System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-24565, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-24565 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-24565 - **State**: PUBLISHED - **Published Date**: January 30, 2024 at 16:46 UTC - **Last Updated**: August 23, 2024 at 19:32 UTC - **Reserved Date**: January 25, 2024 at 15:09 UTC - **Assigned By**: GitHub_M ### Vulnerability Description CrateDB is a distributed SQL database that makes it simple to store and analyze massive amounts of data in real-time. There is a COPY FROM function in the CrateDB database that is used to import file data into database tables. This function has a flaw, and authenticated attackers can use the COPY FROM function to import arbitrary file content into database tables, resulting in information leakage. This vulnerability is patched in 5.3.9, 5.4.8, 5.5.4, and 5.6.1. ### CVSS Metrics - **CVSS Base Score**: 5.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **crate - crate** Affected versions: - < 5.3.9 (Status: affected) - >= 5.4.0, < 5.4.8 (Status: affected) - >= 5.5.0, < 5.5.4 (Status: affected) - >= 5.6.0, < 5.6.1 (Status: affected) ### References 1. [https://github.com/crate/crate/security/advisories/GHSA-475g-vj6c-xf96](https://github.com/crate/crate/security/advisories/GHSA-475g-vj6c-xf96) 2. [https://github.com/crate/crate/commit/4e857d675683095945dd524d6ba03e692c70ecd6](https://github.com/crate/crate/commit/4e857d675683095945dd524d6ba03e692c70ecd6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4650, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4650 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4650 - **State**: PUBLISHED - **Published Date**: August 07, 2017 at 06:00 UTC - **Last Updated**: August 07, 2024 at 00:09 UTC - **Reserved Date**: December 01, 2011 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco Data Center Network Manager is affected by Excessive Logging During a TCP Flood on Java Ports. If the size of server.log becomes very big because of too much logging by the DCNM server, then the CPU utilization increases. Known Affected Releases: 5.2(1). Known Fixed Releases: 6.0(0)SL1(0.14) 5.2(2.73)S0. Product identification: CSCtt15295. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://icisystem.blogspot.com/2015/09/cisco-notification-alert-prime-dcnm-01.html) 2. [](https://quickview.cloudapps.cisco.com/quickview/bug/CSCtt15295)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1730, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1730 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1730 - **State**: PUBLISHED - **Published Date**: May 05, 2010 at 14:00 UTC - **Last Updated**: September 16, 2024 at 19:40 UTC - **Reserved Date**: May 05, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Dolphin Browser 2.5.0 on the HTC Hero allows remote attackers to cause a denial of service (application crash) via JavaScript that writes <marquee> sequences in an infinite loop. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://h.ackack.net/?p=258)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39066, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39066 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39066 - **State**: PUBLISHED - **Published Date**: November 22, 2022 at 00:00 UTC - **Last Updated**: April 29, 2025 at 04:32 UTC - **Reserved Date**: August 31, 2022 at 00:00 UTC - **Assigned By**: zte ### Vulnerability Description There is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection. ### Affected Products **n/a - MF286R** Affected versions: - Nordic_MF286R_B06 (Status: affected) ### References 1. [](https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1027744)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-44556, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-44556 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-44556 - **State**: PUBLISHED - **Published Date**: November 08, 2022 at 00:00 UTC - **Last Updated**: May 01, 2025 at 18:05 UTC - **Reserved Date**: November 01, 2022 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description Missing parameter type validation in the DRM module. Successful exploitation of this vulnerability may affect availability. ### Affected Products **n/a - EMUI** Affected versions: - EMUI 12.0.0 (Status: affected) **n/a - HarmonyOS** Affected versions: - HarmonyOS 2.0 (Status: affected) - HarmonyOS 3.0.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2022/11/) 2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-28885, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-28885 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-28885 - **State**: PUBLISHED - **Published Date**: January 28, 2022 at 11:17 UTC - **Last Updated**: August 04, 2024 at 16:41 UTC - **Reserved Date**: November 16, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Liferay Portal Server tested on 7.3.5 GA6, 7.2.0 GA1 is affected by OS Command Injection. An administrator user can inject commands through the Gogo Shell module to execute any OS command on the Liferay Portal Sever. NOTE: The developer disputes this as a vulnerability since it is a feature for administrators to access and execute commands in Gogo Shell and therefore not a design fla ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://medium.com/%40tranpdanh/some-way-to-execute-os-command-in-liferay-portal-84498bde18d3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20716, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20716 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20716 - **State**: PUBLISHED - **Published Date**: June 06, 2023 at 12:11 UTC - **Last Updated**: January 07, 2025 at 18:47 UTC - **Reserved Date**: October 28, 2022 at 02:03 UTC - **Assigned By**: MediaTek ### Vulnerability Description In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07796883; Issue ID: ALPS07796883. ### Affected Products **MediaTek, Inc. - MT5221, MT6789, MT6855, MT6879, MT6895, MT6983, MT7663, MT7668, MT7902, MT7921, MT8167S, MT8168, MT8175, MT8362A, MT8365, MT8385, MT8518, MT8532, MT8673, MT8695, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797** Affected versions: - Android 12.0, 13.0 / Yocto 4.0 / Iot-Yocto 22.2 / Linux 4.19 (For MT5221 only) (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/June-2023)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0889, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0889 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0889 - **State**: PUBLISHED - **Published Date**: February 02, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:37 UTC - **Reserved Date**: November 14, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Two Sun security certificates have been compromised, which could allow attackers to insert malicious code such as applets and make it appear that it is signed by Sun. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [00198](http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/198&type=0&nav=sec.sba) 2. [CA-2000-19](http://www.cert.org/advisories/CA-2000-19.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43293, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43293 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43293 - **State**: PUBLISHED - **Published Date**: April 11, 2023 at 00:00 UTC - **Last Updated**: February 11, 2025 at 20:20 UTC - **Reserved Date**: October 17, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Wacom Driver 6.3.46-1 for Windows was discovered to contain an arbitrary file write vulnerability via the component \Wacom\Wacom_Tablet.exe. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://lucabarile.github.io/Blog/blog.html) 2. [](https://lucabarile.github.io/Blog/CVE-2022-43293/index.html) 3. [](https://github.com/LucaBarile/CVE-2022-43293) 4. [](https://cdn.wacom.com/u/productsupport/drivers/win/professional/releasenotes/Windows_6.4.2-1.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8666, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8666 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8666 - **State**: PUBLISHED - **Published Date**: December 18, 2019 at 17:33 UTC - **Last Updated**: August 04, 2024 at 21:24 UTC - **Reserved Date**: February 18, 2019 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution. ### Affected Products **Apple - iOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - Safari** Affected versions: - unspecified (Status: affected) **Apple - iTunes for Windows** Affected versions: - unspecified (Status: affected) **Apple - iCloud for Windows** Affected versions: - unspecified (Status: affected) **Apple - iCloud for Windows (Microsoft Store)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/HT210346) 2. [](https://support.apple.com/HT210348) 3. [](https://support.apple.com/HT210351) 4. [](https://support.apple.com/HT210355) 5. [](https://support.apple.com/HT210356) 6. [](https://support.apple.com/HT210357) 7. [](https://support.apple.com/HT210358)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36830, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36830 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36830 - **State**: PUBLISHED - **Published Date**: September 30, 2022 at 16:14 UTC - **Last Updated**: February 20, 2025 at 20:00 UTC - **Reserved Date**: July 19, 2021 at 00:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Comment Guestbook plugin <= 0.8.0 at WordPress. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **mibuthu - Comment Guestbook (WordPress plugin)** Affected versions: - <= 0.8.0 (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/comment-guestbook/wordpress-comment-guestbook-plugin-0-8-0-authenticated-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) 2. [](https://wordpress.org/plugins/comment-guestbook/) ### Credits - Vulnerability discovered by Asif Nawaz Minhas (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3195, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3195 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3195 - **State**: PUBLISHED - **Published Date**: March 20, 2014 at 19:00 UTC - **Last Updated**: August 06, 2024 at 23:29 UTC - **Reserved Date**: August 19, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description shared/inc/sql/lists.php in Domain Technologie Control (DTC) before 0.34.1 allows remote authenticated users to execute arbitrary commands via shell metacharacters in mailing list tunable options. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20110813 Re: CVE request: multiple vulnerabilities in dtc](http://www.openwall.com/lists/oss-security/2011/08/13/1) 2. [[oss-security] 20110824 Re: Re: CVE request: multiple vulnerabilities in dtc](http://www.openwall.com/lists/oss-security/2011/08/24/10) 3. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=637477) 4. [DSA-2365](http://www.debian.org/security/2011/dsa-2365) 5. [](http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=blob%3Bf=debian/changelog%3Bhb=3eb6ef5cea6c571aae5e49e1930de778eca280c3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21767, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21767 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21767 - **State**: PUBLISHED - **Published Date**: March 01, 2024 at 20:54 UTC - **Last Updated**: August 12, 2024 at 20:25 UTC - **Reserved Date**: January 30, 2024 at 22:06 UTC - **Assigned By**: icscert ### Vulnerability Description A remote attacker may be able to bypass access control of Commend WS203VICM by creating a malicious request. ### CVSS Metrics - **CVSS Base Score**: 9.4/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Commend - WS203VICM** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-01) 2. [](https://clibrary-online.commend.com/en/cyber-security/security-advisories.html) ### Credits - Aarón Flecha Menéndez of S21sec reported these vulnerabilities to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3300, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3300 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3300 - **State**: PUBLISHED - **Published Date**: October 23, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 23:10 UTC - **Reserved Date**: October 23, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The register_globals emulation layer in grab_globals.php for phpMyAdmin before 2.6.4-pl3 does not perform safety checks on values in the _FILES array for uploaded files, which allows remote attackers to include arbitrary files by using direct requests to library scripts that do not use grab_globals.php, then modifying certain configuration values for the theme. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SR:2005:028](http://www.novell.com/linux/security/advisories/2005_28_sr.html) 2. [SUSE-SA:2005:066](http://www.novell.com/linux/security/advisories/2005_66_phpmyadmin.html) 3. [17607](http://secunia.com/advisories/17607) 4. [20051022 Advisory 16/2005: phpMyAdmin Local File Inclusion Vulnerability](http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0478.) 5. [17559](http://secunia.com/advisories/17559) 6. [](http://www.hardened-php.net/advisory_162005.73.html) 7. [20051022 Advisory 16/2005: phpMyAdmin Local File Inclusion Vulnerability](http://marc.info/?l=bugtraq&m=113017591414699&w=2) 8. [phpmyadmin-multiple-scripts-file-include(22835)](https://exchange.xforce.ibmcloud.com/vulnerabilities/22835) 9. [DSA-880](http://www.debian.org/security/2005/dsa-880) 10. [17337](http://secunia.com/advisories/17337) 11. [15169](http://www.securityfocus.com/bid/15169) 12. [GLSA-200510-21](http://www.gentoo.org/security/en/glsa/glsa-200510-21.xml) 13. [](http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5) 14. [17289](http://secunia.com/advisories/17289/) 15. [1015091](http://securitytracker.com/id?1015091)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-23839, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-23839 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-23839 - **State**: PUBLISHED - **Published Date**: April 25, 2023 at 00:00 UTC - **Last Updated**: February 04, 2025 at 14:43 UTC - **Reserved Date**: January 18, 2023 at 00:00 UTC - **Assigned By**: SolarWinds ### Vulnerability Description The SolarWinds Platform was susceptible to the Exposure of Sensitive Information Vulnerability. This vulnerability allows users to access Orion.WebCommunityStrings SWIS schema object and obtain sensitive information. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **SolarWinds - SolarWinds Platform** Affected versions: - 2023.1 and prior versions (Status: affected) ### References 1. [](https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2023-2_release_notes.htm) 2. [](https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-23839)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42249, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42249 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42249 - **State**: PUBLISHED - **Published Date**: August 07, 2024 at 15:14 UTC - **Last Updated**: May 04, 2025 at 09:25 UTC - **Reserved Date**: July 30, 2024 at 07:40 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: spi: don't unoptimize message in spi_async() Calling spi_maybe_unoptimize_message() in spi_async() is wrong because the message is likely to be in the queue and not transferred yet. This can corrupt the message while it is being used by the controller driver. spi_maybe_unoptimize_message() is already called in the correct place in spi_finalize_current_message() to balance the call to spi_maybe_optimize_message() in spi_async(). ### Affected Products **Linux - Linux** Affected versions: - 7b1d87af14d9ae902ed0c5dc5fabf4eea5abdf02 (Status: affected) - 7b1d87af14d9ae902ed0c5dc5fabf4eea5abdf02 (Status: affected) **Linux - Linux** Affected versions: - 6.9 (Status: affected) - 0 (Status: unaffected) - 6.9.10 (Status: unaffected) - 6.10 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/8b9af6d67517ce4a0015928b3cf35bfd2b1bc1c2) 2. [](https://git.kernel.org/stable/c/c86a918b1bdba78fb155184f8d88dfba1e63335d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37722, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37722 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37722 - **State**: PUBLISHED - **Published Date**: September 07, 2021 at 12:09 UTC - **Last Updated**: August 04, 2024 at 01:23 UTC - **Reserved Date**: July 29, 2021 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A remote arbitrary command execution vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.4-2.2.0.4; Prior to 8.7.1.4, 8.6.0.9, 8.5.0.13, 8.3.0.16, 6.5.4.20, 6.4.4.25. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability. ### Affected Products **n/a - Aruba SD-WAN Software and Gateways; Aruba Operating System Software** Affected versions: - Prior to 8.6.0.4-2.2.0.4 (Status: affected) - Prior to 8.7.1.4, 8.6.0.9, 8.5.0.13, 8.3.0.16, 6.5.4.20, 6.4.4.25 (Status: affected) ### References 1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt) 2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-280624.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-9974, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-9974 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-9974 - **State**: PUBLISHED - **Published Date**: April 11, 2019 at 18:01 UTC - **Last Updated**: August 04, 2024 at 22:10 UTC - **Reserved Date**: March 24, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description diag_tool.cgi on DASAN H660RM GPON routers with firmware 1.03-0022 lacks any authorization check, which allows remote attackers to run a ping command via a GET request to enumerate LAN devices or crash the router with a DoS attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20190326 Multiple vulnerabilities in DASAN H660RM GPON router firmware](https://seclists.org/bugtraq/2019/Mar/41) 2. [](http://packetstormsecurity.com/files/152232/DASAN-H660RM-Information-Disclosure-Hardcoded-Key.html) 3. [](https://blog.burghardt.pl/2019/03/diag_tool-cgi-on-dasan-h660rm-devices-with-firmware-1-03-0022-allows-spawning-ping-processes-without-any-authorization-leading-to-information-disclosure-and-dos-attacks/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25045, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25045 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25045 - **State**: PUBLISHED - **Published Date**: March 02, 2022 at 20:51 UTC - **Last Updated**: August 03, 2024 at 04:29 UTC - **Reserved Date**: February 14, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Home Owners Collection Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/VivekPanday12/CVE-/issues/6) 2. [](https://www.linkedin.com/in/vivek-panday-796768149/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1396, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1396 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1396 - **State**: PUBLISHED - **Published Date**: November 25, 2019 at 15:44 UTC - **Last Updated**: August 06, 2024 at 04:40 UTC - **Reserved Date**: January 27, 2015 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description A Directory Traversal vulnerability exists in the GNU patch before 2.7.4. A remote attacker can write to arbitrary files via a symlink attack in a patch file. NOTE: this issue exists because of an incomplete fix for CVE-2015-1196. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20150127 Re: CVE Request: patch: CVE needed for incomplete fix for CVE-2015-1196?](http://www.openwall.com/lists/oss-security/2015/01/27/29) 2. [75358](http://www.securityfocus.com/bid/75358) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1186764) 4. [](http://www.securityfocus.com/bid/75358) 5. [](http://www.ubuntu.com/usn/USN-2651-1) 6. [](http://www.openwall.com/lists/oss-security/2015/01/27/29)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14006 - **State**: PUBLISHED - **Published Date**: March 20, 2018 at 16:00 UTC - **Last Updated**: September 16, 2024 at 23:20 UTC - **Reserved Date**: August 30, 2017 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description GE Xeleris versions 1.0,1.1,2.1,3.0,3.1, medical imaging systems, all current versions are affected, these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices. ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **GE Healthcare - GE Xeleris** Affected versions: - 1.0,1.1,2.1,3.0,3.1 (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-1103, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-1103 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-1103 - **State**: PUBLISHED - **Published Date**: September 01, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:44 UTC - **Reserved Date**: March 15, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FTP Voyager ActiveX control before 8.0, when it is marked as safe for scripting (the default) or if allowed by the IObjectSafety interface, allows remote attackers to execute arbitrary commands. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#320944](http://www.kb.cert.org/vuls/id/320944) 2. [ftp-voyager-embedded-script-execution(7119)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7119)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26009, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26009 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26009 - **State**: PUBLISHED - **Published Date**: March 26, 2025 at 00:00 UTC - **Last Updated**: March 27, 2025 at 13:46 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Telesquare TLR-2005KSH 1.1.4 has an Information Disclosure vulnerability when requesting systemutilit.cgi. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Fan-24/Digging/blob/main/11/1.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0629 - **State**: PUBLISHED - **Published Date**: February 04, 2000 at 05:00 UTC - **Last Updated**: August 01, 2024 at 16:41 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The ident/identd service is running. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41205, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41205 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41205 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 02:12 UTC - **Last Updated**: August 02, 2024 at 18:54 UTC - **Reserved Date**: August 24, 2023 at 19:16 UTC - **Assigned By**: zdi ### Vulnerability Description D-Link DAP-1325 SetAPLanSettings SubnetMask Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1325 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of XML data provided to the HNAP1 SOAP endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18831. ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **D-Link - DAP-1325** Affected versions: - 1.07b01 (Status: affected) ### References 1. [ZDI-23-1313](https://www.zerodayinitiative.com/advisories/ZDI-23-1313/) 2. [vendor-provided URL](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10351)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19219, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19219 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19219 - **State**: PUBLISHED - **Published Date**: November 12, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 11:30 UTC - **Reserved Date**: November 12, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In LibSass 3.5-stable, there is an illegal address access at Sass::Eval::operator that will lead to a DoS attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1643760)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-20875, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-20875 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-20875 - **State**: PUBLISHED - **Published Date**: June 04, 2024 at 06:42 UTC - **Last Updated**: August 01, 2024 at 22:06 UTC - **Reserved Date**: December 05, 2023 at 04:57 UTC - **Assigned By**: SamsungMobile ### Vulnerability Description Improper caller verification vulnerability in SemClipboard prior to SMR June-2024 Release 1 allows local attackers to access arbitrary files. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - SMR Jun-2024 Release in Android 12, 13, 14 (Status: unaffected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6453, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6453 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6453 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: August 17, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2571, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2571 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2571 - **State**: PUBLISHED - **Published Date**: August 01, 2022 at 14:12 UTC - **Last Updated**: August 03, 2024 at 00:39 UTC - **Reserved Date**: July 28, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101. ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **vim - vim/vim** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/2e5a1dc4-2dfb-4e5f-8c70-e1ede21f3571) 2. [](https://github.com/vim/vim/commit/a6f9e300161f4cb54713da22f65b261595e8e614)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3533, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3533 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3533 - **State**: PUBLISHED - **Published Date**: July 19, 2014 at 19:00 UTC - **Last Updated**: August 06, 2024 at 10:50 UTC - **Reserved Date**: May 14, 2014 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6 allows local users to cause a denial of service (disconnect) via a certain sequence of crafted messages that cause the dbus-daemon to forward a message containing an invalid file descriptor. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [59798](http://secunia.com/advisories/59798) 2. [59611](http://secunia.com/advisories/59611) 3. [openSUSE-SU-2014:1239](http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html) 4. [60236](http://secunia.com/advisories/60236) 5. [](https://bugs.freedesktop.org/show_bug.cgi?id=80469) 6. [](http://advisories.mageia.org/MGASA-2014-0294.html) 7. [](http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html) 8. [DSA-2971](http://www.debian.org/security/2014/dsa-2971) 9. [](https://bugs.freedesktop.org/show_bug.cgi?id=79694) 10. [[oss-security] 20140702 CVE-2014-3532, -3533: two local DoS vulnerabilities in dbus-daemon](http://openwall.com/lists/oss-security/2014/07/02/4) 11. [MDVSA-2015:176](http://www.mandriva.com/security/advisories?name=MDVSA-2015:176)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24034, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24034 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24034 - **State**: PUBLISHED - **Published Date**: January 23, 2025 at 17:38 UTC - **Last Updated**: February 12, 2025 at 20:41 UTC - **Reserved Date**: January 16, 2025 at 17:31 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Starting in version 0.7.0 and prior to versions 0.7.15 and 0.8.3, Himmelblau is vulnerable to leaking credentials in debug logs. When debug logging is enabled, user access tokens are inadvertently logged, potentially exposing sensitive authentication data. Similarly, Kerberos Ticket-Granting Tickets (TGTs) are logged when debug logging is enabled. Both issues pose a risk of exposing sensitive credentials, particularly in environments where debug logging is enabled. Himmelblau versions 0.7.15 and 0.8.3 contain a patch that fixes both issues. Some workarounds are available for users who are unable to upgrade. For the **logon compliance script issue**, disable the `logon_script` option in `/etc/himmelblau/himmelblau.conf`, and avoid using the `-d` flag when starting the `himmelblaud` daemon. For the Kerberos CCache issue, one may disable debug logging globally by setting the `debug` option in `/etc/himmelblau/himmelblau.conf` to `false` and avoiding the `-d` parameter when starting `himmelblaud`. ### CVSS Metrics - **CVSS Base Score**: 3.2/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **himmelblau-idm - himmelblau** Affected versions: - >= 0.7.0, < 0.7.15 (Status: affected) - >= 0.8.0, < 0.8.3 (Status: affected) ### References 1. [https://github.com/himmelblau-idm/himmelblau/security/advisories/GHSA-p989-2f5w-9cf6](https://github.com/himmelblau-idm/himmelblau/security/advisories/GHSA-p989-2f5w-9cf6) 2. [https://github.com/himmelblau-idm/himmelblau/commit/1216804f15ce5dc74bb5da48b5508c41d2ece8fa](https://github.com/himmelblau-idm/himmelblau/commit/1216804f15ce5dc74bb5da48b5508c41d2ece8fa) 3. [https://github.com/himmelblau-idm/himmelblau/releases/tag/0.7.15](https://github.com/himmelblau-idm/himmelblau/releases/tag/0.7.15) 4. [https://github.com/himmelblau-idm/himmelblau/releases/tag/0.8.3](https://github.com/himmelblau-idm/himmelblau/releases/tag/0.8.3) 5. [https://manpages.opensuse.org/Tumbleweed/himmelblau/himmelblau.conf.5.en.html](https://manpages.opensuse.org/Tumbleweed/himmelblau/himmelblau.conf.5.en.html) 6. [https://manpages.opensuse.org/Tumbleweed/himmelblau/himmelblaud.8.en.html](https://manpages.opensuse.org/Tumbleweed/himmelblau/himmelblaud.8.en.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22780, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22780 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22780 - **State**: PUBLISHED - **Published Date**: February 09, 2022 at 22:05 UTC - **Last Updated**: September 16, 2024 at 21:04 UTC - **Reserved Date**: January 07, 2022 at 00:00 UTC - **Assigned By**: Zoom ### Vulnerability Description The Zoom Client for Meetings chat functionality was susceptible to Zip bombing attacks in the following product versions: Android before version 5.8.6, iOS before version 5.9.0, Linux before version 5.8.6, macOS before version 5.7.3, and Windows before version 5.6.3. This could lead to availability issues on the client host by exhausting system resources. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L` ### Affected Products **Zoom Video Communications Inc - Zoom Client for Meetings for Android** Affected versions: - unspecified (Status: affected) **Zoom Video Communications Inc - Zoom Client for Meetings for iOS** Affected versions: - unspecified (Status: affected) **Zoom Video Communications Inc - Zoom Client for Meetings for Linux** Affected versions: - unspecified (Status: affected) **Zoom Video Communications Inc - Zoom Client for Meetings for macOS** Affected versions: - unspecified (Status: affected) **Zoom Video Communications Inc - Zoom Client for Meetings for Windows** Affected versions: - unspecified (Status: affected) ### References 1. [](https://explore.zoom.us/en/trust/security/security-bulletin) ### Credits - Johnny Yu of Walmart Global Tech
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43238, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43238 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43238 - **State**: PUBLISHED - **Published Date**: September 21, 2023 at 00:00 UTC - **Last Updated**: September 24, 2024 at 15:16 UTC - **Reserved Date**: September 18, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter nvmacaddr in form2Dhcpip.cgi. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.dlink.com/en/security-bulletin/) 2. [](https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/form2Dhcpip_cgi/1.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0822, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0822 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0822 - **State**: PUBLISHED - **Published Date**: June 08, 2010 at 20:00 UTC - **Last Updated**: August 07, 2024 at 00:59 UTC - **Reserved Date**: March 02, 2010 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Stack-based buffer overflow in Microsoft Office Excel 2002 SP3, Office 2004 for Mac, Office 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via an Excel file with a crafted OBJ (0x5D) record, aka "Excel Object Stack Overflow Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20100608 VUPEN Security Research - Microsoft Office Excel OBJ Stack Overflow Vulnerability (CVE-2010-0822)](http://www.securityfocus.com/archive/1/511752/100/0/threaded) 2. [oval:org.mitre.oval:def:7265](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7265) 3. [MS10-038](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-038) 4. [40520](http://www.securityfocus.com/bid/40520) 5. [65236](http://osvdb.org/65236) 6. [TA10-159B](http://www.us-cert.gov/cas/techalerts/TA10-159B.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10847, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10847 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10847 - **State**: PUBLISHED - **Published Date**: August 01, 2019 at 15:30 UTC - **Last Updated**: August 06, 2024 at 03:38 UTC - **Reserved Date**: July 31, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description cPanel before 11.54.0.4 allows arbitrary file-read and file-write operations via scripts/fixmailboxpath (SEC-80). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://documentation.cpanel.net/display/CL/54+Change+Log)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21804, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21804 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21804 - **State**: PUBLISHED - **Published Date**: February 14, 2023 at 19:33 UTC - **Last Updated**: January 01, 2025 at 00:40 UTC - **Reserved Date**: December 16, 2022 at 22:13 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Graphics Component Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Graphics Component Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21804)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27078, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27078 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27078 - **State**: PUBLISHED - **Published Date**: March 23, 2022 at 23:25 UTC - **Last Updated**: August 03, 2024 at 05:18 UTC - **Reserved Date**: March 14, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda M3 1.10 V1.0.0.12(4856) was discovered to contain a command injection vulnerability via the component /goform/setAdInfoDetail. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/GD008/vuln/blob/main/tenda_M3_setAdInfoDetail/M3_setAdInfoDetail.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-57948, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-57948 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-57948 - **State**: PUBLISHED - **Published Date**: January 31, 2025 at 11:25 UTC - **Last Updated**: May 04, 2025 at 10:07 UTC - **Reserved Date**: January 19, 2025 at 11:50 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: mac802154: check local interfaces before deleting sdata list syzkaller reported a corrupted list in ieee802154_if_remove. [1] Remove an IEEE 802.15.4 network interface after unregister an IEEE 802.15.4 hardware device from the system. CPU0 CPU1 ==== ==== genl_family_rcv_msg_doit ieee802154_unregister_hw ieee802154_del_iface ieee802154_remove_interfaces rdev_del_virtual_intf_deprecated list_del(&sdata->list) ieee802154_if_remove list_del_rcu The net device has been unregistered, since the rcu grace period, unregistration must be run before ieee802154_if_remove. To avoid this issue, add a check for local->interfaces before deleting sdata list. [1] kernel BUG at lib/list_debug.c:58! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 6277 Comm: syz-executor157 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:__list_del_entry_valid_or_report+0xf4/0x140 lib/list_debug.c:56 Code: e8 a1 7e 00 07 90 0f 0b 48 c7 c7 e0 37 60 8c 4c 89 fe e8 8f 7e 00 07 90 0f 0b 48 c7 c7 40 38 60 8c 4c 89 fe e8 7d 7e 00 07 90 <0f> 0b 48 c7 c7 a0 38 60 8c 4c 89 fe e8 6b 7e 00 07 90 0f 0b 48 c7 RSP: 0018:ffffc9000490f3d0 EFLAGS: 00010246 RAX: 000000000000004e RBX: dead000000000122 RCX: d211eee56bb28d00 RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 RBP: ffff88805b278dd8 R08: ffffffff8174a12c R09: 1ffffffff2852f0d R10: dffffc0000000000 R11: fffffbfff2852f0e R12: dffffc0000000000 R13: dffffc0000000000 R14: dead000000000100 R15: ffff88805b278cc0 FS: 0000555572f94380(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000056262e4a3000 CR3: 0000000078496000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> __list_del_entry_valid include/linux/list.h:124 [inline] __list_del_entry include/linux/list.h:215 [inline] list_del_rcu include/linux/rculist.h:157 [inline] ieee802154_if_remove+0x86/0x1e0 net/mac802154/iface.c:687 rdev_del_virtual_intf_deprecated net/ieee802154/rdev-ops.h:24 [inline] ieee802154_del_iface+0x2c0/0x5c0 net/ieee802154/nl-phy.c:323 genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline] genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline] genl_rcv_msg+0xb14/0xec0 net/netlink/genetlink.c:1210 netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2551 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219 netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline] netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1357 netlink_sendmsg+0x8e4/0xcb0 net/netlink/af_netlink.c:1901 sock_sendmsg_nosec net/socket.c:729 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:744 ____sys_sendmsg+0x52a/0x7e0 net/socket.c:2607 ___sys_sendmsg net/socket.c:2661 [inline] __sys_sendmsg+0x292/0x380 net/socket.c:2690 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 5.4.290 (Status: unaffected) - 5.10.234 (Status: unaffected) - 5.15.177 (Status: unaffected) - 6.1.127 (Status: unaffected) - 6.6.74 (Status: unaffected) - 6.12.11 (Status: unaffected) - 6.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/0d11dc30edfc4acef0acef130bb5ca596317190a) 2. [](https://git.kernel.org/stable/c/98ea165a2ac240345c48b57c0a3d08bbcad02929) 3. [](https://git.kernel.org/stable/c/80aee0bc0dbe253b6692d33e64455dc742fc52f1) 4. [](https://git.kernel.org/stable/c/41e4ca8acba39f1cecff2dfdf14ace4ee52c4272) 5. [](https://git.kernel.org/stable/c/2e41e98c4e79edae338f2662dbdf74ac2245d183) 6. [](https://git.kernel.org/stable/c/b856d2c1384bc5a7456262afd21aa439ee5cdf6e) 7. [](https://git.kernel.org/stable/c/eb09fbeb48709fe66c0d708aed81e910a577a30a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13614, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13614 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13614 - **State**: PUBLISHED - **Published Date**: July 09, 2018 at 06:00 UTC - **Last Updated**: August 05, 2024 at 09:07 UTC - **Reserved Date**: July 08, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The mintToken function of a smart contract implementation for MAVCash, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md) 2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/MAVCash)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0381, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0381 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0381 - **State**: PUBLISHED - **Published Date**: September 17, 2020 at 15:25 UTC - **Last Updated**: August 04, 2024 at 06:02 UTC - **Reserved Date**: October 17, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In Parse_wave of eas_mdls.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote information disclosure in a highly constrained process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-150159669 ### Affected Products **n/a - Android** Affected versions: - Android-8.0 Android-8.1 Android-9 Android-10 Android-11 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2020-09-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48644, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48644 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48644 - **State**: PUBLISHED - **Published Date**: October 22, 2024 at 00:00 UTC - **Last Updated**: October 23, 2024 at 18:23 UTC - **Reserved Date**: October 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Accounts enumeration vulnerability in the Login Component of Reolink Duo 2 WiFi Camera (Firmware Version v3.0.0.1889_23031701) allows remote attackers to determine valid user accounts via login attempts. This can lead to the enumeration of user accounts and potentially facilitate other attacks, such as brute-forcing of passwords. The vulnerability arises from the application responding differently to login attempts with valid and invalid usernames. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/rosembergpro/CVE-2024-48644)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1156, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1156 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1156 - **State**: PUBLISHED - **Published Date**: September 01, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:19 UTC - **Reserved Date**: September 26, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Apache 2.0.42 allows remote attackers to view the source code of a CGI script via a POST request to a directory with both WebDAV and CGI enabled. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [HPSBUX0210-224](http://online.securityfocus.com/advisories/4617) 2. [](http://www.apacheweek.com/issues/02-10-04) 3. [](http://www.apache.org/dist/httpd/CHANGES_2.0) 4. [VU#910713](http://www.kb.cert.org/vuls/id/910713) 5. [apache-webdav-cgi-source(10499)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10499) 6. [6065](http://www.securityfocus.com/bid/6065) 7. [[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E) 8. [[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E) 9. [[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E) 10. [[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E) 11. [[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E) 12. [[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E) 13. [[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/](https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E) 14. [[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01%40%3Ccvs.httpd.apache.org%3E) 15. [[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E) 16. [[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E) 17. [[httpd-cvs] 20210606 svn commit: r1075470 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0465, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0465 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0465 - **State**: PUBLISHED - **Published Date**: January 25, 2008 at 15:00 UTC - **Last Updated**: August 07, 2024 at 07:46 UTC - **Reserved Date**: January 25, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in optimizer.php in Seagull 0.6.3 allows remote attackers to read arbitrary files via a .. (dot dot) in the files parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20080129 Seagull 0.6.3 Remote File Disclosure Vulnerability fixed](http://www.attrition.org/pipermail/vim/2008-January/001891.html) 2. [4980](https://www.exploit-db.com/exploits/4980) 3. [28646](http://secunia.com/advisories/28646) 4. [ADV-2008-0311](http://www.vupen.com/english/advisories/2008/0311) 5. [seagullstable-optimizer-directory-traversal(39902)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39902) 6. [](http://seagullproject.org/publisher/articleview/action/view/frmArticleID/98/) 7. [27437](http://www.securityfocus.com/bid/27437)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5479, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5479 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5479 - **State**: REJECTED - **Published Date**: January 25, 2021 at 17:53 UTC - **Last Updated**: January 25, 2021 at 17:53 UTC - **Reserved Date**: January 03, 2020 at 00:00 UTC - **Assigned By**: pivotal ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10803, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10803 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10803 - **State**: PUBLISHED - **Published Date**: March 22, 2020 at 03:48 UTC - **Last Updated**: August 04, 2024 at 11:14 UTC - **Reserved Date**: March 22, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.phpmyadmin.net/security/PMASA-2020-4/) 2. [[debian-lts-announce] 20200322 [SECURITY] [DLA 2154-1] phpmyadmin security update](https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html) 3. [openSUSE-SU-2020:0405](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html) 4. [openSUSE-SU-2020:0427](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html) 5. [FEDORA-2020-d7b0a5a84a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/) 6. [FEDORA-2020-25f3aea389](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/) 7. [FEDORA-2020-e60ce63865](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/) 8. [openSUSE-SU-2020:1806](http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-0519, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-0519 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-0519 - **State**: PUBLISHED - **Published Date**: August 17, 2021 at 18:28 UTC - **Last Updated**: August 03, 2024 at 15:40 UTC - **Reserved Date**: November 06, 2020 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-176533109 ### Affected Products **n/a - Android** Affected versions: - Android-10 Android-11 Android-8.1 Android-9 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2021-08-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3808, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3808 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3808 - **State**: PUBLISHED - **Published Date**: April 19, 2025 at 17:31 UTC - **Last Updated**: April 21, 2025 at 02:25 UTC - **Reserved Date**: April 18, 2025 at 14:30 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in zhenfeng13 My-BBS 1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Multiple endpoints might be affected. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) - CWE-862: Missing Authorization ### Affected Products **zhenfeng13 - My-BBS** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-305662 | zhenfeng13 My-BBS cross-site request forgery](https://vuldb.com/?id.305662) 2. [VDB-305662 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.305662) 3. [Submit #555259 | https://github.com/ZHENFENG13/My-BBS My-BBS 1.0 Cross-Site Request Forgery](https://vuldb.com/?submit.555259) 4. [](https://github.com/caigo8/CVE-md/blob/main/My-bbs/CSRF.md) ### Credits - Caigo (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000036, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000036 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000036 - **State**: PUBLISHED - **Published Date**: May 24, 2018 at 13:00 UTC - **Last Updated**: September 13, 2024 at 16:11 UTC - **Reserved Date**: February 02, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Artifex MuPDF 1.12.0 and earlier, multiple memory leaks in the PDF parser allow an attacker to cause a denial of service (memory leak) via a crafted file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5502) 2. [GLSA-201811-15](https://security.gentoo.org/glsa/201811-15) 3. [[debian-lts-announce] 20210923 [SECURITY] [DLA 2765-1] mupdf security update](https://lists.debian.org/debian-lts-announce/2021/09/msg00013.html) 4. [](https://bugs.ghostscript.com/show_bug.cgi?id=698887) 5. [](https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=8aa2bd34065d2844aae778bd4cc20c74bbcd9406)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35374, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35374 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35374 - **State**: PUBLISHED - **Published Date**: May 24, 2024 at 20:29 UTC - **Last Updated**: February 13, 2025 at 15:58 UTC - **Reserved Date**: May 17, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Mocodo Mocodo Online 4.2.6 and below does not properly sanitize the sql_case input field in /web/generate.php, allowing remote attackers to execute arbitrary commands and potentially command injection, leading to remote code execution (RCE) under certain conditions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/generate.php#L104-L158) 2. [](https://chocapikk.com/posts/2024/mocodo-vulnerabilities/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10990, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10990 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10990 - **State**: PUBLISHED - **Published Date**: September 23, 2019 at 15:46 UTC - **Last Updated**: August 04, 2024 at 22:40 UTC - **Reserved Date**: April 08, 2019 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, uses a hard-coded password to encrypt protected files in transit and at rest, which may allow an attacker to access configuration files. ### Weakness Classification (CWE) - CWE-321: Security Weakness ### Affected Products **n/a - Red Lion Controls Crimson (Windows configuration software)** Affected versions: - Version 3.0 and prior, Version 3.1 prior to release 3112.00 (Status: affected) ### References 1. [](https://www.us-cert.gov/ics/advisories/icsa-19-248-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6968, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6968 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6968 - **State**: PUBLISHED - **Published Date**: July 22, 2024 at 03:00 UTC - **Last Updated**: August 01, 2024 at 21:45 UTC - **Reserved Date**: July 21, 2024 at 15:19 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /print_patients_visits.php. The manipulation of the argument from/to leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-272122 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Clinics Patient Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-272122 | SourceCodester Clinics Patient Management System print_patients_visits.php sql injection](https://vuldb.com/?id.272122) 2. [VDB-272122 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.272122) 3. [Submit #378107 | SourceCodester Clinic's Patient Management System 1.0 SQL injection vulnerability](https://vuldb.com/?submit.378107) 4. [](https://github.com/Xu-Mingming/cve/blob/main/sql3.md) ### Credits - Xu Mingming (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-2458, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-2458 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-2458 - **State**: PUBLISHED - **Published Date**: May 27, 2008 at 14:00 UTC - **Last Updated**: August 07, 2024 at 09:05 UTC - **Reserved Date**: May 27, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in index.php in Starsgames Control Panel 4.6.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the st parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [starsgamescontrolpanel-index-xss(42544)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42544) 2. [29295](http://www.securityfocus.com/bid/29295) 3. [20080520 Starsgames Control Panel <= 4.6.2 Remote XSS Vulnerability](http://www.securityfocus.com/archive/1/492264/100/0/threaded) 4. [30321](http://secunia.com/advisories/30321)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6406, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6406 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6406 - **State**: PUBLISHED - **Published Date**: September 22, 2016 at 22:00 UTC - **Last Updated**: August 06, 2024 at 01:29 UTC - **Reserved Date**: July 26, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco IronPort AsyncOS 9.1.2-023, 9.1.2-028, 9.1.2-036, 9.7.2-046, 9.7.2-047, 9.7.2-054, 10.0.0-124, and 10.0.0-125 on Email Security Appliance (ESA) devices, when Enrollment Client before 1.0.2-065 is installed, allows remote attackers to obtain root access via a connection to the testing/debugging interface, aka Bug ID CSCvb26017. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [93116](http://www.securityfocus.com/bid/93116) 2. [20160922 Cisco Email Security Appliance Internal Testing Interface Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160922-esa) 3. [1036881](http://www.securitytracker.com/id/1036881)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37349, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37349 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37349 - **State**: PUBLISHED - **Published Date**: June 20, 2024 at 17:11 UTC - **Last Updated**: August 02, 2024 at 03:50 UTC - **Reserved Date**: June 05, 2024 at 21:07 UTC - **Assigned By**: Absolute ### Vulnerability Description There is a cross-site scripting vulnerability in the management UI of Absolute Secure Access prior to version 13.06. Attackers with system administrator permissions can interfere with other system administrator’s use of the management UI when the victim administrator edits the same management object. This vulnerability is distinct from CVE-2024-37348 and CVE-2024-37351. The scope is unchanged, there is no loss of confidentiality. Impact to system integrity is high, impact to system availability is none. ### CVSS Metrics - **CVSS Base Score**: 4.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Absolute Software - Secure Access** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37349/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1835, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1835 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1835 - **State**: PUBLISHED - **Published Date**: March 02, 2025 at 22:31 UTC - **Last Updated**: March 03, 2025 at 20:08 UTC - **Reserved Date**: March 01, 2025 at 19:57 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in osuuu LightPicture 1.2.2 and classified as critical. This vulnerability affects the function upload of the file /app/controller/Api.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-434: Security Weakness - CWE-284: Security Weakness ### Affected Products **osuuu - LightPicture** Affected versions: - 1.2.2 (Status: affected) ### References 1. [VDB-298102 | osuuu LightPicture Api.php upload unrestricted upload](https://vuldb.com/?id.298102) 2. [VDB-298102 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.298102) 3. [Submit #505007 | https://github.com/osuuu/LightPicture LightPicture 1.2.2 unauthorized file upload](https://vuldb.com/?submit.505007) 4. [](https://github.com/sheratan4/cve/issues/1) ### Credits - sheratan (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5917, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5917 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5917 - **State**: PUBLISHED - **Published Date**: November 17, 2012 at 21:00 UTC - **Last Updated**: August 06, 2024 at 21:21 UTC - **Reserved Date**: November 17, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SnackAmp 3.1.3 allows remote attackers to cause a denial of service (application crash) via a long string in an aiff file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [18692](http://www.exploit-db.com/exploits/18692) 2. [52842](http://www.securityfocus.com/bid/52842) 3. [snackamp-aiff-dos(74528)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74528) 4. [80805](http://osvdb.org/80805)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0877, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0877 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0877 - **State**: PUBLISHED - **Published Date**: November 23, 2013 at 17:00 UTC - **Last Updated**: August 06, 2024 at 14:41 UTC - **Reserved Date**: January 07, 2013 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description The old_codec37 function in libavcodec/sanm.c in FFmpeg before 1.1.3 allows remote attackers to have an unspecified impact via crafted LucasArts Smush data that has a large size when decoded, related to an out-of-bounds array access. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.ffmpeg.org/security.html) 2. [GLSA-201603-06](https://security.gentoo.org/glsa/201603-06) 3. [](http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=365270aec5c2b9284230abc702b11168818f14cf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-55975, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-55975 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-55975 - **State**: PUBLISHED - **Published Date**: December 18, 2024 at 11:38 UTC - **Last Updated**: December 18, 2024 at 16:28 UTC - **Reserved Date**: December 14, 2024 at 19:41 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Rohit Urane Dr Affiliate allows SQL Injection.This issue affects Dr Affiliate: from n/a through 1.2.3. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Rohit Urane - Dr Affiliate** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/dr-affiliate/vulnerability/wordpress-dr-affiliate-plugin-1-2-3-sql-injection-vulnerability?_s_id=cve) ### Credits - LVT-tholv2k (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34305, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34305 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34305 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 01:57 UTC - **Last Updated**: September 18, 2024 at 18:28 UTC - **Reserved Date**: May 31, 2023 at 19:51 UTC - **Assigned By**: zdi ### Vulnerability Description Ashlar-Vellum Cobalt Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of X_B or X_T files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. . Was ZDI-CAN-18637. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Ashlar-Vellum - Cobalt** Affected versions: - Ashlar-Vellum Cobalt 12 beta build 1204.49 (Status: affected) ### References 1. [ZDI-23-865](https://www.zerodayinitiative.com/advisories/ZDI-23-865/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11629 - **State**: PUBLISHED - **Published Date**: June 02, 2018 at 13:00 UTC - **Last Updated**: August 05, 2024 at 08:17 UTC - **Reserved Date**: May 31, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Default and unremovable support credentials (user:lutron password:integration) allow attackers to gain total super user control of an IoT device through a TELNET session to products using the HomeWorks QS Lutron integration protocol Revision M to Revision Y. NOTE: The vendor disputes this id as not being a vulnerability because what can be done through the ports revolve around controlling lighting, not code execution. A certain set of commands are listed, which bear some similarity to code, but they are not arbitrary and do not allow admin-level control of a machine ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://sadfud.me/explotos/CVE-2018-11629) 2. [](https://reversecodes.wordpress.com/2018/06/02/0-day-tomando-el-control-de-las-instalaciones-de-la-nasa-en-cabo-canaveral/) 3. [](http://www.lutron.com/TechnicalDocumentLibrary/040249.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1765, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1765 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1765 - **State**: PUBLISHED - **Published Date**: May 14, 2014 at 19:00 UTC - **Last Updated**: August 06, 2024 at 15:13 UTC - **Reserved Date**: February 19, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in jwplayer.swf in the smart-flv plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) link or (2) playerready parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20130225 Re: CVE request: WordPress plugin smart-flv jwplayer.swf XSS](http://seclists.org/oss-sec/2013/q1/446) 2. [90606](http://osvdb.org/90606) 3. [58135](http://www.securityfocus.com/bid/58135)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0256, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0256 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0256 - **State**: PUBLISHED - **Published Date**: February 15, 2019 at 18:00 UTC - **Last Updated**: August 04, 2024 at 17:44 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description Under certain conditions SAP Business One Mobile Android App, version 1.2.12, allows an attacker to access information which would otherwise be restricted. ### Affected Products **SAP SE - SAP Business One Mobile Android App** Affected versions: - < 1.2.12 (Status: affected) ### References 1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943) 2. [](https://launchpad.support.sap.com/#/notes/2723878) 3. [106995](http://www.securityfocus.com/bid/106995)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1368, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1368 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1368 - **State**: PUBLISHED - **Published Date**: March 23, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 17:12 UTC - **Reserved Date**: March 23, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the USB Gadget RNDIS implementation in the Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (kmalloc'd memory corruption) via a remote NDIS response to OID_GEN_SUPPORTED_LIST, which causes memory to be allocated for the reply data but not the reply structure. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [17831](http://www.securityfocus.com/bid/17831) 2. [ADV-2006-2554](http://www.vupen.com/english/advisories/2006/2554) 3. [USN-281-1](https://usn.ubuntu.com/281-1/) 4. [ADV-2006-1046](http://www.vupen.com/english/advisories/2006/1046) 5. [MDKSA-2006:123](http://www.mandriva.com/security/advisories?name=MDKSA-2006:123) 6. [DSA-1097](http://www.debian.org/security/2006/dsa-1097) 7. [19955](http://secunia.com/advisories/19955) 8. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16) 9. [DSA-1103](http://www.debian.org/security/2006/dsa-1103) 10. [21045](http://secunia.com/advisories/21045) 11. [19330](http://secunia.com/advisories/19330) 12. [20671](http://secunia.com/advisories/20671) 13. [20914](http://secunia.com/advisories/20914) 14. [](http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8763716bfe4d8a16bef28c9947cf9d799b1796a5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4605, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4605 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4605 - **State**: PUBLISHED - **Published Date**: August 23, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 20:42 UTC - **Reserved Date**: August 23, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The default configuration of the SMTP component in Websense Email Security 6.1 through 7.3 enables weak SSL ciphers in the "SurfControl plc\SuperScout Email Filter\SMTP" registry key, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.websense.com/support/article/kbarticle/SSL-TLS-weak-and-export-ciphers-detected-in-Websense-Email-Security-deployments) 2. [websense-smtp-info-disc(78131)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78131) 3. [64758](http://www.securityfocus.com/bid/64758)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5336, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5336 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5336 - **State**: PUBLISHED - **Published Date**: January 11, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 05:33 UTC - **Reserved Date**: January 11, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[debian-lts-announce] 20180126 [SECURITY] [DLA 1258-1] wireshark security update](https://lists.debian.org/debian-lts-announce/2018/01/msg00032.html) 2. [102504](http://www.securityfocus.com/bid/102504) 3. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f4c95cf46ba6adbd10b09747e10742801bc706b) 4. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f6702e49a9720d173246668495eece6d77eca5b0) 5. [](https://www.wireshark.org/security/wnpa-sec-2018-01.html) 6. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14253) 7. [DSA-4101](https://www.debian.org/security/2018/dsa-4101)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0727, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0727 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0727 - **State**: PUBLISHED - **Published Date**: February 21, 2025 at 08:19 UTC - **Last Updated**: February 21, 2025 at 15:34 UTC - **Reserved Date**: January 27, 2025 at 08:43 UTC - **Assigned By**: eclipse ### Vulnerability Description In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length in one packet smaller than the data request size of the other packet. A possible workaround is to disable HTTP PUT support. ### Weakness Classification (CWE) - CWE-191: Security Weakness ### Affected Products **Eclipse Foundation - ThreadX** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014) 2. [](https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-jf6x-9mgc-p72w) ### Credits - Kelly Patterson of Cisco Talos
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4208, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4208 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4208 - **State**: PUBLISHED - **Published Date**: August 08, 2007 at 01:52 UTC - **Last Updated**: August 07, 2024 at 14:46 UTC - **Reserved Date**: August 07, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in default.asp in Next Gen Portfolio Manager allows remote attackers to execute arbitrary SQL commands via the (1) Users_Email or (2) Users_Password parameter in an ExecuteTheLogin action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2976](http://securityreason.com/securityalert/2976) 2. [25195](http://www.securityfocus.com/bid/25195) 3. [nextgen-default-sql-injection(35787)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35787) 4. [ADV-2007-2797](http://www.vupen.com/english/advisories/2007/2797) 5. [](http://outlaw.aria-security.info/?p=14) 6. [26338](http://secunia.com/advisories/26338) 7. [20070803 [Aria-Security.Net] Next Gen Portfolio Manager SQL Injection](http://www.securityfocus.com/archive/1/475449/100/0/threaded) 8. [36280](http://osvdb.org/36280)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43930, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43930 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43930 - **State**: PUBLISHED - **Published Date**: April 28, 2022 at 14:53 UTC - **Last Updated**: April 16, 2025 at 16:27 UTC - **Reserved Date**: November 16, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Elcomplus SmartPTT is vulnerable as the backup and restore system does not adequately validate download requests, enabling malicious users to perform path traversal attacks and potentially download arbitrary files from the system. ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Elcomplus - SmartPTT** Affected versions: - 1.1 (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-04) ### Credits - Michael Heinzl reported these vulnerabilities to CISA
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30427, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30427 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30427 - **State**: PUBLISHED - **Published Date**: March 31, 2025 at 22:24 UTC - **Last Updated**: April 01, 2025 at 13:18 UTC - **Reserved Date**: March 22, 2025 at 00:04 UTC - **Assigned By**: apple ### Vulnerability Description A use-after-free issue was addressed with improved memory management. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash. ### Affected Products **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - visionOS** Affected versions: - unspecified (Status: affected) **Apple - Safari** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/122377) 2. [](https://support.apple.com/en-us/122371) 3. [](https://support.apple.com/en-us/122372) 4. [](https://support.apple.com/en-us/122373) 5. [](https://support.apple.com/en-us/122378) 6. [](https://support.apple.com/en-us/122379)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36393, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36393 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36393 - **State**: REJECTED - **Last Updated**: May 28, 2025 at 18:20 UTC - **Reserved Date**: July 28, 2022 at 03:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16147, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16147 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16147 - **State**: PUBLISHED - **Published Date**: September 09, 2019 at 20:45 UTC - **Last Updated**: August 05, 2024 at 01:10 UTC - **Reserved Date**: September 09, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Liferay Portal through 7.2.0 GA1 allows XSS via a journal article title to journal_article/page.jsp in journal/journal-taglib. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/liferay/liferay-portal/commit/7e063aed70f947a92bb43a4471e0c4e650fe8f7f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4490, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4490 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4490 - **State**: PUBLISHED - **Published Date**: August 31, 2006 at 22:00 UTC - **Last Updated**: August 07, 2024 at 19:14 UTC - **Reserved Date**: August 31, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple directory traversal vulnerabilities in Cybozu Office before 6.6 Build 1.3 and Share 360 before 2.5 Build 0.3 allow remote authenticated users to read arbitrary files via a .. (dot dot) sequence via the id parameter in (1) scripts/cbag/ag.exe or (2) scripts/s360v2/s360.exe. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [28261](http://www.osvdb.org/28261) 2. [21618](http://secunia.com/advisories/21618) 3. [21623](http://secunia.com/advisories/21623) 4. [JVN#90420168](http://jvn.jp/jp/JVN%2390420168/index.html) 5. [](http://cybozu.co.jp/products/dl/notice_060825/) 6. [28262](http://www.osvdb.org/28262) 7. [cybozu-ag-s360-directory-traversal(28591)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28591) 8. [1016759](http://securitytracker.com/id?1016759) 9. [](http://vuln.sg/cybozu-en.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31456, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31456 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31456 - **State**: PUBLISHED - **Published Date**: July 26, 2023 at 00:00 UTC - **Last Updated**: October 29, 2024 at 13:15 UTC - **Reserved Date**: May 23, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site scripting (XSS) vulnerability in Truedesk v1.2.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the team name parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.acunetix.com/vulnerabilities/web/cross-site-scripting/) 2. [](https://medium.com/%40rohitgautam26/cve-2022-31456-c8bbefba6cc1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7593, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7593 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7593 - **State**: PUBLISHED - **Published Date**: August 20, 2019 at 18:22 UTC - **Last Updated**: August 04, 2024 at 20:54 UTC - **Reserved Date**: February 07, 2019 at 00:00 UTC - **Assigned By**: jci ### Vulnerability Description Metasys® ADS/ADX servers and NAE/NIE/NCE engines prior to 9.0 make use of a shared RSA key pair for certain encryption operations involving the Site Management Portal (SMP). ### Weakness Classification (CWE) - CWE-323: Security Weakness ### Affected Products **Johnson Controls - Metasys versions prior to 9.0** Affected versions: - 9.0 (Status: unaffected) ### References 1. [](https://www.johnsoncontrols.com/-/media/jci/cyber-solutions/product-security-advisories/2019/jci-psa-2019-06-v1-metasys-icsa-19-227-01.pdf) 2. [](https://www.us-cert.gov/ics/advisories/icsa-19-227-01) ### Credits - harpocrates.ghost@protonmail.com
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23331, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23331 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23331 - **State**: PUBLISHED - **Published Date**: February 03, 2021 at 18:05 UTC - **Last Updated**: September 16, 2024 at 18:33 UTC - **Reserved Date**: January 08, 2021 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description This affects all versions of package com.squareup:connect. The method prepareDownloadFilecreates creates a temporary file with the permissions bits of -rw-r--r-- on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded by downloadFileFromResponse will be visible to all other users on the local system. A workaround fix for this issue is to set the system property java.io.tmpdir to a safe directory as remediation. Note: This version of the SDK is end of life and no longer maintained, please upgrade to the latest version. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:P/RL:W/RC:C` ### Affected Products **n/a - com.squareup:connect** Affected versions: - 0 (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUP-1065988) 2. [](https://github.com/square/connect-java-sdk/blob/master/src/main/java/com/squareup/connect/ApiClient.java%23L613) ### Credits - Jonathan Leitschuh
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2182, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2182 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2182 - **State**: PUBLISHED - **Published Date**: March 12, 2024 at 16:18 UTC - **Last Updated**: April 15, 2025 at 15:26 UTC - **Reserved Date**: March 05, 2024 at 00:40 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-346: Security Weakness ### Affected Products **Unknown - Unknown** Affected versions: - 20.03.0 (Status: affected) **Red Hat - Fast Datapath for Red Hat Enterprise Linux 8** Affected versions: - 0:23.06.1-112.el8fdp (Status: unaffected) **Red Hat - Fast Datapath for Red Hat Enterprise Linux 8** Affected versions: - 0:22.12.1-94.el8fdp (Status: unaffected) **Red Hat - Fast Datapath for Red Hat Enterprise Linux 8** Affected versions: - 0:22.03.3-71.el8fdp (Status: unaffected) **Red Hat - Fast Datapath for Red Hat Enterprise Linux 8** Affected versions: - 0:23.03.1-100.el8fdp (Status: unaffected) **Red Hat - Fast Datapath for Red Hat Enterprise Linux 8** Affected versions: - 0:21.12.0-142.el8fdp (Status: unaffected) **Red Hat - Fast Datapath for Red Hat Enterprise Linux 9** Affected versions: - 0:23.09.0-136.el9fdp (Status: unaffected) **Red Hat - Fast Datapath for Red Hat Enterprise Linux 9** Affected versions: - 0:23.06.1-112.el9fdp (Status: unaffected) **Red Hat - Fast Datapath for Red Hat Enterprise Linux 9** Affected versions: - 0:22.12.1-94.el9fdp (Status: unaffected) **Red Hat - Fast Datapath for Red Hat Enterprise Linux 9** Affected versions: - 0:22.03.3-71.el9fdp (Status: unaffected) **Red Hat - Fast Datapath for Red Hat Enterprise Linux 9** Affected versions: - 0:23.03.1-100.el9fdp (Status: unaffected) **Red Hat - Fast Datapath for RHEL 7** **Red Hat - Fast Datapath for RHEL 7** **Red Hat - Fast Datapath for RHEL 7** **Red Hat - Fast Datapath for RHEL 8** **Red Hat - Fast Datapath for RHEL 8** **Red Hat - Fast Datapath for RHEL 8** **Red Hat - Fast Datapath for RHEL 8** **Red Hat - Fast Datapath for RHEL 8** **Red Hat - Fast Datapath for RHEL 9** **Red Hat - Fast Datapath for RHEL 9** **Red Hat - Fast Datapath for RHEL 9** ### References 1. [RHSA-2024:1385](https://access.redhat.com/errata/RHSA-2024:1385) 2. [RHSA-2024:1386](https://access.redhat.com/errata/RHSA-2024:1386) 3. [RHSA-2024:1387](https://access.redhat.com/errata/RHSA-2024:1387) 4. [RHSA-2024:1388](https://access.redhat.com/errata/RHSA-2024:1388) 5. [RHSA-2024:1390](https://access.redhat.com/errata/RHSA-2024:1390) 6. [RHSA-2024:1391](https://access.redhat.com/errata/RHSA-2024:1391) 7. [RHSA-2024:1392](https://access.redhat.com/errata/RHSA-2024:1392) 8. [RHSA-2024:1393](https://access.redhat.com/errata/RHSA-2024:1393) 9. [RHSA-2024:1394](https://access.redhat.com/errata/RHSA-2024:1394) 10. [RHSA-2024:4035](https://access.redhat.com/errata/RHSA-2024:4035) 11. [](https://access.redhat.com/security/cve/CVE-2024-2182) 12. [RHBZ#2267840](https://bugzilla.redhat.com/show_bug.cgi?id=2267840) 13. [](https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html) 14. [](https://www.openwall.com/lists/oss-security/2024/03/12/5) ### Credits - Red Hat would like to thank Frode Nordahl (Canonical) for reporting this issue.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3758, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3758 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3758 - **State**: PUBLISHED - **Published Date**: July 17, 2013 at 10:00 UTC - **Last Updated**: August 06, 2024 at 16:22 UTC - **Reserved Date**: June 03, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Enterprise Manager (EM) Base Platform 10.2.0.5 and 11.1.0.1; EM DB Control 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3; and EM Plugin for DB 12.1.0.2 and 12.1.0.3 in Oracle Enterprise Manager Grid Control allows remote attackers to affect integrity via unknown vectors related to Schema Management. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oracle-cpujuly2013-cve20133758(85665)](https://exchange.xforce.ibmcloud.com/vulnerabilities/85665) 2. [95278](http://osvdb.org/95278) 3. [1028795](http://www.securitytracker.com/id/1028795) 4. [](http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html) 5. [61205](http://www.securityfocus.com/bid/61205)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3355, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3355 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3355 - **State**: PUBLISHED - **Published Date**: July 06, 2006 at 20:00 UTC - **Last Updated**: August 07, 2024 at 18:23 UTC - **Reserved Date**: July 06, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Heap-based buffer overflow in httpdget.c in mpg123 before 0.59s-rll allows remote attackers to execute arbitrary code via a long URL, which is not properly terminated before being used with the strncpy function. NOTE: This appears to be the result of an incomplete patch for CVE-2004-0982. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [18794](http://www.securityfocus.com/bid/18794) 2. [GLSA-200607-01](http://security.gentoo.org/glsa/glsa-200607-01.xml) 3. [](http://bugs.gentoo.org/show_bug.cgi?id=133988) 4. [20937](http://secunia.com/advisories/20937)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11682, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11682 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11682 - **State**: PUBLISHED - **Published Date**: May 02, 2019 at 15:03 UTC - **Last Updated**: August 04, 2024 at 23:03 UTC - **Reserved Date**: May 02, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A buffer overflow in the SMTP response service in MailCarrier 2.51 allows the attacker to execute arbitrary code remotely via a long HELP command, a related issue to CVE-2019-11395. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com/files/152694/MailCarrier-2.51-HELP-Remote-Buffer-Overflow.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-6638, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-6638 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-6638 - **State**: PUBLISHED - **Published Date**: February 15, 2014 at 11:00 UTC - **Last Updated**: September 16, 2024 at 16:14 UTC - **Reserved Date**: February 15, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The tcp_rcv_state_process function in net/ipv4/tcp_input.c in the Linux kernel before 3.2.24 allows remote attackers to cause a denial of service (kernel resource consumption) via a flood of SYN+FIN TCP packets, a different vulnerability than CVE-2012-2663. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24) 2. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fdf5af0daf8019cec2396cdef8fb042d80fe71fa) 3. [](https://github.com/torvalds/linux/commit/fdf5af0daf8019cec2396cdef8fb042d80fe71fa) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=826702)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6235, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6235 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6235 - **State**: PUBLISHED - **Published Date**: December 04, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 16:02 UTC - **Reserved Date**: December 04, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A certain ActiveX control in RealNetworks RealPlayer 11 allows remote attackers to cause a denial of service (application crash) via a malformed .au file that triggers a divide-by-zero error. NOTE: this might be related to CVE-2007-4904. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20071201 Realplayer 11 DOS attack when processing a malformed AU file on MS Vista and XP](http://www.securityfocus.com/archive/1/484449/100/0/threaded) 2. [4683](https://www.exploit-db.com/exploits/4683) 3. [](http://www.safehack.com/Advisory/realpdos_au.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28326, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28326 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28326 - **State**: PUBLISHED - **Published Date**: March 28, 2023 at 12:36 UTC - **Last Updated**: October 23, 2024 at 15:13 UTC - **Reserved Date**: March 14, 2023 at 09:26 UTC - **Assigned By**: apache ### Vulnerability Description Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings from 2.0.0 before 7.0.0 Description: Attacker can elevate their privileges in any room ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **Apache Software Foundation - Apache OpenMeetings** Affected versions: - 2.0.0 (Status: affected) ### References 1. [](https://lists.apache.org/thread/r9vn12dp5yofn1h3wd5x4h7c3vmmr5d9) ### Credits - Dennis Zimmt
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11711, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11711 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11711 - **State**: PUBLISHED - **Published Date**: August 25, 2023 at 00:00 UTC - **Last Updated**: October 02, 2024 at 18:12 UTC - **Reserved Date**: April 12, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Stormshield SNS 3.8.0. Authenticated Stored XSS in the admin login panel leads to SSL VPN credential theft. A malicious disclaimer file can be uploaded from the admin panel. The resulting file is rendered on the authentication interface of the admin panel. It is possible to inject malicious HTML content in order to execute JavaScript inside a victim's browser. This results in a stored XSS on the authentication interface of the admin panel. Moreover, an unsecured authentication form is present on the authentication interface of the SSL VPN captive portal. Users are allowed to save their credentials inside the browser. If an administrator saves his credentials through this unsecured form, these credentials could be stolen via the stored XSS on the admin panel without user interaction. Another possible exploitation would be modification of the authentication form of the admin panel into a malicious form. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.digitemis.com/category/blog/actualite/) 2. [](https://twitter.com/_ACKNAK_) 3. [](https://advisories.stormshield.eu/2020-011/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49956, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49956 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49956 - **State**: PUBLISHED - **Published Date**: October 21, 2024 at 18:02 UTC - **Last Updated**: May 04, 2025 at 09:42 UTC - **Reserved Date**: October 21, 2024 at 12:17 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: gfs2: fix double destroy_workqueue error When gfs2_fill_super() fails, destroy_workqueue() is called within gfs2_gl_hash_clear(), and the subsequent code path calls destroy_workqueue() on the same work queue again. This issue can be fixed by setting the work queue pointer to NULL after the first destroy_workqueue() call and checking for a NULL pointer before attempting to destroy the work queue again. ### Affected Products **Linux - Linux** Affected versions: - 30e388d573673474cbd089dec83688331c117add (Status: affected) - 30e388d573673474cbd089dec83688331c117add (Status: affected) **Linux - Linux** Affected versions: - 6.11 (Status: affected) - 0 (Status: unaffected) - 6.11.3 (Status: unaffected) - 6.12 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/a5336035728d77efd76306940d742a6f23debe68) 2. [](https://git.kernel.org/stable/c/6cb9df81a2c462b89d2f9611009ab43ae8717841)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46661, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46661 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46661 - **State**: PUBLISHED - **Published Date**: February 01, 2022 at 01:48 UTC - **Last Updated**: August 04, 2024 at 05:10 UTC - **Reserved Date**: February 01, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MariaDB through 10.5.9 allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://jira.mariadb.org/browse/MDEV-25766) 2. [](https://security.netapp.com/advisory/ntap-20220221-0002/) 3. [](https://mariadb.com/kb/en/security/) 4. [FEDORA-2022-263f7cc483](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/) 5. [FEDORA-2022-03350936ee](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/) 6. [FEDORA-2022-5cfe372ab7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5876, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5876 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5876 - **State**: PUBLISHED - **Published Date**: June 09, 2025 at 12:00 UTC - **Last Updated**: June 09, 2025 at 13:04 UTC - **Reserved Date**: June 08, 2025 at 18:01 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic was found in Lucky LM-520-SC, LM-520-FSC and LM-520-FSC-SAM up to 20250321. Affected by this vulnerability is an unknown functionality. The manipulation leads to missing authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R` ### Weakness Classification (CWE) - CWE-306: Security Weakness - CWE-287: Improper Authentication ### Affected Products **Lucky - LM-520-SC** Affected versions: - 20250321 (Status: affected) **Lucky - LM-520-FSC** Affected versions: - 20250321 (Status: affected) **Lucky - LM-520-FSC-SAM** Affected versions: - 20250321 (Status: affected) ### References 1. [VDB-311635 | Lucky LM-520-SC/LM-520-FSC/LM-520-FSC-SAM missing authentication](https://vuldb.com/?id.311635) 2. [VDB-311635 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.311635) 3. [Submit #585821 | Lucky Technology Ltd LM-520-SC 5.0.9433A Missing Authentication for Critical Function](https://vuldb.com/?submit.585821) 4. [](https://github.com/zeke2997/cve_request_LuckyTechnologyLtd) ### Credits - zeke (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1954, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1954 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1954 - **State**: PUBLISHED - **Published Date**: July 18, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 19:17 UTC - **Reserved Date**: March 30, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Use-after-free vulnerability in the nsDocument::AdoptNode function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code via vectors involving multiple adoptions and empty documents. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [49977](http://secunia.com/advisories/49977) 2. [49992](http://secunia.com/advisories/49992) 3. [54578](http://www.securityfocus.com/bid/54578) 4. [DSA-2514](http://www.debian.org/security/2012/dsa-2514) 5. [DSA-2528](http://www.debian.org/security/2012/dsa-2528) 6. [1027256](http://www.securitytracker.com/id?1027256) 7. [RHSA-2012:1088](http://rhn.redhat.com/errata/RHSA-2012-1088.html) 8. [49963](http://secunia.com/advisories/49963) 9. [](http://www.mozilla.org/security/announce/2012/mfsa2012-44.html) 10. [USN-1509-2](http://www.ubuntu.com/usn/USN-1509-2) 11. [1027258](http://www.securitytracker.com/id?1027258) 12. [49979](http://secunia.com/advisories/49979) 13. [SUSE-SU-2012:0895](http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html) 14. [USN-1510-1](http://www.ubuntu.com/usn/USN-1510-1) 15. [oval:org.mitre.oval:def:16984](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16984) 16. [49965](http://secunia.com/advisories/49965) 17. [1027257](http://www.securitytracker.com/id?1027257) 18. [openSUSE-SU-2012:0917](http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html) 19. [83995](http://osvdb.org/83995) 20. [](https://bugzilla.mozilla.org/show_bug.cgi?id=765139) 21. [49964](http://secunia.com/advisories/49964) 22. [SUSE-SU-2012:0896](http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html) 23. [49994](http://secunia.com/advisories/49994) 24. [openSUSE-SU-2012:0899](http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html) 25. [49968](http://secunia.com/advisories/49968) 26. [USN-1509-1](http://www.ubuntu.com/usn/USN-1509-1) 27. [49993](http://secunia.com/advisories/49993) 28. [49972](http://secunia.com/advisories/49972)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0916, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0916 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0916 - **State**: PUBLISHED - **Published Date**: April 25, 2024 at 23:02 UTC - **Last Updated**: August 06, 2024 at 18:40 UTC - **Reserved Date**: January 26, 2024 at 03:47 UTC - **Assigned By**: Pentraze ### Vulnerability Description Unauthenticated file upload allows remote code execution. This issue affects UvDesk Community: from 1.0.0 through 1.1.3. ### CVSS Metrics - **CVSS Base Score**: 10/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **Webkul Software - UvDesk Community** Affected versions: - 1.0.0 (Status: affected) ### References 1. [](https://github.com/uvdesk/core-framework/pull/706) 2. [](https://pentraze.com/vulnerability-reports/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4834, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4834 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4834 - **State**: PUBLISHED - **Published Date**: November 04, 2013 at 15:00 UTC - **Last Updated**: September 17, 2024 at 03:44 UTC - **Reserved Date**: July 12, 2013 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Unspecified vulnerability in the client component in HP Application LifeCycle Management (ALM) before 11 p11 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1327. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SSRT100597](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969433) 2. [HPSBMU02932](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969433)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29436, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29436 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29436 - **State**: PUBLISHED - **Published Date**: May 17, 2022 at 19:51 UTC - **Last Updated**: February 20, 2025 at 20:22 UTC - **Reserved Date**: April 18, 2022 at 00:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Persistent Cross-Site Scripting (XSS) vulnerability in Alexander Stokmann's Code Snippets Extended plugin <= 1.4.7 on WordPress via Cross-Site Request Forgery (vulnerable parameters &title, &snippet_code). ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Alexander Stokmann - Code Snippets Extended (WordPress plugin)** Affected versions: - <= 1.4.7 (Status: affected) ### References 1. [](https://wordpress.org/plugins/code-snippets-extended/#developers) 2. [](https://patchstack.com/database/vulnerability/code-snippets-extended/wordpress-code-snippets-extended-plugin-1-4-7-cross-site-request-forgery-csrf-vulnerability-leading-to-persistent-cross-site-scripting-xss) ### Credits - Vulnerability discovered by BEE-K (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7525, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7525 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7525 - **State**: PUBLISHED - **Published Date**: February 06, 2018 at 15:00 UTC - **Last Updated**: September 17, 2024 at 02:21 UTC - **Reserved Date**: April 05, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. ### Weakness Classification (CWE) - CWE-184: Security Weakness ### Affected Products **FasterXML - jackson-databind** Affected versions: - before 2.6.7.1 (Status: affected) - before 2.7.9.1 (Status: affected) - before 2.8.9 (Status: affected) ### References 1. [1040360](http://www.securitytracker.com/id/1040360) 2. [RHSA-2017:1840](https://access.redhat.com/errata/RHSA-2017:1840) 3. [RHSA-2017:2547](https://access.redhat.com/errata/RHSA-2017:2547) 4. [RHSA-2017:1836](https://access.redhat.com/errata/RHSA-2017:1836) 5. [RHSA-2017:1835](https://access.redhat.com/errata/RHSA-2017:1835) 6. [RHSA-2018:1449](https://access.redhat.com/errata/RHSA-2018:1449) 7. [1039744](http://www.securitytracker.com/id/1039744) 8. [1039947](http://www.securitytracker.com/id/1039947) 9. [RHSA-2017:2635](https://access.redhat.com/errata/RHSA-2017:2635) 10. [RHSA-2017:2638](https://access.redhat.com/errata/RHSA-2017:2638) 11. [RHSA-2018:1450](https://access.redhat.com/errata/RHSA-2018:1450) 12. [RHSA-2017:3458](https://access.redhat.com/errata/RHSA-2017:3458) 13. [RHSA-2018:0294](https://access.redhat.com/errata/RHSA-2018:0294) 14. [RHSA-2017:1837](https://access.redhat.com/errata/RHSA-2017:1837) 15. [RHSA-2017:1834](https://access.redhat.com/errata/RHSA-2017:1834) 16. [RHSA-2017:2546](https://access.redhat.com/errata/RHSA-2017:2546) 17. [RHSA-2017:2636](https://access.redhat.com/errata/RHSA-2017:2636) 18. [RHSA-2017:3455](https://access.redhat.com/errata/RHSA-2017:3455) 19. [RHSA-2017:2477](https://access.redhat.com/errata/RHSA-2017:2477) 20. [RHSA-2017:3456](https://access.redhat.com/errata/RHSA-2017:3456) 21. [RHSA-2018:0342](https://access.redhat.com/errata/RHSA-2018:0342) 22. [RHSA-2017:1839](https://access.redhat.com/errata/RHSA-2017:1839) 23. [99623](http://www.securityfocus.com/bid/99623) 24. [RHSA-2017:2637](https://access.redhat.com/errata/RHSA-2017:2637) 25. [RHSA-2017:3454](https://access.redhat.com/errata/RHSA-2017:3454) 26. [DSA-4004](https://www.debian.org/security/2017/dsa-4004) 27. [RHSA-2017:3141](https://access.redhat.com/errata/RHSA-2017:3141) 28. [RHSA-2017:2633](https://access.redhat.com/errata/RHSA-2017:2633) 29. [[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report](https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E) 30. [[lucene-dev] 20190325 [jira] [Closed] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...](https://lists.apache.org/thread.html/f60afd3c7e9ebaaf70fad4a4beb75cf8740ac959017a31e7006c7486%40%3Cdev.lucene.apache.org%3E) 31. [[lucene-dev] 20190325 [jira] [Updated] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...](https://lists.apache.org/thread.html/3c87dc8bca99a2b3b4743713b33d1de05b1d6b761fdf316224e9c81f%40%3Cdev.lucene.apache.org%3E) 32. [[lucene-dev] 20190325 [jira] [Assigned] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...](https://lists.apache.org/thread.html/c2ed4c0126b43e324cf740012a0edd371fd36096fd777be7bfe7a2a6%40%3Cdev.lucene.apache.org%3E) 33. [[lucene-dev] 20190325 [jira] [Resolved] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...](https://lists.apache.org/thread.html/c10a2bf0fdc3d25faf17bd191d6ec46b29a353fa9c97bebd7c4e5913%40%3Cdev.lucene.apache.org%3E) 34. [[lucene-dev] 20190325 [jira] [Updated] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...](https://lists.apache.org/thread.html/b1f33fe5ade396bb903fdcabe9f243f7692c7dfce5418d3743c2d346%40%3Cdev.lucene.apache.org%3E) 35. [RHSA-2019:0910](https://access.redhat.com/errata/RHSA-2019:0910) 36. [RHSA-2019:2858](https://access.redhat.com/errata/RHSA-2019:2858) 37. [RHSA-2019:3149](https://access.redhat.com/errata/RHSA-2019:3149) 38. [[cassandra-commits] 20191113 [jira] [Created] (CASSANDRA-15416) CVE-2017-7525 ( jackson-databind is vulnerable to Remote Code Execution) on version 3.11.4](https://lists.apache.org/thread.html/4641ed8616ccc2c1fbddac2c3dc9900c96387bc226eaf0232d61909b%40%3Ccommits.cassandra.apache.org%3E) 39. [[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities](https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E) 40. [[lucene-solr-user] 20191218 CVE-2017-7525 fix for Solr 7.7.x](https://lists.apache.org/thread.html/5008bcbd45ee65ce39e4220b6ac53d28a24d6bc67d5804e9773a7399%40%3Csolr-user.lucene.apache.org%3E) 41. [[lucene-solr-user] 20191218 Re: CVE-2017-7525 fix for Solr 7.7.x](https://lists.apache.org/thread.html/c9d5ff20929e8a3c8794facf4c4b326a9c10618812eec356caa20b87%40%3Csolr-user.lucene.apache.org%3E) 42. [[lucene-solr-user] 20191219 Re: CVE-2017-7525 fix for Solr 7.7.x](https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629%40%3Csolr-user.lucene.apache.org%3E) 43. [[debian-lts-announce] 20200131 [SECURITY] [DLA 2091-1] libjackson-json-java security update](https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html) 44. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html) 45. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html) 46. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html) 47. [](https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html) 48. [](https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html) 49. [](https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html) 50. [[debian-lts-announce] 20200824 [SECURITY] [DLA 2342-1] libjackson-json-java security update](https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html) 51. [](https://www.oracle.com/security-alerts/cpuoct2020.html) 52. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us) 53. [](https://github.com/FasterXML/jackson-databind/issues/1723) 54. [](https://github.com/FasterXML/jackson-databind/issues/1599) 55. [](https://bugzilla.redhat.com/show_bug.cgi?id=1462702) 56. [](https://security.netapp.com/advisory/ntap-20171214-0002/) 57. [](https://cwiki.apache.org/confluence/display/WW/S2-055) 58. [[spark-issues] 20210223 [jira] [Created] (SPARK-34511) Current Security vulnerabilities in spark libraries](https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589%40%3Cissues.spark.apache.org%3E) 59. [[cassandra-commits] 20210927 [jira] [Commented] (CASSANDRA-15416) CVE-2017-7525 ( jackson-databind is vulnerable to Remote Code Execution) on version 3.11.4](https://lists.apache.org/thread.html/rf7f87810c38dc9abf9f93989f76008f504cbf7c1a355214640b2d04c%40%3Ccommits.cassandra.apache.org%3E) 60. [[cassandra-commits] 20210927 [jira] [Updated] (CASSANDRA-15416) CVE-2017-7525 ( jackson-databind is vulnerable to Remote Code Execution) on version 3.11.4](https://lists.apache.org/thread.html/r42ac3e39e6265db12d9fc6ae1cd4b5fea7aed9830dc6f6d58228fed7%40%3Ccommits.cassandra.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3407, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3407 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3407 - **State**: PUBLISHED - **Published Date**: September 24, 2020 at 18:02 UTC - **Last Updated**: November 13, 2024 at 17:55 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the RESTCONF and NETCONF-YANG access control list (ACL) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect processing of the ACL that is tied to the RESTCONF or NETCONF-YANG feature. An attacker could exploit this vulnerability by accessing the device using RESTCONF or NETCONF-YANG. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition. ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **Cisco - Cisco IOS XE Software** Affected versions: - n/a (Status: affected) ### References 1. [20200924 Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confacl-HbPtfSuO)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10192, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10192 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10192 - **State**: PUBLISHED - **Published Date**: April 17, 2018 at 21:00 UTC - **Last Updated**: September 16, 2024 at 20:47 UTC - **Reserved Date**: April 17, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IPVanish 3.0.11 for macOS suffers from a root privilege escalation vulnerability. The `com.ipvanish.osx.vpnhelper` LaunchDaemon implements an insecure XPC service that could allow an attacker to execute arbitrary code as the root user. IPVanish uses a third-party library for converting `xpc_object_t` types in to `NSObject` types for sending XPC messages. When IPVanish establishes a new connection, the following XPC message is sent to the `com.ipvanish.osx.vpnhelper` LaunchDaemon. Because the XPC service itself does not validate an incoming connection, any application installed on the operating system can send it XPC messages. In the case of the "connect" message, an attacker could manipulate the `OpenVPNPath` to point at a malicious binary on the system. The `com.ipvanish.osx.vpnhelper` would receive the VPNHelperConnect command, and then execute the malicious binary as the root user. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/VerSprite/research/blob/master/advisories/VS-2018-020.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2445, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2445 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2445 - **State**: PUBLISHED - **Published Date**: May 09, 2016 at 10:00 UTC - **Last Updated**: August 05, 2024 at 23:32 UTC - **Reserved Date**: February 18, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description The NVIDIA media driver in Android before 2016-05-01 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 27253079. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://source.android.com/security/bulletin/2016-05-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-22421, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-22421 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-22421 - **State**: PUBLISHED - **Published Date**: December 08, 2021 at 03:42 UTC - **Last Updated**: August 04, 2024 at 14:51 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description 74CMS v6.0.4 was discovered to contain a cross-site scripting (XSS) vulnerability via /index.php?m=&c=help&a=help_list&key. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/congcong9184-123/congcong9184-123.github.io/blob/master/74cms.docx)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18475, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18475 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18475 - **State**: PUBLISHED - **Published Date**: August 05, 2019 at 12:45 UTC - **Last Updated**: August 05, 2024 at 21:20 UTC - **Reserved Date**: July 31, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In cPanel before 62.0.4, Exim piped filters ran in the context of an incorrect user account when delivering to a system user (SEC-204). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://documentation.cpanel.net/display/CL/62+Change+Log)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51936, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51936 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51936 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:30 UTC - **Last Updated**: November 20, 2024 at 14:36 UTC - **Reserved Date**: November 04, 2024 at 09:59 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Henry ESB Testimonials allows Stored XSS.This issue affects ESB Testimonials: from n/a through 1.0.0. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Henry - ESB Testimonials** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/esb-testimonials/wordpress-esb-testimonials-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43199, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43199 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43199 - **State**: PUBLISHED - **Published Date**: November 09, 2021 at 14:46 UTC - **Last Updated**: August 04, 2024 at 03:47 UTC - **Reserved Date**: November 02, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In JetBrains TeamCity before 2021.1.2, permission checks in the Create Patch functionality are insufficient. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.jetbrains.com/blog/2021/11/08/jetbrains-security-bulletin-q3-2021/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17657, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17657 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17657 - **State**: PUBLISHED - **Published Date**: January 24, 2019 at 04:00 UTC - **Last Updated**: August 05, 2024 at 10:54 UTC - **Reserved Date**: September 28, 2018 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the gotoURL method of a host object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6507. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Foxit - Reader** Affected versions: - 9.2.0.9297 (Status: affected) ### References 1. [](https://www.foxitsoftware.com/support/security-bulletins.php) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-18-1203/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37483, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37483 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37483 - **State**: PUBLISHED - **Published Date**: August 08, 2023 at 00:39 UTC - **Last Updated**: October 10, 2024 at 19:00 UTC - **Reserved Date**: July 06, 2023 at 14:57 UTC - **Assigned By**: sap ### Vulnerability Description SAP PowerDesigner - version 16.7, has improper access control which might allow an unauthenticated attacker to run arbitrary queries against the back-end database via Proxy. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **SAP_SE - SAP PowerDesigner** Affected versions: - 16.7 (Status: affected) ### References 1. [](https://me.sap.com/notes/3341460) 2. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html)