System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1628, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1628 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1628
- **State**: PUBLISHED
- **Published Date**: May 17, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:59 UTC
- **Reserved Date**: May 17, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
apage.cgi in WebAPP 0.9.9.2.1, and possibly earlier versions, allows remote attackers to execute arbitrary commands via shell metacharacters in the f parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.soulblack.com.ar/repo/tools/sbwebapp.txt)
2. [20061023 Application orders Linux in WebAPP v0.9.9.2.1](http://www.securityfocus.com/archive/1/449517/100/200/threaded)
3. [13637](http://www.securityfocus.com/bid/13637)
4. [](http://www.defacers.com.mx/advisories/3.txt)
5. [20061024 Re: Application orders Linux in WebAPP v0.9.9.2.1](http://www.securityfocus.com/archive/1/449573/100/200/threaded)
6. [ADV-2005-0554](http://www.vupen.com/english/advisories/2005/0554) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41873, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41873 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41873
- **State**: PUBLISHED
- **Published Date**: September 13, 2024 at 07:00 UTC
- **Last Updated**: September 13, 2024 at 14:10 UTC
- **Reserved Date**: July 22, 2024 at 17:16 UTC
- **Assigned By**: adobe
### Vulnerability Description
Media Encoder versions 24.5, 23.6.8 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Media Encoder**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/media-encoder/apsb24-53.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20203, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20203 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20203
- **State**: PUBLISHED
- **Published Date**: August 16, 2023 at 21:38 UTC
- **Last Updated**: August 02, 2024 at 09:05 UTC
- **Reserved Date**: October 27, 2022 at 18:47 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device.
### Affected Products
**Cisco - Cisco Prime Infrastructure**
Affected versions:
- 2.0.0 (Status: affected)
- 2.0.10 (Status: affected)
- 2.0.39 (Status: affected)
- 2.1.0 (Status: affected)
- 2.1.1 (Status: affected)
- 2.1.2 (Status: affected)
- 2.1.56 (Status: affected)
- 2.2.0 (Status: affected)
- 2.2.1 (Status: affected)
- 2.2.2 (Status: affected)
- 2.2.3 (Status: affected)
- 2.2.10 (Status: affected)
- 2.2.8 (Status: affected)
- 2.2.4 (Status: affected)
- 2.2.7 (Status: affected)
- 2.2.5 (Status: affected)
- 2.2.9 (Status: affected)
- 2.2.1 Update 01 (Status: affected)
- 2.2.2 Update 03 (Status: affected)
- 2.2.2 Update 04 (Status: affected)
- 2.2.3 Update 02 (Status: affected)
- 2.2.3 Update 03 (Status: affected)
- 2.2.3 Update 04 (Status: affected)
- 2.2.3 Update 05 (Status: affected)
- 2.2.3 Update 06 (Status: affected)
- 3.0.0 (Status: affected)
- 3.0.1 (Status: affected)
- 3.0.2 (Status: affected)
- 3.0.3 (Status: affected)
- 3.0.4 (Status: affected)
- 3.0.6 (Status: affected)
- 3.0.5 (Status: affected)
- 3.0.7 (Status: affected)
- 3.1.0 (Status: affected)
- 3.1.1 (Status: affected)
- 3.1.7 (Status: affected)
- 3.1.5 (Status: affected)
- 3.1.2 (Status: affected)
- 3.1.3 (Status: affected)
- 3.1.4 (Status: affected)
- 3.1.6 (Status: affected)
- 3.2.2 (Status: affected)
- 3.2.0-FIPS (Status: affected)
- 3.2.1 (Status: affected)
- 3.3.0 (Status: affected)
- 3.3.1 (Status: affected)
- 3.3.0 Update 01 (Status: affected)
- 3.4.0 (Status: affected)
- 3.4.1 (Status: affected)
- 3.4.2 (Status: affected)
- 3.4.1 Update 01 (Status: affected)
- 3.4.1 Update 02 (Status: affected)
- 3.4.2 Update 01 (Status: affected)
- 3.5.0 (Status: affected)
- 3.5.1 (Status: affected)
- 3.5.0 Update 01 (Status: affected)
- 3.5.0 Update 02 (Status: affected)
- 3.5.0 Update 03 (Status: affected)
- 3.5.1 Update 01 (Status: affected)
- 3.5.1 Update 02 (Status: affected)
- 3.5.1 Update 03 (Status: affected)
- 3.6.0 (Status: affected)
- 3.6.0 Update 01 (Status: affected)
- 3.6.0 Update 02 (Status: affected)
- 3.6.0 Update 03 (Status: affected)
- 3.6.0 Update 04 (Status: affected)
- 2.1 (Status: affected)
- 2.2 (Status: affected)
- 3.2 (Status: affected)
- 3.4_DP1 (Status: affected)
- 3.4_DP3 (Status: affected)
- 3.4_DP2 (Status: affected)
- 3.5_DP1 (Status: affected)
- 3.4_DP7 (Status: affected)
- 3.4_DP10 (Status: affected)
- 3.4_DP5 (Status: affected)
- 3.1_DP15 (Status: affected)
- 3.4_DP11 (Status: affected)
- 3.4_DP8 (Status: affected)
- 3.7_DP1 (Status: affected)
- 3.3_DP4 (Status: affected)
- 3.10_DP1 (Status: affected)
- 3.8_DP1 (Status: affected)
- 3.7_DP2 (Status: affected)
- 3.6_DP1 (Status: affected)
- 3.1_DP16 (Status: affected)
- 3.5_DP4 (Status: affected)
- 3.3_DP3 (Status: affected)
- 3.2_DP2 (Status: affected)
- 3.4_DP4 (Status: affected)
- 3.1_DP14 (Status: affected)
- 3.1_DP6 (Status: affected)
- 3.1_DP9 (Status: affected)
- 3.4_DP6 (Status: affected)
- 3.2_DP3 (Status: affected)
- 3.4_DP9 (Status: affected)
- 3.3_DP2 (Status: affected)
- 3.2_DP1 (Status: affected)
- 3.1_DP10 (Status: affected)
- 3.9_DP1 (Status: affected)
- 3.3_DP1 (Status: affected)
- 3.1_DP13 (Status: affected)
- 3.5_DP2 (Status: affected)
- 3.1_DP12 (Status: affected)
- 3.1_DP4 (Status: affected)
- 3.5_DP3 (Status: affected)
- 3.1_DP8 (Status: affected)
- 3.1_DP7 (Status: affected)
- 3.2_DP4 (Status: affected)
- 3.1_DP11 (Status: affected)
- 3.1_DP5 (Status: affected)
- 3.7.0 (Status: affected)
- 3.7.1 (Status: affected)
- 3.7.1 Update 04 (Status: affected)
- 3.7.1 Update 06 (Status: affected)
- 3.7.1 Update 07 (Status: affected)
- 3.7.1 Update 03 (Status: affected)
- 3.7.0 Update 03 (Status: affected)
- 3.7.1 Update 01 (Status: affected)
- 3.7.1 Update 02 (Status: affected)
- 3.7.1 Update 05 (Status: affected)
- 3.8.0 (Status: affected)
- 3.8.1 (Status: affected)
- 3.8.1 Update 02 (Status: affected)
- 3.8.1 Update 04 (Status: affected)
- 3.8.1 Update 01 (Status: affected)
- 3.8.1 Update 03 (Status: affected)
- 3.8.0 Update 01 (Status: affected)
- 3.8.0 Update 02 (Status: affected)
- 3.9.0 (Status: affected)
- 3.9.1 (Status: affected)
- 3.9.1 Update 02 (Status: affected)
- 3.9.1 Update 03 (Status: affected)
- 3.9.1 Update 01 (Status: affected)
- 3.9.1 Update 04 (Status: affected)
- 3.9.0 Update 01 (Status: affected)
- 3.10.0 (Status: affected)
- 3.10.3 (Status: affected)
- 3.10.1 (Status: affected)
- 3.10.2 (Status: affected)
- 3.10 Update 01 (Status: affected)
**Cisco - Cisco Evolved Programmable Network Manager (EPNM)**
Affected versions:
- 1.2.6 (Status: affected)
- 1.2.2 (Status: affected)
- 1.2.3 (Status: affected)
- 1.2.5 (Status: affected)
- 1.2.1.2 (Status: affected)
- 1.2.4 (Status: affected)
- 1.2.7 (Status: affected)
- 1.2 (Status: affected)
- 1.2.2.4 (Status: affected)
- 1.2.4.2 (Status: affected)
- 2.0.2 (Status: affected)
- 2.0.4 (Status: affected)
- 2.0.3 (Status: affected)
- 2.0.1 (Status: affected)
- 2.0 (Status: affected)
- 2.0.1.1 (Status: affected)
- 2.0.2.1 (Status: affected)
- 2.0.4.1 (Status: affected)
- 2.0.4.2 (Status: affected)
- 2.1.2 (Status: affected)
- 2.1.3 (Status: affected)
- 2.1.1 (Status: affected)
- 2.1 (Status: affected)
- 2.1.1.1 (Status: affected)
- 2.1.1.3 (Status: affected)
- 2.1.1.4 (Status: affected)
- 2.1.2.2 (Status: affected)
- 2.1.2.3 (Status: affected)
- 2.1.3.2 (Status: affected)
- 2.1.3.3 (Status: affected)
- 2.1.3.4 (Status: affected)
- 2.1.3.5 (Status: affected)
- 2.1.4 (Status: affected)
- 2.2.1 (Status: affected)
- 2.2 (Status: affected)
- 2.2.1.1 (Status: affected)
- 2.2.1.2 (Status: affected)
- 2.2.1.3 (Status: affected)
- 2.2.1.4 (Status: affected)
- 2.2.3 (Status: affected)
- 2.2.4 (Status: affected)
- 2.2.5 (Status: affected)
- 3.0.1 (Status: affected)
- 3.0.2 (Status: affected)
- 3.0.3 (Status: affected)
- 3.0 (Status: affected)
- 3.1.1 (Status: affected)
- 3.1.2 (Status: affected)
- 3.1.3 (Status: affected)
- 3.1 (Status: affected)
- 4.1.1 (Status: affected)
- 4.1 (Status: affected)
- 4.1.1.1 (Status: affected)
- 4.1.1.2 (Status: affected)
- 4.0.3 (Status: affected)
- 4.0.1 (Status: affected)
- 4.0.2 (Status: affected)
- 4.0 (Status: affected)
- 4.0.3.1 (Status: affected)
- 5.0.1 (Status: affected)
- 5.0.2 (Status: affected)
- 5.0.2.5 (Status: affected)
- 5.0.2.3 (Status: affected)
- 5.0.2.4 (Status: affected)
- 5.0.2.1 (Status: affected)
- 5.0.2.2 (Status: affected)
- 5.0 (Status: affected)
- 5.1.1 (Status: affected)
- 5.1.2 (Status: affected)
- 5.1.3 (Status: affected)
- 5.1.4 (Status: affected)
- 5.1.4.2 (Status: affected)
- 5.1.4.1 (Status: affected)
- 5.1.4.3 (Status: affected)
- 5.1 (Status: affected)
- 5.1.3.1 (Status: affected)
- 5.1.3.2 (Status: affected)
- 7.0.0 (Status: affected)
- 6.0.0 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2.1 (Status: affected)
- 6.0.1.1 (Status: affected)
- 6.0.3 (Status: affected)
- 6.1.1 (Status: affected)
- 6.1.1.1 (Status: affected)
- 6.1 (Status: affected)
### References
1. [cisco-sa-pi-epnm-BFjSRJP5](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-BFjSRJP5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1986, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1986 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1986
- **State**: PUBLISHED
- **Published Date**: April 08, 2020 at 18:41 UTC
- **Last Updated**: September 16, 2024 at 20:26 UTC
- **Reserved Date**: December 04, 2019 at 00:00 UTC
- **Assigned By**: palo_alto
### Vulnerability Description
Improper input validation vulnerability in Secdo allows an authenticated local user with 'create folders or append data' access to the root of the OS disk (C:\) to cause a system crash on every login. This issue affects all versions Secdo for Windows.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Secdo - Secdo**
Affected versions:
- all versions (Status: affected)
### References
1. [](https://security.paloaltonetworks.com/CVE-2020-1986)
### Credits
- We like to thank Eviatar Gerzi of CyberArk Labs Team for discovering and reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31143, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31143
- **State**: PUBLISHED
- **Published Date**: September 14, 2022 at 17:40 UTC
- **Last Updated**: April 23, 2025 at 17:10 UTC
- **Reserved Date**: May 18, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**glpi-project - glpi**
Affected versions:
- >=9.5.0, < 10.0.3 (Status: affected)
### References
1. [](https://github.com/glpi-project/glpi/security/advisories/GHSA-6mmq-x3j2-677j)
2. [](https://github.com/glpi-project/glpi/commit/e66a0dfe697cbd4b3ec22736a8f8fd025a28f978) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23624, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23624 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23624
- **State**: PUBLISHED
- **Published Date**: November 03, 2021 at 17:20 UTC
- **Last Updated**: September 16, 2024 at 19:20 UTC
- **Reserved Date**: January 08, 2021 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays.
### CVSS Metrics
- **CVSS Base Score**: 5.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RC:C`
### Affected Products
**n/a - dotty**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-DOTTY-1577292)
2. [](https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7)
### Credits
- Alessio Della Libera of Snyk Research Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7086, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7086
- **State**: PUBLISHED
- **Published Date**: May 24, 2019 at 18:51 UTC
- **Last Updated**: August 04, 2024 at 20:38 UTC
- **Reserved Date**: January 28, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-07.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2497, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2497 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2497
- **State**: PUBLISHED
- **Published Date**: March 15, 2024 at 17:00 UTC
- **Last Updated**: August 08, 2024 at 20:47 UTC
- **Reserved Date**: March 15, 2024 at 11:50 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in RaspAP raspap-webgui 3.0.9 and classified as critical. This issue affects some unknown processing of the file includes/provider.php of the component HTTP POST Request Handler. The manipulation of the argument country leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256919. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**RaspAP - raspap-webgui**
Affected versions:
- 3.0.9 (Status: affected)
### References
1. [VDB-256919 | RaspAP raspap-webgui HTTP POST Request provider.php code injection](https://vuldb.com/?id.256919)
2. [VDB-256919 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.256919)
3. [](https://toradah.notion.site/Code-Injection-Leading-to-Remote-Code-Execution-RCE-in-RaspAP-Web-GUI-d321e1a416694520bec7099253c65060?pvs=4)
### Credits
- torada (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20833
- **State**: PUBLISHED
- **Published Date**: June 04, 2020 at 16:49 UTC
- **Last Updated**: August 05, 2024 at 02:53 UTC
- **Reserved Date**: June 04, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Foxit PhantomPDF before 8.3.10. It has mishandling of cloud credentials, as demonstrated by Google Drive.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3640, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3640
- **State**: PUBLISHED
- **Published Date**: August 09, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 18:39 UTC
- **Reserved Date**: July 17, 2006 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 5.01 and 6 allows certain script to persist across navigations between pages, which allows remote attackers to obtain the window location of visited web pages in other domains or zones, aka "Window Location Information Disclosure Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1016663](http://securitytracker.com/id?1016663)
2. [MS06-042](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042)
3. [oval:org.mitre.oval:def:171](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A171)
4. [19339](http://www.securityfocus.com/bid/19339)
5. [21396](http://secunia.com/advisories/21396)
6. [ADV-2006-3212](http://www.vupen.com/english/advisories/2006/3212)
7. [27850](http://www.osvdb.org/27850) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11397, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11397 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11397
- **State**: PUBLISHED
- **Published Date**: May 14, 2019 at 20:18 UTC
- **Last Updated**: August 04, 2024 at 22:55 UTC
- **Reserved Date**: April 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GetFile.aspx in Rapid4 RapidFlows Enterprise Application Builder 4.5M.23 (when used with .NET Framework 4.5) allows Local File Inclusion via the FileDesc parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://rapidflows.com/)
2. [](https://medium.com/%40javarmutt/rapid4-local-file-inclusion-0day-151c830ac74a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6720
- **State**: PUBLISHED
- **Published Date**: January 20, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 16:18 UTC
- **Reserved Date**: January 20, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libmikmod 3.1.9 through 3.2.0, as used by MikMod, SDL-mixer, and possibly other products, relies on the channel count of the last loaded song, rather than the currently playing song, for certain playback calculations, which allows user-assisted attackers to cause a denial of service (application crash) by loading multiple songs (aka MOD files) with different numbers of channels.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [34259](http://secunia.com/advisories/34259)
2. [33235](http://www.securityfocus.com/bid/33235)
3. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=422021)
4. [FEDORA-2009-9095](https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html)
5. [SUSE-SR:2009:006](http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html)
6. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
7. [FEDORA-2009-9112](https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html)
8. [](https://bugzilla.redhat.com/show_bug.cgi?id=479829)
9. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461519)
10. [[oss-security] 20090113 CVE Request -- libmikmod](http://openwall.com/lists/oss-security/2009/01/13/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28633, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28633 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28633
- **State**: PUBLISHED
- **Published Date**: April 05, 2023 at 15:27 UTC
- **Last Updated**: February 10, 2025 at 16:37 UTC
- **Reserved Date**: March 20, 2023 at 12:19 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GLPI is a free asset and IT management software package. Starting in version 0.84 and prior to versions 9.5.13 and 10.0.7, usage of RSS feeds is subject to server-side request forgery (SSRF). In case the remote address is not a valid RSS feed, an RSS autodiscovery feature is triggered. This feature does not check safety or URLs. Versions 9.5.13 and 10.0.7 contain a patch for this issue.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**glpi-project - glpi**
Affected versions:
- >= 0.84, < 9.5.13 (Status: affected)
- >= 10.0.0, < 10.0.7 (Status: affected)
### References
1. [https://github.com/glpi-project/glpi/security/advisories/GHSA-r57v-j88m-rwwf](https://github.com/glpi-project/glpi/security/advisories/GHSA-r57v-j88m-rwwf)
2. [https://github.com/glpi-project/glpi/commit/e2819da64c9075050805a44c834e1f4dc621a982](https://github.com/glpi-project/glpi/commit/e2819da64c9075050805a44c834e1f4dc621a982)
3. [https://github.com/glpi-project/glpi/releases/tag/10.0.7](https://github.com/glpi-project/glpi/releases/tag/10.0.7)
4. [https://github.com/glpi-project/glpi/releases/tag/9.5.13](https://github.com/glpi-project/glpi/releases/tag/9.5.13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11204
- **State**: PUBLISHED
- **Published Date**: February 22, 2021 at 06:25 UTC
- **Last Updated**: August 04, 2024 at 11:28 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Possible memory corruption and information leakage in sub-system due to lack of check for validity and boundary compliance for parameters that are read from shared MSG RAM in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8009, APQ8016, APQ8017, APQ8037, APQ8053, APQ8064AU, APQ8084, APQ8096AU, AQT1000, AR8031, AR8035, AR8151, CSR8811, CSRA6620, CSRA6640, CSRB31024, FSM10055, FSM10056, IPQ5010, IPQ5018, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9640, MDM9645, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8916, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, PM215, PM3003A, PM4125, PM4250, PM439, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM6350, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8004, PM8005, PM8008, PM8009, PM8019, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8937, PM8940, PM8953, PM8996, ...[truncated*] (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1270, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1270 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1270
- **State**: PUBLISHED
- **Published Date**: February 13, 2013 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 14:57 UTC
- **Reserved Date**: January 12, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS13-016](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-016)
2. [TA13-043B](http://www.us-cert.gov/cas/techalerts/TA13-043B.html)
3. [oval:org.mitre.oval:def:16349](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16349) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0743, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0743 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0743
- **State**: PUBLISHED
- **Published Date**: March 06, 2019 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 17:58 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input, aka 'Team Foundation Server Cross-site Scripting Vulnerability'. This CVE ID is unique from CVE-2019-0742.
### Affected Products
**Microsoft - Team Foundation Server 2018**
Affected versions:
- Update 3.2 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0743)
2. [106970](http://www.securityfocus.com/bid/106970) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5352, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5352 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5352
- **State**: PUBLISHED
- **Published Date**: May 26, 2024 at 00:31 UTC
- **Last Updated**: August 01, 2024 at 21:11 UTC
- **Reserved Date**: May 25, 2024 at 05:37 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been rated as critical. Affected by this issue is the function validationRules of the component com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266264.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**anji-plus - AJ-Report**
Affected versions:
- 1.4.0 (Status: affected)
- 1.4.1 (Status: affected)
### References
1. [VDB-266264 | anji-plus AJ-Report validationRules deserialization](https://vuldb.com/?id.266264)
2. [VDB-266264 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.266264)
3. [](https://github.com/anji-plus/report/issues/34)
4. [](https://github.com/anji-plus/report/files/15363269/aj-report.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0232, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0232 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0232
- **State**: PUBLISHED
- **Published Date**: January 05, 2025 at 22:00 UTC
- **Last Updated**: January 06, 2025 at 14:49 UTC
- **Reserved Date**: January 04, 2025 at 19:49 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Codezips Blood Bank Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /successadmin.php. The manipulation of the argument psw leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**Codezips - Blood Bank Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-290228 | Codezips Blood Bank Management System successadmin.php sql injection](https://vuldb.com/?id.290228)
2. [VDB-290228 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.290228)
3. [Submit #474597 | Blood Bank Management System In PHP With Source Code V1.0 SQL Injection](https://vuldb.com/?submit.474597)
4. [](https://github.com/alc9700jmo/CVE/issues/7)
### Credits
- alc9700 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13239, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13239 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13239
- **State**: PUBLISHED
- **Published Date**: May 20, 2020 at 14:57 UTC
- **Last Updated**: August 04, 2024 at 12:11 UTC
- **Reserved Date**: May 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The DMS/ECM module in Dolibarr 11.0.4 renders user-uploaded .html files in the browser when the attachment parameter is removed from the direct download link. This causes XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dubget.com/stored-xss-via-file-upload.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36686, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36686 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36686
- **State**: PUBLISHED
- **Published Date**: August 29, 2022 at 13:56 UTC
- **Last Updated**: August 03, 2024 at 10:14 UTC
- **Reserved Date**: July 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the month parameter at /admin/?page=reports/stockin&month=.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/vul-wiki/blob/master/vendors/oretnom23/ingredients-stock-management-system/SQLi-1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30132
- **State**: PUBLISHED
- **Published Date**: March 18, 2025 at 00:00 UTC
- **Last Updated**: March 21, 2025 at 13:48 UTC
- **Reserved Date**: March 17, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on IROAD Dashcam V devices. It uses an unregistered public domain name as an internal domain, creating a security risk. During analysis, it was found that this domain was not owned by IROAD, allowing an attacker to register it and potentially intercept sensitive device traffic. If the dashcam or related services attempt to resolve this domain over the public Internet instead of locally, it could lead to data exfiltration or man-in-the-middle attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-6-public-domain-used-for-internal-domain-name)
2. [](https://github.com/geo-chen/IROAD-V) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7899, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7899 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7899
- **State**: PUBLISHED
- **Published Date**: June 30, 2017 at 02:35 UTC
- **Last Updated**: August 05, 2024 at 16:19 UTC
- **Reserved Date**: April 18, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An Information Exposure issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. User credentials are sent to the web server using the HTTP GET method, which may result in the credentials being logged. This could make user credentials available for unauthorized retrieval.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**n/a - Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400**
Affected versions:
- Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 (Status: affected)
### References
1. [1038546](http://www.securitytracker.com/id/1038546)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-115-04) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16452, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16452 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16452
- **State**: PUBLISHED
- **Published Date**: December 19, 2019 at 14:46 UTC
- **Last Updated**: August 05, 2024 at 01:17 UTC
- **Reserved Date**: September 19, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions , 2019.021.20056 and earlier, 2017.011.30152 and earlier, 2017.011.30155 and earlier version, 2017.011.30152 and earlier, and 2015.006.30505 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- , 2019.021.20056 and earlier, 2017.011.30152 and earlier, 2017.011.30155 and earlier version, 2017.011.30152 and earlier, and 2015.006.30505 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-55.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4588, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4588
- **State**: PUBLISHED
- **Published Date**: November 19, 2013 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 16:45 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system call, related to the do_ip_vs_set_ctl function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2065-1](http://www.ubuntu.com/usn/USN-2065-1)
2. [](https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb)
3. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=04bcef2a83f40c6db24222b27a52892cba39dffb)
4. [](http://ftp.linux.org.uk/pub/linux/linux-2.6/ChangeLog-2.6.33)
5. [63744](http://www.securityfocus.com/bid/63744)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=1030800)
7. [USN-2064-1](http://www.ubuntu.com/usn/USN-2064-1)
8. [[oss-security] 20131115 Re: CVE request: Linux kernel: net: ipvs stack buffer overflow](http://www.openwall.com/lists/oss-security/2013/11/15/12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21619, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21619
- **State**: PUBLISHED
- **Published Date**: February 24, 2021 at 15:05 UTC
- **Last Updated**: August 03, 2024 at 18:16 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Claim Plugin 2.18.1 and earlier does not escape the user display name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security realm, or directly inside Jenkins.
### Affected Products
**Jenkins project - Jenkins Claim Plugin**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2188%20%281%29)
2. [[oss-security] 20210224 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2021/02/24/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54372, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54372 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54372
- **State**: PUBLISHED
- **Published Date**: December 16, 2024 at 14:14 UTC
- **Last Updated**: December 16, 2024 at 16:39 UTC
- **Reserved Date**: December 02, 2024 at 12:05 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Sourov Amin Insertify allows Code Injection.This issue affects Insertify: from n/a through 1.1.4.
### CVSS Metrics
- **CVSS Base Score**: 9.6/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Sourov Amin - Insertify**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/insertify/vulnerability/wordpress-insertify-plugin-1-1-4-csrf-to-remote-code-execution-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4185, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4185 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4185
- **State**: PUBLISHED
- **Published Date**: August 17, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 18:57 UTC
- **Reserved Date**: August 16, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the NCPENGINE in Novell eDirectory 8.7.3.8 allows local users to cause a denial of service (CPU consumption) via unspecified vectors, as originally demonstrated using a Nessus scan.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973826.htm)
2. [19498](http://www.securityfocus.com/bid/19498)
3. [1016695](http://securitytracker.com/id?1016695)
4. [21496](http://secunia.com/advisories/21496)
5. [28369](http://www.osvdb.org/28369) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3073, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3073 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3073
- **State**: PUBLISHED
- **Published Date**: May 09, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 14:16 UTC
- **Reserved Date**: December 02, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free vulnerability when handling multiple mask properties of display objects, aka memory corruption. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**n/a - Adobe Flash Player 25.0.0.148 and earlier.**
Affected versions:
- Adobe Flash Player 25.0.0.148 and earlier. (Status: affected)
### References
1. [GLSA-201705-12](https://security.gentoo.org/glsa/201705-12)
2. [](https://helpx.adobe.com/security/products/flash-player/apsb17-15.html)
3. [98349](http://www.securityfocus.com/bid/98349)
4. [RHSA-2017:1219](https://access.redhat.com/errata/RHSA-2017:1219)
5. [1038427](http://www.securitytracker.com/id/1038427) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37994, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37994
- **State**: PUBLISHED
- **Published Date**: October 11, 2022 at 00:00 UTC
- **Last Updated**: January 02, 2025 at 21:27 UTC
- **Reserved Date**: August 08, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Group Policy Preference Client Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Group Policy Preference Client Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37994) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7151, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7151 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7151
- **State**: PUBLISHED
- **Published Date**: October 19, 2020 at 17:38 UTC
- **Last Updated**: August 04, 2024 at 09:18 UTC
- **Reserved Date**: January 16, 2020 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A faulttrapgroupselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
### Affected Products
**n/a - HPE Intelligent Management Center (iMC)**
Affected versions:
- Prior to iMC PLAT 7.3 (E0705P07) (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04036en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6113
- **State**: PUBLISHED
- **Published Date**: February 01, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 01:22 UTC
- **Reserved Date**: June 29, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Verse is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
### Affected Products
**IBM Corporation - Domino**
Affected versions:
- 8.5.3.5 (Status: affected)
- 8.5.3.6 (Status: affected)
- 9.0.1 (Status: affected)
- 8.5 (Status: affected)
- 9.0 (Status: affected)
- 8.5.1 (Status: affected)
- 8.5.2 (Status: affected)
- 8.5.3 (Status: affected)
- 9.0.1.1 (Status: affected)
- 8.0.2 (Status: affected)
- 8.0 (Status: affected)
- 8.0.1 (Status: affected)
- 8.5.1.5 (Status: affected)
- 8.5.2.4 (Status: affected)
- 9.0.1.2 (Status: affected)
- 8.5.0.1 (Status: affected)
- 9.0.1.3 (Status: affected)
- 8.5.1.4 (Status: affected)
- 9.0.1.4 (Status: affected)
- 9.0.1.5 (Status: affected)
- 8.5.1.1 (Status: affected)
- 9.0.1.6 (Status: affected)
- 9.0.1.7 (Status: affected)
### References
1. [94603](http://www.securityfocus.com/bid/94603)
2. [1037383](http://www.securitytracker.com/id/1037383)
3. [](http://www.ibm.com/support/docview.wss?uid=swg21992835) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2031, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2031
- **State**: PUBLISHED
- **Published Date**: January 20, 2021 at 14:50 UTC
- **Last Updated**: September 26, 2024 at 18:38 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.22 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2021.html)
2. [](https://security.netapp.com/advisory/ntap-20210219-0003/)
3. [GLSA-202105-27](https://security.gentoo.org/glsa/202105-27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42337, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42337 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42337
- **State**: PUBLISHED
- **Published Date**: November 16, 2021 at 01:40 UTC
- **Last Updated**: September 16, 2024 at 19:51 UTC
- **Reserved Date**: October 12, 2021 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
The permission control of AIFU cashier management salary query function can be bypassed, thus after obtaining general user’s permission, the remote attacker can access account information except passwords by crafting URL parameters.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**AIFU Information Technology Co. - CASH**
Affected versions:
- 0 (Status: unknown)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-5296-cbf80-1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4931, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4931
- **State**: PUBLISHED
- **Published Date**: May 19, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 05:18 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.1 and earlier have an exploitable stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.
### Affected Products
**n/a - Adobe Experience Manager AEM 6.1 and earlier**
Affected versions:
- Adobe Experience Manager AEM 6.1 and earlier (Status: affected)
### References
1. [103709](http://www.securityfocus.com/bid/103709)
2. [](https://helpx.adobe.com/security/products/experience-manager/apsb18-10.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1851, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1851 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1851
- **State**: PUBLISHED
- **Published Date**: May 16, 2019 at 01:20 UTC
- **Last Updated**: November 21, 2024 at 19:24 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the External RESTful Services (ERS) API of the Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to generate arbitrary certificates signed by the Internal Certificate Authority (CA) Services on ISE. This vulnerability is due to an incorrect implementation of role-based access control (RBAC). An attacker could exploit this vulnerability by crafting a specific HTTP request with administrative credentials. A successful exploit could allow the attacker to generate a certificate that is signed and trusted by the ISE CA with arbitrary attributes. The attacker could use this certificate to access other networks or assets that are protected by certificate authentication.
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**Cisco - Cisco Identity Services Engine Software**
Affected versions:
- unspecified (Status: affected)
### References
1. [20190515 Cisco Identity Services Engine Arbitrary Client Certificate Creation Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-ise-certcreation)
2. [108356](http://www.securityfocus.com/bid/108356) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28698, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28698 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28698
- **State**: REJECTED
- **Last Updated**: May 28, 2025 at 18:19 UTC
- **Reserved Date**: April 05, 2022 at 15:12 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34610, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34610 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34610
- **State**: PUBLISHED
- **Published Date**: June 14, 2023 at 00:00 UTC
- **Last Updated**: January 06, 2025 at 19:20 UTC
- **Reserved Date**: June 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered json-io thru 4.14.0 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jdereg/json-io/issues/169) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20898, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20898
- **State**: PUBLISHED
- **Published Date**: August 01, 2019 at 13:55 UTC
- **Last Updated**: August 05, 2024 at 12:12 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 71.9980.37 allows e-mail injection during cPAddons moderation (SEC-396).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/72+Change+Log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26177
- **State**: PUBLISHED
- **Published Date**: December 18, 2020 at 09:26 UTC
- **Last Updated**: August 04, 2024 at 15:49 UTC
- **Reserved Date**: September 30, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In tangro Business Workflow before 1.18.1, a user's profile contains some items that are greyed out and thus are not intended to be edited by regular users. However, this restriction is only applied client-side. Manipulating any of the greyed-out values in requests to /api/profile is not prohibited server-side.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:N/C:N/I:L/PR:L/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.tangro.de/)
2. [](https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28950, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28950 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28950
- **State**: PUBLISHED
- **Published Date**: November 13, 2024 at 21:08 UTC
- **Last Updated**: November 14, 2024 at 19:44 UTC
- **Reserved Date**: April 20, 2024 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncontrolled search path for some Intel(R) oneAPI Math Kernel Library software for Windows before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**n/a - Intel(R) oneAPI Math Kernel Library software for Windows**
Affected versions:
- before version 2024.2 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01155.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01155.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22936, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22936 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22936
- **State**: PUBLISHED
- **Published Date**: August 16, 2021 at 18:38 UTC
- **Last Updated**: August 03, 2024 at 18:58 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A vulnerability in Pulse Connect Secure before 9.1R12 could allow a threat actor to perform a cross-site script attack against an authenticated administrator via an unsanitized web parameter.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - Pulse Connect Secure**
Affected versions:
- Fixed in 9.1R12 (Status: affected)
### References
1. [](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44858/?kA23Z000000L6oySAC) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30199, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30199 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30199
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 06:11 UTC
- **Last Updated**: August 06, 2024 at 16:12 UTC
- **Reserved Date**: March 25, 2024 at 11:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Lab WP-Lister Lite for Amazon allows Reflected XSS.This issue affects WP-Lister Lite for Amazon: from n/a through 2.6.8.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WP Lab - WP-Lister Lite for Amazon**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-lister-for-amazon/wordpress-wp-lister-lite-for-amazon-plugin-2-6-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Yudistira Arya (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0694, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0694 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0694
- **State**: PUBLISHED
- **Published Date**: February 11, 2020 at 21:23 UTC
- **Last Updated**: February 28, 2025 at 20:12 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-0693.
### Affected Products
**Microsoft - Microsoft SharePoint Enterprise Server**
Affected versions:
- 2016 (Status: affected)
**Microsoft - Microsoft SharePoint Server**
Affected versions:
- 2019 (Status: affected)
- 2013 Service Pack 1 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0694) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5688, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5688 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5688
- **State**: PUBLISHED
- **Published Date**: December 19, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 11:04 UTC
- **Reserved Date**: December 19, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MediaWiki 1.8.1, and other versions before 1.13.3, when the wgShowExceptionDetails variable is enabled, sometimes provides the full installation path in a debugging message, which might allow remote attackers to obtain sensitive information via unspecified requests that trigger an uncaught exception.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2008-11802](https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html)
2. [[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update](http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html)
3. [](http://www.mediawiki.org/wiki/Manual:%24wgShowExceptionDetails)
4. [FEDORA-2008-11688](https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html)
5. [33349](http://secunia.com/advisories/33349) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13301, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13301 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13301
- **State**: PUBLISHED
- **Published Date**: July 05, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 09:00 UTC
- **Reserved Date**: July 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In FFmpeg 4.0.1, due to a missing check of a profile value before setting it, the ff_mpeg4_decode_picture_header function in libavcodec/mpeg4videodec.c may trigger a NULL pointer dereference while converting a crafted AVI file to MPEG4, leading to a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/FFmpeg/FFmpeg/commit/2aa9047486dbff12d9e040f917e5f799ed2fd78b)
2. [104675](http://www.securityfocus.com/bid/104675) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1443, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1443 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1443
- **State**: PUBLISHED
- **Published Date**: September 01, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:26 UTC
- **Reserved Date**: February 05, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Google toolbar 1.1.58 and earlier allows remote web sites to monitor a user's input into the toolbar via an "onkeydown" event handler.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020808 Exploiting the Google toolbar (GM#001-MC)](http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0066.html)
2. [20020808 Exploiting the Google toolbar (GM#001-MC)](http://online.securityfocus.com/archive/1/286527)
3. [](http://sec.greymagic.com/adv/gm001-mc/)
4. [google-toolbar-keypress-monitoring(10054)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10054)
5. [](http://toolbar.google.com/whatsnew.php3)
6. [5426](http://www.securityfocus.com/bid/5426) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-5010, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-5010 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-5010
- **State**: PUBLISHED
- **Published Date**: October 19, 2010 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 16:59 UTC
- **Reserved Date**: October 19, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Race condition in the FTPHandler class in ftpserver.py in pyftpdlib before 0.5.1 allows remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, a different vulnerability than CVE-2010-3494.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20100910 Re: CVE Request -- Python -- accept() implementation in async core is broken => more subcases](http://www.openwall.com/lists/oss-security/2010/09/11/2)
2. [](http://code.google.com/p/pyftpdlib/issues/detail?id=91)
3. [](http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY)
4. [](https://bugs.launchpad.net/zodb/+bug/135108)
5. [](http://code.google.com/p/pyftpdlib/source/detail?r=439)
6. [[oss-security] 20100924 Re: CVE Request -- Python -- accept() implementation in async core is broken => more subcases](http://www.openwall.com/lists/oss-security/2010/09/24/3)
7. [[oss-security] 20100922 Re: CVE Request -- Python -- accept() implementation in async core is broken => more subcases](http://www.openwall.com/lists/oss-security/2010/09/22/3)
8. [](http://bugs.python.org/issue6706)
9. [[oss-security] 20100909 CVE Request -- Python -- accept() implementation in async core is broken => more subcases](http://www.openwall.com/lists/oss-security/2010/09/09/6)
10. [](http://code.google.com/p/pyftpdlib/source/diff?spec=svn439&r=439&format=side&path=/trunk/pyftpdlib/ftpserver.py) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29921, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29921 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29921
- **State**: PUBLISHED
- **Published Date**: April 19, 2023 at 00:00 UTC
- **Last Updated**: February 05, 2025 at 15:20 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create app interface.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/PowerJob/PowerJob/issues/586) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000523, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000523 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000523
- **State**: PUBLISHED
- **Published Date**: June 26, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 12:40 UTC
- **Reserved Date**: May 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
topydo contains a CWE-20: Improper Input Validation vulnerability in ListFormatParser::parse, file topydo/lib/ListFormat.py line 292 as of d4f843dac71308b2f29a7c2cdc76f055c3841523 that can result in Injection of arbitrary bytes to the terminal, including terminal escape code sequences. This attack appear to be exploitable via The victim must open a todo.txt with at least one specially crafted line..
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/bram85/topydo/issues/240)
2. [](https://github.com/bram85/topydo/blob/master/topydo/lib/ListFormat.py#L292) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35661, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35661 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35661
- **State**: PUBLISHED
- **Published Date**: June 09, 2024 at 18:33 UTC
- **Last Updated**: August 02, 2024 at 03:14 UTC
- **Reserved Date**: May 17, 2024 at 10:08 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in SoftLab Upload Fields for WPForms.This issue affects Upload Fields for WPForms: from n/a through 1.0.2.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**SoftLab - Upload Fields for WPForms**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/upload-fields-for-wpforms/wordpress-upload-fields-for-wpforms-plugin-1-0-2-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Majed Refaea (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2952, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2952 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2952
- **State**: PUBLISHED
- **Published Date**: June 12, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 18:06 UTC
- **Reserved Date**: June 12, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in Net Portal Dynamic System (NPDS) 5.10 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) sequence and trailing null (%00) byte in the (1) Default_Theme parameter to header.php or (2) ModPath parameter to modules/cluster-paradise/cluster-E.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20523](http://secunia.com/advisories/20523)
2. [1076](http://securityreason.com/securityalert/1076)
3. [18383](http://www.securityfocus.com/bid/18383)
4. [26291](http://www.osvdb.org/26291)
5. [npds-header-clustere-file-include(27121)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27121)
6. [20060608 NPDS <= 5.10 Local Inclusion, XSS, Full path disclosure](http://www.securityfocus.com/archive/1/436442/100/0/threaded)
7. [ADV-2006-2233](http://www.vupen.com/english/advisories/2006/2233)
8. [](http://www.acid-root.new.fr/advisories/npds510.txt)
9. [26290](http://www.osvdb.org/26290) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47135
- **State**: PUBLISHED
- **Published Date**: March 15, 2024 at 20:14 UTC
- **Last Updated**: May 04, 2025 at 07:04 UTC
- **Reserved Date**: March 04, 2024 at 18:12 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report
Fix possible array out of bound access in mt7921_mcu_tx_rate_report.
Remove unnecessary varibable in mt7921_mcu_tx_rate_report
### Affected Products
**Linux - Linux**
Affected versions:
- 1c099ab44727c8e42fe4de4d91b53cec3ef02860 (Status: affected)
- 1c099ab44727c8e42fe4de4d91b53cec3ef02860 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.12 (Status: affected)
- 0 (Status: unaffected)
- 5.12.10 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/6919e8a24e70b6ba148fe07f44f835bcdd1a8d02)
2. [](https://git.kernel.org/stable/c/d874e6c06952382897d35bf4094193cd44ae91bd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3311, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3311 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3311
- **State**: PUBLISHED
- **Published Date**: August 09, 2016 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The kernel-mode drivers in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-3308, CVE-2016-3309, and CVE-2016-3310.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS16-098](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-098)
2. [92299](http://www.securityfocus.com/bid/92299)
3. [1036572](http://www.securitytracker.com/id/1036572) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6271, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6271 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6271
- **State**: PUBLISHED
- **Published Date**: September 22, 2017 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 23:01 UTC
- **Reserved Date**: February 23, 2017 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer handler for DxgkDdiCreateAllocation where untrusted user input is used as a divisor without validation while processing block linear information which may lead to a potential divide by zero and denial of service.
### Affected Products
**Nvidia Corporation - GPU Display Driver**
Affected versions:
- All (Status: affected)
### References
1. [101001](http://www.securityfocus.com/bid/101001)
2. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4544) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3589, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3589 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3589
- **State**: PUBLISHED
- **Published Date**: April 24, 2017 at 19:00 UTC
- **Last Updated**: October 07, 2024 at 16:10 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data. CVSS 3.0 Base Score 3.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
### Affected Products
**Oracle Corporation - MySQL Connectors**
Affected versions:
- 5.1.41 and earlier (Status: affected)
### References
1. [97836](http://www.securityfocus.com/bid/97836)
2. [1038287](http://www.securitytracker.com/id/1038287)
3. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html)
4. [DSA-3857](http://www.debian.org/security/2017/dsa-3857) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31412, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31412 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31412
- **State**: PUBLISHED
- **Published Date**: August 24, 2023 at 18:15 UTC
- **Last Updated**: December 09, 2024 at 14:12 UTC
- **Reserved Date**: April 27, 2023 at 18:35 UTC
- **Assigned By**: SICK AG
### Vulnerability Description
The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**SICK AG - LMS5xx**
Affected versions:
- all firmware versions (Status: affected)
### References
1. [](https://sick.com/psirt)
2. [](https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf)
3. [](https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12942, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12942
- **State**: PUBLISHED
- **Published Date**: September 10, 2019 at 20:48 UTC
- **Last Updated**: August 04, 2024 at 23:32 UTC
- **Reserved Date**: June 24, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TTLock devices do not properly block guest access in certain situations where the network connection to the cloud is unavailable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.kth.se/polopoly_fs/1.923565.1568098364%21/Vulnerability_Report_TTLock_State_Consistency.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0898, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0898
- **State**: PUBLISHED
- **Published Date**: February 23, 2013 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 14:41 UTC
- **Reserved Date**: January 07, 2013 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use-after-free vulnerability in Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2013/02/stable-channel-update_21.html)
2. [](https://code.google.com/p/chromium/issues/detail?id=164643)
3. [openSUSE-SU-2013:0454](http://lists.opensuse.org/opensuse-updates/2013-03/msg00045.html)
4. [oval:org.mitre.oval:def:16569](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16569) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16103, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16103 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16103
- **State**: REJECTED
- **Published Date**: February 11, 2019 at 19:00 UTC
- **Last Updated**: February 11, 2019 at 18:57 UTC
- **Reserved Date**: August 29, 2018 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5496, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5496 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5496
- **State**: PUBLISHED
- **Published Date**: January 03, 2020 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 08:30 UTC
- **Reserved Date**: January 03, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FontForge 20190801 has a heap-based buffer overflow in the Type2NotDefSplines() function in splinesave.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/fontforge/fontforge/issues/4085)
2. [openSUSE-SU-2020:0089](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00041.html)
3. [GLSA-202004-14](https://security.gentoo.org/glsa/202004-14)
4. [[debian-lts-announce] 20240307 [SECURITY] [DLA 3754-1] fontforge security update](https://lists.debian.org/debian-lts-announce/2024/03/msg00007.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48963, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48963 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48963
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 20:05 UTC
- **Last Updated**: May 04, 2025 at 08:27 UTC
- **Reserved Date**: August 22, 2024 at 01:27 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: wwan: iosm: fix memory leak in ipc_mux_init()
When failed to alloc ipc_mux->ul_adb.pp_qlt in ipc_mux_init(), ipc_mux
is not released.
### Affected Products
**Linux - Linux**
Affected versions:
- 1f52d7b622854b8bd7a1be3de095ca2e1f77098e (Status: affected)
- 1f52d7b622854b8bd7a1be3de095ca2e1f77098e (Status: affected)
**Linux - Linux**
Affected versions:
- 5.18 (Status: affected)
- 0 (Status: unaffected)
- 6.0.13 (Status: unaffected)
- 6.1 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/e21478d0054f63eec7ce833296cf9788764a0ec7)
2. [](https://git.kernel.org/stable/c/23353efc26e98b61b925274ecbb8f0610f69a8aa) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6987, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6987 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6987
- **State**: PUBLISHED
- **Published Date**: August 08, 2024 at 04:11 UTC
- **Last Updated**: August 08, 2024 at 13:11 UTC
- **Reserved Date**: July 22, 2024 at 23:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Orchid Store theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'orchid_store_activate_plugin' function in all versions up to, and including, 1.5.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to activate the Addonify Floating Cart For WooCommerce plugin if it is installed.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**themebeez - Orchid Store**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5402f206-0375-4c47-8a5c-e8ea5742493d?source=cve)
2. [](https://themes.trac.wordpress.org/browser/orchid-store/1.5.6/functions.php#L300)
3. [](https://themes.trac.wordpress.org/changeset/237704/)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29313, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29313 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29313
- **State**: PUBLISHED
- **Published Date**: March 24, 2025 at 00:00 UTC
- **Last Updated**: March 25, 2025 at 17:36 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Use of incorrectly resolved name or reference in OpenDaylight Service Function Chaining (SFC) Subproject SFC Sodium-SR4 and below allows attackers to cause a Denial of Service (DoS).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.csdn.net/weixin_43959580/article/details/146018191) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30463, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30463 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30463
- **State**: PUBLISHED
- **Published Date**: March 29, 2024 at 16:22 UTC
- **Last Updated**: August 02, 2024 at 01:32 UTC
- **Reserved Date**: March 27, 2024 at 07:10 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in realmag777 BEAR.This issue affects BEAR: from n/a through 1.1.4.3.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**realmag777 - BEAR**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/woo-bulk-editor/wordpress-bear-plugin-1-1-4-3-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Dhabaleshwar Das (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0212, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0212 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0212
- **State**: PUBLISHED
- **Published Date**: February 08, 2009 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 04:24 UTC
- **Reserved Date**: January 20, 2009 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Unspecified vulnerability in the WebFGServer application in AREVA e-terrahabitat 5.7 and earlier allows remote attackers to cause a denial of service (system crash) via unknown vectors, aka PD32020.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20090205 C4 SCADA Security Advisory - AREVA e-terrahabitat / e-terraplatform Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/500689/100/0/threaded)
2. [33837](http://secunia.com/advisories/33837)
3. [33637](http://www.securityfocus.com/bid/33637)
4. [VU#337569](http://www.kb.cert.org/vuls/id/337569)
5. [](http://www.scada-security.com/vulnerabilities/areva1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38438, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38438 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38438
- **State**: PUBLISHED
- **Published Date**: October 18, 2021 at 12:39 UTC
- **Last Updated**: September 16, 2024 at 20:58 UTC
- **Reserved Date**: August 10, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
A use after free vulnerability in FATEK Automation WinProladder versions 3.30 and prior may be exploited when a valid user opens a malformed project file, which may allow arbitrary code execution.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**FATEK Automation - WinProladder**
Affected versions:
- All (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06)
### Credits
- xina1i and Natnael Samson (@NattiSamson), working with Trend Micro’s Zero Day Initiative, reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5372, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5372 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5372
- **State**: PUBLISHED
- **Published Date**: December 08, 2008 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 23:05 UTC
- **Reserved Date**: December 08, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
sdm-login in sdm-terminal 0.4.0b allows local users to overwrite arbitrary files via a symlink attack on the /tmp/sdm.autologin.once temporary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[debian-devel] 20080811 Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages](http://lists.debian.org/debian-devel/2008/08/msg00283.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2284, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2284 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2284
- **State**: PUBLISHED
- **Published Date**: September 30, 2019 at 15:40 UTC
- **Last Updated**: August 04, 2024 at 18:42 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Possible use-after-free issue due to a race condition while calling camera ioctl concurrently in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MSM8909W, QCS405, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 845 / SD 850, SD 855, SDM439, SDX24
### Affected Products
**Qualcomm, Inc. - Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- MSM8909W, QCS405, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 845 / SD 850, SD 855, SDM439, SDX24 (Status: affected)
### References
1. [](https://www.codeaurora.org/security-bulletin/2019/08/05/august-2019-code-aurora-security-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26426, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26426 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26426
- **State**: PUBLISHED
- **Published Date**: August 12, 2021 at 18:11 UTC
- **Last Updated**: November 18, 2024 at 21:46 UTC
- **Reserved Date**: January 29, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows User Account Profile Picture Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26426) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7695, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7695 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7695
- **State**: PUBLISHED
- **Published Date**: January 29, 2025 at 07:42 UTC
- **Last Updated**: February 22, 2025 at 14:48 UTC
- **Reserved Date**: August 12, 2024 at 03:06 UTC
- **Assigned By**: Moxa
### Vulnerability Description
Multiple switches are affected by an out-of-bounds write vulnerability. This vulnerability is caused by insufficient input validation, which allows data to be written to memory outside the bounds of the buffer. Successful exploitation of this vulnerability could result in a denial-of-service attack.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Moxa - PT-7728 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - PT-7828 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - PT-G503 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - PT-G510 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - PT-G7728 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - PT-G7828 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-608 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-611 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-616 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-619 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-405A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-408A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-505A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-508A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-510A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-516A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-518A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-G509 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-P510 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-P510A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-510E Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-518E Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-528E Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-G508E Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-G512E Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-G516E Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDS-P506E Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - ICS-G7526A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - ICS-G7528A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - ICS-G7748A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - ICS-G7750A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - ICS-G7752A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - ICS-G7826A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - ICS-G7828A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - ICS-G7848A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - ICS-G7850A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - ICS-G7852A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - IKS-G6524A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - IKS-6726A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - IKS-6728A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - IKS-G6824A Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - SDS-3006 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - SDS-3008 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - SDS-3010 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - SDS-3016 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - SDS-G3006 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - SDS-G3008 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - SDS-G3010 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - SDS-G3016 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - TN-G4500 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - TN-G6500 Series**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240162-cve-2024-7695-out-of-bounds-write-vulnerability-identified-in-multiple-pt-switches)
2. [](https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240163-cve-2024-7695-out-of-bounds-write-vulnerability-in-multiple-eds,-ics,-iks,-and-sds-switches)
3. [](https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240164-cve-2024-7695-out-of-bounds-write-vulnerability-identified-in-en-50155-switches) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49671, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49671
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:24 UTC
- **Last Updated**: May 04, 2025 at 08:42 UTC
- **Reserved Date**: February 26, 2025 at 02:21 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
RDMA/cm: Fix memory leak in ib_cm_insert_listen
cm_alloc_id_priv() allocates resource for the cm_id_priv. When
cm_init_listen() fails it doesn't free it, leading to memory leak.
Add the missing error unwind.
### Affected Products
**Linux - Linux**
Affected versions:
- 98f67156a80f37db70ec64787020b1f9bc8aea8c (Status: affected)
- 98f67156a80f37db70ec64787020b1f9bc8aea8c (Status: affected)
- 98f67156a80f37db70ec64787020b1f9bc8aea8c (Status: affected)
- 98f67156a80f37db70ec64787020b1f9bc8aea8c (Status: affected)
**Linux - Linux**
Affected versions:
- 5.7 (Status: affected)
- 0 (Status: unaffected)
- 5.10.129 (Status: unaffected)
- 5.15.53 (Status: unaffected)
- 5.18.10 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/b0cab8b517aeaf2592c3479294f934209c41a26f)
2. [](https://git.kernel.org/stable/c/889000874c1204e47c7f2a4945db262a47e7efc9)
3. [](https://git.kernel.org/stable/c/2febf09a8a8ae4accf908f043f1bab1421056568)
4. [](https://git.kernel.org/stable/c/2990f223ffa7bb25422956b9f79f9176a5b38346) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14006
- **State**: PUBLISHED
- **Published Date**: June 24, 2020 at 13:27 UTC
- **Last Updated**: August 04, 2024 at 12:32 UTC
- **Reserved Date**: June 10, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Solarwinds Orion (with Web Console WPM 2019.4.1, and Orion Platform HF4 or NPM HF2 2019.4) allows XSS via a Responsible Team.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/alert3/f8d33412ab0c671d3cac6a50b132a894) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0833
- **State**: PUBLISHED
- **Published Date**: October 01, 2003 at 04:00 UTC
- **Last Updated**: September 17, 2024 at 03:59 UTC
- **Reserved Date**: September 26, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in webfs before 1.20 allows attackers to execute arbitrary code by creating directories that result in a long pathname.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-392](http://www.debian.org/security/2003/dsa-392) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14195
- **State**: PUBLISHED
- **Published Date**: July 31, 2019 at 12:23 UTC
- **Last Updated**: August 05, 2024 at 00:12 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with unvalidated length at nfs_readlink_reply in the "else" block after calculating the new path length.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/u-boot/u-boot)
2. [](https://blog.semmle.com/uboot-rce-nfs-vulnerability/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3522, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3522 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3522
- **State**: PUBLISHED
- **Published Date**: July 03, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:21 UTC
- **Reserved Date**: July 03, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in sPHPell 1.01 allow remote attackers to execute arbitrary PHP code via a URL in the SpellIncPath parameter to (1) spellcheckpageinc.php, (2) spellchecktext.php, (3) spellcheckwindow.php, or (4) spellcheckwindowframeset.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24727](http://www.securityfocus.com/bid/24727)
2. [ADV-2007-2408](http://www.vupen.com/english/advisories/2007/2408)
3. [sphpell-spellincpath-file-include(35194)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35194)
4. [38966](http://osvdb.org/38966)
5. [38967](http://osvdb.org/38967)
6. [4132](https://www.exploit-db.com/exploits/4132)
7. [38964](http://osvdb.org/38964)
8. [38965](http://osvdb.org/38965) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50101
- **State**: PUBLISHED
- **Published Date**: December 14, 2023 at 00:00 UTC
- **Last Updated**: November 26, 2024 at 15:07 UTC
- **Reserved Date**: December 04, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) via Label management editing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Jarvis-616/cms/blob/master/Label%20management%20editing%20with%20stored%20XSS.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6442
- **State**: PUBLISHED
- **Published Date**: December 10, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 20:26 UTC
- **Reserved Date**: December 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the SetClientInfo function in the CDDBControlAOL.CDDBAOLControl ActiveX control (cddbcontrol.dll), as used in America Online (AOL) 7.0 4114.563, 8.0 4129.230, and 9.0 Security Edition 4156.910, and possibly other products, allows remote attackers to execute arbitrary code via a long ClientId argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-4904](http://www.vupen.com/english/advisories/2006/4904)
2. [21488](http://www.securityfocus.com/bid/21488)
3. [20061211 Secunia Research: AOL CDDBControl ActiveX Control"SetClientInfo()" Buffer Overflow](http://www.securityfocus.com/archive/1/454105/100/0/threaded)
4. [1017357](http://securitytracker.com/id?1017357)
5. [23043](http://secunia.com/advisories/23043)
6. [aol-cddbcontrol-bo(30790)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30790)
7. [20061211 Secunia Research: AOL CDDBControl ActiveX Control "SetClientInfo()" Buffer Overflow](http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051230.html)
8. [](http://secunia.com/secunia_research/2006-69/advisory/)
9. [20061211 GraceNote CDDBControl (CVE-2006-3134) = CDDBAOLControl (CVE-2006-6442)](http://attrition.org/pipermail/vim/2006-December/001173.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-21270, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-21270 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-21270
- **State**: PUBLISHED
- **Published Date**: December 03, 2020 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 12:26 UTC
- **Reserved Date**: December 03, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://hackerone.com/reports/321670)
2. [](https://www.npmjs.com/advisories/664)
3. [](https://github.com/mhart/StringStream/issues/7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1112, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1112 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1112
- **State**: PUBLISHED
- **Published Date**: September 06, 2012 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 18:45 UTC
- **Reserved Date**: February 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Directory traversal vulnerability in Open-Realty CMS 2.5.8 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the select_users_template parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://yehg.net/lab/pr0js/advisories/%5Bopen-realty_2.5.8_2.x%5D_lfi)
2. [52296](http://www.securityfocus.com/bid/52296)
3. [[oss-security] 20120305 Re: Open-Realty CMS 2.5.8 (2.x.x) <= "select_users_template" Local File Inclusion Vulnerability](http://www.openwall.com/lists/oss-security/2012/03/05/23)
4. [20120305 Open-Realty CMS 2.5.8 (2.x.x) <= "select_users_template" Local File Inclusion Vulnerability](http://archives.neohapsis.com/archives/bugtraq/2012-03/0012.html)
5. [openrealty-selectuserstemplate-file-include(73736)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73736)
6. [[oss-security] 20120306 Open-Realty CMS 2.5.8 (2.x.x) <= "select_users_template" Local File Inclusion Vulnerability](http://www.openwall.com/lists/oss-security/2012/03/05/14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0421
- **State**: PUBLISHED
- **Published Date**: October 05, 2018 at 14:00 UTC
- **Last Updated**: November 26, 2024 at 14:45 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in TCP connection management in Cisco Prime Access Registrar could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition when the application unexpectedly restarts. The vulnerability is due to incorrect handling of incoming TCP SYN packets to specific listening ports. The improper handling of the TCP SYN packets could cause a system file description to be allocated and not freed. An attacker could exploit this vulnerability by sending a crafted stream of TCP SYN packets to the application. A successful exploit could allow the attacker to cause the application to eventually restart if a file description cannot be obtained.
### Weakness Classification (CWE)
- CWE-399: Security Weakness
### Affected Products
**Cisco - Cisco Prime Access Registrar**
Affected versions:
- n/a (Status: affected)
### References
1. [20180905 Cisco Prime Access Registrar Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cpar-dos)
2. [1041684](http://www.securitytracker.com/id/1041684)
3. [105282](http://www.securityfocus.com/bid/105282) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5030, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5030 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5030
- **State**: PUBLISHED
- **Published Date**: May 21, 2025 at 16:31 UTC
- **Last Updated**: May 21, 2025 at 19:51 UTC
- **Reserved Date**: May 21, 2025 at 10:58 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Ackites KillWxapkg up to 2.4.1. It has been declared as critical. This vulnerability affects the function processFile of the file internal/unpack/unpack.go of the component wxapkg File Parser. The manipulation leads to os command injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
- CWE-77: Security Weakness
### Affected Products
**Ackites - KillWxapkg**
Affected versions:
- 2.4.0 (Status: affected)
- 2.4.1 (Status: affected)
### References
1. [VDB-309850 | Ackites KillWxapkg wxapkg File Parser unpack.go processFile os command injection](https://vuldb.com/?id.309850)
2. [VDB-309850 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309850)
3. [Submit #580526 | KillWxapkg v2.4.1 OS Command Injection](https://vuldb.com/?submit.580526)
4. [](https://github.com/Ackites/KillWxapkg/issues/85)
5. [](https://github.com/Ackites/KillWxapkg/issues/85#issue-3052039180)
### Credits
- zznQ (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5541, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5541 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5541
- **State**: PUBLISHED
- **Published Date**: November 20, 2019 at 15:11 UTC
- **Last Updated**: August 04, 2024 at 20:01 UTC
- **Reserved Date**: January 07, 2019 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an out-of-bounds write vulnerability in the e1000e virtual network adapter. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition on their own VM.
### Affected Products
**VMware - Workstation and Fusion**
Affected versions:
- Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2019-0021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0150, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0150 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0150
- **State**: PUBLISHED
- **Published Date**: January 28, 2025 at 03:26 UTC
- **Last Updated**: January 28, 2025 at 15:21 UTC
- **Reserved Date**: December 02, 2023 at 00:43 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA GPU display driver for Windows and Linux contains a vulnerability where data is written past the end or before the beginning of a buffer. A successful exploit of this vulnerability might lead to information disclosure, denial of service, or data tampering.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**NVIDIA - NVIDIA GPU Display Driver, vGPU software**
Affected versions:
- R535, R550, R560, R565 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5614) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1387, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1387 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1387
- **State**: PUBLISHED
- **Published Date**: March 26, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 17:12 UTC
- **Reserved Date**: March 24, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TWiki 4.0, 4.0.1, and 20010901 through 20040904 allows remote authenticated users with edit rights to cause a denial of service (infinite recursion leading to CPU and memory consumption) via INCLUDE by URL statements that form a loop, such as a page that includes itself.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19410](http://secunia.com/advisories/19410)
2. [twiki-include-edit-dos(25445)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25445)
3. [](http://twiki.org/cgi-bin/view/Codev/SecurityAdvisoryDosAttackWithInclude)
4. [ADV-2006-1116](http://www.vupen.com/english/advisories/2006/1116)
5. [17267](http://www.securityfocus.com/bid/17267) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13650
- **State**: PUBLISHED
- **Published Date**: October 24, 2019 at 14:55 UTC
- **Last Updated**: August 04, 2024 at 23:57 UTC
- **Reserved Date**: July 18, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow internalPort OS Command Injection (issue 2 of 5).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pastebin.com/yAxBFe05) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21788, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21788 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21788
- **State**: PUBLISHED
- **Published Date**: May 16, 2024 at 20:47 UTC
- **Last Updated**: August 29, 2024 at 20:27 UTC
- **Reserved Date**: January 13, 2024 at 04:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncontrolled search path in some Intel(R) GPA software before version 2023.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**n/a - Intel(R) GPA software**
Affected versions:
- before version 2023.4 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01067.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01067.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21840, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21840
- **State**: PUBLISHED
- **Published Date**: January 11, 2022 at 20:22 UTC
- **Last Updated**: January 02, 2025 at 18:22 UTC
- **Reserved Date**: December 14, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Office Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft SharePoint Enterprise Server 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Enterprise Server 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Server 2019**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019 for Mac**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office Online Server**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC for Mac 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft SharePoint Server Subscription Edition**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - SharePoint Server Subscription Edition Language Pack**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Excel 2016**
Affected versions:
- 16.0.0.0 (Status: affected)
**Microsoft - Microsoft Office 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Excel 2013 Service Pack 1**
Affected versions:
- 15.0.0.0 (Status: affected)
**Microsoft - Microsoft Office 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft Office Web Apps Server 2013 Service Pack 1**
Affected versions:
- 15.0.1 (Status: affected)
**Microsoft - Microsoft SharePoint Foundation 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
### References
1. [Microsoft Office Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21840) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8560, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8560 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8560
- **State**: PUBLISHED
- **Published Date**: September 07, 2024 at 18:00 UTC
- **Last Updated**: September 09, 2024 at 18:21 UTC
- **Reserved Date**: September 06, 2024 at 21:32 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in SourceCodester Simple Invoice Generator System 1.0. Affected is an unknown function of the file /save_invoice.php. The manipulation of the argument invoice_code/customer/cashier/total_amount/discount_percentage/discount_amount/tendered_amount leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Simple Invoice Generator System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-276780 | SourceCodester Simple Invoice Generator System save_invoice.php sql injection](https://vuldb.com/?id.276780)
2. [VDB-276780 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.276780)
3. [Submit #403629 | SourceCodester Simple Invoice Generator System 1.0 SQL Injection](https://vuldb.com/?submit.403629)
4. [](https://www.sourcecodester.com/)
### Credits
- Delvy (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8011, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8011
- **State**: PUBLISHED
- **Published Date**: July 18, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 22:30 UTC
- **Reserved Date**: March 09, 2018 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server. Fixed in Apache HTTP Server 2.4.34 (Affected 2.4.33).
### Affected Products
**Apache Software Foundation - Apache HTTP Server**
Affected versions:
- Fixed in Apache HTTP Server 2.4.34 (Affected 2.4.33) (Status: affected)
### References
1. [1041401](http://www.securitytracker.com/id/1041401)
2. [](https://security.netapp.com/advisory/ntap-20180926-0007/)
3. [](https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-8011)
4. [[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E)
5. [[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E)
6. [[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E)
7. [[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E)
8. [[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E)
9. [[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/](https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E)
10. [[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E)
11. [[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E)
12. [[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/](https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E)
13. [[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E)
14. [[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E)
15. [[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E)
### Credits
- The issue was discovered by Daniel Caminada <daniel.caminada@ergon.ch>. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46584, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46584 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46584
- **State**: PUBLISHED
- **Published Date**: December 30, 2022 at 00:00 UTC
- **Last Updated**: April 11, 2025 at 15:10 UTC
- **Reserved Date**: December 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the qcawifi.wifi%d_vap%d.maclist parameter in the kick_ban_wifi_mac_deny (sub_415D7C) function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://brief-nymphea-813.notion.site/Vul4-TEW755-bof-kick_ban_wifi_mac_deny-a6801904571848d9a313c35b081e0793) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0866
- **State**: PUBLISHED
- **Published Date**: October 18, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:37 UTC
- **Reserved Date**: October 18, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Interbase 6 SuperServer for Linux allows an attacker to cause a denial of service via a query containing 0 bytes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20000907 SEGFAULTING Interbase 6 SS Linux](http://archives.neohapsis.com/archives/bugtraq/2000-09/0027.html)
2. [1654](http://www.securityfocus.com/bid/1654)
3. [interbase-query-dos(5205)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5205) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8689, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8689 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8689
- **State**: PUBLISHED
- **Published Date**: December 18, 2019 at 17:33 UTC
- **Last Updated**: August 04, 2024 at 21:24 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows (Microsoft Store)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT210353)
2. [](https://support.apple.com/HT210346)
3. [](https://support.apple.com/HT210348)
4. [](https://support.apple.com/HT210351)
5. [](https://support.apple.com/HT210355)
6. [](https://support.apple.com/HT210356)
7. [](https://support.apple.com/HT210357)
8. [](https://support.apple.com/HT210358) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10803, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10803 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10803
- **State**: PUBLISHED
- **Published Date**: July 04, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 17:50 UTC
- **Reserved Date**: July 03, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Odoo 8.0, Odoo Community Edition 9.0 and 10.0, and Odoo Enterprise Edition 9.0 and 10.0, insecure handling of anonymization data in the Database Anonymization module allows remote authenticated privileged users to execute arbitrary Python code, because unpickle is used.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/odoo/odoo/issues/17898) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41241
- **State**: PUBLISHED
- **Published Date**: September 21, 2022 at 15:46 UTC
- **Last Updated**: May 28, 2025 at 14:51 UTC
- **Reserved Date**: September 21, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins RQM Plugin 2.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
### Affected Products
**Jenkins project - Jenkins RQM Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 2.8 (Status: unknown)
### References
1. [](https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2805) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4027, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4027 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4027
- **State**: PUBLISHED
- **Published Date**: October 28, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 03:34 UTC
- **Reserved Date**: October 21, 2010 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in the camera application in HP Palm webOS 1.4.1 allows local users to overwrite arbitrary files via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT100269](http://marc.info/?l=bugtraq&m=128820226417721&w=2)
2. [1024658](http://www.securitytracker.com/id?1024658)
3. [HPSBMI02582](http://marc.info/?l=bugtraq&m=128820226417721&w=2)
4. [42023](http://secunia.com/advisories/42023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1147, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1147
- **State**: PUBLISHED
- **Published Date**: March 15, 2011 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 22:14 UTC
- **Reserved Date**: March 03, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl.c in Asterisk Open Source 1.4.x before 1.4.39.2, 1.6.1.x before 1.6.1.22, 1.6.2.x before 1.6.2.16.2, and 1.8 before 1.8.2.4; Business Edition C.x.x before C.3.6.3; AsteriskNOW 1.5; and s800i (Asterisk Appliance), when T.38 support is enabled, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDPTL packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43702](http://secunia.com/advisories/43702)
2. [46474](http://www.securityfocus.com/bid/46474)
3. [DSA-2225](http://www.debian.org/security/2011/dsa-2225)
4. [43429](http://secunia.com/advisories/43429)
5. [FEDORA-2011-2438](http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055421.html)
6. [ADV-2011-0635](http://www.vupen.com/english/advisories/2011/0635)
7. [[oss-security] 20110311 CVE Request -- Asterisk AST-2011-002 / Multiple array overflow and crash vulnerabilities in UDPTL code](http://www.openwall.com/lists/oss-security/2011/03/11/2)
8. [FEDORA-2011-2360](http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055030.html)
9. [FEDORA-2011-2558](http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055634.html)
10. [1025101](http://www.securitytracker.com/id?1025101)
11. [[oss-security] 20110311 Re: CVE Request -- Asterisk AST-2011-002 / Multiple array overflow and crash vulnerabilities in UDPTL code](http://www.openwall.com/lists/oss-security/2011/03/11/8)
12. [](http://downloads.asterisk.org/pub/security/AST-2011-002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25001
- **State**: PUBLISHED
- **Published Date**: June 27, 2023 at 00:00 UTC
- **Last Updated**: December 05, 2024 at 14:15 UTC
- **Reserved Date**: February 01, 2023 at 00:00 UTC
- **Assigned By**: autodesk
### Vulnerability Description
A maliciously crafted SKP file in Autodesk Navisworks 2023 and 2022 be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.
### Affected Products
**n/a - Navisworks**
Affected versions:
- 2023, 2022 (Status: affected)
### References
1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0002) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39089, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39089 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39089
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 01:21 UTC
- **Last Updated**: January 28, 2025 at 17:08 UTC
- **Reserved Date**: September 01, 2022 at 06:09 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In mlog service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9184, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9184 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9184
- **State**: PUBLISHED
- **Published Date**: May 23, 2017 at 03:56 UTC
- **Last Updated**: September 16, 2024 at 19:00 UTC
- **Reserved Date**: May 22, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libautotrace.a in AutoTrace 0.31.1 has a "cannot be represented in type int" issue in input-bmp.c:314:7.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2306, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2306 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2306
- **State**: PUBLISHED
- **Published Date**: October 05, 2023 at 16:46 UTC
- **Last Updated**: January 16, 2025 at 21:29 UTC
- **Reserved Date**: April 26, 2023 at 15:22 UTC
- **Assigned By**: icscert
### Vulnerability Description
Qognify NiceVision versions 3.1 and prior are vulnerable to exposing sensitive information using hard-coded credentials. With these credentials an attacker can retrieve information about the cameras, user information, and modify database records.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**Qognify - NiceVision**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-278-02)
### Credits
- Roni Gavrilov of OTORIO reported this vulnerability to CISA. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.