 3. [](http://packetstormsecurity.com/files/152626/JioFi-4G-M2S-1.0.2-Denial-Of-Service.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0976, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0976 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0976 - **State**: PUBLISHED - **Published Date**: December 10, 2003 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:12 UTC - **Reserved Date**: December 09, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description NFS Server (XNFS.NLM) for Novell NetWare 6.5 does not properly enforce sys:\etc\exports when hostname aliases from sys:etc\hosts file are used, which could allow users to mount file systems when XNFS should deny the host. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.novell.com/cgi-bin/search/searchtid.cgi?/10089375.htm) 2. [netware-nfs-share-access(13915)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13915)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4162, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4162 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4162 - **State**: PUBLISHED - **Published Date**: January 03, 2011 at 19:26 UTC - **Last Updated**: August 07, 2024 at 03:34 UTC - **Reserved Date**: November 04, 2010 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple integer overflows in fs/bio.c in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (system crash) via a crafted device ioctl to a SCSI device. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SA:2011:004](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html) 2. [42778](http://secunia.com/advisories/42778) 3. [42801](http://secunia.com/advisories/42801) 4. [SUSE-SA:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html) 5. [FEDORA-2010-18983](http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html) 6. [44793](http://www.securityfocus.com/bid/44793) 7. [SUSE-SA:2011:001](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html) 8. [42932](http://secunia.com/advisories/42932) 9. [RHSA-2011:0007](http://www.redhat.com/support/errata/RHSA-2011-0007.html) 10. [ADV-2011-0124](http://www.vupen.com/english/advisories/2011/0124) 11. [[oss-security] 20101110 CVE request: kernel: Multiple DoS issues in block layer](http://openwall.com/lists/oss-security/2010/11/10/18) 12. [SUSE-SA:2011:007](http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html) 13. [SUSE-SA:2010:060](http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html) 14. [ADV-2010-3321](http://www.vupen.com/english/advisories/2010/3321) 15. [[oss-security] 20101112 Re: CVE request: kernel: Multiple DoS issues in block layer](http://openwall.com/lists/oss-security/2010/11/12/2) 16. [ADV-2011-0298](http://www.vupen.com/english/advisories/2011/0298) 17. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2) 18. [](https://bugzilla.redhat.com/show_bug.cgi?id=652529) 19. [42890](http://secunia.com/advisories/42890) 20. [ADV-2011-0012](http://www.vupen.com/english/advisories/2011/0012) 21. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb4644cac4a2797afc847e6c92736664d4b0ea34) 22. [MDVSA-2011:029](http://www.mandriva.com/security/advisories?name=MDVSA-2011:029) 23. [42745](http://secunia.com/advisories/42745)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1002, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1002 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1002 - **State**: PUBLISHED - **Published Date**: February 22, 2011 at 18:00 UTC - **Last Updated**: August 06, 2024 at 22:14 UTC - **Reserved Date**: February 14, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2011:0779](http://www.redhat.com/support/errata/RHSA-2011-0779.html) 2. [avahi-udp-packet-dos(65525)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65525) 3. [[oss-security] 20110222 Re: [oss-security] CVE request: avahi daemon remote denial of service by sending NULL UDP](http://www.openwall.com/lists/oss-security/2011/02/22/9) 4. [RHSA-2011:0436](http://www.redhat.com/support/errata/RHSA-2011-0436.html) 5. [ADV-2011-0511](http://www.vupen.com/english/advisories/2011/0511) 6. [[oss-security] 20110218 CVE request: avahi daemon remote denial of service by sending NULL UDP](http://openwall.com/lists/oss-security/2011/02/18/1) 7. [43605](http://secunia.com/advisories/43605) 8. [43465](http://secunia.com/advisories/43465) 9. [43673](http://secunia.com/advisories/43673) 10. [ADV-2011-0601](http://www.vupen.com/english/advisories/2011/0601) 11. [](https://bugzilla.redhat.com/show_bug.cgi?id=667187) 12. [ADV-2011-0969](http://www.vupen.com/english/advisories/2011/0969) 13. [avahi-udp-dos(65524)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65524) 14. [44131](http://secunia.com/advisories/44131) 15. [MDVSA-2011:040](http://www.mandriva.com/security/advisories?name=MDVSA-2011:040) 16. [46446](http://www.securityfocus.com/bid/46446) 17. [MDVSA-2011:037](http://www.mandriva.com/security/advisories?name=MDVSA-2011:037) 18. [ADV-2011-0448](http://www.vupen.com/english/advisories/2011/0448) 19. [SUSE-SR:2011:005](http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html) 20. [DSA-2174](http://www.debian.org/security/2011/dsa-2174) 21. [ADV-2011-0499](http://www.vupen.com/english/advisories/2011/0499) 22. [70948](http://osvdb.org/70948) 23. [43361](http://secunia.com/advisories/43361) 24. [ADV-2011-0670](http://www.vupen.com/english/advisories/2011/0670) 25. [](http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/) 26. [](http://avahi.org/ticket/325) 27. [FEDORA-2011-3033](http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055858.html) 28. [ADV-2011-0565](http://www.vupen.com/english/advisories/2011/0565) 29. [](http://git.0pointer.de/?p=avahi.git%3Ba=commit%3Bh=46109dfec75534fe270c0ab902576f685d5ab3a6) 30. [USN-1084-1](http://ubuntu.com/usn/usn-1084-1) 31. [[oss-security] 20110218 Re: CVE request: avahi daemon remote denial of service by sending NULL UDP](http://openwall.com/lists/oss-security/2011/02/18/4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41304, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41304 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41304 - **State**: PUBLISHED - **Published Date**: October 14, 2022 at 00:00 UTC - **Last Updated**: May 14, 2025 at 15:31 UTC - **Reserved Date**: September 21, 2022 at 00:00 UTC - **Assigned By**: autodesk ### Vulnerability Description An Out-Of-Bounds Write Vulnerability in Autodesk FBX SDK 2020 version and prior may lead to code execution through maliciously crafted FBX files or information disclosure. ### Affected Products **n/a - FBX SDK** Affected versions: - 2020.3.1 (Status: affected) ### References 1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0022)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19318, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19318 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19318 - **State**: PUBLISHED - **Published Date**: November 27, 2019 at 23:41 UTC - **Last Updated**: August 05, 2024 at 02:16 UTC - **Reserved Date**: November 26, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer, ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19318) 2. [](https://security.netapp.com/advisory/ntap-20200103-0001/) 3. [openSUSE-SU-2020:0336](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html) 4. [USN-4414-1](https://usn.ubuntu.com/4414-1/) 5. [[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update](https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-20974, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-20974 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-20974 - **State**: PUBLISHED - **Published Date**: May 07, 2025 at 08:24 UTC - **Last Updated**: May 07, 2025 at 14:39 UTC - **Reserved Date**: November 06, 2024 at 02:30 UTC - **Assigned By**: SamsungMobile ### Vulnerability Description Improper handling of insufficient permission in PackageInstallerCN prior to version 15.0.11.0 allows local attacker to bypass user interaction for requested installation. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N` ### Affected Products **Samsung Mobile - PackageInstallerCN** Affected versions: - 15.0.11.0 (Status: unaffected) ### References 1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=05)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25144, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25144 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25144 - **State**: PUBLISHED - **Published Date**: March 07, 2023 at 22:19 UTC - **Last Updated**: March 06, 2025 at 16:04 UTC - **Reserved Date**: February 03, 2023 at 15:46 UTC - **Assigned By**: trendmicro ### Vulnerability Description An improper access control vulnerability in the Trend Micro Apex One agent could allow a local attacker to gain elevated privileges and create arbitrary directories with arbitrary ownership. ### Affected Products **Trend Micro, Inc. - Trend Micro Apex One** Affected versions: - 2019 (14.0) (Status: affected) ### References 1. [](https://success.trendmicro.com/solution/000292209) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-23-171/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1297, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1297 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1297 - **State**: PUBLISHED - **Published Date**: April 26, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:44 UTC - **Reserved Date**: April 26, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the include.cgi script allows remote attackers to inject arbitrary web script or HTML via the argument. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050425 remote command execution in include.cgi script](http://marc.info/?l=bugtraq&m=111445189816161&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9909, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9909 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9909 - **State**: PUBLISHED - **Published Date**: October 16, 2020 at 16:43 UTC - **Last Updated**: August 04, 2024 at 10:43 UTC - **Reserved Date**: March 02, 2020 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations. ### Affected Products **Apple - iOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/HT211288) 2. [](https://support.apple.com/HT211290) 3. [](https://support.apple.com/HT211291)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8425, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8425 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8425 - **State**: PUBLISHED - **Published Date**: February 28, 2025 at 08:23 UTC - **Last Updated**: February 28, 2025 at 13:25 UTC - **Reserved Date**: September 04, 2024 at 14:18 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WooCommerce Ultimate Gift Card plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'mwb_wgm_preview_mail' and 'mwb_wgm_woocommerce_add_cart_item_data' functions in all versions up to, and including, 2.6.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **WP Swings - WooCommerce Ultimate Gift Card** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/6ebffb82-7455-40c9-9ffd-b78e0e73e431?source=cve) 2. [](https://codecanyon.net/item/woocommerce-ultimate-gift-card/19191057) ### Credits - Tonn
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21905, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21905 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21905 - **State**: PUBLISHED - **Published Date**: January 11, 2022 at 20:23 UTC - **Last Updated**: January 02, 2025 at 18:22 UTC - **Reserved Date**: December 14, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Hyper-V Security Feature Bypass Vulnerability ### CVSS Metrics - **CVSS Base Score**: 4.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H1** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Hyper-V Security Feature Bypass Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21905)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29696, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29696 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29696 - **State**: PUBLISHED - **Published Date**: August 02, 2021 at 16:35 UTC - **Last Updated**: September 17, 2024 at 01:56 UTC - **Reserved Date**: March 31, 2021 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Cloud Pak for Security (CP4S) 1.5.0.0, 1.5.1.0, 1.6.0.0, 1.6.1.0, 1.7.0.0, and 1.7.1.0 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. ### Affected Products **IBM - Cloud Pak for Security** Affected versions: - 1.6.0.0 (Status: affected) - 1.5.0.1 (Status: affected) - 1.5.0.0 (Status: affected) - 1.6.0.1 (Status: affected) - 1.7.0.0 (Status: affected) - 1.7.1.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6476940) 2. [ibm-cp4s-cve202129696-command-exec (200597)](https://exchange.xforce.ibmcloud.com/vulnerabilities/200597)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8154, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8154 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8154 - **State**: PUBLISHED - **Published Date**: May 09, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 06:46 UTC - **Reserved Date**: March 14, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka "Microsoft Exchange Memory Corruption Vulnerability." This affects Microsoft Exchange Server. This CVE ID is unique from CVE-2018-8151. ### Affected Products **Microsoft - Microsoft Exchange Server** Affected versions: - 2010 Service Pack 3 Update Rollup 21 (Status: affected) - 2013 Cumulative Update 19 (Status: affected) - 2013 Cumulative Update 20 (Status: affected) - 2013 Service Pack 1 (Status: affected) - 2016 Cumulative Update 8 (Status: affected) - 2016 Cumulative Update 9 (Status: affected) ### References 1. [104054](http://www.securityfocus.com/bid/104054) 2. [1040850](http://www.securitytracker.com/id/1040850) 3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8154)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27179, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27179 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27179 - **State**: PUBLISHED - **Published Date**: April 11, 2023 at 00:00 UTC - **Last Updated**: February 11, 2025 at 15:43 UTC - **Reserved Date**: February 27, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GDidees CMS v3.9.1 and lower was discovered to contain an arbitrary file download vulenrability via the filename parameter at /_admin/imgdownload.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://knowledge-base.secureflag.com/vulnerabilities/unrestricted_file_download/unrestricted_file_download_vulnerability.html) 2. [](https://www.gdidees.eu/cms-1-0.html) 3. [](https://gist.github.com/Hadi999/516aa25b953b0cba57089a0c11b1305b) 4. [](http://packetstormsecurity.com/files/171894/GDidees-CMS-3.9.1-Local-File-Disclosure-Directory-Traversal.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-24135, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-24135 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-24135 - **State**: PUBLISHED - **Published Date**: January 29, 2024 at 00:00 UTC - **Last Updated**: June 05, 2025 at 18:29 UTC - **Reserved Date**: January 25, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Product Name and Product Code in the 'Add Product' section of Sourcecodester Product Inventory with Export to Excel 1.0 are vulnerable to XSS attacks. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BurakSevben/2024_Product_Inventory_with_Export_to_Excel_XSS/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22681, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22681 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22681 - **State**: PUBLISHED - **Published Date**: March 20, 2023 at 10:56 UTC - **Last Updated**: January 10, 2025 at 19:19 UTC - **Reserved Date**: January 06, 2023 at 12:02 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Aarvanshinfotech Online Exam Software: eExamhall plugin <= 4.0 versions. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Aarvanshinfotech - Online Exam Software : eExamhall** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/eexamhall/wordpress-online-exam-software-eexamhall-plugin-4-0-cross-site-request-forgery-csrf?_s_id=cve) ### Credits - NeginNrb (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0923, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0923 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0923 - **State**: PUBLISHED - **Published Date**: January 22, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:37 UTC - **Reserved Date**: November 24, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description authenticate.cgi CGI program in Aplio PRO allows remote attackers to execute arbitrary commands via shell metacharacters in the password parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [uclinux-apliophone-bin-execute(5333)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5333) 2. [1784](http://www.securityfocus.com/bid/1784) 3. [20001006 Fwd: APlio PRO web shell](http://archives.neohapsis.com/archives/bugtraq/2000-10/0107.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10946, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10946 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10946 - **State**: PUBLISHED - **Published Date**: October 31, 2017 at 19:00 UTC - **Last Updated**: August 05, 2024 at 17:50 UTC - **Reserved Date**: July 05, 2017 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.1.6871. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the setItem function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-4721. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Foxit - Foxit Reader** Affected versions: - 8.2.1.6871 (Status: affected) ### References 1. [](https://www.foxitsoftware.com/support/security-bulletins.php) 2. [](https://zerodayinitiative.com/advisories/ZDI-17-459)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22949, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22949 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22949 - **State**: PUBLISHED - **Published Date**: January 10, 2025 at 00:00 UTC - **Last Updated**: January 14, 2025 at 14:51 UTC - **Reserved Date**: January 09, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda ac9 v1.0 firmware v15.03.05.19 is vulnerable to command injection in /goform/SetSambaCfg, which may lead to remote arbitrary code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://noisy-caravel-a9a.notion.site/Tenda_AC9V1-0_V15-03-05-19_formSetSambaConf_doSystemCmd_CI-16f898c94eac80d5801bdaf777ac2b27)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0783, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0783 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0783 - **State**: PUBLISHED - **Published Date**: March 22, 2000 at 05:00 UTC - **Last Updated**: August 01, 2024 at 16:48 UTC - **Reserved Date**: November 25, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FreeBSD allows local users to conduct a denial of service by creating a hard link from a device special file to a file on an NFS file system. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [I-057](http://www.ciac.org/ciac/bulletins/i-057.shtml) 2. [6090](http://www.osvdb.org/6090)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5586, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5586 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5586 - **State**: PUBLISHED - **Published Date**: October 15, 2023 at 00:28 UTC - **Last Updated**: September 16, 2024 at 20:00 UTC - **Reserved Date**: October 15, 2023 at 00:27 UTC - **Assigned By**: @huntrdev ### Vulnerability Description NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3.0-DEV. ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **gpac - gpac/gpac** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740) 2. [](https://github.com/gpac/gpac/commit/ca1b48f0abe71bf81a58995d7d75dc27f5a17ddc)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20617, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20617 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20617 - **State**: PUBLISHED - **Published Date**: January 12, 2022 at 19:05 UTC - **Last Updated**: August 03, 2024 at 02:17 UTC - **Reserved Date**: October 28, 2021 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository. ### Affected Products **Jenkins project - Jenkins Docker Commons Plugin** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1878) 2. [[oss-security] 20220112 Multiple vulnerabilities in Jenkins and Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/01/12/6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11654, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11654 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11654 - **State**: PUBLISHED - **Published Date**: July 26, 2017 at 14:00 UTC - **Last Updated**: August 05, 2024 at 18:12 UTC - **Reserved Date**: July 26, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An out-of-bounds read and write flaw was found in the way SIPcrack 0.2 processed SIP traffic, because 0x00 termination of a payload array was mishandled. A remote attacker could potentially use this flaw to crash the sipdump process by generating specially crafted SIP traffic. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://openwall.com/lists/oss-security/2017/07/26/1) 2. [100023](http://www.securityfocus.com/bid/100023)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39167, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39167 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39167 - **State**: PUBLISHED - **Published Date**: December 07, 2023 at 14:05 UTC - **Last Updated**: August 02, 2024 at 18:02 UTC - **Reserved Date**: July 25, 2023 at 14:06 UTC - **Assigned By**: CERTVDE ### Vulnerability Description In SENEC Storage Box V1,V2 and V3 an unauthenticated remote attacker can obtain the devices' logfiles that contain sensitive data. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **SENEC - Storage Box V1** Affected versions: - all (until 19.06.2023) (Status: affected) **SENEC - Storage Box V2** Affected versions: - all (until 19.06.2023) (Status: affected) **SENEC - Storage Box V3** Affected versions: - all (until 19.06.2023) (Status: affected) ### References 1. [](https://seclists.org/fulldisclosure/2023/Nov/5) ### Credits - Ph0s[4] - R0ckE7
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-23993, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-23993 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-23993 - **State**: PUBLISHED - **Published Date**: July 10, 2023 at 15:27 UTC - **Last Updated**: October 17, 2024 at 15:49 UTC - **Reserved Date**: January 20, 2023 at 09:29 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in LionScripts.Com LionScripts: IP Blocker Lite plugin <= 11.1.1 versions. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **LionScripts.com - LionScripts: IP Blocker Lite** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/ip-address-blocker/wordpress-lionscripts-ip-blocker-lite-plugin-11-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37688, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37688 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37688 - **State**: PUBLISHED - **Published Date**: August 12, 2021 at 22:00 UTC - **Last Updated**: August 04, 2024 at 01:23 UTC - **Reserved Date**: July 29, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service. The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L268-L285) unconditionally dereferences a pointer. We have patched the issue in GitHub commit 15691e456c7dc9bd6be203b09765b063bf4a380c. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **tensorflow - tensorflow** Affected versions: - >= 2.5.0, < 2.5.1 (Status: affected) - >= 2.4.0, < 2.4.3 (Status: affected) - < 2.3.4 (Status: affected) ### References 1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vcjj-9vg7-vf68) 2. [](https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2243, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2243 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2243 - **State**: PUBLISHED - **Published Date**: April 22, 2023 at 16:31 UTC - **Last Updated**: August 02, 2024 at 06:19 UTC - **Reserved Date**: April 22, 2023 at 15:49 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Complaint Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file users/registration.php of the component POST Parameter Handler. The manipulation of the argument fullname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227228. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Complaint Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.227228) 2. [](https://vuldb.com/?ctiid.227228) 3. [](https://github.com/HibuMk/bug_report/blob/main/SQLi.md) ### Credits - mckayyang (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21666, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21666 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21666 - **State**: PUBLISHED - **Published Date**: January 31, 2025 at 11:25 UTC - **Last Updated**: May 04, 2025 at 07:18 UTC - **Reserved Date**: December 29, 2024 at 08:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] Recent reports have shown how we sometimes call vsock_*_has_data() when a vsock socket has been de-assigned from a transport (see attached links), but we shouldn't. Previous commits should have solved the real problems, but we may have more in the future, so to avoid null-ptr-deref, we can return 0 (no space, no data available) but with a warning. This way the code should continue to run in a nearly consistent state and have a warning that allows us to debug future problems. ### Affected Products **Linux - Linux** Affected versions: - c0cfa2d8a788fcf45df5bf4070ab2474c88d543a (Status: affected) - c0cfa2d8a788fcf45df5bf4070ab2474c88d543a (Status: affected) - c0cfa2d8a788fcf45df5bf4070ab2474c88d543a (Status: affected) - c0cfa2d8a788fcf45df5bf4070ab2474c88d543a (Status: affected) - c0cfa2d8a788fcf45df5bf4070ab2474c88d543a (Status: affected) - c0cfa2d8a788fcf45df5bf4070ab2474c88d543a (Status: affected) **Linux - Linux** Affected versions: - 5.5 (Status: affected) - 0 (Status: unaffected) - 5.10.234 (Status: unaffected) - 5.15.177 (Status: unaffected) - 6.1.127 (Status: unaffected) - 6.6.74 (Status: unaffected) - 6.12.11 (Status: unaffected) - 6.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/daeac89cdb03d30028186f5ff7dc26ec8fa843e7) 2. [](https://git.kernel.org/stable/c/9e5fed46ccd2c34c5fa5a9c8825ce4823fdc853e) 3. [](https://git.kernel.org/stable/c/b52e50dd4fabd12944172bd486a4f4853b7f74dd) 4. [](https://git.kernel.org/stable/c/bc9c49341f9728c31fe248c5fbba32d2e81a092b) 5. [](https://git.kernel.org/stable/c/c23d1d4f8efefb72258e9cedce29de10d057f8ca) 6. [](https://git.kernel.org/stable/c/91751e248256efc111e52e15115840c35d85abaf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6361, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6361 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6361 - **State**: PUBLISHED - **Published Date**: December 11, 2014 at 00:00 UTC - **Last Updated**: August 06, 2024 at 12:10 UTC - **Reserved Date**: September 11, 2014 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 Gold and SP1, Excel 2013 RT Gold and SP1, and Office Compatibility Pack allow remote attackers to execute arbitrary code via a crafted Office document, aka "Excel Invalid Pointer Remote Code Execution Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS14-083](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-083)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13669, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13669 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13669 - **State**: PUBLISHED - **Published Date**: August 24, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 19:05 UTC - **Reserved Date**: August 24, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL Injection exists in NexusPHP 1.5.beta5.20120707 via the setanswered parameter to staffbox.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/bingtanguan/cve/blob/master/201701)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3201, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3201 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3201 - **State**: PUBLISHED - **Published Date**: June 08, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 05:39 UTC - **Reserved Date**: April 10, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Thermostat before 2.0.0 uses world-readable permissions for the web.xml configuration file, which allows local users to obtain user credentials by reading the file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2015-8867](http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159788.html) 2. [](http://icedtea.classpath.org/hg/thermostat/rev/c2f18f81f57a) 3. [](http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=2372) 4. [RHSA-2015:1052](http://rhn.redhat.com/errata/RHSA-2015-1052.html) 5. [75066](http://www.securityfocus.com/bid/75066) 6. [FEDORA-2015-8919](http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159958.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13246, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13246 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13246 - **State**: PUBLISHED - **Published Date**: January 09, 2025 at 18:52 UTC - **Last Updated**: January 10, 2025 at 19:34 UTC - **Reserved Date**: January 09, 2025 at 18:27 UTC - **Assigned By**: drupal ### Vulnerability Description Improper Ownership Management vulnerability in Drupal Node Access Rebuild Progressive allows Target Influence via Framing.This issue affects Node Access Rebuild Progressive: from 0.0.0 before 2.0.2. ### Weakness Classification (CWE) - CWE-282: Security Weakness ### Affected Products **Drupal - Node Access Rebuild Progressive** Affected versions: - 0.0.0 (Status: affected) ### References 1. [](https://www.drupal.org/sa-contrib-2024-010) ### Credits - Pierre Rudloff - Pierre Rudloff - Shelane French - Greg Knaddison - Damien McKenna
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0988, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0988 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0988 - **State**: PUBLISHED - **Published Date**: March 26, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 01:06 UTC - **Reserved Date**: March 18, 2010 at 00:00 UTC - **Assigned By**: flexera ### Vulnerability Description Multiple unspecified vulnerabilities in Pulse CMS before 1.2.3 allow (1) remote attackers to write to arbitrary files and execute arbitrary PHP code via vectors related to improper handling of login failures by includes/login.php; and allow remote authenticated users to write to arbitrary files and execute arbitrary PHP code via vectors involving the (2) filename and (3) block parameters to view.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20100324 Secunia Research: Pulse CMS login.php Arbitrary File Writing Vulnerability](http://www.securityfocus.com/archive/1/510300/100/0/threaded) 2. [](http://secunia.com/secunia_research/2010-45/) 3. [](http://secunia.com/secunia_research/2010-51/) 4. [63168](http://www.osvdb.org/63168) 5. [38956](http://www.securityfocus.com/bid/38956) 6. [63166](http://www.osvdb.org/63166) 7. [20100324 Secunia Research: Pulse CMS Arbitrary File Writing Vulnerability](http://www.securityfocus.com/archive/1/510299/100/0/threaded) 8. [39011](http://secunia.com/advisories/39011)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45426, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45426 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45426 - **State**: PUBLISHED - **Published Date**: February 25, 2025 at 19:39 UTC - **Last Updated**: February 26, 2025 at 16:49 UTC - **Reserved Date**: August 28, 2024 at 21:50 UTC - **Assigned By**: Zoom ### Vulnerability Description Incorrect ownership assignment in some Zoom Workplace Apps may allow a privileged user to conduct an information disclosure via network access. ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-708: Security Weakness ### Affected Products **Zoom Communications, Inc - Zoom Workplace Apps** Affected versions: - See references (Status: affected) ### References 1. [](https://www.zoom.com/en/trust/security-bulletin/zsb-24038/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9659, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9659 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9659 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 29, 2016 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38116, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38116 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38116 - **State**: PUBLISHED - **Published Date**: August 13, 2024 at 17:30 UTC - **Last Updated**: May 21, 2025 at 21:06 UTC - **Reserved Date**: June 11, 2024 at 22:36 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows IP Routing Management Snapin Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows 11 Version 24H2** Affected versions: - 10.0.26100.0 (Status: affected) ### References 1. [Windows IP Routing Management Snapin Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38116)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3499, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3499 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3499 - **State**: PUBLISHED - **Published Date**: July 11, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 10:43 UTC - **Reserved Date**: May 14, 2014 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1111687) 2. [RHSA-2014:0820](http://rhn.redhat.com/errata/RHSA-2014-0820.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16191, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16191 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16191 - **State**: PUBLISHED - **Published Date**: June 07, 2018 at 02:00 UTC - **Last Updated**: September 17, 2024 at 01:56 UTC - **Reserved Date**: October 29, 2017 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description cypserver is a static file server. cypserver is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **HackerOne - cypserver node module** Affected versions: - All versions (Status: affected) ### References 1. [](https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/cypserver) 2. [](https://nodesecurity.io/advisories/440)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0784, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0784 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0784 - **State**: PUBLISHED - **Published Date**: February 12, 2023 at 07:29 UTC - **Last Updated**: August 02, 2024 at 05:24 UTC - **Reserved Date**: February 12, 2023 at 07:28 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in SourceCodester Best Online News Portal 1.0. Affected is an unknown function of the component Login Page. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220644. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Best Online News Portal** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.220644) 2. [](https://vuldb.com/?ctiid.220644) 3. [](https://youtu.be/V62MSWhLGL4) ### Credits - Gab3 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42619, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42619 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42619 - **State**: PUBLISHED - **Published Date**: August 20, 2024 at 00:00 UTC - **Last Updated**: August 20, 2024 at 18:42 UTC - **Reserved Date**: August 05, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/domain_management.php?id=0&list=whitelist&remove=pligg.com ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/jinwu1234567890/cms2/tree/main/17/readme.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37372, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37372 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37372 - **State**: PUBLISHED - **Published Date**: October 26, 2021 at 12:12 UTC - **Last Updated**: August 04, 2024 at 01:16 UTC - **Reserved Date**: July 21, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Online Student Admission System 1.0 is affected by an insecure file upload vulnerability. A low privileged user can upload malicious PHP files by updating their profile image to gain remote code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.sourcecodester.com/php/14874/online-student-admission-system.html) 2. [](http://packetstormsecurity.com/files/164625/Online-Student-Admission-System-1.0-SQL-Injection-Shell-Upload.html) 3. [](https://packetstormsecurity.com/files/164625/Online_Admission_System_CVEs-Gerard-Carbonell.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11781, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11781 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11781 - **State**: PUBLISHED - **Published Date**: December 12, 2024 at 05:24 UTC - **Last Updated**: December 12, 2024 at 14:56 UTC - **Reserved Date**: November 26, 2024 at 15:46 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Smart Agenda – Prise de rendez-vous en ligne plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'smartagenda' shortcode in all versions up to, and including, 4.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **smartagenda - Smart Agenda – Prise de rendez-vous en ligne** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1a7bb274-9bbf-4d78-ad81-0e7ac6b7b265?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3201483%40smart-agenda-prise-de-rendez-vous-en-ligne&new=3201483%40smart-agenda-prise-de-rendez-vous-en-ligne&sfp_email=&sfph_mail=) ### Credits - Djaidja Moundjid
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19649, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19649 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19649 - **State**: PUBLISHED - **Published Date**: December 17, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 11:44 UTC - **Reserved Date**: November 28, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description XSS exists in InfoVista VistaPortal SE Version 5.1 (build 51029). VPortal/mgtconsole/RolePermissions.jsp has reflected XSS via the ConnPoolName parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html) 2. [20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)](http://seclists.org/fulldisclosure/2018/Dec/20)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41655, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41655 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41655 - **State**: PUBLISHED - **Published Date**: September 29, 2023 at 13:24 UTC - **Last Updated**: September 20, 2024 at 16:01 UTC - **Reserved Date**: August 30, 2023 at 13:02 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Andreas Heigl authLdap plugin <= 2.5.9 versions. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Andreas Heigl - authLdap** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/authldap/wordpress-authldap-plugin-2-5-8-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Rio Darmawan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2842, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2842 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2842 - **State**: PUBLISHED - **Published Date**: September 08, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:45 UTC - **Reserved Date**: September 08, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in dwrcs.exe in DameWare Mini Remote Control before 4.9.0 allows remote attackers to execute arbitrary code via the username. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [42703](https://www.exploit-db.com/exploits/42703/) 2. [20050831 Dameware critical hole](http://archives.neohapsis.com/archives/fulldisclosure/2005-08/1074.html) 3. [16655](http://secunia.com/advisories/16655) 4. [1014830](http://securitytracker.com/id?1014830) 5. [VU#170905](http://www.kb.cert.org/vuls/id/170905) 6. [14707](http://www.securityfocus.com/bid/14707) 7. [](http://www.jpno5.com/Releases/Public/Exploits/Dameware%20Mini%20Remote%20Control%20Exploit/dameware.txt) 8. [ADV-2005-1596](http://www.vupen.com/english/advisories/2005/1596)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-1553, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-1553 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-1553 - **State**: PUBLISHED - **Published Date**: July 14, 2005 at 04:00 UTC - **Last Updated**: September 16, 2024 at 23:30 UTC - **Reserved Date**: July 14, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20011202 Vulnerability in SETI@home](http://archives.neohapsis.com/archives/vuln-dev/2001-q4/0662.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0279, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0279 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0279 - **State**: PUBLISHED - **Published Date**: September 29, 1999 at 04:00 UTC - **Last Updated**: August 01, 2024 at 16:34 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Excite for Web Servers (EWS) allows remote command execution via shell metacharacters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0279)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14456, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14456 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14456 - **State**: REJECTED - **Published Date**: October 30, 2019 at 15:36 UTC - **Last Updated**: October 30, 2019 at 15:36 UTC - **Reserved Date**: September 13, 2017 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43668, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43668 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43668 - **State**: PUBLISHED - **Published Date**: October 16, 2023 at 08:07 UTC - **Last Updated**: September 16, 2024 at 18:25 UTC - **Reserved Date**: September 21, 2023 at 03:46 UTC - **Assigned By**: apache ### Vulnerability Description Authorization Bypass Through User-Controlled Key vulnerability in Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.8.0,  some sensitive params checks will be bypassed, like "autoDeserizalize","allowLoadLocalInfile".... .   Users are advised to upgrade to Apache InLong's 1.9.0 or cherry-pick [1] to solve it. [1]  https://github.com/apache/inlong/pull/8604 ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **Apache Software Foundation - Apache InLong** Affected versions: - 1.4.0 (Status: affected) ### References 1. [](https://lists.apache.org/thread/16gtk7rpdm1rof075ro83fkrnhbzn5sh) ### Credits - nbxiglk
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2121, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2121 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2121 - **State**: PUBLISHED - **Published Date**: June 24, 2022 at 15:00 UTC - **Last Updated**: September 17, 2024 at 03:58 UTC - **Reserved Date**: June 17, 2022 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description OFFIS DCMTK's (All versions prior to 3.6.7) has a NULL pointer dereference vulnerability while processing DICOM files, which may result in a denial-of-service condition. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **OFFIS - DCMTK** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsma-22-174-01) 2. [[debian-lts-announce] 20240628 [SECURITY] [DLA 3847-1] dcmtk security update](https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6003, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6003 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6003 - **State**: PUBLISHED - **Published Date**: October 16, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 07:06 UTC - **Reserved Date**: August 14, 2015 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#751328](http://www.kb.cert.org/vuls/id/751328) 2. [1033794](http://www.securitytracker.com/id/1033794) 3. [](https://www.qnap.com/i/en/support/con_show.php?cid=85)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-7041, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-7041 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-7041 - **State**: PUBLISHED - **Published Date**: December 21, 2023 at 20:00 UTC - **Last Updated**: August 02, 2024 at 08:50 UTC - **Reserved Date**: December 21, 2023 at 08:44 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in codelyfe Stupid Simple CMS up to 1.2.4. Affected by this issue is some unknown functionality of the file /file-manager/rename.php. The manipulation of the argument newName leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248690 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-24: Security Weakness ### Affected Products **codelyfe - Stupid Simple CMS** Affected versions: - 1.2.0 (Status: affected) - 1.2.1 (Status: affected) - 1.2.2 (Status: affected) - 1.2.3 (Status: affected) - 1.2.4 (Status: affected) ### References 1. [](https://vuldb.com/?id.248690) 2. [](https://vuldb.com/?ctiid.248690) 3. [](https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20overwrite.md) ### Credits - ggbot (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27428, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27428 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27428 - **State**: PUBLISHED - **Published Date**: April 25, 2022 at 12:43 UTC - **Last Updated**: August 03, 2024 at 05:25 UTC - **Reserved Date**: March 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A stored cross-site scripting (XSS) vulnerability in /index.php/album/add of GalleryCMS v2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the album_name parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/bensonarts/GalleryCMS/issues/20)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-40624, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-40624 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-40624 - **State**: PUBLISHED - **Published Date**: July 15, 2024 at 19:28 UTC - **Last Updated**: August 02, 2024 at 04:33 UTC - **Reserved Date**: July 08, 2024 at 16:13 UTC - **Assigned By**: GitHub_M ### Vulnerability Description TorrentPier is an open source BitTorrent Public/Private tracker engine, written in php. In `torrentpier/library/includes/functions.php`, `get_tracks()` uses the unsafe native PHP serialization format to deserialize user-controlled cookies. One can use phpggc and the chain Guzzle/FW1 to write PHP code to an arbitrary file, and execute commands on the system. For instance, the cookie bb_t will be deserialized when browsing to viewforum.php. This issue has been addressed in commit `ed37e6e52` which is expected to be included in release version 2.4.4. Users are advised to upgrade as soon as the new release is available. There are no known workarounds for this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **torrentpier - torrentpier** Affected versions: - < 2.4.4 (Status: affected) ### References 1. [https://github.com/torrentpier/torrentpier/security/advisories/GHSA-fg86-4c2r-7wxw](https://github.com/torrentpier/torrentpier/security/advisories/GHSA-fg86-4c2r-7wxw) 2. [https://github.com/torrentpier/torrentpier/commit/ed37e6e522f345f2b46147c6f53c1ab6dec1db9e](https://github.com/torrentpier/torrentpier/commit/ed37e6e522f345f2b46147c6f53c1ab6dec1db9e) 3. [https://github.com/torrentpier/torrentpier/blob/84f6c9f4a081d9ffff4c233098758280304bf50f/library/includes/functions.php#L41-L60](https://github.com/torrentpier/torrentpier/blob/84f6c9f4a081d9ffff4c233098758280304bf50f/library/includes/functions.php#L41-L60)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46190, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46190 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46190 - **State**: PUBLISHED - **Published Date**: October 24, 2023 at 10:23 UTC - **Last Updated**: September 11, 2024 at 16:59 UTC - **Reserved Date**: October 18, 2023 at 08:45 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Novo-media Novo-Map : your WP posts on custom google maps plugin <= 1.1.2 versions. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Novo-media - Novo-Map : your WP posts on custom google maps** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/novo-map/wordpress-novo-map-your-wp-posts-on-custom-google-maps-plugin-1-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1360, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1360 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1360 - **State**: PUBLISHED - **Published Date**: April 13, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 01:21 UTC - **Reserved Date**: April 13, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple PHP remote file inclusion vulnerabilities in FAQEngine 4.24.00 allow remote attackers to execute arbitrary PHP code via a URL in the path_faqe parameter to (1) attachs.php, (2) backup.php, (3) badwords.php, (4) categories.php, (5) changepw.php, (6) colorchooser.php, (7) colorwheel.php, (8) dbfiles.php, (9) diraccess.php, (10) faq.php, (11) index.php, (12) kb.php, and (13) stats.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [11111](http://www.exploit-db.com/exploits/11111) 2. [faqengine-pathfaqe-file-include(55532)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55532) 3. [37719](http://www.securityfocus.com/bid/37719) 4. [](http://packetstormsecurity.org/1001-exploits/faqengine-rfi.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41936, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41936 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41936 - **State**: PUBLISHED - **Published Date**: August 08, 2024 at 19:27 UTC - **Last Updated**: August 21, 2024 at 20:05 UTC - **Reserved Date**: July 30, 2024 at 16:15 UTC - **Assigned By**: icscert ### Vulnerability Description A directory traversal vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enables an unauthenticated remote attacker to read arbitrary files and bypass authentication. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Vonets - VAR1200-H** Affected versions: - 0 (Status: affected) **Vonets - VAR1200-L** Affected versions: - 0 (Status: affected) **Vonets - VAR600-H** Affected versions: - 0 (Status: affected) **Vonets - VAP11AC** Affected versions: - 0 (Status: affected) **Vonets - VAP11G-500S** Affected versions: - 0 (Status: affected) **Vonets - VBG1200** Affected versions: - 0 (Status: affected) **Vonets - VAP11S-5G** Affected versions: - 0 (Status: affected) **Vonets - VAP11S** Affected versions: - 0 (Status: affected) **Vonets - VAR11N-300** Affected versions: - 0 (Status: affected) **Vonets - VAP11G-300** Affected versions: - 0 (Status: affected) **Vonets - VAP11N-300** Affected versions: - 0 (Status: affected) **Vonets - VAP11G** Affected versions: - 0 (Status: affected) **Vonets - VAP11G-500** Affected versions: - 0 (Status: affected) **Vonets - VBG1200** Affected versions: - 0 (Status: affected) **Vonets - VAP11AC** Affected versions: - 0 (Status: affected) **Vonets - VGA-1000** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08) ### Credits - Wodzen reported these vulnerabilities to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4095, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4095 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4095 - **State**: PUBLISHED - **Published Date**: December 08, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:31 UTC - **Reserved Date**: December 08, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in connector.php in the fckeditor2rc2 addon in DoceboLMS 2.0.4 allows remote attackers to list arbitrary files and directories via ".." sequences in the Type parameter in a GetFoldersAndFiles command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2005-2771](http://www.vupen.com/english/advisories/2005/2771) 2. [15742](http://www.securityfocus.com/bid/15742) 3. [17896](http://secunia.com/advisories/17896) 4. [docebolms-connector-directory-traversal(23518)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23518) 5. [](http://rgod.altervista.org/docebo204_xpl.html) 6. [1015308](http://secunia.com/advisories/1015308) 7. [21464](http://www.osvdb.org/21464) 8. [1015308](http://securitytracker.com/id?1015308)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4498, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4498 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4498 - **State**: PUBLISHED - **Published Date**: January 07, 2011 at 18:00 UTC - **Last Updated**: August 07, 2024 at 03:51 UTC - **Reserved Date**: December 07, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Collaborative Information Manager server, as used in TIBCO Collaborative Information Manager before 8.1.0 and ActiveCatalog before 1.0.1, allows remote attackers to modify data or obtain sensitive information via a crafted URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [45691](http://www.securityfocus.com/bid/45691) 2. [42791](http://secunia.com/advisories/42791) 3. [70373](http://osvdb.org/70373) 4. [ADV-2011-0037](http://www.vupen.com/english/advisories/2011/0037) 5. [1024942](http://www.securitytracker.com/id?1024942) 6. [](http://www.tibco.com/services/support/advisories/cim-advisory_20100105.jsp) 7. [](http://www.tibco.com/multimedia/cim_advisory_20110105_tcm8-12765.txt) 8. [tibco-urls-information-disclosure(64522)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64522)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7989, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7989 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7989 - **State**: PUBLISHED - **Published Date**: November 07, 2014 at 11:00 UTC - **Last Updated**: August 06, 2024 at 13:03 UTC - **Reserved Date**: October 08, 2014 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco Unified Computing System on B-Series blade servers allows local users to gain shell privileges via a crafted (1) ping6 or (2) traceroute6 command, aka Bug ID CSCuq38176. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [70969](http://www.securityfocus.com/bid/70969) 2. [1031178](http://www.securitytracker.com/id/1031178) 3. [cisco-ucs-cve20147989-priv-esc(98530)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98530) 4. [20141106 Cisco Unified Computing System B-Series Servers Privilege Escalation Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7989)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8236, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8236 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8236 - **State**: PUBLISHED - **Published Date**: October 23, 2019 at 20:46 UTC - **Last Updated**: August 04, 2024 at 21:17 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Creative Cloud Desktop Application version 4.6.1 and earlier versions have Security Bypass vulnerability. Successful exploitation could lead to Privilege Escalation in the context of the current user. ### Affected Products **n/a - Adobe Creative Cloud Desktop application** Affected versions: - Creative Cloud Desktop Application version 4.6.1 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/creative-cloud/apsb19-39.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27483, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27483 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27483 - **State**: PUBLISHED - **Published Date**: March 09, 2023 at 20:18 UTC - **Last Updated**: February 25, 2025 at 14:59 UTC - **Reserved Date**: March 01, 2023 at 19:03 UTC - **Assigned By**: GitHub_M ### Vulnerability Description crossplane-runtime is a set of go libraries used to build Kubernetes controllers in Crossplane and its related stacks. An out of memory panic vulnerability has been discovered in affected versions. Applications that use the `Paved` type's `SetValue` method with user provided input without proper validation might use excessive amounts of memory and cause an out of memory panic. In the fieldpath package, the Paved.SetValue method sets a value on the Paved object according to the provided path, without any validation. This allows setting values in slices at any provided index, which grows the target array up to the requested index, the index is currently capped at max uint32 (4294967295) given how indexes are parsed, but that is still an unnecessarily large value. If callers are not validating paths' indexes on their own, which most probably are not going to do, given that the input is parsed directly in the SetValue method, this could allow users to consume arbitrary amounts of memory. Applications that do not use the `Paved` type's `SetValue` method are not affected. This issue has been addressed in versions 0.16.1 and 0.19.2. Users are advised to upgrade. Users unable to upgrade can parse and validate the path before passing it to the `SetValue` method of the `Paved` type, constraining the index size as deemed appropriate. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness - CWE-20: Improper Input Validation ### Affected Products **crossplane - crossplane-runtime** Affected versions: - >= 0.17.0, < 0.19.2 (Status: affected) - < 0.16.1 (Status: affected) ### References 1. [https://github.com/crossplane/crossplane-runtime/security/advisories/GHSA-vfvj-3m3g-m532](https://github.com/crossplane/crossplane-runtime/security/advisories/GHSA-vfvj-3m3g-m532) 2. [https://github.com/crossplane/crossplane-runtime/commit/53508a9f4374604db140dd8ab2fa52276441e738](https://github.com/crossplane/crossplane-runtime/commit/53508a9f4374604db140dd8ab2fa52276441e738)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21337, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21337 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21337 - **State**: PUBLISHED - **Published Date**: January 11, 2024 at 21:27 UTC - **Last Updated**: June 03, 2025 at 14:07 UTC - **Reserved Date**: December 08, 2023 at 22:45 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 5.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Microsoft - Microsoft Edge (Chromium-based)** Affected versions: - 1.0.0 (Status: affected) **Microsoft - Microsoft Edge (Chromium-based) Extended Stable** Affected versions: - 1.0.0 (Status: affected) ### References 1. [Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21337)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3750, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3750 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3750 - **State**: PUBLISHED - **Published Date**: November 22, 2005 at 19:00 UTC - **Last Updated**: August 07, 2024 at 23:24 UTC - **Reserved Date**: November 22, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Opera before 8.51 on Linux and Unix systems allows remote attackers to execute arbitrary code via shell metacharacters (backticks) in a URL that another product provides in a command line argument when launching Opera. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.opera.com/docs/changelogs/linux/851/) 2. [SUSE-SR:2005:028](http://www.novell.com/linux/security/advisories/2005_28_sr.html) 3. [18111](http://secunia.com/advisories/18111) 4. [199](http://securityreason.com/securityalert/199) 5. [ADV-2005-2519](http://www.vupen.com/english/advisories/2005/2519) 6. [21003](http://www.osvdb.org/21003) 7. [1015253](http://securitytracker.com/id?1015253) 8. [15521](http://www.securityfocus.com/bid/15521) 9. [20051122 Secunia Research: Opera Command Line URL Shell Command Injection](http://www.securityfocus.com/archive/1/417393/30/0/threaded) 10. [](http://secunia.com/secunia_research/2005-57/advisory/) 11. [16907](http://secunia.com/advisories/16907) 12. [GLSA-200512-10](http://www.gentoo.org/security/en/glsa/glsa-200512-10.xml) 13. [20051122 Secunia Research: Opera Command Line URL Shell Command Injection](http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0677.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10893, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10893 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10893 - **State**: PUBLISHED - **Published Date**: December 03, 2024 at 06:00 UTC - **Last Updated**: December 03, 2024 at 14:23 UTC - **Reserved Date**: November 05, 2024 at 18:31 UTC - **Assigned By**: WPScan ### Vulnerability Description The WP Booking Calendar WordPress plugin before 10.6.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - WP Booking Calendar** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/a230a552-3fda-4145-810f-58af540107db/) ### Credits - Dmitrii Ignatyev - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30077, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30077 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30077 - **State**: PUBLISHED - **Published Date**: March 16, 2025 at 00:00 UTC - **Last Updated**: March 17, 2025 at 15:51 UTC - **Reserved Date**: March 16, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Open Networking Foundation SD-RAN ONOS onos-lib-go 0.10.28 allows an index out-of-range panic in asn1/aper GetBitString via a zero value of numBits. ### CVSS Metrics - **CVSS Base Score**: 6.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-129: Security Weakness ### Affected Products **onosproject - onos-lib-go** Affected versions: - 0.10.28 (Status: affected) ### References 1. [](https://github.com/onosproject/onos-lib-go/issues/295)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5217, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5217 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5217 - **State**: PUBLISHED - **Published Date**: July 10, 2024 at 16:28 UTC - **Last Updated**: February 13, 2025 at 17:54 UTC - **Reserved Date**: May 22, 2024 at 18:36 UTC - **Assigned By**: SN ### Vulnerability Description ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-184: Security Weakness ### Affected Products **ServiceNow - Now Platform** Affected versions: - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) ### References 1. [](https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313) 2. [](https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293) 3. [](https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit) ### Credits - Adam Kues - Assetnote Attack Surface Management
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1738, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1738 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1738 - **State**: PUBLISHED - **Published Date**: April 14, 2006 at 18:00 UTC - **Last Updated**: August 07, 2024 at 17:19 UTC - **Reserved Date**: April 12, 2006 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) by changing the (1) -moz-grid and (2) -moz-grid-group display styles. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-275-1](https://usn.ubuntu.com/275-1/) 2. [RHSA-2006:0330](http://www.redhat.com/support/errata/RHSA-2006-0330.html) 3. [SSRT061145](http://www.securityfocus.com/archive/1/434524/100/0/threaded) 4. [19902](http://secunia.com/advisories/19902) 5. [20060404-01-U](ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc) 6. [USN-276-1](https://usn.ubuntu.com/276-1/) 7. [HPSBUX02122](http://www.securityfocus.com/archive/1/438730/100/0/threaded) 8. [19941](http://secunia.com/advisories/19941) 9. [19780](http://secunia.com/advisories/19780) 10. [RHSA-2006:0328](http://www.redhat.com/support/errata/RHSA-2006-0328.html) 11. [19821](http://secunia.com/advisories/19821) 12. [GLSA-200604-12](http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml) 13. [21622](http://secunia.com/advisories/21622) 14. [19862](http://secunia.com/advisories/19862) 15. [MDKSA-2006:075](http://www.mandriva.com/security/advisories?name=MDKSA-2006:075) 16. [](http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm) 17. [DSA-1051](http://www.debian.org/security/2006/dsa-1051) 18. [FEDORA-2006-410](http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html) 19. [mozilla-mozgrid-memory-corruption(25811)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25811) 20. [USN-271-1](https://usn.ubuntu.com/271-1/) 21. [19714](http://secunia.com/advisories/19714) 22. [oval:org.mitre.oval:def:1687](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1687) 23. [RHSA-2006:0329](http://www.redhat.com/support/errata/RHSA-2006-0329.html) 24. [](http://www.mozilla.org/security/announce/2006/mfsa2006-11.html) 25. [GLSA-200604-18](http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml) 26. [19811](http://secunia.com/advisories/19811) 27. [HPSBTU02118](http://www.securityfocus.com/archive/1/434524/100/0/threaded) 28. [19794](http://secunia.com/advisories/19794) 29. [19746](http://secunia.com/advisories/19746) 30. [21033](http://secunia.com/advisories/21033) 31. [102550](http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1) 32. [19696](http://secunia.com/advisories/19696) 33. [19759](http://secunia.com/advisories/19759) 34. [SUSE-SA:2006:021](http://lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html) 35. [FLSA:189137-2](http://www.securityfocus.com/archive/1/436338/100/0/threaded) 36. [ADV-2006-1356](http://www.vupen.com/english/advisories/2006/1356) 37. [SSRT061158](http://www.securityfocus.com/archive/1/438730/100/0/threaded) 38. [MDKSA-2006:078](http://www.mandriva.com/security/advisories?name=MDKSA-2006:078) 39. [19729](http://secunia.com/advisories/19729) 40. [20051](http://secunia.com/advisories/20051) 41. [19863](http://secunia.com/advisories/19863) 42. [VU#252324](http://www.kb.cert.org/vuls/id/252324) 43. [SCOSA-2006.26](ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt) 44. [TA06-107A](http://www.us-cert.gov/cas/techalerts/TA06-107A.html) 45. [FLSA:189137-1](http://www.securityfocus.com/archive/1/436296/100/0/threaded) 46. [17516](http://www.securityfocus.com/bid/17516) 47. [228526](http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1) 48. [FEDORA-2006-411](http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html) 49. [19852](http://secunia.com/advisories/19852) 50. [19721](http://secunia.com/advisories/19721) 51. [oval:org.mitre.oval:def:9405](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9405) 52. [GLSA-200605-09](http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml) 53. [19631](http://secunia.com/advisories/19631) 54. [19950](http://secunia.com/advisories/19950) 55. [MDKSA-2006:076](http://www.mandriva.com/security/advisories?name=MDKSA-2006:076) 56. [DSA-1046](http://www.debian.org/security/2006/dsa-1046) 57. [DSA-1044](http://www.debian.org/security/2006/dsa-1044)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1335, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1335 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1335 - **State**: PUBLISHED - **Published Date**: May 15, 2013 at 01:00 UTC - **Last Updated**: August 06, 2024 at 14:57 UTC - **Reserved Date**: January 12, 2013 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Word 2003 SP3 and Word Viewer allow remote attackers to execute arbitrary code via crafted shape data in a Word document, aka "Word Shape Corruption Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:16229](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16229) 2. [TA13-134A](http://www.us-cert.gov/ncas/alerts/TA13-134A) 3. [MS13-043](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-043)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0606, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0606 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0606 - **State**: PUBLISHED - **Published Date**: March 06, 2019 at 00:00 UTC - **Last Updated**: August 04, 2024 at 17:51 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0606) 2. [106859](http://www.securityfocus.com/bid/106859)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0377, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0377 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0377 - **State**: PUBLISHED - **Published Date**: January 21, 2025 at 15:23 UTC - **Last Updated**: February 12, 2025 at 20:41 UTC - **Reserved Date**: January 10, 2025 at 14:21 UTC - **Assigned By**: HashiCorp ### Vulnerability Description HashiCorp’s go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-59: Security Weakness ### Affected Products **HashiCorp - Shared library** Affected versions: - 0 (Status: affected) ### References 1. [](https://discuss.hashicorp.com/t/hcsec-2025-01-hashicorp-go-slug-vulnerable-to-zip-slip-attack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4658, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4658 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4658 - **State**: PUBLISHED - **Published Date**: September 04, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 15:01 UTC - **Reserved Date**: September 04, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The money_format function in PHP 5 before 5.2.4, and PHP 4 before 4.4.8, permits multiple (1) %i and (2) %n tokens, which has unknown impact and attack vectors, possibly related to a format string vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [26822](http://secunia.com/advisories/26822) 2. [php-moneyformat-unspecified(36377)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36377) 3. [](https://launchpad.net/bugs/173043) 4. [SUSE-SA:2008:004](http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html) 5. [ADV-2008-0059](http://www.vupen.com/english/advisories/2008/0059) 6. [28658](http://secunia.com/advisories/28658) 7. [FEDORA-2007-709](https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html) 8. [26967](http://secunia.com/advisories/26967) 9. [DSA-1444](http://www.debian.org/security/2008/dsa-1444) 10. [GLSA-200710-02](http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml) 11. [27864](http://secunia.com/advisories/27864) 12. [oval:org.mitre.oval:def:10363](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10363) 13. [](http://www.php.net/releases/4_4_8.php) 14. [SSA:2008-045-03](http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136) 15. [](http://www.php.net/ChangeLog-5.php#5.2.4) 16. [28936](http://secunia.com/advisories/28936) 17. [26930](http://secunia.com/advisories/26930) 18. [2007-0026](http://www.trustix.org/errata/2007/0026/) 19. [RHSA-2007:0889](http://rhn.redhat.com/errata/RHSA-2007-0889.html) 20. [USN-549-1](https://usn.ubuntu.com/549-1/) 21. [](https://issues.rpath.com/browse/RPL-1693) 22. [28249](http://secunia.com/advisories/28249) 23. [](https://issues.rpath.com/browse/RPL-1702) 24. [27545](http://secunia.com/advisories/27545) 25. [](http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm) 26. [26838](http://secunia.com/advisories/26838) 27. [27377](http://secunia.com/advisories/27377) 28. [MDKSA-2007:187](http://www.mandriva.com/security/advisories?name=MDKSA-2007:187) 29. [](http://www.php.net/ChangeLog-4.php) 30. [27102](http://secunia.com/advisories/27102) 31. [ADV-2007-3023](http://www.vupen.com/english/advisories/2007/3023) 32. [](http://www.php.net/releases/5_2_4.php) 33. [26895](http://secunia.com/advisories/26895) 34. [USN-549-2](http://www.ubuntu.com/usn/usn-549-2) 35. [RHSA-2007:0890](http://www.redhat.com/support/errata/RHSA-2007-0890.html) 36. [RHSA-2007:0891](http://www.redhat.com/support/errata/RHSA-2007-0891.html) 37. [26871](http://secunia.com/advisories/26871) 38. [26642](http://secunia.com/advisories/26642)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4255, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4255 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4255 - **State**: PUBLISHED - **Published Date**: August 13, 2012 at 18:00 UTC - **Last Updated**: September 17, 2024 at 04:04 UTC - **Reserved Date**: August 13, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MySQLDumper 1.24.4 allows remote attackers to obtain sensitive information via a direct request to learn/cubemail/refresh_dblist.php, which reveals the installation path in an error message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html) 2. [53306](http://www.securityfocus.com/bid/53306) 3. [81616](http://www.osvdb.org/81616)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5766, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5766 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5766 - **State**: PUBLISHED - **Published Date**: January 18, 2018 at 07:00 UTC - **Last Updated**: August 05, 2024 at 05:40 UTC - **Reserved Date**: January 18, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Libav through 12.2, there is an invalid memcpy in the av_packet_ref function of libavcodec/avpacket.c. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted avi file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.libav.org/show_bug.cgi?id=1112) 2. [102793](http://www.securityfocus.com/bid/102793) 3. [[debian-lts-announce] 20190902 [SECURITY] [DLA 1907-1] libav security update](https://lists.debian.org/debian-lts-announce/2019/09/msg00000.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-35847, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-35847 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-35847 - **State**: PUBLISHED - **Published Date**: June 19, 2023 at 00:00 UTC - **Last Updated**: December 11, 2024 at 17:09 UTC - **Reserved Date**: June 19, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not have an MSS lower bound (e.g., it could be zero). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/virtualsquare/picotcp/commit/eaf166009e44641e6570c576ba071217f100fd99)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16517, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16517 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16517 - **State**: PUBLISHED - **Published Date**: January 23, 2020 at 17:19 UTC - **Last Updated**: August 05, 2024 at 01:17 UTC - **Reserved Date**: September 19, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. There is a CORS misconfiguration, which reflected the Origin provided by incoming requests. This allowed JavaScript running on any domain to interact with the server APIs and perform administrative actions, without the victim's knowledge. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://know.bishopfox.com/advisories) 2. [](https://know.bishopfox.com/advisories/connectwise-control) 3. [](https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34) 4. [](https://www.crn.com/news/managed-services/connectwise-control-msp-security-vulnerabilities-are-severe-bishop-fox) 5. [](https://www.crn.com/slide-shows/managed-services/connectwise-control-attack-chain-exploit-20-questions-for-security-researcher-bishop-fox)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54237, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54237 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54237 - **State**: PUBLISHED - **Published Date**: December 13, 2024 at 14:24 UTC - **Last Updated**: December 13, 2024 at 19:00 UTC - **Reserved Date**: December 02, 2024 at 12:03 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in anzia Ni CRM Lead allows Reflected XSS.This issue affects Ni CRM Lead: from n/a through 1.3.0. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **anzia - Ni CRM Lead** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/ni-crm-lead/vulnerability/wordpress-ni-crm-lead-plugin-1-3-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - thiennv (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52583, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52583 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52583 - **State**: PUBLISHED - **Published Date**: March 06, 2024 at 06:45 UTC - **Last Updated**: May 04, 2025 at 07:39 UTC - **Reserved Date**: March 02, 2024 at 21:55 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: ceph: fix deadlock or deadcode of misusing dget() The lock order is incorrect between denty and its parent, we should always make sure that the parent get the lock first. But since this deadcode is never used and the parent dir will always be set from the callers, let's just remove it. ### Affected Products **Linux - Linux** Affected versions: - 9030aaf9bf0a1eee47a154c316c789e959638b0f (Status: affected) - 9030aaf9bf0a1eee47a154c316c789e959638b0f (Status: affected) - 9030aaf9bf0a1eee47a154c316c789e959638b0f (Status: affected) - 9030aaf9bf0a1eee47a154c316c789e959638b0f (Status: affected) - 9030aaf9bf0a1eee47a154c316c789e959638b0f (Status: affected) - 9030aaf9bf0a1eee47a154c316c789e959638b0f (Status: affected) - 9030aaf9bf0a1eee47a154c316c789e959638b0f (Status: affected) - 9030aaf9bf0a1eee47a154c316c789e959638b0f (Status: affected) **Linux - Linux** Affected versions: - 2.6.34 (Status: affected) - 0 (Status: unaffected) - 4.19.307 (Status: unaffected) - 5.4.269 (Status: unaffected) - 5.10.210 (Status: unaffected) - 5.15.149 (Status: unaffected) - 6.1.77 (Status: unaffected) - 6.6.16 (Status: unaffected) - 6.7.4 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6) 2. [](https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980) 3. [](https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3) 4. [](https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca) 5. [](https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e) 6. [](https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160) 7. [](https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67) 8. [](https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3982, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3982 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3982 - **State**: PUBLISHED - **Published Date**: December 17, 2009 at 17:00 UTC - **Last Updated**: August 07, 2024 at 06:45 UTC - **Reserved Date**: November 19, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [37699](http://secunia.com/advisories/37699) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=513981) 3. [37783](http://secunia.com/advisories/37783) 4. [ADV-2009-3558](http://www.vupen.com/english/advisories/2009/3558) 5. [ADV-2009-3547](http://www.vupen.com/english/advisories/2009/3547) 6. [37881](http://secunia.com/advisories/37881) 7. [FEDORA-2009-13362](https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01034.html) 8. [37785](http://secunia.com/advisories/37785) 9. [1023333](http://securitytracker.com/id?1023333) 10. [USN-874-1](http://www.ubuntu.com/usn/USN-874-1) 11. [FEDORA-2009-13333](https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00995.html) 12. [oval:org.mitre.oval:def:8434](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8434) 13. [](https://bugzilla.mozilla.org/show_bug.cgi?id=524121) 14. [firefox-javascript-eng-code-exec(54802)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54802) 15. [](https://bugzilla.mozilla.org/show_bug.cgi?id=514999) 16. [37349](http://www.securityfocus.com/bid/37349) 17. [FEDORA-2009-13366](https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01041.html) 18. [37856](http://secunia.com/advisories/37856) 19. [](http://www.mozilla.org/security/announce/2009/mfsa2009-65.html) 20. [1023334](http://securitytracker.com/id?1023334) 21. [37364](http://www.securityfocus.com/bid/37364) 22. [](https://bugzilla.mozilla.org/show_bug.cgi?id=510518) 23. [SUSE-SA:2009:063](http://www.novell.com/linux/security/advisories/2009_63_firefox.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3590, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3590 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3590 - **State**: PUBLISHED - **Published Date**: July 25, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 20:13 UTC - **Reserved Date**: June 19, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT5485) 2. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html) 3. [](http://support.apple.com/kb/HT5503) 4. [APPLE-SA-2012-09-12-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html) 5. [APPLE-SA-2012-07-25-1](http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html) 6. [](http://support.apple.com/kb/HT5400)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31006 - **State**: PUBLISHED - **Published Date**: September 09, 2022 at 19:10 UTC - **Last Updated**: April 23, 2025 at 17:12 UTC - **Reserved Date**: May 18, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description indy-node is the server portion of Hyperledger Indy, a distributed ledger purpose-built for decentralized identity. In vulnerable versions of indy-node, an attacker can max out the number of client connections allowed by the ledger, leaving the ledger unable to be used for its intended purpose. However, the ledger content will not be impacted and the ledger will resume functioning after the attack. This attack exploits the trade-off between resilience and availability. Any protection against abusive client connections will also prevent the network being accessed by certain legitimate users. As a result, validator nodes must tune their firewall rules to ensure the right trade-off for their network's expected users. The guidance to network operators for the use of firewall rules in the deployment of Indy networks has been modified to better protect against denial of service attacks by increasing the cost and complexity in mounting such attacks. The mitigation for this vulnerability is not in the Hyperledger Indy code per se, but rather in the individual deployments of Indy. The mitigations should be applied to all deployments of Indy, and are not related to a particular release. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **hyperledger - indy-node** Affected versions: - <= 1.12.6 (Status: affected) ### References 1. [](https://github.com/hyperledger/indy-node/security/advisories/GHSA-x996-7qh9-7ff7) 2. [](https://github.com/hyperledger/indy-node/commit/53a2a1bf1a26cb8ba710fd6adc8bcf275186a4b3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0881, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0881 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0881 - **State**: PUBLISHED - **Published Date**: February 12, 2016 at 01:00 UTC - **Last Updated**: August 05, 2024 at 22:30 UTC - **Reserved Date**: December 17, 2015 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description EMC Documentum xCP 2.1 before patch 23 and 2.2 before patch 11 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and obtain sensitive repository information by appending a query to a REST request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1034993](http://www.securitytracker.com/id/1034993) 2. [20160209 ESA-2016-010 EMC Documentum xCP Security Update for Multiple Vulnerabilities](http://seclists.org/bugtraq/2016/Feb/66)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28776, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28776 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28776 - **State**: PUBLISHED - **Published Date**: June 22, 2023 at 11:29 UTC - **Last Updated**: October 10, 2024 at 17:24 UTC - **Reserved Date**: March 23, 2023 at 17:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Continuous Image Carousel With Lightbox plugin <= 1.0.15 versions. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **I Thirteen Web Solution - Continuous Image Carousel With Lightbox** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/continuous-image-carousel-with-lightbox/wordpress-continuous-image-carousel-with-lightbox-plugin-1-0-15-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve) ### Credits - yuyudhn (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11341, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11341 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11341 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:45 UTC - **Last Updated**: December 20, 2021 at 22:45 UTC - **Reserved Date**: March 31, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3705, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3705 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3705 - **State**: PUBLISHED - **Published Date**: July 19, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 18:39 UTC - **Reserved Date**: July 18, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple unspecified vulnerabilities in Oracle Database 10.1.0.5 have unknown impact and attack vectors, aka Oracle Vuln# (1) DB21 for Statistics and (2) DB22 for Upgrade & Downgrade. NOTE: as of 20060719, Oracle has not disputed a claim by a reliable researcher that DB21 is for a local SQL injection vulnerability in SYS.DBMS_STATS, and that DB22 is for SQL injection in SYS.DBMS_UPGRADE. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1016529](http://securitytracker.com/id?1016529) 2. [oracle-dbmsstats-sql-injection(27887)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27887) 3. [](http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_upgrade.html) 4. [19054](http://www.securityfocus.com/bid/19054) 5. [1251](http://securityreason.com/securityalert/1251) 6. [oracle-cpu-july-2006(27897)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27897) 7. [21165](http://secunia.com/advisories/21165) 8. [HPSBMA02133](http://www.securityfocus.com/archive/1/440758/100/100/threaded) 9. [ADV-2006-2947](http://www.vupen.com/english/advisories/2006/2947) 10. [](http://www.red-database-security.com/advisory/oracle_cpu_july_2006.html) 11. [SSRT061201](http://www.securityfocus.com/archive/1/440758/100/100/threaded) 12. [TA06-200A](http://www.us-cert.gov/cas/techalerts/TA06-200A.html) 13. [21111](http://secunia.com/advisories/21111) 14. [20060718 Oracle Database - SQL Injection in SYS.DBMS_STATS [DB21]](http://www.securityfocus.com/archive/1/440453/100/0/threaded) 15. [oracle-dbmsupgrade-sql-injection(27886)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27886) 16. [20060718 Oracle Database - SQL Injection in SYS.DBMS_STATS [DB21]](http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047993.html) 17. [](http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_stats.html) 18. [20060718 Oracle Database - SQL Injection in SYS.DBMS_UPGRADE [DB22]](http://www.securityfocus.com/archive/1/440447/100/0/threaded) 19. [](http://www.oracle.com/technetwork/topics/security/cpujul2006-101315.html) 20. [ADV-2006-2863](http://www.vupen.com/english/advisories/2006/2863) 21. [20060718 Oracle Database - SQL Injection in SYS.DBMS_UPGRADE [DB22]](http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047992.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-26099, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-26099 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-26099 - **State**: PUBLISHED - **Published Date**: July 12, 2021 at 09:56 UTC - **Last Updated**: October 25, 2024 at 13:56 UTC - **Reserved Date**: January 25, 2021 at 00:00 UTC - **Assigned By**: fortinet ### Vulnerability Description Missing cryptographic steps in the Identity-Based Encryption service of FortiMail before 7.0.0 may allow an attacker who comes in possession of the encrypted master keys to compromise their confidentiality by observing a few invariant properties of the ciphertext. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Affected Products **Fortinet - Fortinet FortiMail** Affected versions: - FortiMail before 7.0.0 (Status: affected) ### References 1. [](https://fortiguard.com/advisory/FG-IR-20-244)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6665, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6665 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6665 - **State**: PUBLISHED - **Published Date**: January 04, 2008 at 11:00 UTC - **Last Updated**: August 07, 2024 at 16:18 UTC - **Reserved Date**: January 03, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in admin/login.asp in Netchemia oneSCHOOL allows remote attackers to execute arbitrary SQL commands via the txtLoginID parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [39893](http://osvdb.org/39893) 2. [4824](https://www.exploit-db.com/exploits/4824) 3. [27085](http://www.securityfocus.com/bid/27085) 4. [oneschool-login-sql-injection(39349)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39349)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-6268, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-6268 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-6268 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: December 06, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1793, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1793 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1793 - **State**: PUBLISHED - **Published Date**: May 20, 2016 at 10:00 UTC - **Last Updated**: August 05, 2024 at 23:10 UTC - **Reserved Date**: January 13, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description AppleGraphicsDeviceControlClient in Apple OS X before 10.11.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (NULL pointer dereference) via a crafted app. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.chromium.org/p/project-zero/issues/detail?id=782) 2. [](https://support.apple.com/HT206567) 3. [APPLE-SA-2016-05-16-4](http://lists.apple.com/archives/security-announce/2016/May/msg00004.html) 4. [90696](http://www.securityfocus.com/bid/90696) 5. [39923](https://www.exploit-db.com/exploits/39923/) 6. [1035895](http://www.securitytracker.com/id/1035895) 7. [](http://packetstormsecurity.com/files/137401/OS-X-AppleGraphicsDeviceControl-NULL-Pointer-Dereference.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38087, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38087 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38087 - **State**: PUBLISHED - **Published Date**: August 12, 2021 at 13:44 UTC - **Last Updated**: August 04, 2024 at 01:30 UTC - **Reserved Date**: August 03, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Reflected cross-site scripting (XSS) was possible on the login page in Acronis Cyber Protect 15 prior to build 27009. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.acronis.com/content/68564)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22873, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22873 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22873 - **State**: PUBLISHED - **Published Date**: January 21, 2021 at 19:14 UTC - **Last Updated**: August 03, 2024 at 18:51 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description Revive Adserver before 5.1.0 is vulnerable to open redirects via the `dest`, `oadest`, and/or `ct0` parameters of the lg.php and ck.php delivery scripts. Such open redirects had previously been available by design to allow third party ad servers to track such metrics when delivering ads. However, third party click tracking via redirects is not a viable option anymore, leading to such open redirect functionality being removed and reclassified as a vulnerability. ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **n/a - https://github.com/revive-adserver/revive-adserver** Affected versions: - Fixed in 5.1.0 (Status: affected) ### References 1. [](https://hackerone.com/reports/1081406) 2. [](https://www.revive-adserver.com/security/revive-sa-2021-001/) 3. [](https://github.com/revive-adserver/revive-adserver/issues/1068) 4. [20210122 [REVIVE-SA-2021-001] Revive Adserver Vulnerabilities](http://seclists.org/fulldisclosure/2021/Jan/60) 5. [](http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scripting-Open-Redirect.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6849, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6849 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6849 - **State**: PUBLISHED - **Published Date**: April 01, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 06:17 UTC - **Reserved Date**: February 08, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In the WebRTC component in DuckDuckGo 4.2.0, after visiting a web site that attempts to gather complete client information (such as https://ip.voidsec.com), the browser can disclose a private IP address in a STUN request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/rapid7/metasploit-framework/pull/9538) 2. [](https://voidsec.com/vpn-leak/) 3. [44403](https://www.exploit-db.com/exploits/44403/) 4. [](https://news.ycombinator.com/item?id=16699270) 5. [](https://datarift.blogspot.com/p/private-ip-leakage-using-webrtc.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33090, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33090 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33090 - **State**: PUBLISHED - **Published Date**: March 04, 2024 at 10:48 UTC - **Last Updated**: August 02, 2024 at 15:32 UTC - **Reserved Date**: May 17, 2023 at 09:28 UTC - **Assigned By**: qualcomm ### Vulnerability Description Transient DOS while processing channel information for speaker protection v2 module in ADSP. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-126: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - AR8035 (Status: affected) - FastConnect 6800 (Status: affected) - FastConnect 6900 (Status: affected) - FastConnect 7800 (Status: affected) - QAM8255P (Status: affected) - QAM8295P (Status: affected) - QAM8650P (Status: affected) - QAM8775P (Status: affected) - QAMSRV1H (Status: affected) - QAMSRV1M (Status: affected) - QCA6391 (Status: affected) - QCA6426 (Status: affected) - QCA6436 (Status: affected) - QCA6574AU (Status: affected) - QCA6584AU (Status: affected) - QCA6696 (Status: affected) - QCA6698AQ (Status: affected) - QCA8081 (Status: affected) - QCA8337 (Status: affected) - QCC710 (Status: affected) - QCN6224 (Status: affected) - QCN6274 (Status: affected) - QFW7114 (Status: affected) - QFW7124 (Status: affected) - SA6145P (Status: affected) - SA6150P (Status: affected) - SA6155P (Status: affected) - SA8145P (Status: affected) - SA8150P (Status: affected) - SA8155P (Status: affected) - SA8195P (Status: affected) - SA8255P (Status: affected) - SA8295P (Status: affected) - SA8650P (Status: affected) - SA8770P (Status: affected) - SA8775P (Status: affected) - SA9000P (Status: affected) - SD865 5G (Status: affected) - Snapdragon 865 5G Mobile Platform (Status: affected) - Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected) - Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected) - Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected) - Snapdragon X55 5G Modem-RF System (Status: affected) - Snapdragon X75 5G Modem-RF System (Status: affected) - Snapdragon XR2 5G Platform (Status: affected) - SRV1H (Status: affected) - SRV1M (Status: affected) - SXR2130 (Status: affected) - WCD9340 (Status: affected) - WCD9380 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35724, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35724 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35724 - **State**: PUBLISHED - **Published Date**: June 10, 2024 at 07:49 UTC - **Last Updated**: August 02, 2024 at 03:14 UTC - **Reserved Date**: May 17, 2024 at 10:09 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Bosa Themes Bosa Elementor Addons and Templates for WooCommerce.This issue affects Bosa Elementor Addons and Templates for WooCommerce: from n/a through 1.0.12. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Bosa Themes - Bosa Elementor Addons and Templates for WooCommerce** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/bosa-elementor-for-woocommerce/wordpress-bosa-elementor-addons-and-templates-for-woocommerce-plugin-1-0-12-broken-access-control-vulnerability?_s_id=cve) ### Credits - Abdi Pranata (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-3929, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-3929 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-3929 - **State**: PUBLISHED - **Published Date**: April 30, 2019 at 20:21 UTC - **Last Updated**: February 06, 2025 at 20:26 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: tenable ### Vulnerability Description The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Crestron - Crestron AirMedia, Barco WePresent, Extron ShareLink, Teq AV IT WIPS710, SHARP PN-L703WA, Optoma WPS-Pro, Blackbox HD WPS, InFocus LiteShow3, and InFocus LiteShow4.** Affected versions: - Crestron AM-100 firmware 1.6.0.2 (Status: affected) - Crestron AM-101 firmware 2.7.0.1 (Status: affected) - Barco wePresent WiPG-1000P firmware 2.3.0.10 (Status: affected) - Barco wePresent WiPG-1600W before firmware 2.4.1.19 (Status: affected) - Extron ShareLink 200/250 firmware 2.0.3.4 (Status: affected) - Teq AV IT WIPS710 firmware 1.1.0.7 (Status: affected) - SHARP PN-L703WA firmware 1.4.2.3 (Status: affected) - Optoma WPS-Pro firmware 1.0.0.5 (Status: affected) - Blackbox HD WPS firmware 1.0.0.5 (Status: affected) - InFocus LiteShow3 firmware 1.0.16 (Status: affected) - and InFocus LiteShow4 2.0.0.7 (Status: affected) ### References 1. [](https://www.tenable.com/security/research/tra-2019-20) 2. [46786](https://www.exploit-db.com/exploits/46786/) 3. [](http://packetstormsecurity.com/files/152715/Barco-AWIND-OEM-Presentation-Platform-Unauthenticated-Remote-Command-Injection.html) 4. [](http://packetstormsecurity.com/files/155948/Barco-WePresent-file_transfer.cgi-Command-Injection.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2817, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2817 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2817 - **State**: PUBLISHED - **Published Date**: June 05, 2006 at 17:00 UTC - **Last Updated**: August 07, 2024 at 18:06 UTC - **Reserved Date**: June 05, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in bolum.php in tekno.Portal allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.securityfocus.com/data/vulnerabilities/exploits/Tekno.Portal-0601-sql.txt) 2. [20464](http://secunia.com/advisories/20464) 3. [18216](http://www.securityfocus.com/bid/18216) 4. [teknoportal-bolum-sql-injection(26990)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26990) 5. [ADV-2006-2192](http://www.vupen.com/english/advisories/2006/2192)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1506, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1506 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1506 - **State**: PUBLISHED - **Published Date**: March 18, 2003 at 05:00 UTC - **Last Updated**: August 08, 2024 at 03:26 UTC - **Reserved Date**: February 05, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in Linuxconf before 1.28r4 allows local users to execute arbitrary code via a long LINUXCONF_LANG environment variable, which overflows an error string that is generated. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.solucorp.qc.ca/changes.hc?projet=linuxconf&version=1.28r4) 2. [5585](http://www.securityfocus.com/bid/5585) 3. [20020828 iDEFENSE Security Advisory: Linuxconf locally exploitable buffer overflow](http://archives.neohapsis.com/archives/bugtraq/2002-08/0304.html) 4. [20020828 iDEFENSE Security Advisory: Linuxconf locally exploitable buffer overflow](http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0093.html) 5. [linuxconf-linuxconflang-env-bo(9980)](http://www.iss.net/security_center/static/9980.php)