System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39357, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39357
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 14:21 UTC
- **Last Updated**: January 14, 2025 at 16:04 UTC
- **Reserved Date**: June 28, 2024 at 18:06 UTC
- **Assigned By**: talos
### Vulnerability Description
A stack-based buffer overflow vulnerability exists in the wireless.cgi SetName() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Wavlink - Wavlink AC3000**
Affected versions:
- M33A8.V5030.210505 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-2039](https://talosintelligence.com/vulnerability_reports/TALOS-2024-2039)
### Credits
- Discovered by Lilith >_> of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33331, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33331
- **State**: PUBLISHED
- **Published Date**: August 03, 2021 at 20:43 UTC
- **Last Updated**: August 03, 2024 at 23:50 UTC
- **Reserved Date**: May 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Open redirect vulnerability in the Notifications module in Liferay Portal 7.0.0 through 7.3.1, and Liferay DXP 7.0 before fix pack 94, 7.1 before fix pack 19 and 7.2 before fix pack 8, allows remote attackers to redirect users to arbitrary external URLs via the 'redirect' parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/120747627)
2. [](https://issues.liferay.com/browse/LPE-17022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21456, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21456 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21456
- **State**: PUBLISHED
- **Published Date**: April 19, 2022 at 20:37 UTC
- **Last Updated**: September 24, 2024 at 20:09 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Navigation Pages, Portal, Query). Supported versions that are affected are 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**Oracle Corporation - PeopleSoft Enterprise PT PeopleTools**
Affected versions:
- 8.58 (Status: affected)
- 8.59 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5785, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5785 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5785
- **State**: PUBLISHED
- **Published Date**: August 25, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 06:59 UTC
- **Reserved Date**: August 06, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Apple QuickTime before 7.7.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file, a different vulnerability than CVE-2015-5786.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT205046)
2. [1033346](http://www.securitytracker.com/id/1033346)
3. [APPLE-SA-2015-08-20-1](http://lists.apple.com/archives/security-announce/2015/Aug/msg00004.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0470, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0470
- **State**: PUBLISHED
- **Published Date**: October 13, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:21 UTC
- **Reserved Date**: July 11, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Allegro RomPager HTTP server allows remote attackers to cause a denial of service via a malformed authentication request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1290](http://www.securityfocus.com/bid/1290)
2. [20000601 Hardware Exploit - Gets network Down](http://archives.neohapsis.com/archives/bugtraq/2000-05/0398.html)
3. [rompager-malformed-dos(4588)](https://exchange.xforce.ibmcloud.com/vulnerabilities/4588) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38326, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38326 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38326
- **State**: REJECTED
- **Last Updated**: July 18, 2023 at 00:00 UTC
- **Reserved Date**: July 14, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10415, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10415 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10415
- **State**: PUBLISHED
- **Published Date**: October 19, 2017 at 17:00 UTC
- **Last Updated**: October 04, 2024 at 16:41 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle iSupport component of Oracle E-Business Suite (subcomponent: Others). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iSupport. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iSupport, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iSupport accessible data as well as unauthorized update, insert or delete access to some of Oracle iSupport accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### Affected Products
**Oracle Corporation - iSupport**
Affected versions:
- 12.1.1 (Status: affected)
- 12.1.2 (Status: affected)
- 12.1.3 (Status: affected)
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
- 12.2.7 (Status: affected)
### References
1. [101336](http://www.securityfocus.com/bid/101336)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html)
3. [1039592](http://www.securitytracker.com/id/1039592) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45616, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45616
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 22:48 UTC
- **Last Updated**: August 30, 2024 at 17:23 UTC
- **Reserved Date**: October 09, 2023 at 16:22 UTC
- **Assigned By**: hpe
### Vulnerability Description
There is a buffer overflow vulnerability in the underlying AirWave client service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Hewlett Packard Enterprise (HPE) - Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; **
Affected versions:
- ArubaOS 10.5.x.x: 10.5.0.0 and below (Status: affected)
- ArubaOS 10.4.x.x: 10.4.0.2 and below (Status: affected)
- InstantOS 8.11.x.x: 8.11.1.2 and below (Status: affected)
- InstantOS 8.10.x.x: 8.10.0.8 and below (Status: affected)
- InstantOS 8.6.x.x: 8.6.0.22 and below (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt)
### Credits
- XiaoC from Moonlight Bug Hunter |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4897, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4897 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4897
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: June 24, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9315, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9315
- **State**: REJECTED
- **Published Date**: April 06, 2018 at 16:00 UTC
- **Last Updated**: April 06, 2018 at 15:57 UTC
- **Reserved Date**: April 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9664, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9664 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9664
- **State**: PUBLISHED
- **Published Date**: February 07, 2025 at 15:21 UTC
- **Last Updated**: February 07, 2025 at 15:32 UTC
- **Reserved Date**: October 08, 2024 at 21:34 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP All Import Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.9.7 via deserialization of untrusted input from an import file. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Soflyy - WP All Import Pro**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/0099a8d7-827d-4215-9a2b-b3c268fb5e97?source=cve)
2. [](https://www.wpallimport.com/)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47948, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47948 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47948
- **State**: PUBLISHED
- **Published Date**: October 08, 2024 at 15:48 UTC
- **Last Updated**: October 08, 2024 at 16:14 UTC
- **Reserved Date**: October 07, 2024 at 15:14 UTC
- **Assigned By**: JetBrains
### Vulnerability Description
In JetBrains TeamCity before 2024.07.3 path traversal leading to information disclosure was possible via server backups
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**JetBrains - TeamCity**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.jetbrains.com/privacy-security/issues-fixed/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26338
- **State**: PUBLISHED
- **Published Date**: March 28, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:13 UTC
- **Reserved Date**: February 22, 2023 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Dimension**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/dimension/apsb23-20.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2673, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2673 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2673
- **State**: PUBLISHED
- **Published Date**: January 09, 2007 at 21:00 UTC
- **Last Updated**: August 08, 2024 at 01:36 UTC
- **Reserved Date**: January 09, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in ArGoSoft FTP Server before 1.4.1.6 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via (1) a SITE ZIP command with a long first or second argument, or (2) a SITE COPY with a long argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [11334](http://www.osvdb.org/11334)
2. [9770](http://www.securityfocus.com/bid/9770)
3. [](http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx)
4. [11002](http://secunia.com/advisories/11002)
5. [](http://www.securiteam.com/windowsntfocus/5RP010KCAO.html)
6. [argosoftftp-site-bo(15410)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15410) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27349, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27349
- **State**: PUBLISHED
- **Published Date**: April 22, 2024 at 14:08 UTC
- **Last Updated**: February 13, 2025 at 17:46 UTC
- **Reserved Date**: February 24, 2024 at 10:44 UTC
- **Assigned By**: apache
### Vulnerability Description
Authentication Bypass by Spoofing vulnerability in Apache HugeGraph-Server.This issue affects Apache HugeGraph-Server: from 1.0.0 before 1.3.0.
Users are recommended to upgrade to version 1.3.0, which fixes the issue.
### Weakness Classification (CWE)
- CWE-290: Security Weakness
### Affected Products
**Apache Software Foundation - Apache HugeGraph-Server**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/dz9n9lndqfsf64t72o73r7sttrc6ocsd)
2. [](http://www.openwall.com/lists/oss-security/2024/04/22/4)
### Credits
- 6right of moresec |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0243, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0243 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0243
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:40 UTC
- **Reserved Date**: December 23, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-5323, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-5323 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-5323
- **State**: PUBLISHED
- **Published Date**: June 07, 2015 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 04:17 UTC
- **Reserved Date**: March 26, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in UploadServlet in the Remote Management component in Novell ZENworks Configuration Management (ZCM) 10 before 10.3 allows remote attackers to execute arbitrary code via a crafted WAR pathname in the filename parameter in conjunction with WAR content in the POST data, a different vulnerability than CVE-2010-5324.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.novell.com/support/kb/doc.php?id=7005573)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-10-078/)
3. [16784](http://www.exploit-db.com/exploits/16784/)
4. [](https://bugzilla.novell.com/show_bug.cgi?id=578911) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40145
- **State**: PUBLISHED
- **Published Date**: December 21, 2022 at 15:23 UTC
- **Last Updated**: April 15, 2025 at 18:03 UTC
- **Reserved Date**: September 07, 2022 at 08:02 UTC
- **Assigned By**: apache
### Vulnerability Description
This vulnerable is about a potential code injection when an attacker has control of the target LDAP server using in the JDBC JNDI URL.
The function jaas.modules.src.main.java.porg.apache.karaf.jass.modules.jdbc.JDBCUtils#doCreateDatasource
use InitialContext.lookup(jndiName) without filtering.
An user can modify `options.put(JDBCUtils.DATASOURCE, "osgi:" + DataSource.class.getName());` to `options.put(JDBCUtils.DATASOURCE,"jndi:rmi://x.x.x.x:xxxx/Command");` in JdbcLoginModuleTest#setup.
This is vulnerable to a remote code execution (RCE) attack when a
configuration uses a JNDI LDAP data source URI when an attacker has
control of the target LDAP server.This issue affects all versions of Apache Karaf up to 4.4.1 and 4.3.7.
We encourage the users to upgrade to Apache Karaf at least 4.4.2 or 4.3.8
### Weakness Classification (CWE)
- CWE-74: Security Weakness
- CWE-20: Improper Input Validation
### Affected Products
**Apache Software Foundation - Apache Karaf**
Affected versions:
- 4.4.0 (Status: affected)
- 0 (Status: affected)
### References
1. [](https://karaf.apache.org/security/cve-2022-40145.txt)
### Credits
- Xun Bai <bbbbear68@gmail.com> |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36462
- **State**: PUBLISHED
- **Published Date**: August 08, 2021 at 05:13 UTC
- **Last Updated**: August 04, 2024 at 17:30 UTC
- **Reserved Date**: August 08, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the syncpool crate before 0.1.6 for Rust. There is an unconditional implementation of Send for Bucket2.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2020-0142.html)
2. [](https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/syncpool/RUSTSEC-2020-0142.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2988, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2988 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2988
- **State**: PUBLISHED
- **Published Date**: January 30, 2023 at 00:00 UTC
- **Last Updated**: February 05, 2025 at 20:08 UTC
- **Reserved Date**: August 25, 2022 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-787: Out-of-bounds Write vulnerability exists that could cause sensitive information leakage when accessing a malicious web page from the commissioning software. Affected Products: SoMachine HVAC (Versions prior to V2.1.0), EcoStruxure Machine Expert – HVAC (Versions prior to V1.4.0)
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Schneider Electric - SoMachine HVAC**
Affected versions:
- All (Status: affected)
**Schneider Electric - EcoStruxure Machine Expert – HVAC**
Affected versions:
- All (Status: affected)
### References
1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-010-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-010-01_EcoStruxure_Machine_Expert_Machine_HVAC_Security_Notification.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2389, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2389 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2389
- **State**: PUBLISHED
- **Published Date**: August 17, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:22 UTC
- **Reserved Date**: August 17, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in Jabber Gadu-Gadu Transport (a.k.a. jabber-gg-transport) 2.0.x before 2.0.8 allows remote attackers to cause a denial of service (infinite loop) via user re-registration.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [jabber-gadugadu-dos(15319)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15319)
2. [9710](http://www.securityfocus.com/bid/9710)
3. [4057](http://www.osvdb.org/4057)
4. [1009248](http://securitytracker.com/id?1009248)
5. [10974](http://secunia.com/advisories/10974/)
6. [](http://www.jabberstudio.org/projects/jabber-gg-transport/releases/view.php?id=429) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2784, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2784 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2784
- **State**: PUBLISHED
- **Published Date**: August 03, 2011 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 23:15 UTC
- **Reserved Date**: July 20, 2011 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Google Chrome before 13.0.782.107 allows remote attackers to obtain sensitive information via a request for the GL program log, which reveals a local path in an unspecified log entry.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:14580](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14580)
2. [google-chrome-gl-path-disclosure(68946)](https://exchange.xforce.ibmcloud.com/vulnerabilities/68946)
3. [](http://code.google.com/p/chromium/issues/detail?id=83841)
4. [](http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html)
5. [74234](http://osvdb.org/74234) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9077, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9077 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9077
- **State**: PUBLISHED
- **Published Date**: February 24, 2019 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 21:38 UTC
- **Reserved Date**: February 23, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=24243)
2. [107139](http://www.securityfocus.com/bid/107139)
3. [](https://security.netapp.com/advisory/ntap-20190314-0003/)
4. [](https://support.f5.com/csp/article/K00056379)
5. [USN-4336-1](https://usn.ubuntu.com/4336-1/)
6. [openSUSE-SU-2020:1790](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html)
7. [openSUSE-SU-2020:1804](http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html)
8. [GLSA-202107-24](https://security.gentoo.org/glsa/202107-24) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25946
- **State**: PUBLISHED
- **Published Date**: May 05, 2022 at 16:21 UTC
- **Last Updated**: September 17, 2024 at 03:28 UTC
- **Reserved Date**: April 19, 2022 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP Advanced WAF, ASM, and ASM, and F5 BIG-IP Guided Configuration (GC) all versions prior to 9.0, when running in Appliance mode, an authenticated attacker with Administrator role privilege may be able to bypass Appliance mode restrictions due to a missing integrity check in F5 BIG-IP Guided Configuration. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
### CVSS Metrics
- **CVSS Base Score**: 8.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-354: Security Weakness
### Affected Products
**F5 - BIG-IP (Advanced WAF, APM, ASM)**
Affected versions:
- 16.1.x (Status: affected)
- 15.1.x (Status: affected)
- 14.1.x (Status: affected)
- 13.1.x (Status: affected)
- 12.1.x (Status: affected)
- 11.6.x (Status: affected)
- 17.0.0 (Status: unaffected)
**F5 - BIG-IP Guided Configuration (GC)**
Affected versions:
- All (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K52322100) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14905, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14905
- **State**: PUBLISHED
- **Published Date**: December 05, 2017 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 20:27 UTC
- **Reserved Date**: September 28, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing a specially crafted cfg80211 vendor command, a buffer over-read can occur.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2017-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2511, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2511 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2511
- **State**: PUBLISHED
- **Published Date**: August 19, 2005 at 04:00 UTC
- **Last Updated**: September 17, 2024 at 02:33 UTC
- **Reserved Date**: August 10, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in Mac OS X 10.4.2 and earlier, when using Kerberos authentication with LDAP, allows attackers to gain access to a root Terminal window.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2005-08-15](http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html)
2. [APPLE-SA-2005-08-17](http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45347, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45347 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45347
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 10:47 UTC
- **Last Updated**: April 15, 2025 at 13:41 UTC
- **Reserved Date**: November 14, 2022 at 09:49 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache ShardingSphere-Proxy prior to 5.3.0 when using MySQL as database backend didn't cleanup the database session completely after client authentication failed, which allowed an attacker to execute normal commands by constructing a special MySQL client. This vulnerability has been fixed in Apache ShardingSphere 5.3.0.
### Weakness Classification (CWE)
- CWE-459: Security Weakness
### Affected Products
**Apache Software Foundation - Apache ShardingSphere-Proxy**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/l5rz7j4rg10o7ywtgknh2f5hxnv6yw3l)
### Credits
- smoking |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36198
- **State**: PUBLISHED
- **Published Date**: May 13, 2021 at 02:55 UTC
- **Last Updated**: September 17, 2024 at 01:10 UTC
- **Reserved Date**: January 19, 2021 at 00:00 UTC
- **Assigned By**: qnap
### Vulnerability Description
A command injection vulnerability has been reported to affect certain versions of Malware Remover. If exploited, this vulnerability allows remote attackers to execute arbitrary commands. This issue affects: QNAP Systems Inc. Malware Remover versions prior to 4.6.1.0. This issue does not affect: QNAP Systems Inc. Malware Remover 3.x.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
- CWE-78: OS Command Injection
### Affected Products
**QNAP Systems Inc. - Malware Remover**
Affected versions:
- unspecified (Status: affected)
- 3.x (Status: unaffected)
### References
1. [](https://www.qnap.com/zh-tw/security-advisory/qsa-21-16)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-592/)
3. [](http://packetstormsecurity.com/files/162849/QNAP-MusicStation-MalwareRemover-File-Upload-Command-Injection.html)
### Credits
- Trend Micro ZDI - ZDI-CAN-12891 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16938, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16938 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16938
- **State**: PUBLISHED
- **Published Date**: November 24, 2017 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 20:43 UTC
- **Reserved Date**: November 24, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A global buffer overflow in OptiPNG 0.7.6 allows remote attackers to cause a denial-of-service attack or other unspecified impact with a maliciously crafted GIF format file, related to an uncontrolled loop in the LZWReadByte function of the gifread.c file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[debian-lts-announce] 20171130 [SECURITY] [DLA 1196-1] optipng security update](https://lists.debian.org/debian-lts-announce/2017/11/msg00042.html)
2. [DSA-4058](https://www.debian.org/security/2017/dsa-4058)
3. [](https://sourceforge.net/p/optipng/bugs/69/)
4. [GLSA-201801-02](https://security.gentoo.org/glsa/201801-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38677
- **State**: PUBLISHED
- **Published Date**: October 14, 2022 at 00:00 UTC
- **Last Updated**: May 15, 2025 at 14:18 UTC
- **Reserved Date**: August 22, 2022 at 00:00 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In cell service, there is a missing permission check. This could lead to local denial of service in cell service with no additional execution privileges needed.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1575654905820020738) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0121, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0121 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0121
- **State**: PUBLISHED
- **Published Date**: December 14, 2010 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 00:37 UTC
- **Reserved Date**: January 04, 2010 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
The cook codec in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, Mac RealPlayer 11.0 through 12.0.0.1444, and Linux RealPlayer 11.0.2.1744 does not properly perform initialization, which has unspecified impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1024861](http://www.securitytracker.com/id?1024861)
2. [](http://service.real.com/realplayer/security/12102010_player/en/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10144, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10144
- **State**: PUBLISHED
- **Published Date**: March 24, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 03:14 UTC
- **Reserved Date**: January 16, 2017 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
coders/ipl.c in ImageMagick allows remote attackers to have unspecific impact by leveraging a missing malloc check.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20170116 CVE Request: Imagemagick: various flaws: memory corruption, out-of-bounds writes, memory leaks, double-frees, off-by-one errors](http://www.openwall.com/lists/oss-security/2017/01/16/6)
2. [95750](http://www.securityfocus.com/bid/95750)
3. [GLSA-201702-09](https://security.gentoo.org/glsa/201702-09)
4. [DSA-3799](http://www.debian.org/security/2017/dsa-3799)
5. [[oss-security] 20170116 Re: CVE Request: Imagemagick: various flaws: memory corruption, out-of-bounds writes, memory leaks, double-frees, off-by-one errors](http://www.openwall.com/lists/oss-security/2017/01/17/5)
6. [](https://github.com/ImageMagick/ImageMagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20)
7. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851485) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-5041, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-5041 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-5041
- **State**: PUBLISHED
- **Published Date**: December 30, 2011 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 00:23 UTC
- **Reserved Date**: December 30, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Pulse Pro CMS 1.7.2 allow remote attackers to inject arbitrary web script or HTML via the (1) d parameter in a blocks action and (2) post_id parameter in an edit-post action to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.org/files/view/107830/pulsepro172-xss.txt)
2. [pulse-index-xss(71798)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71798)
3. [77693](http://osvdb.org/77693)
4. [47225](http://secunia.com/advisories/47225) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21107, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21107 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21107
- **State**: PUBLISHED
- **Published Date**: May 15, 2023 at 00:00 UTC
- **Last Updated**: January 24, 2025 at 17:46 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In retrieveAppEntry of NotificationAccessDetails.java, there is a missing permission check. This could lead to local escalation of privilege across user boundaries with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-259385017
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 Android-12 Android-12L Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2023-05-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9868, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9868 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9868
- **State**: PUBLISHED
- **Published Date**: June 25, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 17:18 UTC
- **Reserved Date**: June 25, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Mosquitto through 1.4.12, mosquitto.db (aka the persistence file) is world readable, which allows local users to obtain sensitive MQTT topic information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/eclipse/mosquitto/issues/468)
2. [[debian-lts-announce] 20180928 [SECURITY] [DLA 1525-1] mosquitto security update](https://lists.debian.org/debian-lts-announce/2018/09/msg00036.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42429, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42429 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42429
- **State**: PUBLISHED
- **Published Date**: January 19, 2024 at 20:03 UTC
- **Last Updated**: August 02, 2024 at 19:16 UTC
- **Reserved Date**: September 14, 2023 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper buffer restrictions in some Intel NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-92: Security Weakness
### Affected Products
**n/a - Intel NUC BIOS firmware**
Affected versions:
- See references (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01028.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01028.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23191, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23191
- **State**: PUBLISHED
- **Published Date**: February 16, 2022 at 16:38 UTC
- **Last Updated**: April 23, 2025 at 19:04 UTC
- **Reserved Date**: January 12, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Illustrator**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/illustrator/apsb22-07.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6200, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6200 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6200
- **State**: PUBLISHED
- **Published Date**: January 28, 2024 at 12:19 UTC
- **Last Updated**: June 05, 2025 at 19:45 UTC
- **Reserved Date**: November 20, 2023 at 09:44 UTC
- **Assigned By**: redhat
### Vulnerability Description
A race condition was found in the Linux Kernel. Under certain conditions, an unauthenticated attacker from an adjacent network could send an ICMPv6 router advertisement packet, causing arbitrary code execution.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-362: Security Weakness
### Affected Products
**n/a - kernel**
Affected versions:
- 6.7-rc7 (Status: unaffected)
**n/a - kernel**
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 9**
**Red Hat - Red Hat Enterprise Linux 9**
**Red Hat - Red Hat Virtualization 4**
**Fedora - Fedora**
### References
1. [](https://access.redhat.com/security/cve/CVE-2023-6200)
2. [RHBZ#2250377](https://bugzilla.redhat.com/show_bug.cgi?id=2250377)
3. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dade3f6a1e4e)
### Credits
- Red Hat would like to thank Lucas Leong (Trend Micro Zero Day Initiative) for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25625, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25625 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25625
- **State**: PUBLISHED
- **Published Date**: March 13, 2025 at 00:00 UTC
- **Last Updated**: March 19, 2025 at 18:32 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross-site scripting vulnerability exists in FS model S3150-8T2F switches running firmware s3150-8t2f-switch-fsos-220d_118101 and web firmware v2.2.2, which allows an authenticated web interface user to bypass input filtering on user names, and stores un-sanitized HTML and Javascript on the device. Pages which then present the user name without encoding special characters will then cause the injected code to be parsed by the browsers of other users accessing the web interface.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/whitewhale-dmb/Vulnerability-Research/tree/main/CVE-2025-25625) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2322, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2322 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2322
- **State**: PUBLISHED
- **Published Date**: May 02, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:06 UTC
- **Reserved Date**: March 12, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
lib/string_utf_support.rb in the Arabic Prawn 0.0.1 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) downloaded_file or (2) url variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html)
2. [[oss-security] 20140310 Remote Command Injection in Arabic Prawn 0.0.1 Ruby Gem](http://www.openwall.com/lists/oss-security/2014/03/10/8)
3. [[oss-security] 20140312 Re: Remote Command Injection in Arabic Prawn 0.0.1 Ruby Gem](http://www.openwall.com/lists/oss-security/2014/03/12/6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3360, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3360 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3360
- **State**: PUBLISHED
- **Published Date**: October 31, 2022 at 00:00 UTC
- **Last Updated**: May 06, 2025 at 20:39 UTC
- **Reserved Date**: September 29, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The LearnPress WordPress plugin before 4.1.7.2 unserialises user input in a REST API endpoint available to unauthenticated users, which could lead to PHP Object Injection when a suitable gadget is present, leadint to remote code execution (RCE). To successfully exploit this vulnerability attackers must have knowledge of the site secrets, allowing them to generate a valid hash via the wp_hash() function.
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Unknown - LearnPress – WordPress LMS Plugin**
Affected versions:
- 4.1.7.2 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/acea7a54-a964-4127-a93f-f38f883074e3)
### Credits
- Nguyen Duy Quoc Khanh |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7242, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7242 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7242
- **State**: PUBLISHED
- **Published Date**: January 12, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 07:43 UTC
- **Reserved Date**: September 18, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Push-Service-Mails feature in AVM FRITZ!OS before 6.30 allows remote attackers to inject arbitrary web script or HTML via the display name in the FROM field of an SIP INVITE message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/135168/AVM-FRITZ-OS-HTML-Injection.html)
2. [](http://ds-develop.de/advisories/advisory-2016-01-07-1-avm.txt)
3. [](https://avm.de/service/sicherheitsinfos-zu-updates/)
4. [20160107 [CVE-2015-7242] AVM FRITZ!Box: HTML Injection Vulnerability](http://www.securityfocus.com/archive/1/537249/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26669, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26669 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26669
- **State**: PUBLISHED
- **Published Date**: June 20, 2022 at 05:30 UTC
- **Last Updated**: September 17, 2024 at 02:42 UTC
- **Reserved Date**: March 08, 2022 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
ASUS Control Center is vulnerable to SQL injection. An authenticated remote attacker with general user privilege can inject SQL command to specific API parameters to acquire database schema or access data.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**ASUS - Control Center**
Affected versions:
- 1.4.2.5 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-6056-b0d90-1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41465, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41465 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41465
- **State**: PUBLISHED
- **Published Date**: July 24, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 04:46 UTC
- **Reserved Date**: July 18, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow vulnerability via the funcpara1 parameter at ip/goform/setcfm.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/iotresearch/iot-vuln/tree/main/Tenda/FH1201/setcfm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28186, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28186 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28186
- **State**: PUBLISHED
- **Published Date**: December 24, 2020 at 14:30 UTC
- **Last Updated**: August 04, 2024 at 16:33 UTC
- **Reserved Date**: November 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Email Injection in TerraMaster TOS <= 4.2.06 allows remote unauthenticated attackers to abuse the forget password functionality and achieve account takeover.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.terra-master.com/)
2. [](https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24654, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24654
- **State**: PUBLISHED
- **Published Date**: August 15, 2022 at 18:44 UTC
- **Last Updated**: August 03, 2024 at 04:13 UTC
- **Reserved Date**: February 07, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Authenticated stored cross-site scripting (XSS) vulnerability in "Field Server Address" field in INTELBRAS ATA 200 Firmware 74.19.10.21 allows attackers to inject JavaScript code through a crafted payload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://intelbras.com)
2. [](https://packetstormsecurity.com/files/168064/Intelbras-ATA-200-Cross-Site-Scripting.html)
3. [](https://github.com/leonardobg/CVE-2022-24654) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43458
- **State**: PUBLISHED
- **Published Date**: September 10, 2024 at 16:54 UTC
- **Last Updated**: December 31, 2024 at 23:03 UTC
- **Reserved Date**: August 14, 2024 at 01:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Networking Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-908: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
### References
1. [Windows Networking Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43458) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36133, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36133 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36133
- **State**: PUBLISHED
- **Published Date**: December 07, 2021 at 20:42 UTC
- **Last Updated**: August 04, 2024 at 00:47 UTC
- **Reserved Date**: July 02, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The OPTEE-OS CSU driver for NXP i.MX SoC devices lacks security access configuration for several models, resulting in TrustZone bypass because the NonSecure World can perform arbitrary memory read/write operations on Secure World memory. This involves a DMA capable peripheral.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/f-secure-foundry/advisories/blob/master/Security_Advisory-Ref_FSC-HWSEC-VR2021-0001-OP-TEE_TrustZone_bypass.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3896, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3896 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3896
- **State**: PUBLISHED
- **Published Date**: November 11, 2011 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 23:53 UTC
- **Reserved Date**: October 01, 2011 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Buffer overflow in Google Chrome before 15.0.874.120 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to shader variable mapping.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://code.google.com/p/chromium/issues/detail?id=101624)
2. [](http://googlechromereleases.blogspot.com/2011/11/stable-channel-update.html)
3. [oval:org.mitre.oval:def:14423](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14423)
4. [46933](http://secunia.com/advisories/46933) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18408, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18408
- **State**: PUBLISHED
- **Published Date**: October 17, 2018 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 11:08 UTC
- **Reserved Date**: October 16, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A use-after-free was discovered in the tcpbridge binary of Tcpreplay 4.3.0 beta1. The issue gets triggered in the function post_args() at tcpbridge.c, causing a denial of service or possibly unspecified other impact.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/appneta/tcpreplay/issues/489)
2. [](https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay/README.md#use-after-free-in-post_args)
3. [FEDORA-2019-a9c08d4b40](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MLPY6W7Z7G6PF2JN4LXXHCACYLD4RBG6/)
4. [FEDORA-2019-e40253f67e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4V3SADKXUSHWTVAPU3WLXBDEQUHRA6ZO/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40414, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40414 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40414
- **State**: PUBLISHED
- **Published Date**: January 10, 2024 at 22:03 UTC
- **Last Updated**: February 13, 2025 at 17:08 UTC
- **Reserved Date**: August 14, 2023 at 20:26 UTC
- **Assigned By**: apple
### Vulnerability Description
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 10, iOS 17 and iPadOS 17, tvOS 17, macOS Sonoma 14, Safari 17. Processing web content may lead to arbitrary code execution.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213938)
2. [](https://support.apple.com/en-us/HT213936)
3. [](https://support.apple.com/en-us/HT213941)
4. [](https://support.apple.com/en-us/HT213940)
5. [](https://support.apple.com/en-us/HT213937)
6. [](http://www.openwall.com/lists/oss-security/2024/02/05/8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1038, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1038 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1038
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:55 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tiger 2.2.3 allows local users to overwrite arbitrary files via a symlink attack on various temporary files in Tiger's default working directory, as defined by the WORKDIR variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19980626 vulnerability in satan, cops & tiger](http://marc.info/?l=bugtraq&m=90221103125976&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0712, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0712 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0712
- **State**: PUBLISHED
- **Published Date**: October 12, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:30 UTC
- **Reserved Date**: September 07, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The rendering engine in Internet Explorer determines the MIME type independently of the type that is specified by the server, which allows remote servers to automatically execute script which is placed in a file whose MIME type does not normally support scripting, such as text (.txt), JPEG (.jpg), etc.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010729 Re: TXT or HTML? -- IE NEW BUG](http://www.securityfocus.com/archive/1/200291)
2. [20010727 TXT or HTML? -- IE NEW BUG](http://www.securityfocus.com/archive/1/200109)
3. [3116](http://www.securityfocus.com/bid/3116) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15617, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15617
- **State**: PUBLISHED
- **Published Date**: January 11, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 19:57 UTC
- **Reserved Date**: October 19, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the iface variable in the interface_wan.lua file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt)
2. [20180110 Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)](http://www.securityfocus.com/archive/1/541655/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36558, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36558 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36558
- **State**: PUBLISHED
- **Published Date**: February 06, 2025 at 00:00 UTC
- **Last Updated**: March 19, 2025 at 14:29 UTC
- **Reserved Date**: May 30, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Forever KidsWatch Call Me KW-50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h suffers from Cleartext Transmission of Sensitive Information due to lack of encryption in device-server communication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.diva-portal.org/smash/record.jsf?aq2=%5B%5B%5D%5D&c=1&af=%5B%5D&searchType=SIMPLE&sortOrder2=title_sort_asc&query=Exploiting+Vulnerabilities+to+Remotely+Hijack+Children%E2%80%99s+Smartwatches&language=en&pid=diva2%3A1933447&aq=%5B%5B%5D%5D&sf=undergraduate&aqe=%5B%5D&sortOrder=author_sort_asc&onlyFullText=false&noOfRows=50&dswid=-8296) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43033, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43033 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43033
- **State**: PUBLISHED
- **Published Date**: December 06, 2021 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 03:47 UTC
- **Reserved Date**: October 26, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. Multiple functions in the bpserverd daemon were vulnerable to arbitrary remote code execution as root. The vulnerability was caused by untrusted input (received by the server) being passed to system calls.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961)
2. [](https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1)
3. [](https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7217, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7217
- **State**: PUBLISHED
- **Published Date**: November 10, 2016 at 06:16 UTC
- **Last Updated**: August 06, 2024 at 01:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Media Foundation in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Media Foundation Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [94066](http://www.securityfocus.com/bid/94066)
2. [1037243](http://www.securitytracker.com/id/1037243)
3. [MS16-132](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-132) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3249, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3249 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3249
- **State**: PUBLISHED
- **Published Date**: July 21, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 09:28 UTC
- **Reserved Date**: July 21, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The client in Lenovo System Update before 3.14 does not properly validate the certificate when establishing an SSL connection, which allows remote attackers to install arbitrary packages via an SSL certificate whose X.509 headers match a public certificate used by IBM.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30379](http://secunia.com/advisories/30379)
2. [](http://www.security-objectives.com/advisories/SECOBJADV-2008-01.txt)
3. [29366](http://www.securityfocus.com/bid/29366)
4. [20080525 SECOBJADV-2008-01: Lenovo SystemUpdate SSL Certificate Issuer Spoofing Vulnerability](http://www.securityfocus.com/archive/1/492579)
5. [ibm-thinkvantage-ssl-spoofing(42638)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42638)
6. [1020112](http://securitytracker.com/id?1020112) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2377, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2377 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2377
- **State**: PUBLISHED
- **Published Date**: April 02, 2017 at 01:36 UTC
- **Last Updated**: August 05, 2024 at 13:55 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. The issue involves the "WebKit Web Inspector" component. It allows attackers to cause a denial of service (memory corruption and application crash) by leveraging a window-close action during a debugger-pause state.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [97129](http://www.securityfocus.com/bid/97129)
2. [1038137](http://www.securitytracker.com/id/1038137)
3. [GLSA-201706-15](https://security.gentoo.org/glsa/201706-15)
4. [](https://support.apple.com/HT207600)
5. [](https://support.apple.com/HT207617) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48024, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48024
- **State**: PUBLISHED
- **Published Date**: November 17, 2023 at 00:00 UTC
- **Last Updated**: August 29, 2024 at 17:27 UTC
- **Reserved Date**: November 13, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Liblisp through commit 4c65969 was discovered to contain a use-after-free vulnerability in void hash_destroy(hash_table_t *h) at hash.c
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/howerj/liblisp/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16844, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16844 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16844
- **State**: REJECTED
- **Last Updated**: December 02, 2022 at 00:00 UTC
- **Reserved Date**: September 24, 2019 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1590, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1590 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1590
- **State**: PUBLISHED
- **Published Date**: September 11, 2020 at 17:09 UTC
- **Last Updated**: August 04, 2024 at 06:39 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
<p>An elevation of privilege vulnerability exists when the Connected User Experiences and Telemetry Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system.</p>
<p>To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially crafted application.</p>
<p>The security update addresses the vulnerability by correcting how the Connected User Experiences and Telemetry Service handles file operations.</p>
### CVSS Metrics
- **CVSS Base Score**: 6.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1590) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12005, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12005 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12005
- **State**: PUBLISHED
- **Published Date**: May 24, 2019 at 16:44 UTC
- **Last Updated**: August 05, 2024 at 08:24 UTC
- **Reserved Date**: June 07, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
An unprivileged user can issue a binder call and cause a system halt in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24, SM7150
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24, SM7150 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-12005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14879, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14879 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14879
- **State**: PUBLISHED
- **Published Date**: January 07, 2020 at 16:23 UTC
- **Last Updated**: August 05, 2024 at 00:26 UTC
- **Reserved Date**: August 10, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was found in Moodle versions 3.7.x before 3.7.3, 3.6.x before 3.6.7 and 3.5.x before 3.5.9. When a cohort role assignment was removed, the associated capabilities were not being revoked (where applicable).
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**[UNKNOWN] - moodle**
Affected versions:
- 3.7.x before 3.7.3 (Status: affected)
- 3.6.x before 3.6.7 (Status: affected)
- 3.5.x before 3.5.9 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14879) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37529, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37529 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37529
- **State**: PUBLISHED
- **Published Date**: February 02, 2024 at 19:45 UTC
- **Last Updated**: June 03, 2025 at 18:59 UTC
- **Reserved Date**: July 06, 2023 at 16:12 UTC
- **Assigned By**: HCL
### Vulnerability Description
A cross-site scripting (XSS) vulnerability in the Web Reports component of HCL BigFix Platform can possibly allow an attacker to execute malicious javascript code into a webpage trying to retrieve cookie stored information. This is not the same vulnerability as identified in CVE-2023-37530.
### CVSS Metrics
- **CVSS Base Score**: 3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N`
### Affected Products
**HCL Software - BigFix Platform**
Affected versions:
- 9.5 - 9.5.23, 10 - 10.0.10 (Status: affected)
### References
1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0110209) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2881, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2881 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2881
- **State**: PUBLISHED
- **Published Date**: August 29, 2024 at 23:10 UTC
- **Last Updated**: August 30, 2024 at 14:18 UTC
- **Reserved Date**: March 25, 2024 at 22:01 UTC
- **Assigned By**: wolfSSL
### Vulnerability Description
Fault Injection vulnerability in wc_ed25519_sign_msg function in wolfssl/wolfcrypt/src/ed25519.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate privileges via Rowhammer fault injection to the ed25519_key structure.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-1256: Out-of-bounds Read
- CWE-252: Security Weakness
### Affected Products
**WolfSSL - wolfCrypt**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.0-stable) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20425, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20425 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20425
- **State**: PUBLISHED
- **Published Date**: January 27, 2020 at 04:21 UTC
- **Last Updated**: August 05, 2024 at 02:39 UTC
- **Reserved Date**: January 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the Lustre file system before 2.12.3, the ptlrpc module has an out-of-bounds access and panic due to the lack of validation for specific fields of packets sent by a client. In the function lustre_msg_string, there is no validation of a certain length value derived from lustre_msg_buflen_v2.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://wiki.lustre.org/Lustre_2.12.3_Changelog)
2. [](http://lustre.org/)
3. [](https://jira.whamcloud.com/browse/LU-12613)
4. [](https://review.whamcloud.com/#/c/36209/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34565, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34565 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34565
- **State**: PUBLISHED
- **Published Date**: May 08, 2024 at 10:57 UTC
- **Last Updated**: August 02, 2024 at 02:59 UTC
- **Reserved Date**: May 06, 2024 at 19:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Debug Info allows Stored XSS.This issue affects Debug Info: from n/a through 1.3.10.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**AMP-MODE - Debug Info**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/debug-info/wordpress-debug-info-plugin-1-3-10-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Jakick (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1308, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1308 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1308
- **State**: PUBLISHED
- **Published Date**: April 08, 2021 at 04:05 UTC
- **Last Updated**: November 08, 2024 at 23:29 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
### CVSS Metrics
- **CVSS Base Score**: 7.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Cisco - Cisco Small Business RV Series Router Firmware**
Affected versions:
- n/a (Status: affected)
### References
1. [20210407 Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4314, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4314 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4314
- **State**: PUBLISHED
- **Published Date**: December 14, 2009 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 23:50 UTC
- **Reserved Date**: December 14, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sun Ray Server Software 4.1 on Solaris 10, when Automatic Multi-Group Hotdesking (AMGH) is enabled, responds to a logout action by immediately logging the user in again, which makes it easier for physically proximate attackers to obtain access to a session by going to an unattended DTU device.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sunsolve.sun.com/search/document.do?assetkey=1-21-139548-03-1)
2. [268228](http://sunsolve.sun.com/search/document.do?assetkey=1-66-268228-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4268, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4268 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4268
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 15:13 UTC
- **Last Updated**: September 16, 2024 at 23:30 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM QRadar 7.3.0 to 7.3.3 Patch 2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-ForceID: 175841.
### Affected Products
**IBM - Qradar**
Affected versions:
- 7.3.3.Patch2 (Status: affected)
**IBM - QRadar**
Affected versions:
- 7.3.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6189639)
2. [ibm-qradar-cve20204268-xss (175841)](https://exchange.xforce.ibmcloud.com/vulnerabilities/175841) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0747, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0747
- **State**: PUBLISHED
- **Published Date**: July 26, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:03 UTC
- **Reserved Date**: July 25, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in lsmcode in AIX 4.3.3.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [IY29589](http://archives.neohapsis.com/archives/aix/2002-q2/0005.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1274, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1274 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1274
- **State**: PUBLISHED
- **Published Date**: March 10, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 08:17 UTC
- **Reserved Date**: March 10, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in man in IBM AIX 6.1.0 allows local users to execute arbitrary code via a malicious program in the man directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-0805](http://www.vupen.com/english/advisories/2008/0805/references)
2. [28180](http://www.securityfocus.com/bid/28180)
3. [IZ17177](http://www-1.ibm.com/support/search.wss?rs=0&q=IZ17177&apar=only)
4. [ibm-aix-man-privilege-escalation(41067)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41067)
5. [1019572](http://www.securitytracker.com/id?1019572)
6. [oval:org.mitre.oval:def:5169](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5169)
7. [29301](http://secunia.com/advisories/29301) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3793, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3793
- **State**: PUBLISHED
- **Published Date**: April 15, 2024 at 14:13 UTC
- **Last Updated**: August 01, 2024 at 20:20 UTC
- **Reserved Date**: April 15, 2024 at 10:19 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
Vulnerability in WBSAirback 21.02.04, which consists of a stored Cross-Site Scripting (XSS) through /admin/CloudAccounts, account name / user password / server fields, all parameters. Exploitation of this vulnerability could allow a remote user to send a specially crafted URL to the victim and steal their session data.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WBSAirback - White Bear Solutions**
Affected versions:
- 21.02.04 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions)
### Credits
- Alejandro Amorín Niño
- Guillermo Tuvilla Gómez
- Sergio Román Hurtado |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1855, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1855 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1855
- **State**: PUBLISHED
- **Published Date**: June 28, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 16:43 UTC
- **Reserved Date**: June 28, 2005 at 04:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5119](http://www.securityfocus.com/bid/5119)
2. [webinf-dot-file-retrieval(9446)](http://www.iss.net/security_center/static/9446.php)
3. [](http://www.macromedia.com/v1/handlers/index.cfm?ID=23164)
4. [](http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt)
5. [20020628 wp-02-0002: 'WEB-INF' Folder accessible in Multiple Web Application Servers](http://online.securityfocus.com/archive/1/279582) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10100, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10100 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10100
- **State**: PUBLISHED
- **Published Date**: March 05, 2020 at 00:37 UTC
- **Last Updated**: August 04, 2024 at 10:50 UTC
- **Reserved Date**: March 05, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Zammad 3.0 through 3.2. It allows for users to view ticket customer details associated with specific customers. However, the application does not properly implement access controls related to this functionality. As such, users of one company are able to access ticket data from other companies. Due to the multi-tenant nature of this application, users who can access ticket details from one organization to the next allows for users to exfiltrate potentially sensitive data of other companies.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://zammad.com/news/security-advisory-zaa-2020-05) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29537
- **State**: PUBLISHED
- **Published Date**: June 02, 2023 at 00:00 UTC
- **Last Updated**: January 09, 2025 at 16:01 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Multiple race conditions in the font initialization could have led to memory corruption and execution of attacker-controlled code. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112.
### Affected Products
**Mozilla - Firefox for Android**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Focus for Android**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2023-13/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1823365)
3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1824200)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1825569) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10093, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10093 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10093
- **State**: PUBLISHED
- **Published Date**: August 02, 2019 at 18:32 UTC
- **Last Updated**: August 04, 2024 at 22:10 UTC
- **Reserved Date**: March 26, 2019 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
In Apache Tika 1.19 to 1.21, a carefully crafted 2003ml or 2006ml file could consume all available SAXParsers in the pool and lead to very long hangs. Apache Tika users should upgrade to 1.22 or later.
### Affected Products
**Apache - Apache Tika**
Affected versions:
- 1.19 to 1.21 (Status: affected)
### References
1. [](https://lists.apache.org/thread.html/a5a44eff1b9eda3bc69d22943a1030c43d376380c75d3ab04d0c1a21%40%3Cdev.tika.apache.org%3E)
2. [[tika-dev] 20190809 security fixes for CVE-2019-10088 and CVE-2019-1009{3,4}](https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d%40%3Cdev.tika.apache.org%3E)
3. [[tika-dev] 20190812 Re: security fixes for CVE-2019-10088 and CVE-2019-1009{3,4}](https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94%40%3Cdev.tika.apache.org%3E)
4. [[tika-dev] 20190813 Re: security fixes for CVE-2019-10088 and CVE-2019-1009{3,4}](https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d%40%3Cdev.tika.apache.org%3E)
5. [](https://security.netapp.com/advisory/ntap-20190828-0004/)
6. [](https://www.oracle.com/security-alerts/cpujan2020.html)
7. [[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1](https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E)
8. [](https://www.oracle.com/security-alerts/cpuapr2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2544, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2544 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2544
- **State**: PUBLISHED
- **Published Date**: May 23, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:51 UTC
- **Reserved Date**: May 22, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Xtreme Topsites 1.1, with magic_quotes_gpc disabled, allow remote attackers to execute arbitrary SQL commands via the (1) searchthis parameter in lostid.php and (2) id parameter in stats.php. NOTE: the provenance of this information is unknown; portions of the details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-1899](http://www.vupen.com/english/advisories/2006/1899)
2. [25703](http://www.osvdb.org/25703)
3. [20192](http://secunia.com/advisories/20192) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2149
- **State**: PUBLISHED
- **Published Date**: March 14, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 15:27 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in ownCloud before 4.0.16 and 5.x before 5.0.7 allow remote authenticated users to inject arbitrary web script or HTML via vectors related to shared files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://owncloud.org/about/security/advisories/oC-SA-2013-028/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31236
- **State**: PUBLISHED
- **Published Date**: May 12, 2025 at 21:43 UTC
- **Last Updated**: May 14, 2025 at 15:07 UTC
- **Reserved Date**: March 27, 2025 at 16:13 UTC
- **Assigned By**: apple
### Vulnerability Description
An information disclosure issue was addressed with improved privacy controls. This issue is fixed in macOS Sequoia 15.5. An app may be able to access sensitive user data.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122716) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5419, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5419 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5419
- **State**: PUBLISHED
- **Published Date**: October 12, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 15:31 UTC
- **Reserved Date**: October 12, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The 3Com 3CRWER100-75 router with 1.2.10ww software, when enabling an optional virtual server, configures this server to accept all source IP addresses on the external (Internet) interface unless the user selects other options, which might expose the router to unintended incoming traffic from remote attackers, as demonstrated by setting up a virtual server on port 80, which allows remote attackers to access the web management interface.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20071010 3Com WIFI router remote administration vulnerability.](http://www.securityfocus.com/archive/1/481977/100/0/threaded)
2. [43657](http://osvdb.org/43657)
3. [3217](http://securityreason.com/securityalert/3217)
4. [26009](http://www.securityfocus.com/bid/26009) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5014, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5014 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5014
- **State**: PUBLISHED
- **Published Date**: April 23, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 20:50 UTC
- **Reserved Date**: September 21, 2012 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco IOS before 15.1(2)SY allows remote authenticated users to cause a denial of service (device crash) by establishing an SSH session from a client and then placing this client into a (1) slow or (2) idle state, aka Bug ID CSCto87436.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4527, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4527 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4527
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:41 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0579
- **State**: PUBLISHED
- **Published Date**: February 08, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 16:41 UTC
- **Reserved Date**: February 08, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple integer overflows in (1) the new_demux_packet function in demuxer.h and (2) the demux_asf_read_packet function in demux_asf.c in MPlayer 1.0pre7try2 and earlier allow remote attackers to execute arbitrary code via an ASF file with a large packet length value. NOTE: the provenance of this information is unknown; portions of the details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18718](http://secunia.com/advisories/18718)
2. [mplayer-asf-integer-overflow(24531)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24531)
3. [19114](http://secunia.com/advisories/19114)
4. [GLSA-200603-03](http://www.gentoo.org/security/en/glsa/glsa-200603-03.xml)
5. [MDKSA-2006:048](http://www.mandriva.com/security/advisories?name=MDKSA-2006:048)
6. [ADV-2006-0457](http://www.vupen.com/english/advisories/2006/0457) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4056
- **State**: PUBLISHED
- **Published Date**: April 26, 2024 at 06:02 UTC
- **Last Updated**: August 27, 2024 at 10:47 UTC
- **Reserved Date**: April 23, 2024 at 08:17 UTC
- **Assigned By**: M-Files Corporation
### Vulnerability Description
Denial of service condition in M-Files Server in versions before 24.4.13592.4 and after 23.11 (excluding 24.2 LTS) allows unauthenticated user to consume computing resources.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-1333: Security Weakness
### Affected Products
**M-Files Corporation - M-Files Server**
Affected versions:
- 23.11 (Status: affected)
- 24.2 LTS (Status: unaffected)
### References
1. [](https://product.m-files.com/security-advisories/cve-2024-4056/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0174, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0174 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0174
- **State**: PUBLISHED
- **Published Date**: May 08, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 14:18 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The external node classifier (ENC) API in Foreman before 1.1 allows remote attackers to obtain the hashed root password via an API request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://projects.theforeman.org/issues/2069)
2. [](http://theforeman.org/security.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1447, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1447
- **State**: PUBLISHED
- **Published Date**: November 12, 2019 at 18:53 UTC
- **Last Updated**: August 04, 2024 at 18:20 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A spoofing vulnerability exists when Office Online does not validate origin in cross-origin communications handlers correctly, aka 'Microsoft Office Online Spoofing Vulnerability'. This CVE ID is unique from CVE-2019-1445.
### Affected Products
**Microsoft - Office Online Server**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1447) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5281, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5281 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5281
- **State**: PUBLISHED
- **Published Date**: October 13, 2006 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 19:48 UTC
- **Reserved Date**: October 13, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in naboard_pnr.php in n@board 3.1.9e and earlier allows remote attackers to execute arbitrary PHP code via a URL in the skin parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29692](http://www.osvdb.org/29692)
2. [2514](https://www.exploit-db.com/exploits/2514)
3. [ADV-2006-4013](http://www.vupen.com/english/advisories/2006/4013)
4. [22250](http://secunia.com/advisories/22250)
5. [20462](http://www.securityfocus.com/bid/20462)
6. [n@board-naboard-file-include(29431)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29431)
7. [](http://securitydot.net/txt/id/1645/type/xpl/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-55076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-55076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-55076
- **State**: PUBLISHED
- **Published Date**: January 06, 2025 at 00:00 UTC
- **Last Updated**: January 06, 2025 at 20:48 UTC
- **Reserved Date**: December 06, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Grocy through 4.3.0 has no CSRF protection, as demonstrated by changing the Administrator's password.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Grocy project - Grocy**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://m10x.de/posts/2024/11/all-your-recipe-are-belong-to-us-part-1/3-stored-xss-csrf-and-broken-access-control-vulnerabilities-in-grocy/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0092, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0092
- **State**: PUBLISHED
- **Published Date**: March 11, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 03:55 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted (1) web site or (2) file, aka "Adobe Font Driver Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-0088, CVE-2015-0090, CVE-2015-0091, and CVE-2015-0093.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS15-021](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-021)
2. [72906](http://www.securityfocus.com/bid/72906)
3. [1031889](http://www.securitytracker.com/id/1031889) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24341, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24341 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24341
- **State**: PUBLISHED
- **Published Date**: February 25, 2022 at 14:35 UTC
- **Last Updated**: August 03, 2024 at 04:07 UTC
- **Reserved Date**: February 02, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In JetBrains TeamCity before 2021.2.1, editing a user account to change its password didn't terminate sessions of the edited user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.jetbrains.com)
2. [](https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36426, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36426 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36426
- **State**: PUBLISHED
- **Published Date**: February 03, 2023 at 00:00 UTC
- **Last Updated**: March 26, 2025 at 17:32 UTC
- **Reserved Date**: July 12, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
File Upload vulnerability in phpwcms 1.9.25 allows remote attackers to run arbitrary code via crafted file upload to include/inc_lib/general.inc.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/slackero/phpwcms/issues/312) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40101
- **State**: PUBLISHED
- **Published Date**: October 30, 2023 at 17:01 UTC
- **Last Updated**: September 17, 2024 at 13:20 UTC
- **Reserved Date**: August 09, 2023 at 02:29 UTC
- **Assigned By**: google_android
### Vulnerability Description
In collapse of canonicalize_md.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
### References
1. [](https://source.android.com/docs/security/bulletin/android-14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0207
- **State**: PUBLISHED
- **Published Date**: September 18, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:14 UTC
- **Reserved Date**: March 08, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in bing allows remote attackers to execute arbitrary commands via a long hostname, which is copied to a small buffer after a reverse DNS lookup using the gethostbyaddr function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [linux-bing-bo(6036)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6036)
2. [2279](http://www.securityfocus.com/bid/2279)
3. [20010119 Buffer overflow in bing](http://archives.neohapsis.com/archives/bugtraq/2001-01/0330.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4728, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4728 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4728
- **State**: PUBLISHED
- **Published Date**: March 12, 2024 at 09:33 UTC
- **Last Updated**: August 02, 2024 at 07:38 UTC
- **Reserved Date**: September 01, 2023 at 21:36 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The LadiApp plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the publish_lp() function hooked via an AJAX action in versions up to, and including, 4.4. This makes it possible for authenticated attackers with subscriber-level access and above to change the LadiPage key (a key fully controlled by the attacker), enabling them to freely create new pages, including web pages that trigger stored XSS
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Affected Products
**binhnguyenplus - LadiApp: Landing Page, PopupX, Marketing Automation, Affiliate Marketing…**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/6dafc81c-f1be-422d-b34f-87f1956e8849?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/ladipage/trunk/ladipage.php#L1992)
### Credits
- GiongfNef |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15302
- **State**: PUBLISHED
- **Published Date**: October 16, 2017 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 19:50 UTC
- **Reserved Date**: October 14, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In CPUID CPU-Z through 1.81, there are improper access rights to a kernel-mode driver (e.g., cpuz143_x64.sys for version 1.43) that can result in information disclosure or elevation of privileges, because of an arbitrary read of any physical address via ioctl 0x9C402604. Any application running on the system (Windows), including sandboxed users, can issue an ioctl to this driver without any validation. Furthermore, the driver can map any physical page on the system and returns the allocated map page address to the user: that results in an information leak and EoP. NOTE: the vendor indicates that the arbitrary read itself is intentional behavior (for ACPI scan functionality); the security issue is the lack of an ACL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/akayn/Bugs/blob/master/CPUID/CVE-2017-15302/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8999, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8999
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 10:08 UTC
- **Last Updated**: March 20, 2025 at 19:01 UTC
- **Reserved Date**: September 19, 2024 at 14:18 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
lunary-ai/lunary version v1.4.25 contains an improper access control vulnerability in the POST /api/v1/data-warehouse/bigquery endpoint. This vulnerability allows any user to export the entire database data by creating a stream to Google BigQuery without proper authentication or authorization. The issue is fixed in version 1.4.26.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**lunary-ai - lunary-ai/lunary**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/d42b7a44-0dcb-4ef0-b15c-d0e558da65c6)
2. [](https://github.com/lunary-ai/lunary/commit/aa0fd22952d1d84a717ae563eb1ab564d94a9e2b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1648, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1648
- **State**: PUBLISHED
- **Published Date**: July 26, 2022 at 14:24 UTC
- **Last Updated**: September 16, 2024 at 19:47 UTC
- **Reserved Date**: May 10, 2022 at 00:00 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
Pandora FMS v7.0NG.760 and below allows a relative path traversal in File Manager where a privileged user could upload a .php file outside the intended images directory which is restricted to execute the .php file. The impact could lead to a Remote Code Execution with running application privilege.
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-23: Security Weakness
### Affected Products
**Artica PFMS - Pandora FMS**
Affected versions:
- v760 (Status: affected)
### References
1. [](https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/)
2. [](https://www.incibe.es/en/cve-assignment-publication/coordinated-cves) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25330, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25330 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25330
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 00:00 UTC
- **Last Updated**: February 28, 2025 at 15:57 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Boohee Technology Boohee Health iOS 13.0.13 allows attackers to access sensitive user information via supplying a crafted link.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ZhouZiyi1/Vuls/blob/main/250116-BooheeHealth/250116-BooheeHealth.pdf) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.