System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21723, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21723 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21723
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 02:07 UTC
- **Last Updated**: May 04, 2025 at 07:19 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: mpi3mr: Fix possible crash when setting up bsg fails
If bsg_setup_queue() fails, the bsg_queue is assigned a non-NULL value.
Consequently, in mpi3mr_bsg_exit(), the condition "if(!mrioc->bsg_queue)"
will not be satisfied, preventing execution from entering
bsg_remove_queue(), which could lead to the following crash:
BUG: kernel NULL pointer dereference, address: 000000000000041c
Call Trace:
<TASK>
mpi3mr_bsg_exit+0x1f/0x50 [mpi3mr]
mpi3mr_remove+0x6f/0x340 [mpi3mr]
pci_device_remove+0x3f/0xb0
device_release_driver_internal+0x19d/0x220
unbind_store+0xa4/0xb0
kernfs_fop_write_iter+0x11f/0x200
vfs_write+0x1fc/0x3e0
ksys_write+0x67/0xe0
do_syscall_64+0x38/0x80
entry_SYSCALL_64_after_hwframe+0x78/0xe2
### Affected Products
**Linux - Linux**
Affected versions:
- 4268fa7513655a83d5492705591fdac6c65db48a (Status: affected)
- 4268fa7513655a83d5492705591fdac6c65db48a (Status: affected)
- 4268fa7513655a83d5492705591fdac6c65db48a (Status: affected)
**Linux - Linux**
Affected versions:
- 5.19 (Status: affected)
- 0 (Status: unaffected)
- 6.12.13 (Status: unaffected)
- 6.13.2 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/19b248069d1b1424982723a2bf3941ad864d5204)
2. [](https://git.kernel.org/stable/c/832b8f95a2832321b8200ae478ed988b25faaef4)
3. [](https://git.kernel.org/stable/c/295006f6e8c17212d3098811166e29627d19e05c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3344, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3344 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3344
- **State**: PUBLISHED
- **Published Date**: April 21, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 05:47 UTC
- **Reserved Date**: April 21, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Course module 6.x-1.x before 6.x-1.2 and 7.x-1.x before 7.x-1.4 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via a node title.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/node/2403305)
2. [72631](http://www.securityfocus.com/bid/72631)
3. [[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015](http://www.openwall.com/lists/oss-security/2015/01/29/6)
4. [](https://www.drupal.org/node/2403333)
5. [](https://www.drupal.org/node/2403309) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38053
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 17:03 UTC
- **Last Updated**: May 05, 2025 at 17:01 UTC
- **Reserved Date**: June 11, 2024 at 22:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38053) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45563, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45563
- **State**: PUBLISHED
- **Published Date**: May 06, 2025 at 08:31 UTC
- **Last Updated**: May 06, 2025 at 13:47 UTC
- **Reserved Date**: September 02, 2024 at 10:26 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption while handling schedule request in Camera Request Manager(CRM) due to invalid link count in the corresponding session.
### CVSS Metrics
- **CVSS Base Score**: 6.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- SDM429W (Status: affected)
- Snapdragon 429 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- SXR2230P (Status: affected)
- SXR2250P (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3620 (Status: affected)
- WCN3660B (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13303, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13303
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 20:24 UTC
- **Last Updated**: January 10, 2025 at 17:55 UTC
- **Reserved Date**: January 09, 2025 at 18:28 UTC
- **Assigned By**: drupal
### Vulnerability Description
Missing Authorization vulnerability in Drupal Download All Files allows Forceful Browsing.This issue affects Download All Files: from 0.0.0 before 2.0.2.
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Drupal - Download All Files**
Affected versions:
- 0.0.0 (Status: affected)
### References
1. [](https://www.drupal.org/sa-contrib-2024-069)
### Credits
- Pierre Rudloff
- Jeroen Tubex
- Jeroen Tubex
- striknin
- Giuseppe
- Greg Knaddison
- Damien McKenna
- Ivo Van Geertruyen |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4481
- **State**: PUBLISHED
- **Published Date**: August 16, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 10, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Race condition in the Mozilla Maintenance Service in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Windows allows local users to write to arbitrary files and consequently gain privileges via vectors involving a hard link to a log file during an update.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1171518)
2. [openSUSE-SU-2015:1454](http://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html)
3. [openSUSE-SU-2015:1389](http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html)
4. [openSUSE-SU-2015:1453](http://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html)
5. [](http://www.mozilla.org/security/announce/2015/mfsa2015-84.html)
6. [37925](https://www.exploit-db.com/exploits/37925/)
7. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
8. [1033247](http://www.securitytracker.com/id/1033247)
9. [GLSA-201605-06](https://security.gentoo.org/glsa/201605-06)
10. [1033372](http://www.securitytracker.com/id/1033372)
11. [openSUSE-SU-2015:1390](http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20752, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20752 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20752
- **State**: PUBLISHED
- **Published Date**: July 06, 2022 at 20:30 UTC
- **Last Updated**: November 01, 2024 at 19:00 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to perform a timing attack. This vulnerability is due to insufficient protection of a system password. An attacker could exploit this vulnerability by observing the time it takes the system to respond to various queries. A successful exploit could allow the attacker to determine a sensitive system password.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-208: Improper Input Validation
### Affected Products
**Cisco - Cisco Unified Communications Manager**
Affected versions:
- n/a (Status: affected)
### References
1. [20220706 Cisco Unified Communications Products Timing Attack Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-timing-JVbHECOK) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4219
- **State**: PUBLISHED
- **Published Date**: July 17, 2014 at 02:36 UTC
- **Last Updated**: August 06, 2024 at 11:04 UTC
- **Reserved Date**: June 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-2987](http://www.debian.org/security/2014/dsa-2987)
2. [60129](http://secunia.com/advisories/60129)
3. [](http://www.vmware.com/security/advisories/VMSA-2014-0012.html)
4. [DSA-2980](http://www.debian.org/security/2014/dsa-2980)
5. [1030577](http://www.securitytracker.com/id/1030577)
6. [59987](http://secunia.com/advisories/59987)
7. [HPSBUX03092](http://marc.info/?l=bugtraq&m=140852974709252&w=2)
8. [60812](http://secunia.com/advisories/60812)
9. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://www.securityfocus.com/archive/1/534161/100/0/threaded)
10. [SUSE-SU-2015:0376](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html)
11. [59986](http://secunia.com/advisories/59986)
12. [RHSA-2015:0264](http://rhn.redhat.com/errata/RHSA-2015-0264.html)
13. [60245](http://secunia.com/advisories/60245)
14. [60817](http://secunia.com/advisories/60817)
15. [59924](http://secunia.com/advisories/59924)
16. [61577](http://secunia.com/advisories/61577)
17. [RHSA-2014:0908](https://access.redhat.com/errata/RHSA-2014:0908)
18. [SUSE-SU-2015:0392](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html)
19. [SSRT101668](http://marc.info/?l=bugtraq&m=140852974709252&w=2)
20. [](http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html)
21. [60485](http://secunia.com/advisories/60485)
22. [59680](http://secunia.com/advisories/59680)
23. [oracle-cpujul2014-cve20144219(94589)](https://exchange.xforce.ibmcloud.com/vulnerabilities/94589)
24. [68620](http://www.securityfocus.com/bid/68620)
25. [](http://www-01.ibm.com/support/docview.wss?uid=swg21686383)
26. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://seclists.org/fulldisclosure/2014/Dec/23)
27. [](http://www-01.ibm.com/support/docview.wss?uid=swg21680334)
28. [60622](http://secunia.com/advisories/60622)
29. [60081](http://secunia.com/advisories/60081)
30. [RHSA-2014:0902](https://access.redhat.com/errata/RHSA-2014:0902)
31. [59985](http://secunia.com/advisories/59985)
32. [61640](http://secunia.com/advisories/61640)
33. [](http://www-01.ibm.com/support/docview.wss?uid=swg21686824)
34. [GLSA-201502-12](http://security.gentoo.org/glsa/glsa-201502-12.xml)
35. [60317](http://secunia.com/advisories/60317)
36. [SUSE-SU-2015:0344](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html)
37. [59404](http://secunia.com/advisories/59404) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1379, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1379 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1379
- **State**: PUBLISHED
- **Published Date**: June 08, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 04:40 UTC
- **Reserved Date**: January 27, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.dest-unreach.org/socat/)
2. [[oss-security] 20150406 Socat security advisory 6 - Possible DoS with fork (update: CVE-Id: CVE-2015-1379; fix for version 2)](http://www.openwall.com/lists/oss-security/2015/04/06/4)
3. [72321](http://www.securityfocus.com/bid/72321)
4. [[oss-security] 20150127 Re: Socat security advisory 6 - Possible DoS with fork](http://www.openwall.com/lists/oss-security/2015/01/27/19)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=1185711) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39022
- **State**: PUBLISHED
- **Published Date**: July 28, 2023 at 00:00 UTC
- **Last Updated**: October 22, 2024 at 18:29 UTC
- **Reserved Date**: July 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
oscore v2.2.6 and below was discovered to contain a code injection vulnerability in the component com.opensymphony.util.EJBUtils.createStateless. This vulnerability is exploited via passing an unchecked argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/LetianYuan/My-CVE-Public-References/tree/main/opensymphony_oscore) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36975, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36975 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36975
- **State**: PUBLISHED
- **Published Date**: September 15, 2021 at 11:23 UTC
- **Last Updated**: August 04, 2024 at 01:09 UTC
- **Reserved Date**: July 19, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Win32k Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36975) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-38152, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-38152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-38152
- **State**: PUBLISHED
- **Published Date**: April 18, 2025 at 07:01 UTC
- **Last Updated**: May 26, 2025 at 05:25 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
remoteproc: core: Clear table_sz when rproc_shutdown
There is case as below could trigger kernel dump:
Use U-Boot to start remote processor(rproc) with resource table
published to a fixed address by rproc. After Kernel boots up,
stop the rproc, load a new firmware which doesn't have resource table
,and start rproc.
When starting rproc with a firmware not have resource table,
`memcpy(loaded_table, rproc->cached_table, rproc->table_sz)` will
trigger dump, because rproc->cache_table is set to NULL during the last
stop operation, but rproc->table_sz is still valid.
This issue is found on i.MX8MP and i.MX9.
Dump as below:
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
Mem abort info:
ESR = 0x0000000096000004
EC = 0x25: DABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x04: level 0 translation fault
Data abort info:
ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
CM = 0, WnR = 0, TnD = 0, TagAccess = 0
GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=000000010af63000
[0000000000000000] pgd=0000000000000000, p4d=0000000000000000
Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
Modules linked in:
CPU: 2 UID: 0 PID: 1060 Comm: sh Not tainted 6.14.0-rc7-next-20250317-dirty #38
Hardware name: NXP i.MX8MPlus EVK board (DT)
pstate: a0000005 (NzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __pi_memcpy_generic+0x110/0x22c
lr : rproc_start+0x88/0x1e0
Call trace:
__pi_memcpy_generic+0x110/0x22c (P)
rproc_boot+0x198/0x57c
state_store+0x40/0x104
dev_attr_store+0x18/0x2c
sysfs_kf_write+0x7c/0x94
kernfs_fop_write_iter+0x120/0x1cc
vfs_write+0x240/0x378
ksys_write+0x70/0x108
__arm64_sys_write+0x1c/0x28
invoke_syscall+0x48/0x10c
el0_svc_common.constprop.0+0xc0/0xe0
do_el0_svc+0x1c/0x28
el0_svc+0x30/0xcc
el0t_64_sync_handler+0x10c/0x138
el0t_64_sync+0x198/0x19c
Clear rproc->table_sz to address the issue.
### Affected Products
**Linux - Linux**
Affected versions:
- 9dc9507f1880fb6225e3e058cb5219b152cbf198 (Status: affected)
- 9dc9507f1880fb6225e3e058cb5219b152cbf198 (Status: affected)
- 9dc9507f1880fb6225e3e058cb5219b152cbf198 (Status: affected)
- 9dc9507f1880fb6225e3e058cb5219b152cbf198 (Status: affected)
- 9dc9507f1880fb6225e3e058cb5219b152cbf198 (Status: affected)
- 9dc9507f1880fb6225e3e058cb5219b152cbf198 (Status: affected)
- 9dc9507f1880fb6225e3e058cb5219b152cbf198 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.13 (Status: affected)
- 0 (Status: unaffected)
- 5.15.180 (Status: unaffected)
- 6.1.134 (Status: unaffected)
- 6.6.87 (Status: unaffected)
- 6.12.23 (Status: unaffected)
- 6.13.11 (Status: unaffected)
- 6.14.2 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/6e66bca8cd51ebedd5d32426906a38e4a3c69c5f)
2. [](https://git.kernel.org/stable/c/e6015ca453b82ec54aec9682dcc38773948fcc48)
3. [](https://git.kernel.org/stable/c/7c6bb82a6f3da6ab2d3fbea03901482231708b98)
4. [](https://git.kernel.org/stable/c/2df19f5f6f72da6f6ebab7cdb3a3b9f7686bb476)
5. [](https://git.kernel.org/stable/c/8e0fd2a3b9852ac3cf540edb06ccc0153b38b5af)
6. [](https://git.kernel.org/stable/c/068f6648ff5b0c7adeb6c363fae7fb188aa178fa)
7. [](https://git.kernel.org/stable/c/efdde3d73ab25cef4ff2d06783b0aad8b093c0e4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8723, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8723 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8723
- **State**: PUBLISHED
- **Published Date**: December 18, 2019 at 17:33 UTC
- **Last Updated**: August 04, 2024 at 21:24 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Multiple issues in ld64 in the Xcode toolchains were addressed by updating to version ld64-507.4. This issue is fixed in Xcode 11.0. Compiling code without proper input validation could lead to arbitrary code execution with user privilege.
### Affected Products
**Apple - Xcode**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT210609) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29679, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29679 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29679
- **State**: PUBLISHED
- **Published Date**: October 15, 2021 at 15:55 UTC
- **Last Updated**: September 17, 2024 at 01:21 UTC
- **Reserved Date**: March 31, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cognos Analytics 11.1.7 and 11.2.0 could allow an authenticated user to execute code remotely due to incorrectly neutralizaing user-contrlled input that could be interpreted a a server-side include (SSI) directive. IBM X-Force ID: 199915.
### Affected Products
**IBM - Cognos Analytics**
Affected versions:
- 11.2.0 (Status: affected)
- 11.1.7 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6491661)
2. [ibm-cognos-cve202129679-code-exec (199915)](https://exchange.xforce.ibmcloud.com/vulnerabilities/199915)
3. [](https://security.netapp.com/advisory/ntap-20211112-0005/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21622, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21622
- **State**: PUBLISHED
- **Published Date**: January 03, 2024 at 16:51 UTC
- **Last Updated**: April 17, 2025 at 18:35 UTC
- **Reserved Date**: December 29, 2023 at 03:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Craft is a content management system. This is a potential moderate impact, low complexity privilege escalation vulnerability in Craft starting in 3.x prior to 3.9.6 and 4.x prior to 4.4.16 with certain user permissions setups. This has been fixed in Craft 4.4.16 and Craft 3.9.6. Users should ensure they are running at least those versions.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**craftcms - cms**
Affected versions:
- >= 4.0.0-RC1, < 4.5.11 (Status: affected)
- >= 3.0.0, < 3.9.6 (Status: affected)
### References
1. [https://github.com/craftcms/cms/security/advisories/GHSA-j5g9-j7r4-6qvx](https://github.com/craftcms/cms/security/advisories/GHSA-j5g9-j7r4-6qvx)
2. [https://github.com/craftcms/cms/pull/13931](https://github.com/craftcms/cms/pull/13931)
3. [https://github.com/craftcms/cms/pull/13932](https://github.com/craftcms/cms/pull/13932)
4. [https://github.com/craftcms/cms/commit/76caf9af07d9964be0fd362772223be6a5f5b6aa](https://github.com/craftcms/cms/commit/76caf9af07d9964be0fd362772223be6a5f5b6aa)
5. [https://github.com/craftcms/cms/commit/be81eb653d633833f2ab22510794abb6bb9c0843](https://github.com/craftcms/cms/commit/be81eb653d633833f2ab22510794abb6bb9c0843)
6. [https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#4511---2023-11-16](https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#4511---2023-11-16)
7. [https://github.com/craftcms/cms/blob/v3/CHANGELOG.md#396---2023-11-16](https://github.com/craftcms/cms/blob/v3/CHANGELOG.md#396---2023-11-16) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3245, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3245 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3245
- **State**: PUBLISHED
- **Published Date**: October 27, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 23:01 UTC
- **Reserved Date**: October 17, 2005 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 to 0.10.12, when the "Dissect unknown RPC program numbers" option is enabled, allows remote attackers to cause a denial of service (memory consumption).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2005:809](http://www.redhat.com/support/errata/RHSA-2005-809.html)
2. [17327](http://secunia.com/advisories/17327)
3. [GLSA-200510-25](http://www.gentoo.org/security/en/glsa/glsa-200510-25.xml)
4. [17392](http://secunia.com/advisories/17392)
5. [17480](http://secunia.com/advisories/17480)
6. [1015082](http://securitytracker.com/id?1015082)
7. [](http://www.ethereal.com/appnotes/enpa-sa-00021.html)
8. [SUSE-SR:2005:025](http://www.novell.com/linux/security/advisories/2005_25_sr.html)
9. [17286](http://secunia.com/advisories/17286)
10. [FLSA-2006:152922](http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html)
11. [17377](http://secunia.com/advisories/17377)
12. [15148](http://www.securityfocus.com/bid/15148)
13. [20129](http://www.osvdb.org/20129)
14. [oval:org.mitre.oval:def:11060](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11060)
15. [17254](http://secunia.com/advisories/17254) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3648, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3648
- **State**: PUBLISHED
- **Published Date**: November 07, 2010 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 03:18 UTC
- **Reserved Date**: September 28, 2010 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2011-0192](http://www.vupen.com/english/advisories/2011/0192)
2. [42183](http://secunia.com/advisories/42183)
3. [](http://support.apple.com/kb/HT4435)
4. [](http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1)
5. [43026](http://secunia.com/advisories/43026)
6. [GLSA-201101-09](http://security.gentoo.org/glsa/glsa-201101-09.xml)
7. [ADV-2010-2918](http://www.vupen.com/english/advisories/2010/2918)
8. [44684](http://www.securityfocus.com/bid/44684)
9. [APPLE-SA-2010-11-10-1](http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html)
10. [RHSA-2010:0834](http://www.redhat.com/support/errata/RHSA-2010-0834.html)
11. [SUSE-SA:2010:055](http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html)
12. [42926](http://secunia.com/advisories/42926)
13. [SSRT100428](http://marc.info/?l=bugtraq&m=130331642631603&w=2)
14. [ADV-2010-2903](http://www.vupen.com/english/advisories/2010/2903)
15. [HPSBMA02663](http://marc.info/?l=bugtraq&m=130331642631603&w=2)
16. [ADV-2011-0173](http://www.vupen.com/english/advisories/2011/0173)
17. [](http://www.adobe.com/support/security/bulletins/apsb10-26.html)
18. [ADV-2010-2906](http://www.vupen.com/english/advisories/2010/2906)
19. [RHSA-2010:0867](http://www.redhat.com/support/errata/RHSA-2010-0867.html)
20. [oval:org.mitre.oval:def:15980](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15980)
21. [oval:org.mitre.oval:def:11842](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11842)
22. [RHSA-2010:0829](http://www.redhat.com/support/errata/RHSA-2010-0829.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44413, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44413 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44413
- **State**: PUBLISHED
- **Published Date**: November 18, 2022 at 00:00 UTC
- **Last Updated**: April 29, 2025 at 19:08 UTC
- **Reserved Date**: October 30, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Automotive Shop Management System v1.0 is vulnerable to SQL Injection via /asms/admin/mechanics/manage_mechanic.php?id=.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/huchengrong/bug_report/blob/main/vendors/oretnom23/automotive-shop-management-system/SQLi-3.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4715
- **State**: PUBLISHED
- **Published Date**: December 08, 2011 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 00:16 UTC
- **Reserved Date**: December 08, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in cgi-bin/koha/mainpage.pl in Koha 3.4 before 3.4.7 and 3.6 before 3.6.1, and LibLime Koha 4.2 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the KohaOpacLanguage cookie to cgi-bin/opac/opac-main.pl, related to Output.pm.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [50812](http://www.securityfocus.com/bid/50812)
2. [](http://koha-community.org/koha-3-6-1/#more-2929)
3. [](http://www.vigasis.com/en/?guncel_guvenlik=LibLime%20Koha%20%3C=%204.2%20Local%20File%20Inclusion%20Vulnerability&lnk=exploits/18153)
4. [18153](http://www.exploit-db.com/exploits/18153)
5. [](http://koha-community.org/koha-3-4-7/#more-2971)
6. [77322](http://osvdb.org/77322)
7. [46980](http://secunia.com/advisories/46980)
8. [](https://github.com/liblime/LibLime-Koha/commit/8ea6f7bc37d05a9ec25b5afbea011cf9de5f1e49#C4/Output.pm)
9. [liblimekoha-opacmain-file-include(71478)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71478) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1278, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1278 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1278
- **State**: PUBLISHED
- **Published Date**: April 26, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:44 UTC
- **Reserved Date**: April 26, 2005 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [13392](http://www.securityfocus.com/bid/13392)
2. [15125](http://secunia.com/advisories/15125)
3. [RHSA-2005:421](http://www.redhat.com/support/errata/RHSA-2005-421.html)
4. [20050426 tcpdump[v3.8.x/v3.9.1]: ISIS, BGP, and LDP infinite loop DOS exploits.](http://www.securityfocus.com/archive/1/396932)
5. [RHSA-2005:417](http://www.redhat.com/support/errata/RHSA-2005-417.html)
6. [FLSA:156139](http://www.securityfocus.com/archive/1/430292/100/0/threaded)
7. [SCOSA-2005.60](ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.60/SCOSA-2005.60.txt)
8. [oval:org.mitre.oval:def:10159](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10159)
9. [18146](http://secunia.com/advisories/18146) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39123, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39123 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39123
- **State**: PUBLISHED
- **Published Date**: October 14, 2022 at 00:00 UTC
- **Last Updated**: May 14, 2025 at 15:46 UTC
- **Reserved Date**: September 01, 2022 at 00:00 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1575654905820020738) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1675, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1675 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1675
- **State**: PUBLISHED
- **Published Date**: March 29, 2011 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 01:35 UTC
- **Reserved Date**: April 30, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=654614)
2. [71258](http://www.osvdb.org/71258)
3. [SUSE-SR:2011:005](http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html)
4. [quagga-aspath-dos(66212)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66212)
5. [GLSA-201202-02](http://security.gentoo.org/glsa/glsa-201202-02.xml)
6. [SUSE-SU-2011:1316](http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html)
7. [43770](http://secunia.com/advisories/43770)
8. [48106](http://secunia.com/advisories/48106)
9. [DSA-2197](http://www.debian.org/security/2011/dsa-2197)
10. [ADV-2011-0711](http://www.vupen.com/english/advisories/2011/0711)
11. [46943](http://www.securityfocus.com/bid/46943)
12. [](http://www.quagga.net/news2.php?y=2011&m=3&d=21#id1300723200)
13. [MDVSA-2011:058](http://www.mandriva.com/security/advisories?name=MDVSA-2011:058)
14. [43499](http://secunia.com/advisories/43499) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4580, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4580
- **State**: PUBLISHED
- **Published Date**: December 29, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:53 UTC
- **Reserved Date**: December 29, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Day Communique 4 allows remote attackers to inject arbitrary web script or HTML via the query parameter in a search.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16072](http://www.securityfocus.com/bid/16072)
2. [21930](http://www.osvdb.org/21930)
3. [Communiqué-search-xss(23860)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23860)
4. [](http://pridels0.blogspot.com/2005/12/communiqu-4-xss-vuln.html)
5. [18258](http://secunia.com/advisories/18258) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34948, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34948 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34948
- **State**: PUBLISHED
- **Published Date**: May 07, 2024 at 22:54 UTC
- **Last Updated**: August 04, 2024 at 00:26 UTC
- **Reserved Date**: June 17, 2021 at 19:27 UTC
- **Assigned By**: zdi
### Vulnerability Description
Foxit PDF Reader Square Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Square annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14272.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - PDF Reader**
Affected versions:
- 11.0.0.49893 (Status: affected)
### References
1. [ZDI-21-1179](https://www.zerodayinitiative.com/advisories/ZDI-21-1179/)
2. [vendor-provided URL](https://www.foxit.com/support/security-bulletins.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-19264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-19264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-19264
- **State**: PUBLISHED
- **Published Date**: September 09, 2021 at 17:44 UTC
- **Last Updated**: August 04, 2024 at 14:08 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site request forgery (CSRF) in MipCMS v5.0.1 allows attackers to arbitrarily add users via index.php?s=/user/ApiAdminUser/itemAdd.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sansanyun/mipcms5/issues/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20653, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20653
- **State**: PUBLISHED
- **Published Date**: April 06, 2023 at 00:00 UTC
- **Last Updated**: February 13, 2025 at 15:30 UTC
- **Reserved Date**: October 28, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628168; Issue ID: ALPS07589144.
### Affected Products
**MediaTek, Inc. - MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8185, MT8192, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8871, MT8891**
Affected versions:
- Android 10.0, 11.0, 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/April-2023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12994, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12994
- **State**: PUBLISHED
- **Published Date**: September 14, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 18:51 UTC
- **Reserved Date**: August 21, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201709-23](https://security.gentoo.org/glsa/201709-23)
2. [](https://support.apple.com/HT208221)
3. [DSA-3971](http://www.debian.org/security/2017/dsa-3971)
4. [1039307](http://www.securitytracker.com/id/1039307)
5. [](http://www.tcpdump.org/tcpdump-changes.txt)
6. [](https://github.com/the-tcpdump-group/tcpdump/commit/ffde45acf3348f8353fb4064a1b21683ee6b5ddf)
7. [RHEA-2018:0705](https://access.redhat.com/errata/RHEA-2018:0705) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0967
- **State**: PUBLISHED
- **Published Date**: March 16, 2010 at 18:26 UTC
- **Last Updated**: August 07, 2024 at 01:06 UTC
- **Reserved Date**: March 16, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in Geekhelps ADMP 1.01, when magic_quotes_gpc is disabled, allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the style parameter to (1) colorvoid/footer.php, (2) default-green/footer.php, (3) default-orange/footer.php, and (4) default/footer.php in themes/. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [62918](http://osvdb.org/62918)
2. [11721](http://www.exploit-db.com/exploits/11721)
3. [62915](http://osvdb.org/62915)
4. [geekhelpsadmp-style-file-include(56857)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56857)
5. [ADV-2010-0612](http://www.vupen.com/english/advisories/2010/0612)
6. [38949](http://secunia.com/advisories/38949)
7. [62917](http://osvdb.org/62917)
8. [62916](http://osvdb.org/62916) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10902, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10902 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10902
- **State**: PUBLISHED
- **Published Date**: August 21, 2019 at 12:45 UTC
- **Last Updated**: August 06, 2024 at 03:38 UTC
- **Reserved Date**: August 16, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The wp-customer-reviews plugin before 3.0.9 for WordPress has CSRF in the admin tools.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/wp-customer-reviews/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2434, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2434
- **State**: PUBLISHED
- **Published Date**: September 06, 2022 at 17:18 UTC
- **Last Updated**: May 05, 2025 at 16:19 UTC
- **Reserved Date**: July 15, 2022 at 00:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The String Locator plugin for WordPress is vulnerable to deserialization of untrusted input via the 'string-locator-path' parameter in versions up to, and including 2.5.0. This makes it possible for unauthenticated users to call files using a PHAR wrapper, granted they can trick a site administrator into performing an action such as clicking on a link, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Affected Products
**instawp - String locator**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/10a36e37-4188-403f-9b17-d7e79b8b8a6d?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/string-locator/trunk/editor.php#L59)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2759486%40string-locator&new=2759486%40string-locator&sfp_email=&sfph_mail=)
4. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2434)
### Credits
- Rasoul Jahanshahi |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6516, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6516 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6516
- **State**: PUBLISHED
- **Published Date**: August 18, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 07:22 UTC
- **Reserved Date**: August 18, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in cygnux.org sysPass 1.0.9 and earlier allows remote authenticated users to execute arbitrary SQL commands via the search parameter to ajax/ajax_search.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-031.txt)
2. [37610](https://www.exploit-db.com/exploits/37610/)
3. [20150713 [SYSS-2015-031] sysPass - SQL Injection](http://www.securityfocus.com/archive/1/535989/100/0/threaded)
4. [](http://packetstormsecurity.com/files/132672/sysPass-1.0.9-SQL-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3476
- **State**: PUBLISHED
- **Published Date**: June 17, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:43 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2014:0848](http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00031.html)
2. [59547](http://secunia.com/advisories/59547)
3. [68026](http://www.securityfocus.com/bid/68026)
4. [](https://bugs.launchpad.net/keystone/+bug/1324592)
5. [57886](http://secunia.com/advisories/57886)
6. [[oss-security] 20140612 [OSSA 2014-018] Keystone privilege escalation through trust chained delegation (CVE-2014-3476)](http://www.openwall.com/lists/oss-security/2014/06/12/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21689, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21689 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21689
- **State**: PUBLISHED
- **Published Date**: February 10, 2025 at 15:58 UTC
- **Last Updated**: May 04, 2025 at 07:19 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
This patch addresses a null-ptr-deref in qt2_process_read_urb() due to
an incorrect bounds check in the following:
if (newport > serial->num_ports) {
dev_err(&port->dev,
"%s - port change to invalid port: %i\n",
__func__, newport);
break;
}
The condition doesn't account for the valid range of the serial->port
buffer, which is from 0 to serial->num_ports - 1. When newport is equal
to serial->num_ports, the assignment of "port" in the
following code is out-of-bounds and NULL:
serial_priv->current_port = newport;
port = serial->port[serial_priv->current_port];
The fix checks if newport is greater than or equal to serial->num_ports
indicating it is out-of-bounds.
### Affected Products
**Linux - Linux**
Affected versions:
- f7a33e608d9ae022b7f49307921627e34e9484ed (Status: affected)
- f7a33e608d9ae022b7f49307921627e34e9484ed (Status: affected)
- f7a33e608d9ae022b7f49307921627e34e9484ed (Status: affected)
- f7a33e608d9ae022b7f49307921627e34e9484ed (Status: affected)
- f7a33e608d9ae022b7f49307921627e34e9484ed (Status: affected)
- f7a33e608d9ae022b7f49307921627e34e9484ed (Status: affected)
- f7a33e608d9ae022b7f49307921627e34e9484ed (Status: affected)
- f7a33e608d9ae022b7f49307921627e34e9484ed (Status: affected)
**Linux - Linux**
Affected versions:
- 3.5 (Status: affected)
- 0 (Status: unaffected)
- 5.4.290 (Status: unaffected)
- 5.10.234 (Status: unaffected)
- 5.15.178 (Status: unaffected)
- 6.1.128 (Status: unaffected)
- 6.6.75 (Status: unaffected)
- 6.12.12 (Status: unaffected)
- 6.13.1 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/fa4c7472469d97c4707698b4c0e098f8cfc2bf22)
2. [](https://git.kernel.org/stable/c/94770cf7c5124f0268d481886829dc2beecc4507)
3. [](https://git.kernel.org/stable/c/6068dcff7f19e9fa6fa23ee03453ad6a40fa4efe)
4. [](https://git.kernel.org/stable/c/4b9b41fabcd38990f69ef0cee9c631d954a2b530)
5. [](https://git.kernel.org/stable/c/6377838560c03b36e1153a42ef727533def9b68f)
6. [](https://git.kernel.org/stable/c/f371471708c7d997f763b0e70565026eb67cc470)
7. [](https://git.kernel.org/stable/c/8542b33622571f54dfc2a267fce378b6e3840b8b)
8. [](https://git.kernel.org/stable/c/575a5adf48b06a2980c9eeffedf699ed5534fade) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13686, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13686 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13686
- **State**: PUBLISHED
- **Published Date**: August 24, 2017 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 19:04 UTC
- **Reserved Date**: August 24, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
net/ipv4/route.c in the Linux kernel 4.13-rc1 through 4.13-rc6 is too late to check for a NULL fi field when RTM_F_FIB_MATCH is set, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via crafted system calls. NOTE: this does not affect any stable release.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/torvalds/linux/commit/bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205)
2. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21941, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21941 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21941
- **State**: PUBLISHED
- **Published Date**: April 18, 2023 at 19:54 UTC
- **Last Updated**: September 16, 2024 at 15:17 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Web Server). Supported versions that are affected are 6.4.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle BI Publisher accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Oracle Corporation - BI Publisher (formerly XML Publisher)**
Affected versions:
- 6.4.0.0.0 (Status: affected)
- 12.2.1.4.0 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2023.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46485, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46485 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46485
- **State**: PUBLISHED
- **Published Date**: October 31, 2023 at 00:00 UTC
- **Last Updated**: September 06, 2024 at 19:34 UTC
- **Reserved Date**: October 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in TOTOlink X6000R V9.4.0cu.852_B20230719 allows a remote attacker to execute arbitrary code via the setTracerouteCfg function of the stecgi.cgi component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://815yang.github.io/2023/10/29/x6000r/TOTOlink%20X6000R%20V9.1.0cu.2350_B20230313-rsetTracerouteCfg/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40331, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40331
- **State**: PUBLISHED
- **Published Date**: July 10, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 04:33 UTC
- **Reserved Date**: July 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/dbBakMySQL_deal.php?mudi=backup
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Tank992/cms/blob/main/66/csrf.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0291, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0291
- **State**: PUBLISHED
- **Published Date**: June 09, 2023 at 05:33 UTC
- **Last Updated**: December 28, 2024 at 00:51 UTC
- **Reserved Date**: January 13, 2023 at 16:54 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Quiz And Survey Master for WordPress is vulnerable to authorization bypass due to a missing capability check on the function associated with the qsm_remove_file_fd_question AJAX action in versions up to, and including, 8.0.8. This makes it possible for unauthenticated attackers to delete arbitrary media files.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L`
### Affected Products
**expresstech - Quiz And Survey Master – Best Quiz, Exam and Survey Plugin for WordPress**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/68110321-db1a-4634-98cd-0afd3ec933b8?source=cve)
2. [](https://wordpress.org/plugins/quiz-master-next/)
3. [](https://packetstormsecurity.com/files/171011/wpqsm808-xsrf.txt)
4. [](https://plugins.trac.wordpress.org/changeset/2834471/quiz-master-next)
### Credits
- Julien Ahrens |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9831, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9831 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9831
- **State**: PUBLISHED
- **Published Date**: March 15, 2019 at 17:00 UTC
- **Last Updated**: August 04, 2024 at 22:01 UTC
- **Reserved Date**: March 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The AirMore application through 1.6.1 for Android allows remote attackers to cause a denial of service (system hang) via many simultaneous /?Key=PhoneRequestAuthorization requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [46381](https://www.exploit-db.com/exploits/46381)
2. [](https://www.youtube.com/watch?v=FJmZ_FfcdoU) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39188, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39188 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39188
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 09:20 UTC
- **Last Updated**: October 11, 2024 at 13:08 UTC
- **Reserved Date**: July 25, 2023 at 15:52 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted DFT files. This could allow an attacker to execute code in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Siemens - Solid Edge SE2023**
Affected versions:
- All versions < V223.0 Update 7 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37667, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37667 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37667
- **State**: PUBLISHED
- **Published Date**: August 12, 2021 at 21:40 UTC
- **Last Updated**: August 04, 2024 at 01:23 UTC
- **Reserved Date**: July 29, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.UnicodeEncode`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/unicode_ops.cc#L533-L539) reads the first dimension of the `input_splits` tensor before validating that this tensor is not empty. We have patched the issue in GitHub commit 2e0ee46f1a47675152d3d865797a18358881d7a6. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-824: Security Weakness
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- >= 2.5.0, < 2.5.1 (Status: affected)
- >= 2.4.0, < 2.4.3 (Status: affected)
- < 2.3.4 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w74j-v8xh-3w5h)
2. [](https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11294, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11294 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11294
- **State**: PUBLISHED
- **Published Date**: December 17, 2024 at 08:22 UTC
- **Last Updated**: December 17, 2024 at 14:37 UTC
- **Reserved Date**: November 15, 2024 at 23:28 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Memberful plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.73.9 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as site members.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**memberful - Memberful – Membership Plugin**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/19ad787d-e027-48f5-8b5f-9263338b4fc3?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3204895/memberful-wp)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20930, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20930 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20930
- **State**: PUBLISHED
- **Published Date**: January 16, 2024 at 21:41 UTC
- **Last Updated**: June 02, 2025 at 15:07 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Content Access SDK, Image Export SDK, PDF Export SDK, HTML Export SDK). The supported version that is affected is 8.5.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Affected Products
**Oracle Corporation - Outside In Technology**
Affected versions:
- 8.5.6 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0409, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0409
- **State**: PUBLISHED
- **Published Date**: February 19, 2022 at 04:35 UTC
- **Last Updated**: August 02, 2024 at 23:25 UTC
- **Reserved Date**: January 29, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type in Packagist showdoc/showdoc prior to 2.10.2.
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**star7th - star7th/showdoc**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/c25bfad1-2611-4226-954f-009e50f966f7)
2. [](https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1046, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1046
- **State**: PUBLISHED
- **Published Date**: June 25, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:44 UTC
- **Reserved Date**: January 31, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in qpopper (aka qpop or popper) 4.0 through 4.0.2 allows remote attackers to gain privileges via a long username.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [CSSA-2001-SCO.8](http://archives.neohapsis.com/archives/linux/caldera/2001-q3/0006.html)
2. [2811](http://www.securityfocus.com/bid/2811)
3. [20010602 Qpopper 4.0.3 **** Fixes Buffer Overflow **** (fwd)](http://www.securityfocus.com/archive/1/188267)
4. [20010420 Qpopper 4.0 Buffer Overflow](http://marc.info/?l=vuln-dev&m=98777649031406&w=2)
5. [qpopper-username-bo(6647)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6647) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14143, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14143
- **State**: PUBLISHED
- **Published Date**: September 19, 2017 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 19:20 UTC
- **Reserved Date**: September 05, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The getUserzoneCookie function in Kaltura before 13.2.0 uses a hardcoded cookie secret to validate cookie signatures, which allows remote attackers to bypass an intended protection mechanism and consequently conduct PHP object injection attacks and execute arbitrary PHP code via a crafted userzone cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/kaltura/server/commit/6a6d14328b7a1493e8c47f9565461e5f88be20c9#diff-0770640cc76112cbf77bebc604852682)
2. [43028](https://www.exploit-db.com/exploits/43028/)
3. [43876](https://www.exploit-db.com/exploits/43876/)
4. [](https://telekomsecurity.github.io/assets/advisories/20170912_kaltura-advisory.txt)
5. [100976](http://www.securityfocus.com/bid/100976) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1970, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1970 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1970
- **State**: PUBLISHED
- **Published Date**: March 22, 2025 at 11:18 UTC
- **Last Updated**: March 24, 2025 at 20:01 UTC
- **Reserved Date**: March 04, 2025 at 20:47 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Export and Import Users and Customers plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.6.2 via the validate_file() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**webtoffee - Export and Import Users and Customers**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5a4d7d40-8e0e-4251-8e25-3fd4ebd3a93e?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/users-customers-import-export-for-wp-woocommerce/trunk/admin/modules/import/classes/class-import-ajax.php#L175)
3. [](https://wordpress.org/plugins/users-customers-import-export-for-wp-woocommerce/#developers)
4. [](https://plugins.trac.wordpress.org/changeset/3259688/)
### Credits
- Hay Mizrachi |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42767
- **State**: PUBLISHED
- **Published Date**: March 01, 2022 at 01:31 UTC
- **Last Updated**: August 04, 2024 at 03:38 UTC
- **Reserved Date**: October 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A directory traversal vulnerability in the apoc plugins in Neo4J Graph database before 4.4.0.1 allows attackers to read local files, and sometimes create local files. This is fixed in 3.5.17, 4.2.10, 4.3.0.4, and 4.4.0.1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://neo4j.com)
2. [](https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-4mpj-488r-vh6m) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0932, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0932 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0932
- **State**: PUBLISHED
- **Published Date**: May 07, 2013 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 00:10 UTC
- **Reserved Date**: January 09, 2013 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
EMC RSA Archer 5.x before GRC 5.3SP1, and Archer Smart Suite Framework 4.x, allows remote authenticated users to bypass intended access restrictions and upload arbitrary files via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130506 ESA-2013-015: RSA Archer GRC Multiple Vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2013-05/0023.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4810, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4810 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4810
- **State**: REJECTED
- **Published Date**: May 14, 2024 at 01:38 UTC
- **Last Updated**: May 29, 2024 at 07:53 UTC
- **Reserved Date**: May 13, 2024 at 02:04 UTC
- **Assigned By**: Anolis
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7501, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7501 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7501
- **State**: PUBLISHED
- **Published Date**: June 16, 2020 at 19:40 UTC
- **Last Updated**: August 04, 2024 at 09:33 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-798: Use of Hard-coded Credentials vulnerability exists in Vijeo Designer Basic (V1.1 HotFix 16 and prior) and Vijeo Designer (V6.2 SP9 and prior) which could cause unauthorized read and write when downloading and uploading project or firmware into Vijeo Designer Basic and Vijeo Designer.
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**n/a - Vijeo Designer Basic (V1.1 HotFix 16 and prior) and Vijeo Designer (V6.2 SP9 and prior)**
Affected versions:
- Vijeo Designer Basic (V1.1 HotFix 16 and prior) and Vijeo Designer (V6.2 SP9 and prior) (Status: affected)
### References
1. [](https://www.se.com/ww/en/download/document/SEVD-2020-133-02/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3423, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3423 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3423
- **State**: PUBLISHED
- **Published Date**: January 27, 2017 at 22:01 UTC
- **Last Updated**: October 08, 2024 at 20:15 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
### Affected Products
**Oracle - One-to-One Fulfillment**
Affected versions:
- 12.1.1 (Status: affected)
- 12.1.2 (Status: affected)
- 12.1.3 (Status: affected)
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
### References
1. [95569](http://www.securityfocus.com/bid/95569)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2461, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2461
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 10:49 UTC
- **Last Updated**: September 25, 2024 at 19:39 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Communications Interactive Session Recorder product of Oracle Communications (component: Provision API). The supported version that is affected is 6.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Interactive Session Recorder. While the vulnerability is in Oracle Communications Interactive Session Recorder, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Interactive Session Recorder accessible data as well as unauthorized read access to a subset of Oracle Communications Interactive Session Recorder accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Interactive Session Recorder. CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L).
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L`
### Affected Products
**Oracle Corporation - Communications Interactive Session Recorder**
Affected versions:
- 6.4 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6543, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6543
- **State**: PUBLISHED
- **Published Date**: July 13, 2018 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 01:36 UTC
- **Reserved Date**: August 03, 2016 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
A captured MAC/device ID of an iTrack Easy can be registered under multiple user accounts allowing access to getgps GPS data, which can allow unauthenticated parties to track the device.
### Weakness Classification (CWE)
- CWE-799: Cross-site Scripting (XSS)
### Affected Products
**iTrack - Easy**
Affected versions:
- N/A (Status: unknown)
### References
1. [VU#974055](https://www.kb.cert.org/vuls/id/974055)
2. [](https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/)
3. [93875](http://www.securityfocus.com/bid/93875)
### Credits
- Thanks to Deral Heiland and Adam Compton of Rapid7, Inc. for reporting this vulnerability. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2385, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2385 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2385
- **State**: PUBLISHED
- **Published Date**: July 08, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 05:52 UTC
- **Reserved Date**: July 08, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the awardsMembers function in Sources/Profile.php in the Member Awards component 1.0.2 for Simple Machines Forum (SMF) allows remote attackers to execute arbitrary SQL commands via the id parameter in a profile action to index.php. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35661](http://secunia.com/advisories/35661)
2. [memberawards-id-sql-injection(51441)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51441)
3. [9050](http://www.exploit-db.com/exploits/9050)
4. [35536](http://www.securityfocus.com/bid/35536) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26527, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26527 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26527
- **State**: PUBLISHED
- **Published Date**: October 02, 2020 at 20:05 UTC
- **Last Updated**: August 04, 2024 at 15:56 UTC
- **Reserved Date**: October 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in API/api/Version in Damstra Smart Asset 2020.7. Cross-origin resource sharing trusts random origins by accepting the arbitrary 'Origin: example.com' header and responding with 200 OK and a wildcard 'Access-Control-Allow-Origin: *' header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.damstratechnology.com/hc/en-us/categories/900000115446-SmartAsset-Damstra-Asset-Management-Platform)
2. [](https://smartasset.com/)
3. [](https://github.com/lukaszstu/SmartAsset-CORS-CVE-2020-26527/blob/main/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49770, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49770
- **State**: PUBLISHED
- **Published Date**: December 14, 2023 at 15:45 UTC
- **Last Updated**: August 02, 2024 at 22:01 UTC
- **Reserved Date**: November 30, 2023 at 13:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Peter Raschendorfer Smart External Link Click Monitor [Link Log] allows Stored XSS.This issue affects Smart External Link Click Monitor [Link Log]: from n/a through 5.0.2.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Peter Raschendorfer - Smart External Link Click Monitor [Link Log]**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/link-log/wordpress-smart-external-link-click-monitor-link-log-plugin-5-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34240, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34240 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34240
- **State**: PUBLISHED
- **Published Date**: June 27, 2023 at 16:34 UTC
- **Last Updated**: November 27, 2024 at 16:59 UTC
- **Reserved Date**: May 31, 2023 at 13:51 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Cloudexplorer-lite is an open source cloud software stack. Weak passwords can be easily guessed and are an easy target for brute force attacks. This can lead to an authentication system failure and compromise system security. Versions of cloudexplorer-lite prior to 1.2.0 did not enforce strong passwords. This vulnerability has been fixed in version 1.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-521: Security Weakness
### Affected Products
**CloudExplorer-Dev - CloudExplorer-Lite**
Affected versions:
- < 1.2.0 (Status: affected)
### References
1. [https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/security/advisories/GHSA-px4m-5j22-5mw4](https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/security/advisories/GHSA-px4m-5j22-5mw4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1286, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1286 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1286
- **State**: PUBLISHED
- **Published Date**: March 09, 2016 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 22:48 UTC
- **Reserved Date**: January 04, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html)
2. [FEDORA-2016-5047abe4a9](http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.html)
3. [DSA-3511](http://www.debian.org/security/2016/dsa-3511)
4. [1035237](http://www.securitytracker.com/id/1035237)
5. [SUSE-SU-2016:0780](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html)
6. [FreeBSD-SA-16:13](https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.asc)
7. [](https://kb.isc.org/article/AA-01438)
8. [USN-2925-1](http://www.ubuntu.com/usn/USN-2925-1)
9. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html)
10. [RHSA-2016:0562](http://rhn.redhat.com/errata/RHSA-2016-0562.html)
11. [openSUSE-SU-2016:0830](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html)
12. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
13. [GLSA-201610-07](https://security.gentoo.org/glsa/201610-07)
14. [SUSE-SU-2016:1541](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html)
15. [FEDORA-2016-364c0a9df4](http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html)
16. [openSUSE-SU-2016:0834](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html)
17. [HPSBUX03583](http://marc.info/?l=bugtraq&m=146191105921542&w=2)
18. [SUSE-SU-2016:0759](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html)
19. [](https://kb.isc.org/article/AA-01380)
20. [](https://kb.isc.org/article/AA-01353)
21. [FEDORA-2016-dce6dbe6a8](http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.html)
22. [FEDORA-2016-b593e84223](http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html)
23. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821)
24. [SUSE-SU-2016:0825](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html)
25. [RHSA-2016:0601](http://rhn.redhat.com/errata/RHSA-2016-0601.html)
26. [SSRT110084](http://marc.info/?l=bugtraq&m=146191105921542&w=2)
27. [openSUSE-SU-2016:0859](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html)
28. [FEDORA-2016-161b73fc2c](http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.html)
29. [openSUSE-SU-2016:0827](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html)
30. [FEDORA-2016-75f31fbb0a](http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13751, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13751
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:14 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for JustWallet, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/JustWallet)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38592, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38592 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38592
- **State**: PUBLISHED
- **Published Date**: August 12, 2021 at 01:19 UTC
- **Last Updated**: August 04, 2024 at 01:44 UTC
- **Reserved Date**: August 12, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Wasm3 0.5.0 has a heap-based buffer overflow in op_Const64 (called from EvaluateExpression and m3_LoadModule).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33554)
2. [](https://github.com/google/oss-fuzz-vulns/blob/main/vulns/wasm3/OSV-2021-676.yaml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000173, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000173 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000173
- **State**: PUBLISHED
- **Published Date**: May 08, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 12:33 UTC
- **Reserved Date**: April 16, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A session fixaction vulnerability exists in Jenkins Google Login Plugin 1.3 and older in GoogleOAuth2SecurityRealm.java that allows unauthorized attackers to impersonate another user if they can control the pre-authentication session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [104210](http://www.securityfocus.com/bid/104210)
2. [](https://jenkins.io/security/advisory/2018-04-16/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35231, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35231 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35231
- **State**: PUBLISHED
- **Published Date**: May 27, 2024 at 16:40 UTC
- **Last Updated**: August 02, 2024 at 03:07 UTC
- **Reserved Date**: May 14, 2024 at 15:39 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
rack-contrib provides contributed rack middleware and utilities for Rack, a Ruby web server interface. Versions of rack-contrib prior to 2.5.0 are vulnerable to denial of service due to the fact that the user controlled data `profiler_runs` was not constrained to any limitation. This would lead to allocating resources on the server side with no limitation and a potential denial of service by remotely user-controlled data. Version 2.5.0 contains a patch for the issue.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**rack - rack-contrib**
Affected versions:
- < 2.5.0 (Status: affected)
### References
1. [https://github.com/rack/rack-contrib/security/advisories/GHSA-8c8q-2xw3-j869](https://github.com/rack/rack-contrib/security/advisories/GHSA-8c8q-2xw3-j869)
2. [https://github.com/rack/rack-contrib/commit/0eec2a9836329051c6742549e65a94a4c24fe6f7](https://github.com/rack/rack-contrib/commit/0eec2a9836329051c6742549e65a94a4c24fe6f7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10946
- **State**: PUBLISHED
- **Published Date**: May 27, 2020 at 15:12 UTC
- **Last Updated**: August 04, 2024 at 11:21 UTC
- **Reserved Date**: March 25, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the page parameter to service-monitoring/src/index.php. This vulnerability is fixed in versions 1.6.4, 18.10.3, 19.04.3, and 19.0.1 of the Centreon host-monitoring widget; 1.6.4, 18.10.5, 19.04.3, 19.10.2 of the Centreon service-monitoring widget; and 1.0.3, 18.10.1, 19.04.1, 19.10.1 of the Centreon tactical-overview widget.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sysdream.com/news/lab/2020-05-13-cve-2020-10946-several-cross-site-scripting-xss-vulnerabilities-in-centreon/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1013, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1013 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1013
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:12 UTC
- **Reserved Date**: August 27, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in traffic_manager for Inktomi Traffic Server 4.0.18 through 5.2.2, Traffic Edge 1.1.2 and 1.5.0, and Media-IXT 3.0.4 allows local users to gain root privileges via a long -path argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.inktomi.com/kb/070202-003.html)
2. [5098](http://www.securityfocus.com/bid/5098)
3. [inktomi-trafficserver-manager-bo(9465)](http://www.iss.net/security_center/static/9465.php)
4. [20020702 CORE-20020620: Inktomi Traffic Server Buffer Overflow](http://archives.neohapsis.com/archives/bugtraq/2002-07/0023.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0520, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0520 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0520
- **State**: PUBLISHED
- **Published Date**: January 31, 2008 at 19:30 UTC
- **Last Updated**: August 07, 2024 at 07:46 UTC
- **Reserved Date**: January 31, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in main.php in the WassUp plugin 1.4 through 1.4.3 for WordPress allow remote attackers to execute arbitrary SQL commands via the (1) from_date or (2) to_date parameter to spy.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.wpwp.org/archives/warning-security-bug-in-version/)
2. [5017](https://www.exploit-db.com/exploits/5017)
3. [27525](http://www.securityfocus.com/bid/27525)
4. [28702](http://secunia.com/advisories/28702)
5. [ADV-2008-0365](http://www.vupen.com/english/advisories/2008/0365) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3488, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3488 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3488
- **State**: PUBLISHED
- **Published Date**: June 29, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:21 UTC
- **Reserved Date**: June 29, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the viewer ActiveX control in Sony Network Camera SNC-RZ25N before 1.30; SNC-P1 and SNC-P5 before 1.29; SNC-CS10 and SNC-CS11 before 1.06; SNC-DF40N and SNC-DF70N before 1.18; SNC-RZ50N and SNC-CS50N before 2.22; SNC-DF85N, SNC-DF80N, and SNC-DF50N before 1.12; and SNC-RX570N/W, SNC-RX570N/B, SNC-RX550N/W, SNC-RX550N/B, SNC-RX530N/W, and SNC-RX530N/B 3.00 and 2.x before 2.31; allows remote attackers to execute arbitrary code via a long first argument to the PrmSetNetworkParam method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVN#16767117](http://jvn.jp/en/jp/JVN16767117/index.html)
2. [sncp5-prmsetnetworkparam-bo(35133)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35133)
3. [JVNDB-2009-000012](http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000012.html)
4. [4120](https://www.exploit-db.com/exploits/4120)
5. [](http://pro.sony.com/bbsc/ssr/cat-securitycameras/resource.downloads.bbsccms-assets-cat-camsec-downloads-AffectedNetworkCameras.shtml)
6. [39479](http://osvdb.org/39479)
7. [24684](http://www.securityfocus.com/bid/24684)
8. [](http://jvn.jp/en/jp/JVN16767117/041520/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23274, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23274 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23274
- **State**: PUBLISHED
- **Published Date**: March 23, 2021 at 16:55 UTC
- **Last Updated**: September 16, 2024 at 21:58 UTC
- **Reserved Date**: January 08, 2021 at 00:00 UTC
- **Assigned By**: tibco
### Vulnerability Description
The Config UI component of TIBCO Software Inc.'s TIBCO API Exchange Gateway and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric contains a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a clickjacking attack on the affected system. A successful attack using this vulnerability does not require human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO API Exchange Gateway: versions 2.3.3 and below and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric: versions 2.3.3 and below.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**TIBCO Software Inc. - TIBCO API Exchange Gateway**
Affected versions:
- unspecified (Status: affected)
**TIBCO Software Inc. - TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric**
Affected versions:
- unspecified (Status: affected)
### References
1. [](http://www.tibco.com/services/support/advisories)
2. [](https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-23-2021-tibco-api-exchange-gateway) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31513, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31513 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31513
- **State**: PUBLISHED
- **Published Date**: July 11, 2022 at 00:54 UTC
- **Last Updated**: August 03, 2024 at 07:19 UTC
- **Reserved Date**: May 23, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The BolunHan/Krypton repository through 2021-06-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/github/securitylab/issues/669#issuecomment-1117265726) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12843, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12843
- **State**: PUBLISHED
- **Published Date**: October 12, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 08:45 UTC
- **Reserved Date**: June 25, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier versions (Status: affected)
### References
1. [1041809](http://www.securitytracker.com/id/1041809)
2. [105439](http://www.securityfocus.com/bid/105439)
3. [](https://helpx.adobe.com/security/products/acrobat/apsb18-30.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0999, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0999
- **State**: PUBLISHED
- **Published Date**: December 17, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:12 UTC
- **Reserved Date**: December 16, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown multiple vulnerabilities in (1) lpstat and (2) the libprint library in Solaris 2.6 through 9 may allow attackers to execute arbitrary code or read or write arbitrary files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [57451](http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57451)
2. [oval:org.mitre.oval:def:4098](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4098) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28263, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28263 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28263
- **State**: PUBLISHED
- **Published Date**: April 11, 2023 at 19:13 UTC
- **Last Updated**: January 23, 2025 at 01:05 UTC
- **Reserved Date**: March 13, 2023 at 22:18 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Visual Studio Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-170: Security Weakness
### Affected Products
**Microsoft - Microsoft Visual Studio 2022 version 17.2**
Affected versions:
- 17.2.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)**
Affected versions:
- 16.11.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.0**
Affected versions:
- 17.0.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.4**
Affected versions:
- 17.4.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.5**
Affected versions:
- 17.5.0 (Status: affected)
### References
1. [Visual Studio Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28263) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3210, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3210 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3210
- **State**: PUBLISHED
- **Published Date**: June 24, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 18:23 UTC
- **Reserved Date**: June 23, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ralf Image Gallery (RIG) 0.7.4 and other versions before 1.0, when register_globals is enabled, allows remote attackers to conduct PHP remote file inclusion and directory traversal attacks via URLs or ".." sequences in the (1) dir_abs_src parameter in (a) check_entry.php, (b) admin_album.php, (c) admin_image.php, and (d) admin_util.php; and the (2) dir_abs_admin_src parameter in admin_album.php and admin_image.php. NOTE: this issue can be leveraged to conduct cross-site scripting (XSS) attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060627 Re: [MajorSecurity #18] Ralf Image Gallery <=0.7.4 - Multiple XSS, Remote File Include and directory traversal vulnerabilities](http://www.securityfocus.com/archive/1/438645/100/100/threaded)
2. [rig-dirabssrc-dirabsadminsrc-xss(27257)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27257)
3. [18548](http://www.securityfocus.com/bid/18548)
4. [20060620 [MajorSecurity #18] Ralf Image Gallery <=0.7.4 - Multiple XSS, Remote File Include and directory traversal vulnerabilities](http://www.securityfocus.com/archive/1/437818/100/0/threaded)
5. [26753](http://www.osvdb.org/26753)
6. [](http://rig.powerpulsar.com/#news)
7. [rig-dirabssrc-dirabsadminsrc-file-include(27259)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27259)
8. [1136](http://securityreason.com/securityalert/1136)
9. [26756](http://www.osvdb.org/26756)
10. [26754](http://www.osvdb.org/26754)
11. [rig-dirabssrc-directory-traversal(27256)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27256)
12. [26755](http://www.osvdb.org/26755)
13. [](http://www.majorsecurity.de/advisory/major_rls18.txt)
14. [ADV-2006-2477](http://www.vupen.com/english/advisories/2006/2477)
15. [20771](http://secunia.com/advisories/20771) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6370, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6370 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6370
- **State**: REJECTED
- **Published Date**: December 15, 2007 at 01:00 UTC
- **Last Updated**: December 19, 2007 at 10:00 UTC
- **Reserved Date**: December 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41848
- **State**: PUBLISHED
- **Published Date**: March 11, 2022 at 22:17 UTC
- **Last Updated**: August 04, 2024 at 03:22 UTC
- **Reserved Date**: October 01, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Luna Simo PPR1.180610.011/202001031830. It mishandles software updates such that local third-party apps can provide a spoofed software update file that contains an arbitrary shell script and arbitrary ARM binary, where both will be executed as the root user with an SELinux domain named osi. To exploit this vulnerability, a local third-party app needs to have write access to external storage to write the spoofed update at the expected path. The vulnerable system binary (i.e., /system/bin/osi_bin) does not perform any authentication of the update file beyond ensuring that it is encrypted with an AES key (that is hard-coded in the vulnerable system binary). Processes executing with the osi SELinux domain can programmatically perform the following actions: install apps, grant runtime permissions to apps (including permissions with protection levels of dangerous and development), access extensive Personally Identifiable Information (PII) using the programmatically grant permissions, uninstall apps, set the default launcher app to a malicious launcher app that spoofs other apps, set a network proxy to intercept network traffic, unload kernel modules, set the default keyboard to a keyboard that has keylogging functionality, examine notification contents, send text messages, and more. The spoofed update can optionally contain an arbitrary ARM binary that will be locally stored in internal storage and executed at system startup to achieve persistent code execution as the root user with the osi SELinux domain. This ARM binary will continue to execute at startup even if the app that provided the spoofed update is uninstalled.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://simowireless.com/)
2. [](https://www.kryptowire.com/android-firmware-2022/)
3. [](https://athack.com/session-details/401)
4. [](https://www.kryptowire.com/blog/vsim-vulnerability-within-simo-android-phones-exposed/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13669, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13669 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13669
- **State**: PUBLISHED
- **Published Date**: February 11, 2022 at 15:25 UTC
- **Last Updated**: August 04, 2024 at 12:25 UTC
- **Reserved Date**: May 28, 2020 at 00:00 UTC
- **Assigned By**: drupal
### Vulnerability Description
Cross-site Scripting (XSS) vulnerability in ckeditor of Drupal Core allows attacker to inject XSS. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10.; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Drupal - Core**
Affected versions:
- 8.8.x (Status: affected)
- 8.9.x (Status: affected)
- 9.0.x (Status: affected)
### References
1. [](https://www.drupal.org/sa-core-2020-010) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5702, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5702 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5702
- **State**: PUBLISHED
- **Published Date**: June 11, 2024 at 12:40 UTC
- **Last Updated**: August 12, 2024 at 17:00 UTC
- **Reserved Date**: June 06, 2024 at 15:05 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125, Firefox ESR < 115.12, and Thunderbird < 115.12.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1193389)
2. [](https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html)
3. [](https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html)
4. [](https://www.mozilla.org/security/advisories/mfsa2024-18/)
5. [](https://www.mozilla.org/security/advisories/mfsa2024-26/)
6. [](https://www.mozilla.org/security/advisories/mfsa2024-28/)
### Credits
- Kershaw Chang |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1620, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1620 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1620
- **State**: PUBLISHED
- **Published Date**: February 08, 2013 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 15:04 UTC
- **Reserved Date**: February 05, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html)
2. [57777](http://www.securityfocus.com/bid/57777)
3. [](http://www.vmware.com/security/advisories/VMSA-2014-0012.html)
4. [](http://www.isg.rhul.ac.uk/tls/TLStiming.pdf)
5. [openSUSE-SU-2013:0630](http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html)
6. [[oss-security] 20130205 Re: CVE request: TLS CBC padding timing flaw in various SSL / TLS implementations](http://openwall.com/lists/oss-security/2013/02/05/24)
7. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://www.securityfocus.com/archive/1/534161/100/0/threaded)
8. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html)
9. [USN-1763-1](http://www.ubuntu.com/usn/USN-1763-1)
10. [GLSA-201406-19](http://security.gentoo.org/glsa/glsa-201406-19.xml)
11. [RHSA-2013:1135](http://rhn.redhat.com/errata/RHSA-2013-1135.html)
12. [](http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html)
13. [](http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html)
14. [RHSA-2013:1144](http://rhn.redhat.com/errata/RHSA-2013-1144.html)
15. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761)
16. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://seclists.org/fulldisclosure/2014/Dec/23)
17. [openSUSE-SU-2013:0631](http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html)
18. [64758](http://www.securityfocus.com/bid/64758)
19. [](http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43875
- **State**: PUBLISHED
- **Published Date**: December 15, 2021 at 14:15 UTC
- **Last Updated**: August 04, 2024 at 04:10 UTC
- **Reserved Date**: November 16, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Office Graphics Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019 for Mac**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC for Mac 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43875) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0662, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0662 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0662
- **State**: PUBLISHED
- **Published Date**: January 30, 2025 at 04:49 UTC
- **Last Updated**: February 07, 2025 at 17:02 UTC
- **Reserved Date**: January 23, 2025 at 01:56 UTC
- **Assigned By**: freebsd
### Vulnerability Description
In some cases, the ktrace facility will log the contents of kernel structures to userspace. In one such case, ktrace dumps a variable-sized sockaddr to userspace. There, the full sockaddr is copied, even when it is shorter than the full size. This can result in up to 14 uninitialized bytes of kernel memory being copied out to userspace.
It is possible for an unprivileged userspace program to leak 14 bytes of a kernel heap allocation to userspace.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**FreeBSD - FreeBSD**
Affected versions:
- 14.2-RELEASE (Status: affected)
### References
1. [](https://security.freebsd.org/advisories/FreeBSD-SA-25:04.ktrace.asc)
### Credits
- Yichen Chai
- Zhuo Ying Jiang Li |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4740, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4740 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4740
- **State**: PUBLISHED
- **Published Date**: August 31, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 20:42 UTC
- **Reserved Date**: August 31, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the captive portal in PacketFence before 3.3.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[Packetfence-announce] 20120413 PacketFence 3.3.0 released!](http://sourceforge.net/mailarchive/message.php?msg_id=29126135)
2. [53027](http://www.securityfocus.com/bid/53027)
3. [packetfence-unspecified-xss(74887)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74887)
4. [48833](http://secunia.com/advisories/48833) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5273, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5273 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5273
- **State**: PUBLISHED
- **Published Date**: January 08, 2018 at 05:00 UTC
- **Last Updated**: August 05, 2024 at 05:33 UTC
- **Reserved Date**: January 07, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e014. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Malwarebytes_POC/tree/master/0x9c40e014) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16002, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16002 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16002
- **State**: PUBLISHED
- **Published Date**: November 26, 2019 at 03:41 UTC
- **Last Updated**: November 21, 2024 at 19:05 UTC
- **Reserved Date**: September 06, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the vManage web-based UI (web UI) of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web UI on an affected instance of vManage. An attacker could exploit this vulnerability by persuading a user to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Cisco - Cisco vManage Software**
Affected versions:
- unspecified (Status: affected)
### References
1. [20191120 Cisco SD-WAN Solution vManage Cross-Site Request Forgery Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-vman-csrf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52096, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52096 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52096
- **State**: PUBLISHED
- **Published Date**: December 26, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 22:48 UTC
- **Reserved Date**: December 26, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SteVe Community ocpp-jaxb before 0.0.8 generates invalid timestamps such as ones with month 00 in certain situations (such as when an application receives a StartTransaction Open Charge Point Protocol message with a timestamp parameter of 1000000). This may lead to a SQL exception in applications, and may undermine the integrity of transaction records.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/steve-community/steve/issues/1292)
2. [](https://github.com/steve-community/ocpp-jaxb/issues/13)
3. [](https://github.com/steve-community/ocpp-jaxb/compare/0.0.7...0.0.8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21249, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21249 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21249
- **State**: PUBLISHED
- **Published Date**: January 15, 2021 at 20:10 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 22, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is an issue involving YAML parsing which can lead to post-auth remote code execution. In order to parse and process YAML files, OneDev uses SnakeYaml which by default (when not using `SafeConstructor`) allows the instantiation of arbitrary classes. We can leverage that to run arbitrary code by instantiating classes such as `javax.script.ScriptEngineManager` and using `URLClassLoader` to load the script engine provider, resulting in the instantiation of a user controlled class. For a full example refer to the referenced GHSA. This issue was addressed in 4.0.3 by only allowing certain known classes to be deserialized
### CVSS Metrics
- **CVSS Base Score**: 9.6/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-74: Security Weakness
### Affected Products
**theonedev - onedev**
Affected versions:
- < 4.0.3 (Status: affected)
### References
1. [](https://github.com/theonedev/onedev/security/advisories/GHSA-7xhq-m2q9-6hpm)
2. [](https://github.com/theonedev/onedev/commit/d6fc4212b1ac1e9bbe3ce444e95f9af1e3ab8b66) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29212, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29212 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29212
- **State**: PUBLISHED
- **Published Date**: May 13, 2024 at 01:07 UTC
- **Last Updated**: August 02, 2024 at 01:10 UTC
- **Reserved Date**: March 19, 2024 at 01:04 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Due to an unsafe de-serialization method used by the Veeam Service Provider Console(VSPC) server in communication between the management agent and its components, under certain conditions, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.
### Affected Products
**Veeam - Service Provider Console**
Affected versions:
- 8 (Status: affected)
- 7 (Status: affected)
### References
1. [](https://www.veeam.com/kb4575) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28799, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28799 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28799
- **State**: PUBLISHED
- **Published Date**: June 22, 2023 at 19:06 UTC
- **Last Updated**: December 05, 2024 at 17:43 UTC
- **Reserved Date**: March 23, 2023 at 18:29 UTC
- **Assigned By**: Zscaler
### Vulnerability Description
A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-1287: Security Weakness
### Affected Products
**Zscaler - Client Connector**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=Windows&applicable_version=3.7&deployment_date=2021-11-26&id=1386541)
2. [](https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Chrome%20OS&applicable_version=1.10.1&deployment_date=2023-03-10&id=1447771)
3. [](https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Android&applicable_version=1.10.2&deployment_date=2023-03-09&id=1447706)
4. [](https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=iOS&applicable_version=1.9.3&deployment_date=2023-03-03&id=1447071)
5. [](https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux&applicable_version=1.4&deployment_date=2022-10-31&id=1420246)
6. [](https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macOS&applicable_version=3.9&deployment_date=2023-01-25&id=1443546)
### Credits
- Tesla Red Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34711, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34711 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34711
- **State**: PUBLISHED
- **Published Date**: August 15, 2022 at 20:30 UTC
- **Last Updated**: January 02, 2025 at 19:34 UTC
- **Reserved Date**: June 27, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Defender Credential Guard Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
### References
1. [Windows Defender Credential Guard Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34711) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26076
- **State**: PUBLISHED
- **Published Date**: April 14, 2021 at 23:45 UTC
- **Last Updated**: October 17, 2024 at 14:12 UTC
- **Reserved Date**: January 25, 2021 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
The jira.editor.user.mode cookie set by the Jira Editor Plugin in Jira Server and Data Center before version 8.5.12, from version 8.6.0 before version 8.13.4, and from version 8.14.0 before version 8.15.0 allows remote anonymous attackers who can perform an attacker in the middle attack to learn which mode a user is editing in due to the cookie not being set with a secure attribute if Jira was configured to use https.
### Affected Products
**Atlassian - Jira Server**
Affected versions:
- unspecified (Status: affected)
- 8.6.0 (Status: affected)
- unspecified (Status: affected)
- 8.14.0 (Status: affected)
- unspecified (Status: affected)
**Atlassian - Jira Data Center**
Affected versions:
- unspecified (Status: affected)
- 8.6.0 (Status: affected)
- unspecified (Status: affected)
- 8.14.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/JRASERVER-72252) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49221, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49221 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49221
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 01:55 UTC
- **Last Updated**: May 04, 2025 at 12:44 UTC
- **Reserved Date**: February 26, 2025 at 01:49 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dp: populate connector of struct dp_panel
DP CTS test case 4.2.2.6 has valid edid with bad checksum on purpose
and expect DP source return correct checksum. During drm edid read,
correct edid checksum is calculated and stored at
connector::real_edid_checksum.
The problem is struct dp_panel::connector never be assigned, instead the
connector is stored in struct msm_dp::connector. When we run compliance
testing test case 4.2.2.6 dp_panel_handle_sink_request() won't have a valid
edid set in struct dp_panel::edid so we'll try to use the connectors
real_edid_checksum and hit a NULL pointer dereference error because the
connector pointer is never assigned.
Changes in V2:
-- populate panel connector at msm_dp_modeset_init() instead of at dp_panel_read_sink_caps()
Changes in V3:
-- remove unhelpful kernel crash trace commit text
-- remove renaming dp_display parameter to dp
Changes in V4:
-- add more details to commit text
Changes in v10:
-- group into one series
Changes in v11:
-- drop drm/msm/dp: dp_link_parse_sink_count() return immediately if aux read
Signee-off-by: Kuogee Hsieh <quic_khsieh@quicinc.com>
### Affected Products
**Linux - Linux**
Affected versions:
- f86bc4a1a401d3691bad41e67f9db0c2ea94da32 (Status: affected)
- 7948fe12d47a946fb8025a0534c900e3dd4b5839 (Status: affected)
- 7948fe12d47a946fb8025a0534c900e3dd4b5839 (Status: affected)
- 7948fe12d47a946fb8025a0534c900e3dd4b5839 (Status: affected)
- 7948fe12d47a946fb8025a0534c900e3dd4b5839 (Status: affected)
- ab1ccd1e2584b268784518f838f7cc72faec576b (Status: affected)
- 08a96864a45b65ee406a344c78dd761b2fd66887 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15 (Status: affected)
- 0 (Status: unaffected)
- 5.10.110 (Status: unaffected)
- 5.15.33 (Status: unaffected)
- 5.16.19 (Status: unaffected)
- 5.17.2 (Status: unaffected)
- 5.18 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/413c62697b61226a236c8b1f5cd64dcf42bcc12f)
2. [](https://git.kernel.org/stable/c/9525b8bcae8b99188990b56484799cf4b1b43786)
3. [](https://git.kernel.org/stable/c/fbba600f432a360b42452fee79d1fb35d3aa8aeb)
4. [](https://git.kernel.org/stable/c/104074ebc0c3f358dd1ee944fbcde92c6e5a21dd)
5. [](https://git.kernel.org/stable/c/5e602f5156910c7b19661699896cb6e3fb94fab9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6287, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6287
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3172, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3172 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3172
- **State**: PUBLISHED
- **Published Date**: June 11, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 14:05 UTC
- **Reserved Date**: June 11, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in demo/pop3/error.php in Uebimiau Webmail allows remote attackers to determine the existence of arbitrary directories via an absolute pathname and .. (dot dot) in the selected_theme parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [38337](http://osvdb.org/38337)
2. [24210](http://www.securityfocus.com/bid/24210)
3. [uebimiau-error-directory-traversal(34555)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34555)
4. [20070528 Uebimiau Webmail Multiple Vulnerabilities](http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063629.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37895, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37895 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37895
- **State**: PUBLISHED
- **Published Date**: July 25, 2023 at 14:02 UTC
- **Last Updated**: February 13, 2025 at 17:01 UTC
- **Reserved Date**: July 10, 2023 at 17:49 UTC
- **Assigned By**: apache
### Vulnerability Description
Java object deserialization issue in Jackrabbit webapp/standalone on all platforms allows attacker to remotely execute code via RMIVersions up to (including) 2.20.10 (stable branch) and 2.21.17 (unstable branch) use the component "commons-beanutils", which contains a class that can be used for remote code execution over RMI.
Users are advised to immediately update to versions 2.20.11 or 2.21.18. Note that earlier stable branches (1.0.x .. 2.18.x) have been EOLd already and do not receive updates anymore.
In general, RMI support can expose vulnerabilities by the mere presence of an exploitable class on the classpath. Even if Jackrabbit itself does not contain any code known to be exploitable anymore, adding other components to your server can expose the same type of problem. We therefore recommend to disable RMI access altogether (see further below), and will discuss deprecating RMI support in future Jackrabbit releases.
How to check whether RMI support is enabledRMI support can be over an RMI-specific TCP port, and over an HTTP binding. Both are by default enabled in Jackrabbit webapp/standalone.
The native RMI protocol by default uses port 1099. To check whether it is enabled, tools like "netstat" can be used to check.
RMI-over-HTTP in Jackrabbit by default uses the path "/rmi". So when running standalone on port 8080, check whether an HTTP GET request on localhost:8080/rmi returns 404 (not enabled) or 200 (enabled). Note that the HTTP path may be different when the webapp is deployed in a container as non-root context, in which case the prefix is under the user's control.
Turning off RMIFind web.xml (either in JAR/WAR file or in unpacked web application folder), and remove the declaration and the mapping definition for the RemoteBindingServlet:
<servlet>
<servlet-name>RMI</servlet-name>
<servlet-class>org.apache.jackrabbit.servlet.remote.RemoteBindingServlet</servlet-class>
</servlet>
<servlet-mapping>
<servlet-name>RMI</servlet-name>
<url-pattern>/rmi</url-pattern>
</servlet-mapping>
Find the bootstrap.properties file (in $REPOSITORY_HOME), and set
rmi.enabled=false
and also remove
rmi.host
rmi.port
rmi.url-pattern
If there is no file named bootstrap.properties in $REPOSITORY_HOME, it is located somewhere in the classpath. In this case, place a copy in $REPOSITORY_HOME and modify it as explained.
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Apache Software Foundation - Apache Jackrabbit Webapp (jackrabbit-webapp)**
Affected versions:
- 2.21.0 (Status: affected)
- 1.0.0 (Status: affected)
**Apache Software Foundation - Apache Jackrabbit Standalone (jackrabbit-standalone and jackrabbit-standalone-components)**
Affected versions:
- 2.21.0 (Status: affected)
- 1.0.0 (Status: affected)
### References
1. [](https://lists.apache.org/list.html?users@jackrabbit.apache.org)
2. [](https://lists.apache.org/thread/j03b3qdhborc2jrhdc4d765d3jkh8bfw)
3. [](http://seclists.org/fulldisclosure/2023/Jul/43)
4. [](http://www.openwall.com/lists/oss-security/2023/07/25/8)
### Credits
- Siebene@
- Michael Dürig
- Manfred Baedke |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6012, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6012
- **State**: PUBLISHED
- **Published Date**: November 21, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 20:12 UTC
- **Reserved Date**: November 21, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in csm/asp/listings.asp in MGinternet Car Site Manager (CSM) allows remote attackers to inject arbitrary web script or HTML via the p parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-4532](http://www.vupen.com/english/advisories/2006/4532)
2. [carsitemanager-listings-xss(30274)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30274) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14456, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14456 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14456
- **State**: PUBLISHED
- **Published Date**: June 19, 2020 at 13:12 UTC
- **Last Updated**: August 04, 2024 at 12:46 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Mattermost Desktop App before 4.4.0. The Same Origin Policy is mishandled during access-control decisions for web APIs, aka MMSA-2020-0006.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://mattermost.com/security-updates/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4830
- **State**: PUBLISHED
- **Published Date**: April 16, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 10:31 UTC
- **Reserved Date**: October 31, 2008 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Insecure method vulnerability in the KWEdit ActiveX control in SAP GUI 6.40 Patch 29 (KWEDIT.DLL 6400.1.1.41) and 7.10 Patch 5 (KWEDIT.DLL 7100.1.1.43) allows remote attackers to (1) overwrite arbitrary files via the SaveDocumentAs method or (2) read or execute arbitrary files via the OpenDocument method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://secunia.com/secunia_research/2008-56/)
2. [32869](http://secunia.com/advisories/32869)
3. [20090415 Secunia Research: SAP GUI KWEdit ActiveX Control "SaveDocumentAs()" Insecure Method](http://www.securityfocus.com/archive/1/502698/100/0/threaded)
4. [ADV-2009-1043](http://www.vupen.com/english/advisories/2009/1043)
5. [34524](http://www.securityfocus.com/bid/34524)
6. [1022062](http://www.securitytracker.com/id?1022062) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1950, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1950 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1950
- **State**: PUBLISHED
- **Published Date**: June 05, 2009 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 05:27 UTC
- **Reserved Date**: June 05, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in yorum.asp in WebEyes Guest Book 3 allows remote attackers to execute arbitrary SQL commands via the mesajid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8859](https://www.exploit-db.com/exploits/8859)
2. [35290](http://secunia.com/advisories/35290) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-48250, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-48250 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48250
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 14:44 UTC
- **Last Updated**: May 19, 2025 at 15:19 UTC
- **Reserved Date**: May 19, 2025 at 14:13 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory Coupons & Add to Cart by URL Links for WooCommerce allows Stored XSS. This issue affects Coupons & Add to Cart by URL Links for WooCommerce: from n/a through 1.7.7.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WPFactory - Coupons & Add to Cart by URL Links for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/url-coupons-for-woocommerce-by-algoritmika/vulnerability/wordpress-coupons-add-to-cart-by-url-links-for-woocommerce-1-7-7-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- muhammad yudha (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0500, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0500 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0500
- **State**: PUBLISHED
- **Published Date**: January 13, 2024 at 19:00 UTC
- **Last Updated**: June 03, 2025 at 14:02 UTC
- **Reserved Date**: January 12, 2024 at 12:48 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in SourceCodester House Rental Management System 1.0. Affected is an unknown function of the component Manage Tenant Details. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250608.
### CVSS Metrics
- **CVSS Base Score**: 2.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SourceCodester - House Rental Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.250608)
2. [](https://vuldb.com/?ctiid.250608)
3. [](https://drive.google.com/file/d/1z30nTAfoX58NqwIMXyHb3LB6Pv2bEm5v/view?usp=sharing)
### Credits
- Strik3r (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4422, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4422 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4422
- **State**: PUBLISHED
- **Published Date**: October 23, 2013 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 16:45 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
SQL injection vulnerability in Quassel IRC before 0.9.1, when Qt 4.8.5 or later and PostgreSQL 8.2 or later are used, allows remote attackers to execute arbitrary SQL commands via a \ (backslash) in a message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://quassel-irc.org/node/120)
2. [55194](http://secunia.com/advisories/55194)
3. [55581](http://secunia.com/advisories/55581)
4. [](http://bugs.quassel-irc.org/issues/1244)
5. [[oss-security] 20131010 Re: CVE Request - Quassel IRC SQL injection](http://seclists.org/oss-sec/2013/q4/74)
6. [quasselirc-backslash-sql-injection(87805)](https://exchange.xforce.ibmcloud.com/vulnerabilities/87805)
7. [GLSA-201311-03](http://security.gentoo.org/glsa/glsa-201311-03.xml)
8. [62923](http://www.securityfocus.com/bid/62923) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.