System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-43918, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-43918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-43918
- **State**: PUBLISHED
- **Published Date**: April 19, 2025 at 00:00 UTC
- **Last Updated**: April 21, 2025 at 14:19 UTC
- **Reserved Date**: April 19, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SSL.com before 2025-04-19, when domain validation method 3.2.2.4.14 is used, processes certificate requests such that a trusted TLS certificate may be issued for the domain name of a requester's email address, even when the requester does not otherwise establish administrative control of that domain.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-348: Security Weakness
### Affected Products
**SSL.com - SSL.com**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://news.ycombinator.com/item?id=43738485)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1961406) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38454, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38454
- **State**: PUBLISHED
- **Published Date**: June 16, 2024 at 00:00 UTC
- **Last Updated**: March 17, 2025 at 14:07 UTC
- **Reserved Date**: June 16, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ExpressionEngine before 7.4.11 allows XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ExpressionEngine/ExpressionEngine/pull/4279)
2. [](https://github.com/ExpressionEngine/ExpressionEngine/compare/7.4.10...7.4.11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2199, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2199 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2199
- **State**: PUBLISHED
- **Published Date**: July 20, 2022 at 15:24 UTC
- **Last Updated**: April 16, 2025 at 17:51 UTC
- **Reserved Date**: June 24, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
The main MiCODUS MV720 GPS tracker web server has a reflected cross-site scripting vulnerability that could allow an attacker to gain control by tricking a user into making a request.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**MiCODUS - MV720**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01)
### Credits
- Pedro Umbelino, Dan Dahlberg, and Jacob Olcott of BitSight reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45164, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45164
- **State**: PUBLISHED
- **Published Date**: November 04, 2024 at 00:00 UTC
- **Last Updated**: November 06, 2024 at 16:18 UTC
- **Reserved Date**: August 22, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Akamai SIA (Secure Internet Access Enterprise) ThreatAvert, in SPS (Security and Personalization Services) before the latest 19.2.0 patch and Apps Portal before 19.2.0.3 or 19.2.0.20240814, has incorrect authorization controls for the Admin functionality on the ThreatAvert Policy page. An authenticated user can navigate directly to the /#app/intelligence/threatAvertPolicies URI and disable policy enforcement.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.akamai.com/global-services/support/vulnerability-reporting)
2. [](https://notes.netbytesec.com/2024/11/cve-2024-45164-broken-access-control.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8359, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8359
- **State**: REJECTED
- **Published Date**: April 13, 2021 at 20:41 UTC
- **Last Updated**: April 13, 2021 at 20:41 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13704, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13704
- **State**: PUBLISHED
- **Published Date**: February 18, 2025 at 07:28 UTC
- **Last Updated**: February 18, 2025 at 15:47 UTC
- **Reserved Date**: January 24, 2025 at 14:22 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Super Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'st_user_title' parameter in all versions up to, and including, 4.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**themepoints - Super Testimonials**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/20720912-6bfd-4df1-97c7-7025c16d7a0f?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3240039%40super-testimonial&new=3240039%40super-testimonial&sfp_email=&sfph_mail=)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3813, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3813 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3813
- **State**: PUBLISHED
- **Published Date**: July 21, 2023 at 02:04 UTC
- **Last Updated**: February 05, 2025 at 19:38 UTC
- **Reserved Date**: July 20, 2023 at 13:36 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file downloads in versions up to, and including, 2.5.0. This makes it possible for unauthenticated attackers to download the contents of arbitrary files on the server, which can contain sensitive information. The requires the premium version of the plugin to be activated.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**artbees/ - Jupiter X Core**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/f767d94b-fe92-4b69-9d81-96de51e12983?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/utils.php?rev=2777235#L425)
### Credits
- Lana Codes |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7931, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7931
- **State**: PUBLISHED
- **Published Date**: January 22, 2015 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 13:03 UTC
- **Reserved Date**: October 06, 2014 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
factory.cc in Google V8, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code that triggers improper maintenance of backing-store pointers.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [62665](http://secunia.com/advisories/62665)
2. [](https://codereview.chromium.org/813023002)
3. [](http://googlechromereleases.blogspot.com/2015/01/stable-update.html)
4. [62575](http://secunia.com/advisories/62575)
5. [USN-2476-1](http://www.ubuntu.com/usn/USN-2476-1)
6. [72288](http://www.securityfocus.com/bid/72288)
7. [GLSA-201502-13](http://security.gentoo.org/glsa/glsa-201502-13.xml)
8. [1031623](http://www.securitytracker.com/id/1031623)
9. [](https://code.google.com/p/chromium/issues/detail?id=442710)
10. [openSUSE-SU-2015:0441](http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html)
11. [RHSA-2015:0093](http://rhn.redhat.com/errata/RHSA-2015-0093.html)
12. [62383](http://secunia.com/advisories/62383) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41646
- **State**: PUBLISHED
- **Published Date**: May 10, 2023 at 13:16 UTC
- **Last Updated**: January 27, 2025 at 18:07 UTC
- **Reserved Date**: September 29, 2022 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Insufficient control flow management in the Intel(R) IPP Cryptography software before version 2021.6 may allow an unauthenticated user to potentially enable information disclosure via local access.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-691: Security Weakness
### Affected Products
**n/a - Intel(R) IPP Cryptography software**
Affected versions:
- before version 2021.6 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00788.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00788.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2851, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2851 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2851
- **State**: PUBLISHED
- **Published Date**: May 30, 2015 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 05:24 UTC
- **Reserved Date**: April 03, 2015 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
client_chown in the sync client in Synology Cloud Station 1.1-2291 through 3.1-3320 on OS X allows local users to change the ownership of arbitrary files, and consequently obtain root access, by specifying a filename.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [74826](http://www.securityfocus.com/bid/74826)
2. [](http://www.kb.cert.org/vuls/id/BLUU-9VBU45)
3. [VU#551972](http://www.kb.cert.org/vuls/id/551972) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1540, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1540 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1540
- **State**: PUBLISHED
- **Published Date**: April 29, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 22:28 UTC
- **Reserved Date**: March 29, 2011 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP System Management Homepage (SMH) before 6.3 allows remote authenticated users to execute arbitrary code via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1025414](http://www.securitytracker.com/id?1025414)
2. [47507](http://www.securityfocus.com/bid/47507)
3. [HPSBMA02662](http://marc.info/?l=bugtraq&m=130331363227777&w=2)
4. [8233](http://securityreason.com/securityalert/8233)
5. [SSRT100409](http://marc.info/?l=bugtraq&m=130331363227777&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4420, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4420 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4420
- **State**: PUBLISHED
- **Published Date**: January 19, 2011 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 03:43 UTC
- **Reserved Date**: December 06, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Database Vault component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, and 11.2.0.1 allows local users to affect confidentiality and integrity via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2011-0139](http://www.vupen.com/english/advisories/2011/0139)
2. [oracle-db-vault-unspecified(64760)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64760)
3. [1024972](http://www.securitytracker.com/id?1024972)
4. [45855](http://www.securityfocus.com/bid/45855)
5. [42895](http://secunia.com/advisories/42895)
6. [](http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12816
- **State**: PUBLISHED
- **Published Date**: January 25, 2025 at 07:24 UTC
- **Last Updated**: January 27, 2025 at 14:54 UTC
- **Reserved Date**: December 19, 2024 at 20:11 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The NOTICE BOARD BY TOWKIR plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'notice-board' shortcode in all versions up to, and including, 3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**mastowkir - NOTICE BOARD BY TOWKIR**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/069b2f3e-da9d-476c-a9fa-1b7d445a704b?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/notice-board-by-towkir/trunk/towkir-notice-board.php)
3. [](https://wordpress.org/plugins/notice-board-by-towkir/)
### Credits
- zakaria |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8416, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8416 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8416
- **State**: PUBLISHED
- **Published Date**: November 14, 2018 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 06:54 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A tampering vulnerability exists when .NET Core improperly handles specially crafted files, aka ".NET Core Tampering Vulnerability." This affects .NET Core 2.1.
### Affected Products
**Microsoft - .NET Core**
Affected versions:
- 2.1 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8416)
2. [105798](http://www.securityfocus.com/bid/105798)
3. [RHSA-2018:3676](https://access.redhat.com/errata/RHSA-2018:3676)
4. [1042128](http://www.securitytracker.com/id/1042128) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46183, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46183
- **State**: REJECTED
- **Last Updated**: January 27, 2023 at 00:00 UTC
- **Reserved Date**: November 28, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8167
- **State**: PUBLISHED
- **Published Date**: August 26, 2024 at 14:31 UTC
- **Last Updated**: August 26, 2024 at 14:56 UTC
- **Reserved Date**: August 26, 2024 at 07:33 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in code-projects Job Portal 1.0. It has been classified as critical. Affected is an unknown function of the file /forget.php. The manipulation of the argument email/mobile leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**code-projects - Job Portal**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-275766 | code-projects Job Portal forget.php sql injection](https://vuldb.com/?id.275766)
2. [VDB-275766 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275766)
3. [Submit #397714 | code-projects Job Portal Using PHP With Source Code 1.0 SQL Injection](https://vuldb.com/?submit.397714)
4. [](https://github.com/t4rrega/cve/issues/1)
5. [](https://code-projects.org/)
### Credits
- t4rrega (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1622, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1622
- **State**: PUBLISHED
- **Published Date**: June 21, 2010 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 01:28 UTC
- **Reserved Date**: April 29, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html)
2. [ADV-2011-0237](http://www.vupen.com/english/advisories/2011/0237)
3. [](http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html)
4. [13918](http://www.exploit-db.com/exploits/13918)
5. [43087](http://secunia.com/advisories/43087)
6. [](http://www.springsource.com/security/cve-2010-1622)
7. [41025](http://secunia.com/advisories/41025)
8. [RHSA-2011:0175](http://www.redhat.com/support/errata/RHSA-2011-0175.html)
9. [](http://geronimo.apache.org/22x-security-report.html)
10. [40954](http://www.securityfocus.com/bid/40954)
11. [41016](http://secunia.com/advisories/41016)
12. [1033898](http://www.securitytracker.com/id/1033898)
13. [](http://geronimo.apache.org/21x-security-report.html)
14. [20100618 CVE-2010-1622: Spring Framework execution of arbitrary code](http://www.securityfocus.com/archive/1/511877) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23648, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23648
- **State**: PUBLISHED
- **Published Date**: January 24, 2024 at 18:05 UTC
- **Last Updated**: August 01, 2024 at 23:06 UTC
- **Reserved Date**: January 19, 2024 at 00:18 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. The password reset functionality sends to the the user requesting a password change an email containing an URL to reset its password. The URL sent contains a unique token, valid during 24 hours, allowing the user to reset its password. This token is highly sensitive ; as an attacker able to retrieve it would be able to resets the user's password. Prior to version 1.2.3, the reset-password URL is crafted using the "Host" HTTP header of the request sent to request a password reset. This way, an external attacker could send password requests for users, but specify a "Host" header of a website that they control. If the user receiving the mail clicks on the link, the attacker would retrieve the reset token of the victim and perform account takeover. Version 1.2.3 fixes this issue.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-74: Security Weakness
### Affected Products
**pimcore - admin-ui-classic-bundle**
Affected versions:
- < 1.2.3 (Status: affected)
### References
1. [https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-mrqg-mwh7-q94j](https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-mrqg-mwh7-q94j)
2. [https://github.com/pimcore/admin-ui-classic-bundle/commit/70f2205b5a5ea9584721d4f3e803f4d0dd5e4655](https://github.com/pimcore/admin-ui-classic-bundle/commit/70f2205b5a5ea9584721d4f3e803f4d0dd5e4655) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4742
- **State**: PUBLISHED
- **Published Date**: December 16, 2011 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 00:16 UTC
- **Reserved Date**: December 11, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 has web pages containing e-mail addresses that are not intended for correspondence about the local application deployment, which allows remote attackers to obtain potentially sensitive information by reading a page, as demonstrated by smb/user/list and certain other files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://xss.cx/examples/plesk-reports/xss-reflected-cross-site-scripting-cwe79-capec86-plesk-parallels-control-panel-version-20110407.20.html)
2. [plesk-mail-info-disclosure(72317)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72317) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44444, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44444
- **State**: PUBLISHED
- **Published Date**: January 04, 2023 at 00:00 UTC
- **Last Updated**: April 10, 2025 at 14:17 UTC
- **Reserved Date**: October 31, 2022 at 00:00 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In wlan driver, there is a possible missing bounds check. This could lead to local denial of service in wlan services.
### Weakness Classification (CWE)
- CWE-191: Security Weakness
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23980, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23980 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23980
- **State**: PUBLISHED
- **Published Date**: February 04, 2022 at 22:29 UTC
- **Last Updated**: February 20, 2025 at 20:31 UTC
- **Reserved Date**: January 26, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Scripting (XSS) vulnerability discovered in Yasr – Yet Another Stars Rating WordPress plugin (versions <= 2.9.9), vulnerable at parameter 'source'.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Dario Curvino - Yasr – Yet Another Stars Rating (WordPress plugin)**
Affected versions:
- <= 2.9.9 (Status: affected)
### References
1. [](https://wordpress.org/plugins/yet-another-stars-rating/#developers)
2. [](https://patchstack.com/database/vulnerability/yet-another-stars-rating/wordpress-yasr-yet-another-stars-rating-plugin-2-9-9-cross-site-scripting-xss-vulnerability)
### Credits
- Vulnerability discovered by ThuraMoeMyint (Patchstack Red Team project) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20604, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20604 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20604
- **State**: PUBLISHED
- **Published Date**: February 06, 2023 at 00:00 UTC
- **Last Updated**: March 26, 2025 at 14:14 UTC
- **Reserved Date**: October 28, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In ged, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07494067; Issue ID: ALPS07494067.
### Affected Products
**MediaTek, Inc. - MT6735, MT6737, MT6739, MT6753, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6885, MT6889, MT6893, MT6895, MT6983, MT8167, MT8362A**
Affected versions:
- Android 11.0, 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/February-2023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8774
- **State**: PUBLISHED
- **Published Date**: October 27, 2020 at 19:50 UTC
- **Last Updated**: August 04, 2024 at 21:31 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A resource exhaustion issue was addressed with improved input validation. This issue is fixed in iOS 13.1 and iPadOS 13.1, macOS Catalina 10.15. Parsing a maliciously crafted iBooks file may lead to a persistent denial-of-service.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT210634)
2. [](https://support.apple.com/en-us/HT210603) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43381, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43381
- **State**: PUBLISHED
- **Published Date**: December 23, 2022 at 18:19 UTC
- **Last Updated**: April 15, 2025 at 03:58 UTC
- **Reserved Date**: October 17, 2022 at 19:55 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in the AIX SMB client to cause a denial of service. IBM X-Force ID: 238639.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-399: Security Weakness
### Affected Products
**IBM - AIX**
Affected versions:
- 7.1, 7.2, 7.3, VIOS 3.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6851443)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/238639) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22639, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22639 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22639
- **State**: PUBLISHED
- **Published Date**: June 13, 2023 at 08:41 UTC
- **Last Updated**: October 23, 2024 at 14:26 UTC
- **Reserved Date**: January 05, 2023 at 10:06 UTC
- **Assigned By**: fortinet
### Vulnerability Description
A out-of-bounds write in Fortinet FortiOS version 7.2.0 through 7.2.3, FortiOS version 7.0.0 through 7.0.10, FortiOS version 6.4.0 through 6.4.12, FortiOS all versions 6.2, FortiOS all versions 6.0, FortiProxy version 7.2.0 through 7.2.2, FortiProxy version 7.0.0 through 7.0.8, FortiProxy all versions 2.0, FortiProxy all versions 1.2, FortiProxy all versions 1.1, FortiProxy all versions 1.0 allows attacker to escalation of privilege via specifically crafted commands.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Fortinet - FortiOS**
Affected versions:
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
- 6.4.0 (Status: affected)
- 6.2.0 (Status: affected)
- 6.0.0 (Status: affected)
**Fortinet - FortiProxy**
Affected versions:
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
- 2.0.0 (Status: affected)
- 1.2.0 (Status: affected)
- 1.1.0 (Status: affected)
- 1.0.0 (Status: affected)
### References
1. [https://fortiguard.com/psirt/FG-IR-22-494](https://fortiguard.com/psirt/FG-IR-22-494) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3087, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3087 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3087
- **State**: PUBLISHED
- **Published Date**: May 16, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 23:22 UTC
- **Reserved Date**: August 09, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Google Chrome before 19.0.1084.46 does not properly perform window navigation, which has unspecified impact and remote attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201205-03](http://security.gentoo.org/glsa/glsa-201205-03.xml)
2. [openSUSE-SU-2012:0656](http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00017.html)
3. [1027067](http://www.securitytracker.com/id?1027067)
4. [](http://code.google.com/p/chromium/issues/detail?id=118664)
5. [](http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html)
6. [53540](http://www.securityfocus.com/bid/53540)
7. [chrome-window-code-execution(75592)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75592)
8. [oval:org.mitre.oval:def:15567](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15567) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36922, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36922 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36922
- **State**: PUBLISHED
- **Published Date**: November 02, 2021 at 12:36 UTC
- **Last Updated**: August 04, 2024 at 01:09 UTC
- **Reserved Date**: July 19, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
RtsUpx.sys in Realtek RtsUpx USB Utility Driver for Camera/Hub/Audio through 1.14.0.0 allows local low-privileged users to achieve unauthorized access to USB devices (Escalation of Privileges, Denial of Service, Code Execution, and Information Disclosure) via a crafted Device IO Control packet to a device.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sentinelone.com/resources/category/report/)
2. [](https://www.realtek.com/images/safe-report/Realtek_RtsUpx_Security_Advisory_Report.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3212, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3212 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3212
- **State**: PUBLISHED
- **Published Date**: October 14, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 23:01 UTC
- **Reserved Date**: October 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple interpretation error in unspecified versions of NOD32 Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://shadock.net/secubox/AVCraftedArchive.html)
2. [20051007 Antivirus detection bypass by special crafted archive.](http://marc.info/?l=bugtraq&m=112879611919750&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21675, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21675 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21675
- **State**: REJECTED
- **Last Updated**: January 01, 2025 at 00:00 UTC
- **Reserved Date**: January 01, 2024 at 00:05 UTC
- **Assigned By**: atlassian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37630, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37630 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37630
- **State**: PUBLISHED
- **Published Date**: September 07, 2021 at 20:00 UTC
- **Last Updated**: August 04, 2024 at 01:23 UTC
- **Reserved Date**: July 29, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Nextcloud Circles is an open source social network built for the nextcloud ecosystem. In affected versions the Nextcloud Circles application allowed any user to join any "Secret Circle" without approval by the Circle owner leaking private information. It is recommended that Nextcloud Circles is upgraded to 0.19.15, 0.20.11 or 0.21.4. There are no workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**nextcloud - security-advisories**
Affected versions:
- < 0.19.15 (Status: affected)
- >= 0.20.0, < 0.20.11 (Status: affected)
- >= 0.21.0, < 0.21.4 (Status: affected)
### References
1. [](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-56j9-3rj4-wvgm)
2. [](https://github.com/nextcloud/circles/pull/768)
3. [](https://hackerone.com/reports/1257624) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1284, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1284 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1284
- **State**: PUBLISHED
- **Published Date**: July 23, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 04:40 UTC
- **Reserved Date**: January 21, 2015 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The LocalFrame::isURLAllowed function in core/frame/LocalFrame.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly check for a page's maximum number of frames, which allows remote attackers to cause a denial of service (invalid count value and use-after-free) or possibly have unspecified other impact via crafted JavaScript code that makes many createElement calls for IFRAME elements.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2015:1499](http://rhn.redhat.com/errata/RHSA-2015-1499.html)
2. [openSUSE-SU-2015:1287](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html)
3. [1033031](http://www.securitytracker.com/id/1033031)
4. [GLSA-201603-09](https://security.gentoo.org/glsa/201603-09)
5. [](https://code.google.com/p/chromium/issues/detail?id=493243)
6. [75973](http://www.securityfocus.com/bid/75973)
7. [](http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html)
8. [DSA-3315](http://www.debian.org/security/2015/dsa-3315)
9. [](https://src.chromium.org/viewvc/blink?revision=197139&view=revision) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9866
- **State**: PUBLISHED
- **Published Date**: May 29, 2019 at 16:28 UTC
- **Last Updated**: August 04, 2024 at 22:01 UTC
- **Reserved Date**: March 19, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in GitLab Community and Enterprise Edition 11.x before 11.7.7 and 11.8.x before 11.8.3. It allows Information Disclosure.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://about.gitlab.com/2019/03/20/critical-security-release-gitlab-11-dot-8-dot-3-released/)
2. [](https://gitlab.com/gitlab-org/gitlab-ce/issues/59003) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25157
- **State**: PUBLISHED
- **Published Date**: April 01, 2022 at 22:17 UTC
- **Last Updated**: August 03, 2024 at 04:29 UTC
- **Reserved Date**: February 14, 2022 at 00:00 UTC
- **Assigned By**: Mitsubishi
### Vulnerability Description
Use of Password Hash Instead of Password for Authentication vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GF11-T2 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GP21(S)-SX all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03UDECPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions, Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions, Mitsubishi Electric MELSEC L series L02/06/26CPU(-P) all versions, Mitsubishi Electric MELSEC L series L26CPU-(P)BT all versions, Mitsubishi Electric MELSEC L series LJ71C24(-R2) all versions, Mitsubishi Electric MELSEC L series LJ71E71-100 all versions and Mitsubishi Electric MELSEC L series LJ72GF15-T2 all versions allows a remote unauthenticated attacker to disclose or tamper with the information in the product by using an eavesdropped password hash.
### Affected Products
**n/a - Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU; Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU; Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU; Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU; Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU; Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4); Mitsubishi Electric MELSEC iQ-R series RJ71EN71; Mitsubishi Electric MELSEC iQ-R series RJ71GF11-T2; Mitsubishi Electric MELSEC iQ-R series RJ71GP21(S)-SX; Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2; Mitsubishi Electric MELSEC Q series Q03UDECPU; Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU; Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU; Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU; Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4); Mitsubishi Electric MELSEC Q series QJ71E71-100; Mitsubishi Electric MELSEC L series L02/06/26CPU(-P); Mitsubishi Electric MELSEC L series L26CPU-(P)BT; Mitsubishi Electric MELSEC L series LJ71C24(-R2); Mitsubishi Electric MELSEC L series LJ71E71-100; Mitsubishi Electric MELSEC L series LJ72GF15-T2**
Affected versions:
- Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series RJ71GF11-T2 all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series RJ71GP21(S)-SX all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions (Status: affected)
- Mitsubishi Electric MELSEC Q series Q03UDECPU all versions (Status: affected)
- Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU all versions (Status: affected)
- Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions (Status: affected)
- Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions (Status: affected)
- Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions (Status: affected)
- Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions (Status: affected)
- Mitsubishi Electric MELSEC L series L02/06/26CPU(-P) all versions (Status: affected)
- Mitsubishi Electric MELSEC L series L26CPU-(P)BT all versions (Status: affected)
- Mitsubishi Electric MELSEC L series LJ71C24(-R2) all versions (Status: affected)
- Mitsubishi Electric MELSEC L series LJ71E71-100 all versions (Status: affected)
- Mitsubishi Electric MELSEC L series LJ72GF15-T2 all versions (Status: affected)
### References
1. [](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-031_en.pdf)
2. [](https://jvn.jp/vu/JVNVU96577897/index.html)
3. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-04) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14114, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14114 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14114
- **State**: PUBLISHED
- **Published Date**: September 02, 2017 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 02:21 UTC
- **Reserved Date**: September 02, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
RTPproxy through 2.2.alpha.20160822 has a NAT feature that results in not properly determining the IP address and port number of the legitimate recipient of RTP traffic, which allows remote attackers to obtain sensitive information or cause a denial of service (communication outage) via crafted RTP packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rtpbleed.com) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1011, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1011
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:37 UTC
- **Reserved Date**: January 31, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
index2.php in Mambo Site Server 3.0.0 through 3.0.5 allows remote attackers to gain Mambo administrator privileges by setting the PHPSESSID parameter and providing the appropriate administrator information in other parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [mambo-phpsessid-gain-privileges(6910)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6910)
2. [](http://prdownloads.sourceforge.net/mambo/mambov3.0.6.tar.gz)
3. [20010725 Serious security hole in Mambo Site Server version 3.0.X](http://archives.neohapsis.com/archives/bugtraq/2001-07/0569.html)
4. [1911](http://www.osvdb.org/1911)
5. [3093](http://www.securityfocus.com/bid/3093) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20967
- **State**: PUBLISHED
- **Published Date**: January 16, 2024 at 21:41 UTC
- **Last Updated**: June 02, 2025 at 15:07 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- * (Status: affected)
- * (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2024.html)
2. [](https://security.netapp.com/advisory/ntap-20240201-0003/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41317, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41317
- **State**: PUBLISHED
- **Published Date**: September 05, 2023 at 18:31 UTC
- **Last Updated**: September 30, 2024 at 19:17 UTC
- **Reserved Date**: August 28, 2023 at 16:56 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
The Apollo Router is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Affected versions are subject to a Denial-of-Service (DoS) type vulnerability which causes the Router to panic and terminate when GraphQL Subscriptions are enabled. It can be triggered when **all of the following conditions are met**: 1. Running Apollo Router v1.28.0, v1.28.1 or v1.29.0 ("impacted versions"); **and** 2. The Supergraph schema provided to the Router (either via Apollo Uplink or explicitly via other configuration) **has a `subscription` type** with root-fields defined; **and** 3. The YAML configuration provided to the Router **has subscriptions enabled** (they are _disabled_ by default), either by setting `enabled: true` _or_ by setting a valid `mode` within the `subscriptions` object (as seen in [subscriptions' documentation](https://www.apollographql.com/docs/router/executing-operations/subscription-support/#router-setup)); **and** 4. An [anonymous](https://spec.graphql.org/draft/#sec-Anonymous-Operation-Definitions) (i.e., un-named) `subscription` operation (e.g., `subscription { ... }`) is received by the Router If **all four** of these criteria are met, the impacted versions will panic and terminate. There is no data-privacy risk or sensitive-information exposure aspect to this vulnerability. This is fixed in Apollo Router v1.29.1. Users are advised to upgrade. Updating to v1.29.1 should be a clear and simple upgrade path for those running impacted versions. However, if Subscriptions are **not** necessary for your Graph – but are enabled via configuration — then disabling subscriptions is another option to mitigate the risk.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-755: Security Weakness
### Affected Products
**apollographql - router**
Affected versions:
- >= 1.28.0, < 1.29.1 (Status: affected)
### References
1. [https://github.com/apollographql/router/security/advisories/GHSA-w8vq-3hf9-xppx](https://github.com/apollographql/router/security/advisories/GHSA-w8vq-3hf9-xppx)
2. [https://github.com/apollographql/router/commit/b295c103dd86c57c848397d32e8094edfa8502aa](https://github.com/apollographql/router/commit/b295c103dd86c57c848397d32e8094edfa8502aa)
3. [https://github.com/apollographql/router/releases/tag/v1.29.1](https://github.com/apollographql/router/releases/tag/v1.29.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3421
- **State**: PUBLISHED
- **Published Date**: May 08, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:43 UTC
- **Reserved Date**: May 07, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20140507 Re: CVE Request - Predictable temporary filenames in GNU Emacs](http://openwall.com/lists/oss-security/2014/05/07/7)
2. [[emacs-diffs] 20140506 emacs-24 r117066: * gnus-fun.el (gnus-grab-cam-face): Do not use predictable temp-file name.](http://lists.gnu.org/archive/html/emacs-diffs/2014-05/msg00055.html)
3. [MDVSA-2015:117](http://www.mandriva.com/security/advisories?name=MDVSA-2015:117)
4. [](http://advisories.mageia.org/MGASA-2014-0250.html)
5. [](http://debbugs.gnu.org/cgi/bugreport.cgi?bug=17428#8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16129
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 19:04 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to.
### Weakness Classification (CWE)
- CWE-409: Security Weakness
### Affected Products
**HackerOne - superagent node module**
Affected versions:
- <3.7.0 (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/479)
2. [](https://github.com/visionmedia/superagent/issues/1259) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24126, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24126 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24126
- **State**: PUBLISHED
- **Published Date**: January 27, 2025 at 21:46 UTC
- **Last Updated**: March 17, 2025 at 15:25 UTC
- **Reserved Date**: January 17, 2025 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An input validation issue was addressed. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An attacker on the local network may be able to cause unexpected system termination or corrupt process memory.
### Affected Products
**Apple - visionOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122073)
2. [](https://support.apple.com/en-us/122072)
3. [](https://support.apple.com/en-us/122068)
4. [](https://support.apple.com/en-us/122071)
5. [](https://support.apple.com/en-us/122066) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6541, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6541 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6541
- **State**: PUBLISHED
- **Published Date**: April 08, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 07:22 UTC
- **Reserved Date**: August 20, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in the Mail interface in Zimbra Collaboration Server (ZCS) before 8.5 allow remote attackers to hijack the authentication of arbitrary users for requests that change account preferences via a SOAP request to service/soap/BatchRequest.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wiki.zimbra.com/wiki/Security/Collab/86#Notes_from_8.5_.28Jetty.29)
2. [20160225 CVE-2015-6541 : Multiple CSRF in Zimbra Mail interface](http://seclists.org/fulldisclosure/2016/Feb/121)
3. [39500](https://www.exploit-db.com/exploits/39500/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2463, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2463 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2463
- **State**: PUBLISHED
- **Published Date**: August 25, 2022 at 17:24 UTC
- **Last Updated**: April 16, 2025 at 16:11 UTC
- **Reserved Date**: July 18, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. A crafted malicious .7z exchange file may allow an attacker to gain the privileges of the ISaGRAF Workbench software when opened. If the software is running at the SYSTEM level, then the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Rockwell Automation - ISaGRAF Workbench**
Affected versions:
- 6.0 (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03)
### Credits
- Mashav Sapir of Claroty Research reported these vulnerabilities to Rockwell Automation and CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10955, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10955 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10955
- **State**: PUBLISHED
- **Published Date**: September 13, 2019 at 12:17 UTC
- **Last Updated**: August 06, 2024 at 03:38 UTC
- **Reserved Date**: September 12, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The cysteme-finder plugin before 1.4 for WordPress has unrestricted file upload because of incorrect session tracking.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/8612)
2. [](https://wordpress.org/plugins/cysteme-finder/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0930, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0930 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0930
- **State**: PUBLISHED
- **Published Date**: March 05, 2010 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 01:37 UTC
- **Reserved Date**: March 05, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Perforce service (p4s.exe) in Perforce Server 2008.1 allows remote attackers to cause a denial of service (infinite loop) via crafted data that includes a byte sequence of 0xdc, 0xff, 0xff, and 0xff immediately before the client protocol version number.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36261](http://www.securityfocus.com/bid/36261)
2. [[dailydave] 20100304 Perforce](http://lists.immunitysec.com/pipermail/dailydave/2010-March/006063.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9079, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9079
- **State**: PUBLISHED
- **Published Date**: May 19, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 16:55 UTC
- **Reserved Date**: May 19, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Dropbear before 2017.75 might allow local users to read certain files as root, if the file has the authorized_keys file format with a command= option. This occurs because ~/.ssh/authorized_keys is read with root privileges and symlinks are followed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-3859](http://www.debian.org/security/2017/dsa-3859)
2. [](http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2017q2/001985.html)
3. [](https://security.netapp.com/advisory/ntap-20191004-0006/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21916, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21916 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21916
- **State**: PUBLISHED
- **Published Date**: April 18, 2023 at 19:54 UTC
- **Last Updated**: September 16, 2024 at 19:43 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Web Server). Supported versions that are affected are 8.58, 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Oracle Corporation - PeopleSoft Enterprise PT PeopleTools**
Affected versions:
- 8.58 (Status: affected)
- 8.59 (Status: affected)
- 8.60 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2023.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13706, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13706 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13706
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:14 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for IdeaCoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/IdeaCoin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0293, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0293 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0293
- **State**: PUBLISHED
- **Published Date**: September 17, 2020 at 20:48 UTC
- **Last Updated**: August 04, 2024 at 05:55 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Java network APIs, there is possible access to sensitive network state due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation in Android versions: Android-11, Android ID: A-141455849
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-11)
2. [](https://www.usenix.org/conference/usenixsecurity19/presentation/reardon)
3. [](https://www.usenix.org/system/files/sec19-reardon.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4529, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4529 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4529
- **State**: PUBLISHED
- **Published Date**: July 15, 2016 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 00:32 UTC
- **Reserved Date**: May 05, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An unspecified ActiveX control in Schneider Electric SoMachine HVAC Programming Software for M171/M172 Controllers before 2.1.0 allows remote attackers to execute arbitrary code via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-16-440)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-196-03)
3. [](http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2016-161-01)
4. [91778](http://www.securityfocus.com/bid/91778) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1449, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1449
- **State**: PUBLISHED
- **Published Date**: August 31, 2017 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 00:56 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Emptoris Sourcing 9.5 - 10.1.3 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 128174.
### Affected Products
**IBM - Emptoris Sourcing**
Affected versions:
- 9.5 (Status: affected)
- 10.0.0 (Status: affected)
- 10.0.1 (Status: affected)
- 10.0.2 (Status: affected)
- 10.0.4 (Status: affected)
- 10.1.0 (Status: affected)
- 10.1.1 (Status: affected)
- 10.1.3 (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg22005834)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/128174) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1044, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1044 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1044
- **State**: PUBLISHED
- **Published Date**: August 31, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:12 UTC
- **Reserved Date**: August 27, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Ultrafunk Popcorn 1.20 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long Subject field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [popcorn-mail-dos(9547)](http://www.iss.net/security_center/static/9547.php)
2. [20020711 Popcorn vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2002-07/0117.html)
3. [5212](http://www.securityfocus.com/bid/5212) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0577, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0577 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0577
- **State**: PUBLISHED
- **Published Date**: February 05, 2008 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 07:46 UTC
- **Reserved Date**: February 04, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Project Issue Tracking module 5.x-2.x-dev before 20080130 in the 5.x-2.x series, 5.x-1.2 and earlier in the 5.x-1.x series, 4.7.x-2.6 and earlier in the 4.7.x-2.x series, and 4.7.x-1.6 and earlier in the 4.7.x-1.x series for Drupal (1) does not restrict the extensions of attached files when the Upload module is enabled for issue nodes, which allows remote attackers to upload and possibly execute arbitrary files; and (2) accepts the .html extension within the bundled file-upload functionality, which allows remote attackers to upload files containing arbitrary web script or HTML.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-0376](http://www.vupen.com/english/advisories/2008/0376/references)
2. [](http://drupal.org/node/216063)
3. [28731](http://secunia.com/advisories/28731) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10911, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10911 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10911
- **State**: PUBLISHED
- **Published Date**: April 22, 2020 at 20:51 UTC
- **Last Updated**: August 04, 2024 at 11:14 UTC
- **Reserved Date**: March 24, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the GetFieldValue command of the communication API. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9944.
### Weakness Classification (CWE)
- CWE-843: Security Weakness
### Affected Products
**Foxit - PhantomPDF**
Affected versions:
- 9.7.0.29478 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-518/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000124, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000124 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000124
- **State**: PUBLISHED
- **Published Date**: March 13, 2018 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 02:01 UTC
- **Reserved Date**: March 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
I Librarian I-librarian version 4.8 and earlier contains a XML External Entity (XXE) vulnerability in line 154 of importmetadata.php(simplexml_load_string) that can result in an attacker reading the contents of a file and SSRF. This attack appear to be exploitable via posting xml in the Parameter form_import_textarea.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mkucej/i-librarian/issues/116) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35266, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35266 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35266
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 17:02 UTC
- **Last Updated**: May 05, 2025 at 17:01 UTC
- **Reserved Date**: May 14, 2024 at 20:14 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Azure DevOps Server Spoofing Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Microsoft - Azure DevOps Server 2022**
Affected versions:
- 20231128.1 (Status: affected)
### References
1. [Azure DevOps Server Spoofing Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35266) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10882, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10882 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10882
- **State**: PUBLISHED
- **Published Date**: September 26, 2019 at 15:16 UTC
- **Last Updated**: September 16, 2024 at 23:00 UTC
- **Reserved Date**: April 05, 2019 at 00:00 UTC
- **Assigned By**: airbus
### Vulnerability Description
The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from a stack based buffer overflow in "doHandshakefromServer" function. Local users can use this vulnerability to trigger a crash of the service and potentially cause additional impact on the system.
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Netskope - Netskope client**
Affected versions:
- Netskope client 57.2.0.219 (Status: unaffected)
- Netskope client 60.2.0.214 (Status: unaffected)
- 54 (Status: affected)
### References
1. [](https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf)
2. [](https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client)
3. [](https://airbus-seclab.github.io/advisories/netskope.html)
### Credits
- Julien Lenoit, Benoit Camredon, Mouad Abouhali from Airbus Security Lab. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2436
- **State**: PUBLISHED
- **Published Date**: July 20, 2021 at 22:44 UTC
- **Last Updated**: September 25, 2024 at 19:44 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Common Applications product of Oracle E-Business Suite (component: CRM User Management Framework). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Common Applications. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Common Applications accessible data as well as unauthorized update, insert or delete access to some of Oracle Common Applications accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N`
### Affected Products
**Oracle Corporation - Common Applications**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
- 12.2.3-12.2.10 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3474
- **State**: PUBLISHED
- **Published Date**: April 24, 2017 at 19:00 UTC
- **Last Updated**: October 07, 2024 at 16:17 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Zone). The supported version that is affected is 11.3. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Solaris accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
### Affected Products
**Oracle Corporation - Solaris Operating System**
Affected versions:
- 11.3 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html)
2. [1038292](http://www.securitytracker.com/id/1038292)
3. [97834](http://www.securityfocus.com/bid/97834) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7556, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7556
- **State**: PUBLISHED
- **Published Date**: November 19, 2020 at 21:08 UTC
- **Last Updated**: August 04, 2024 at 09:33 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-787 Out-of-bounds Write vulnerability exists in IGSS Definition (Def.exe) version 14.0.0.20247 that could cause Remote Code Execution when malicious CGF (Configuration Group File) file is imported to IGSS Definition.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**n/a - IGSS Definition (Def.exe) version 14.0.0.20247 and prior**
Affected versions:
- IGSS Definition (Def.exe) version 14.0.0.20247 and prior (Status: affected)
### References
1. [](https://www.se.com/ww/en/download/document/SEVD-2020-315-03/)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-095/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4847
- **State**: PUBLISHED
- **Published Date**: May 15, 2024 at 01:56 UTC
- **Last Updated**: August 01, 2024 at 20:55 UTC
- **Reserved Date**: May 13, 2024 at 18:02 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Alt Text AI – Automatically generate image alt text for SEO and accessibility plugin for WordPress is vulnerable to generic SQL Injection via the ‘last_post_id’ parameter in all versions up to, and including, 1.4.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**alttextai - Alt Text AI – Automatically generate image alt text for SEO and accessibility**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3c192623-eb46-4f1d-b897-433ac80608cb?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/alttext-ai/trunk/includes/class-atai-attachment.php#L677)
3. [](https://plugins.trac.wordpress.org/changeset/3086107/)
4. [](https://wordpress.org/plugins/alttext-ai/#developers)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0965, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0965
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:40 UTC
- **Reserved Date**: January 10, 2013 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42730, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42730 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42730
- **State**: PUBLISHED
- **Published Date**: March 16, 2022 at 14:02 UTC
- **Last Updated**: April 23, 2025 at 18:52 UTC
- **Reserved Date**: October 19, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Bridge version 11.1.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious PSD file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-788: OS Command Injection
### Affected Products
**Adobe - Bridge**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/bridge/apsb21-94.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5805, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5805
- **State**: PUBLISHED
- **Published Date**: November 04, 2012 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 20:02 UTC
- **Reserved Date**: November 04, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The PayPal IPN functionality in Zen Cart does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, a different vulnerability than CVE-2012-5806.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34217, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34217
- **State**: PUBLISHED
- **Published Date**: August 17, 2023 at 06:48 UTC
- **Last Updated**: October 02, 2024 at 19:58 UTC
- **Reserved Date**: May 31, 2023 at 08:58 UTC
- **Assigned By**: Moxa
### Vulnerability Description
TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation in the certificate-delete function, which could potentially allow malicious users to delete arbitrary files.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Moxa - TN-5900 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - TN-4900 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDR-G902 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDR-G903 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - EDR-G9010 Series**
Affected versions:
- 1.0 (Status: affected)
**Moxa - NAT-102 Series**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26570, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26570 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26570
- **State**: PUBLISHED
- **Published Date**: October 06, 2020 at 01:04 UTC
- **Last Updated**: August 04, 2024 at 15:56 UTC
- **Reserved Date**: October 06, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Oberthur smart card software driver in OpenSC before 0.21.0-rc1 has a heap-based buffer overflow in sc_oberthur_read_file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24316)
2. [](https://github.com/OpenSC/OpenSC/commit/6903aebfddc466d966c7b865fae34572bf3ed23e)
3. [[oss-security] 20201124 OpenSC 0.21.0 released](http://www.openwall.com/lists/oss-security/2020/11/24/4)
4. [FEDORA-2020-7c80831ffe](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXOHFDMNMO6IDECAGUTB3SJGAGXVRT6S/)
5. [[debian-lts-announce] 20211129 [SECURITY] [DLA 2832-1] opensc security update](https://lists.debian.org/debian-lts-announce/2021/11/msg00027.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4717, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4717 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4717
- **State**: REJECTED
- **Published Date**: March 15, 2017 at 18:00 UTC
- **Last Updated**: March 15, 2017 at 17:57 UTC
- **Reserved Date**: August 28, 2012 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5224
- **State**: PUBLISHED
- **Published Date**: March 29, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 18:04 UTC
- **Reserved Date**: January 05, 2018 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to create a repository in Bamboo, edit an existing plan in Bamboo that has a non-linked Mercurial repository, or create a plan in Bamboo either globally or in a project using Bamboo Specs can can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability.
### Affected Products
**Atlassian - Bamboo**
Affected versions:
- 2.7.1 (Status: affected)
- unspecified (Status: affected)
- 6.4.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [103653](http://www.securityfocus.com/bid/103653)
2. [](https://jira.atlassian.com/browse/BAM-19743)
3. [](https://confluence.atlassian.com/x/PS9sO) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0635, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0635 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0635
- **State**: PUBLISHED
- **Published Date**: January 23, 2025 at 11:07 UTC
- **Last Updated**: February 12, 2025 at 20:41 UTC
- **Reserved Date**: January 22, 2025 at 08:51 UTC
- **Assigned By**: M-Files Corporation
### Vulnerability Description
Denial of service condition in M-Files Server in versions before
25.1.14445.5 allows an unauthenticated user to consume computing resources in certain conditions.
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**M-Files Corporation - M-Files Server**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://product.m-files.com/security-advisories/cve-2025-0635/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43822, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43822 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43822
- **State**: PUBLISHED
- **Published Date**: December 13, 2021 at 19:50 UTC
- **Last Updated**: August 04, 2024 at 04:03 UTC
- **Reserved Date**: November 16, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Jackalope Doctrine-DBAL is an implementation of the PHP Content Repository API (PHPCR) using a relational database to persist data. In affected versions users can provoke SQL injections if they can specify a node name or query. Upgrade to version 1.7.4 to resolve this issue. If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\Transport\DoctrineDBAL\Query\QOMWalker`: `XPath::escape($property)`. Node names and xpaths can contain `"` or `;` according to the JCR specification. The jackalope component that translates the query object model into doctrine dbal queries does not properly escape the names and paths, so that a accordingly crafted node name can lead to an SQL injection. If queries are never done from user input, or if you validate the user input to not contain `;`, you are not affected.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**jackalope - jackalope-doctrine-dbal**
Affected versions:
- < 1.7.4 (Status: affected)
### References
1. [](https://github.com/jackalope/jackalope-doctrine-dbal/security/advisories/GHSA-ph98-v78f-jqrm)
2. [](https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1677
- **State**: PUBLISHED
- **Published Date**: May 16, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 15:13 UTC
- **Reserved Date**: February 13, 2013 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The gfxSkipCharsIterator::SetOffsets function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=826163)
2. [DSA-2699](http://www.debian.org/security/2013/dsa-2699)
3. [MDVSA-2013:165](http://www.mandriva.com/security/advisories?name=MDVSA-2013:165)
4. [openSUSE-SU-2013:0825](http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html)
5. [USN-1823-1](http://www.ubuntu.com/usn/USN-1823-1)
6. [oval:org.mitre.oval:def:16979](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16979)
7. [RHSA-2013:0821](http://rhn.redhat.com/errata/RHSA-2013-0821.html)
8. [openSUSE-SU-2013:0929](http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html)
9. [openSUSE-SU-2013:0831](http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html)
10. [RHSA-2013:0820](http://rhn.redhat.com/errata/RHSA-2013-0820.html)
11. [openSUSE-SU-2013:0834](http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html)
12. [openSUSE-SU-2013:0946](http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html)
13. [USN-1822-1](http://www.ubuntu.com/usn/USN-1822-1)
14. [59868](http://www.securityfocus.com/bid/59868)
15. [](http://www.mozilla.org/security/announce/2013/mfsa2013-48.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0344, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0344 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0344
- **State**: PUBLISHED
- **Published Date**: August 14, 2019 at 13:53 UTC
- **Last Updated**: October 04, 2024 at 13:36 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
Due to unsafe deserialization used in SAP Commerce Cloud (virtualjdbc extension), versions 6.4, 6.5, 6.6, 6.7, 1808, 1811, 1905, it is possible to execute arbitrary code on a target machine with 'Hybris' user rights, resulting in Code Injection.
### Affected Products
**SAP SE - SAP Commerce Cloud (virtualjdbc extension)**
Affected versions:
- < 6.4 (Status: affected)
- < 6.5 (Status: affected)
- < 6.6 (Status: affected)
- < 6.7 (Status: affected)
- < 1808 (Status: affected)
- < 1811 (Status: affected)
- < 1905 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017)
2. [](https://launchpad.support.sap.com/#/notes/2786035) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5755, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5755 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5755
- **State**: PUBLISHED
- **Published Date**: June 27, 2024 at 18:45 UTC
- **Last Updated**: August 01, 2024 at 21:18 UTC
- **Reserved Date**: June 07, 2024 at 17:02 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
In lunary-ai/lunary versions <=v1.2.11, an attacker can bypass email validation by using a dot character ('.') in the email address. This allows the creation of multiple accounts with essentially the same email address (e.g., 'attacker123@gmail.com' and 'attacker.123@gmail.com'), leading to incorrect synchronization and potential security issues.
### Weakness Classification (CWE)
- CWE-821: Security Weakness
### Affected Products
**lunary-ai - lunary-ai/lunary**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/cf337d37-e602-482b-aa7a-9e34e7f13e1f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30535, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30535
- **State**: PUBLISHED
- **Published Date**: March 24, 2025 at 13:46 UTC
- **Last Updated**: March 24, 2025 at 15:06 UTC
- **Reserved Date**: March 24, 2025 at 12:59 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in muro External image replace allows Cross Site Request Forgery. This issue affects External image replace: from n/a through 1.0.8.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**muro - External image replace**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/external-image-replace/vulnerability/wordpress-external-image-replace-plugin-1-0-8-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve)
### Credits
- Nabil Irawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36281, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36281 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36281
- **State**: REJECTED
- **Last Updated**: May 28, 2025 at 18:20 UTC
- **Reserved Date**: August 02, 2022 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48835, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48835 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48835
- **State**: PUBLISHED
- **Published Date**: December 07, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 21:46 UTC
- **Reserved Date**: November 20, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Car Rental Script v3.0 is vulnerable to CSV Injection via a Language > Labels > Export action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.phpjabbers.com/car-rental-script/)
2. [](http://packetstormsecurity.com/files/176045) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54775, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54775
- **State**: PUBLISHED
- **Published Date**: December 27, 2024 at 00:00 UTC
- **Last Updated**: December 28, 2024 at 16:51 UTC
- **Reserved Date**: December 06, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Dcat-Admin v2.2.0-beta and v2.2.2-beta contains a Cross-Site Scripting (XSS) vulnerability via /admin/auth/menu and /admin/auth/extensions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/taynes-llllzt/taynes/issues/5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4582, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4582 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4582
- **State**: PUBLISHED
- **Published Date**: January 03, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 19:14 UTC
- **Reserved Date**: September 06, 2006 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in The Address Book 1.04e allows remote attackers to perform unauthorized actions as other users via unspecified vectors, as demonstrated by deleting arbitrary users via the id parameter in a deleteuser action in users.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://secunia.com/secunia_research/2006-76/advisory/)
2. [32559](http://osvdb.org/32559)
3. [theaddressbook-users-csrf(31251)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31251)
4. [21694](http://secunia.com/advisories/21694) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12814, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12814 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12814
- **State**: PUBLISHED
- **Published Date**: October 17, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 08:45 UTC
- **Reserved Date**: June 25, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Digital Editions versions 4.5.8 and below have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**Adobe - Adobe Digital Editions**
Affected versions:
- 4.5.8 and below versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/Digital-Editions/apsb18-27.html)
2. [105536](http://www.securityfocus.com/bid/105536) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31544, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31544 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31544
- **State**: PUBLISHED
- **Published Date**: July 11, 2022 at 00:58 UTC
- **Last Updated**: August 03, 2024 at 07:19 UTC
- **Reserved Date**: May 23, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The meerstein/rbtm repository through 1.5 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/github/securitylab/issues/669#issuecomment-1117265726) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7481
- **State**: PUBLISHED
- **Published Date**: December 17, 2019 at 22:25 UTC
- **Last Updated**: February 06, 2025 at 19:57 UTC
- **Reserved Date**: February 06, 2019 at 00:00 UTC
- **Assigned By**: sonicwall
### Vulnerability Description
Vulnerability in SonicWall SMA100 allow unauthenticated user to gain read-only access to unauthorized resources. This vulnerablity impacted SMA100 version 9.0.0.3 and earlier.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SonicWall - SMA100**
Affected versions:
- 9.0.0.3 and earlier (Status: affected)
### References
1. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0016) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56748
- **State**: PUBLISHED
- **Published Date**: December 29, 2024 at 11:30 UTC
- **Last Updated**: May 04, 2025 at 10:03 UTC
- **Reserved Date**: December 29, 2024 at 11:26 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb()
Hook "qed_ops->common->sb_init = qed_sb_init" does not release the DMA
memory sb_virt when it fails. Add dma_free_coherent() to free it. This
is the same way as qedr_alloc_mem_sb() and qede_alloc_mem_sb().
### Affected Products
**Linux - Linux**
Affected versions:
- 61d8658b4a435eac729966cc94cdda077a8df5cd (Status: affected)
- 61d8658b4a435eac729966cc94cdda077a8df5cd (Status: affected)
- 61d8658b4a435eac729966cc94cdda077a8df5cd (Status: affected)
- 61d8658b4a435eac729966cc94cdda077a8df5cd (Status: affected)
- 61d8658b4a435eac729966cc94cdda077a8df5cd (Status: affected)
- 61d8658b4a435eac729966cc94cdda077a8df5cd (Status: affected)
- 61d8658b4a435eac729966cc94cdda077a8df5cd (Status: affected)
- 61d8658b4a435eac729966cc94cdda077a8df5cd (Status: affected)
**Linux - Linux**
Affected versions:
- 4.11 (Status: affected)
- 0 (Status: unaffected)
- 5.4.287 (Status: unaffected)
- 5.10.231 (Status: unaffected)
- 5.15.174 (Status: unaffected)
- 6.1.120 (Status: unaffected)
- 6.6.64 (Status: unaffected)
- 6.11.11 (Status: unaffected)
- 6.12.2 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/97384449ddfc07f12ca75f510eb070020d7abb34)
2. [](https://git.kernel.org/stable/c/a56777a3ef5b35e24a20c4418bcf88bad033807a)
3. [](https://git.kernel.org/stable/c/64654bf5efb3f748e6fc41227adda689618ce9c4)
4. [](https://git.kernel.org/stable/c/b514f45e0fe18d763a1afc34401b1585333cb329)
5. [](https://git.kernel.org/stable/c/7c1832287b21ff68c4e3625e63cc7619edf5908b)
6. [](https://git.kernel.org/stable/c/0e04bd5a11dffe8c1c0e4c9fc79f7d3cd6182dd5)
7. [](https://git.kernel.org/stable/c/78a169dc69fbdaf114c40e2d56955bf6bd4fc3c0)
8. [](https://git.kernel.org/stable/c/c62c30429db3eb4ced35c7fcf6f04a61ce3a01bb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23223, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23223 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23223
- **State**: PUBLISHED
- **Published Date**: August 18, 2022 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 16:54 UTC
- **Reserved Date**: November 30, 2021 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper initialization for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
### Affected Products
**n/a - Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products**
Affected versions:
- See references (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html)
2. [[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)](https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2090, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2090
- **State**: PUBLISHED
- **Published Date**: August 01, 2024 at 04:29 UTC
- **Last Updated**: August 07, 2024 at 13:25 UTC
- **Reserved Date**: March 01, 2024 at 15:17 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Remote Content Shortcode plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.5 via the remote_content shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**doublesharp - Remote Content Shortcode**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/ec93f360-2eed-4858-b36f-8cc17f7b4ac1?source=cve)
2. [](https://wordpress.org/plugins/remote-content-shortcode/)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14068, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14068 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14068
- **State**: PUBLISHED
- **Published Date**: March 05, 2020 at 08:56 UTC
- **Last Updated**: August 05, 2024 at 00:05 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Out of bound access in msm routing due to lack of check of size before accessing in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8053, APQ8096AU, MDM9607, MSM8905, MSM8909W, Nicobar, QCS405, QCS605, Rennell, Saipan, SDM429W, SDM845, SDX20, SDX24, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8009, APQ8053, APQ8096AU, MDM9607, MSM8905, MSM8909W, Nicobar, QCS405, QCS605, Rennell, Saipan, SDM429W, SDM845, SDX20, SDX24, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11790, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11790 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11790
- **State**: REJECTED
- **Last Updated**: May 12, 2023 at 00:00 UTC
- **Reserved Date**: May 06, 2019 at 00:00 UTC
- **Assigned By**: odoo
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7219
- **State**: PUBLISHED
- **Published Date**: February 19, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 06:24 UTC
- **Reserved Date**: February 18, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
application/admin/controller/Admin.php in NoneCms 1.3.0 has CSRF, as demonstrated by changing an admin password or adding an account via a public/index.php/admin/admin/edit.html request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://foreversong.cn/archives/1081) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6327, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6327 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6327
- **State**: PUBLISHED
- **Published Date**: December 13, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 16:02 UTC
- **Reserved Date**: December 13, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in a certain ActiveX control in Online Media Technologies AVSMJPEGFILE.DLL 1.1.1.102 allows remote attackers to execute arbitrary code via a long first argument to the CreateStill method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://shinnai.altervista.org/exploits/txt/TXT_UXI8vq3qF5Tl9zwyxCBb.html)
2. [onlinemedia-avsmjpegfile-bo(38984)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38984)
3. [26814](http://www.securityfocus.com/bid/26814)
4. [4716](https://www.exploit-db.com/exploits/4716) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2608
- **State**: PUBLISHED
- **Published Date**: March 21, 2025 at 21:31 UTC
- **Last Updated**: March 24, 2025 at 14:22 UTC
- **Reserved Date**: March 21, 2025 at 14:07 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in PHPGurukul Banquet Booking System 1.2. This affects an unknown part of the file /admin/view-user-queries.php. The manipulation of the argument viewid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Banquet Booking System**
Affected versions:
- 1.2 (Status: affected)
### References
1. [VDB-300591 | PHPGurukul Banquet Booking System view-user-queries.php sql injection](https://vuldb.com/?id.300591)
2. [VDB-300591 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.300591)
3. [Submit #518587 | PHPGurukul Banquet Booking System 1.2 SQL Injection](https://vuldb.com/?submit.518587)
4. [](https://github.com/emano888/cve/issues/1)
5. [](https://phpgurukul.com/)
### Credits
- Emano888 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2379, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2379 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2379
- **State**: REJECTED
- **Published Date**: December 20, 2021 at 22:44 UTC
- **Last Updated**: December 20, 2021 at 22:44 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3247, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3247 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3247
- **State**: PUBLISHED
- **Published Date**: June 27, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 18:23 UTC
- **Reserved Date**: June 26, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in show.php in GL-SH Deaf Forum 6.4.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) search, (2) page, and (3) action parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18651](http://www.securityfocus.com/bid/18651)
2. [20781](http://secunia.com/advisories/20781)
3. [26804](http://www.osvdb.org/26804)
4. [glsh-deaf-forum-show-xss(27363)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27363)
5. [](http://pridels0.blogspot.com/2006/06/gl-sh-deaf-forum-xss-vuln.html)
6. [ADV-2006-2515](http://www.vupen.com/english/advisories/2006/2515) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7768, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7768
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 10:10 UTC
- **Last Updated**: March 20, 2025 at 18:16 UTC
- **Reserved Date**: August 13, 2024 at 18:55 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
A vulnerability in the `/3/ImportFiles` endpoint of h2oai/h2o-3 version 3.46.1 allows an attacker to cause a denial of service. The endpoint takes a single GET parameter, `path`, which can be recursively set to reference itself. This leads the server to repeatedly call its own endpoint, eventually filling up the request queue and leaving the server unable to handle other requests.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**h2oai - h2oai/h2o-3**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/3fe640df-bef4-4072-8890-0d12bc2818f6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11603, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11603 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11603
- **State**: PUBLISHED
- **Published Date**: April 08, 2020 at 15:41 UTC
- **Last Updated**: August 04, 2024 at 11:35 UTC
- **Reserved Date**: April 07, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (incorporating TEEGRIS) software. Type confusion in the MLDAP Trustlet allows arbitrary code execution. The Samsung ID is SVE-2020-16599 (April 2020).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb)
2. [](https://www.tuttoandroid.net/samsung/samsung-patch-sicurezza-aprile-2020-798658/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32508
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:47 UTC
- **Last Updated**: April 17, 2025 at 18:24 UTC
- **Reserved Date**: April 09, 2025 at 11:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ComMotion Course Booking System allows Reflected XSS. This issue affects Course Booking System: from n/a through 6.0.7.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**ComMotion - Course Booking System**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/course-booking-system/vulnerability/wordpress-course-booking-system-plugin-6-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49844, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49844 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49844
- **State**: PUBLISHED
- **Published Date**: May 06, 2025 at 08:32 UTC
- **Last Updated**: May 07, 2025 at 03:55 UTC
- **Reserved Date**: October 20, 2024 at 17:18 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption while triggering commands in the PlayReady Trusted application.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AR8035 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Flight RB5 5G Platform (Status: affected)
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QAM8620P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QAMSRV1H (Status: affected)
- QAMSRV1M (Status: affected)
- QCA6174A (Status: affected)
- QCA6391 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA6564 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6678AQ (Status: affected)
- QCA6688AQ (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCC710 (Status: affected)
- QCM5430 (Status: affected)
- QCM6490 (Status: affected)
- QCM8550 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QCN9011 (Status: affected)
- QCN9012 (Status: affected)
- QCN9274 (Status: affected)
- QCS5430 (Status: affected)
- QCS615 (Status: affected)
- QCS6490 (Status: affected)
- QCS7230 (Status: affected)
- QCS8155 (Status: affected)
- QCS8250 (Status: affected)
- QCS8300 (Status: affected)
- QCS8550 (Status: affected)
- QCS9100 (Status: affected)
- QDU1000 (Status: affected)
- QDU1010 (Status: affected)
- QDU1110 (Status: affected)
- QDU1210 (Status: affected)
- QDX1010 (Status: affected)
- QDX1011 (Status: affected)
- QEP8111 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- QMP1000 (Status: affected)
- QRB5165M (Status: affected)
- QRB5165N (Status: affected)
- QRU1032 (Status: affected)
- QRU1052 (Status: affected)
- QRU1062 (Status: affected)
- QSM8250 (Status: affected)
- QSM8350 (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- Qualcomm Video Collaboration VC5 Platform (Status: affected)
- Robotics RB5 Platform (Status: affected)
- SA4150P (Status: affected)
- SA4155P (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA7255P (Status: affected)
- SA7775P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SA8530P (Status: affected)
- SA8540P (Status: affected)
- SA8620P (Status: affected)
- SA8650P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SC8380XP (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD670 (Status: affected)
- SD865 5G (Status: affected)
- SDM429W (Status: affected)
- SDX55 (Status: affected)
- SM6650 (Status: affected)
- SM6650P (Status: affected)
- SM7250P (Status: affected)
- SM7635 (Status: affected)
- SM7675 (Status: affected)
- SM7675P (Status: affected)
- SM8635 (Status: affected)
- SM8635P (Status: affected)
- SM8650Q (Status: affected)
- SM8735 (Status: affected)
- SM8750 (Status: affected)
- SM8750P (Status: affected)
- Snapdragon 429 Mobile Platform (Status: affected)
- Snapdragon 670 Mobile Platform (Status: affected)
- Snapdragon 710 Mobile Platform (Status: affected)
- Snapdragon 712 Mobile Platform (Status: affected)
- Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected)
- Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected)
- Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 3 Mobile Platform (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB) (Status: affected)
- Snapdragon AR1 Gen 1 Platform (Status: affected)
- Snapdragon AR1 Gen 1 Platform "Luna1" (Status: affected)
- Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected)
- Snapdragon Wear 4100+ Platform (Status: affected)
- Snapdragon X32 5G Modem-RF System (Status: affected)
- Snapdragon X35 5G Modem-RF System (Status: affected)
- Snapdragon X55 5G Modem-RF System (Status: affected)
- Snapdragon X62 5G Modem-RF System (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon X72 5G Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- Snapdragon XR1 Platform (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- SRV1H (Status: affected)
- SRV1L (Status: affected)
- SRV1M (Status: affected)
- SXR1120 (Status: affected)
- SXR2130 (Status: affected)
- SXR2330P (Status: affected)
- Vision Intelligence 300 Platform (Status: affected)
- Vision Intelligence 400 Platform (Status: affected)
- WCD9326 (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9378 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WCN3620 (Status: affected)
- WCN3660B (Status: affected)
- WCN3680B (Status: affected)
- WCN3980 (Status: affected)
- WCN3990 (Status: affected)
- WCN6450 (Status: affected)
- WCN6650 (Status: affected)
- WCN6755 (Status: affected)
- WCN7750 (Status: affected)
- WCN7860 (Status: affected)
- WCN7861 (Status: affected)
- WCN7880 (Status: affected)
- WCN7881 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28234, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28234 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28234
- **State**: PUBLISHED
- **Published Date**: April 11, 2023 at 19:13 UTC
- **Last Updated**: January 23, 2025 at 01:05 UTC
- **Reserved Date**: March 13, 2023 at 22:18 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Secure Channel Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
### References
1. [Windows Secure Channel Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28234) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10928, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10928 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10928
- **State**: PUBLISHED
- **Published Date**: August 13, 2019 at 18:55 UTC
- **Last Updated**: August 04, 2024 at 22:40 UTC
- **Reserved Date**: April 08, 2019 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SCALANCE SC-600 (V2.0). An authenticated attacker with access to port 22/tcp as well as physical access to an affected device may trigger the device to allow execution of arbitrary commands. The security vulnerability could be exploited by an authenticated attacker with physical access to the affected device. No user interaction is required to exploit this vulnerability. The vulnerability impacts the confidentiality, integrity and availability of the affected device.
### Weakness Classification (CWE)
- CWE-703: Security Weakness
### Affected Products
**Siemens AG - SCALANCE SC-600**
Affected versions:
- V2.0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-671286.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33478
- **State**: PUBLISHED
- **Published Date**: November 07, 2023 at 00:00 UTC
- **Last Updated**: September 05, 2024 at 14:04 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
RemoteClinic 2.0 has a SQL injection vulnerability in the ID parameter of /medicines/stocks.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/remoteclinic/RemoteClinic/issues/22) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48934, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48934 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48934
- **State**: PUBLISHED
- **Published Date**: August 22, 2024 at 03:31 UTC
- **Last Updated**: May 04, 2025 at 08:26 UTC
- **Reserved Date**: August 21, 2024 at 06:06 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()
ida_simple_get() returns an id between min (0) and max (NFP_MAX_MAC_INDEX)
inclusive.
So NFP_MAX_MAC_INDEX (0xff) is a valid id.
In order for the error handling path to work correctly, the 'invalid'
value for 'ida_idx' should not be in the 0..NFP_MAX_MAC_INDEX range,
inclusive.
So set it to -1.
### Affected Products
**Linux - Linux**
Affected versions:
- 20cce88650981ec504d328dbbdd004d991eb8535 (Status: affected)
- 20cce88650981ec504d328dbbdd004d991eb8535 (Status: affected)
- 20cce88650981ec504d328dbbdd004d991eb8535 (Status: affected)
- 20cce88650981ec504d328dbbdd004d991eb8535 (Status: affected)
- 20cce88650981ec504d328dbbdd004d991eb8535 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.1 (Status: affected)
- 0 (Status: unaffected)
- 5.4.182 (Status: unaffected)
- 5.10.103 (Status: unaffected)
- 5.15.26 (Status: unaffected)
- 5.16.12 (Status: unaffected)
- 5.17 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/5ad5886f85b6bd893e3ed19013765fb0c243c069)
2. [](https://git.kernel.org/stable/c/af4bc921d39dffdb83076e0a7eed1321242b7d87)
3. [](https://git.kernel.org/stable/c/9d8097caa73200710d52b9f4d9f430548f46a900)
4. [](https://git.kernel.org/stable/c/4086d2433576baf85f0e538511df97c8101e0a10)
5. [](https://git.kernel.org/stable/c/3a14d0888eb4b0045884126acc69abfb7b87814d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4483, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4483 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4483
- **State**: PUBLISHED
- **Published Date**: April 11, 2017 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 00:32 UTC
- **Reserved Date**: May 04, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20160503 CVE request: out-of-bounds read parsing an XML in libxml2 using recover mode](http://www.openwall.com/lists/oss-security/2016/05/03/8)
2. [[oss-security] 20160504 Re: CVE request: out-of-bounds read parsing an XML in libxml2 using recover mode](http://www.openwall.com/lists/oss-security/2016/05/04/7)
3. [](https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd)
4. [[oss-security] 20160607 Re: Please reject duplicate CVE for libxml2](http://www.openwall.com/lists/oss-security/2016/06/07/5)
5. [](http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html)
6. [90013](http://www.securityfocus.com/bid/90013)
7. [](https://www.tenable.com/security/tns-2016-18)
8. [DSA-3593](http://www.debian.org/security/2016/dsa-3593)
9. [[oss-security] 20160607 Please reject duplicate CVE for libxml2](http://www.openwall.com/lists/oss-security/2016/06/07/4)
10. [RHSA-2016:2957](http://rhn.redhat.com/errata/RHSA-2016-2957.html)
11. [GLSA-201701-37](https://security.gentoo.org/glsa/201701-37)
12. [1036348](http://www.securitytracker.com/id/1036348)
13. [[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E)
14. [[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0339
- **State**: PUBLISHED
- **Published Date**: October 14, 2020 at 13:09 UTC
- **Last Updated**: August 04, 2024 at 05:55 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
There is a possible out of bounds read due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-162980705
### Affected Products
**n/a - Android**
Affected versions:
- Android SoC (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2020-10-01) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.