System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22510, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22510 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22510
- **State**: REJECTED
- **Last Updated**: January 16, 2024 at 17:32 UTC
- **Reserved Date**: January 01, 2023 at 00:01 UTC
- **Assigned By**: atlassian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46898, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46898
- **State**: PUBLISHED
- **Published Date**: October 15, 2024 at 06:10 UTC
- **Last Updated**: October 23, 2024 at 04:58 UTC
- **Reserved Date**: October 04, 2024 at 06:36 UTC
- **Assigned By**: jpcert
### Vulnerability Description
SHIRASAGI prior to v1.19.1 processes URLs in HTTP requests improperly, resulting in a path traversal vulnerability. If this vulnerability is exploited, arbitrary files on the server may be retrieved when processing crafted HTTP requests.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**SHIRASAGI Project - SHIRASAGI**
Affected versions:
- prior to v1.19.1 (Status: affected)
### References
1. [](https://github.com/shirasagi/shirasagi/commit/5ac4685d7e4330f949f13219069107fc5d768934)
2. [](https://www.ss-proj.org/)
3. [](https://jvn.jp/en/jp/JVN58721679/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3536, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3536
- **State**: PUBLISHED
- **Published Date**: October 14, 2010 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 03:11 UTC
- **Reserved Date**: September 20, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the PeopleSoft Enterprise SCM component in Oracle PeopleSoft and JDEdwards Suite 8.9 Bundle #38, 9.0 Bundle #31, and 9.1 Bundle #6 allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html)
2. [TA10-287A](http://www.us-cert.gov/cas/techalerts/TA10-287A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5947, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5947
- **State**: PUBLISHED
- **Published Date**: September 06, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 07:06 UTC
- **Reserved Date**: August 06, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SuiteCRM before 7.2.3 allows remote attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/salesagility/SuiteCRM/commit/b1b3fd61c7697ad2073cd253d31c9462929e7bb5)
2. [[oss-security] 20150806 Re: CVE Request: SuiteCRM Post-Auth Race Condition Shell Upload Remote Code Execution.](http://www.openwall.com/lists/oss-security/2015/08/06/6)
3. [](https://github.com/salesagility/SuiteCRM/issues/333)
4. [](https://github.com/XiphosResearch/exploits/tree/master/suiteshell) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46750, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46750 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46750
- **State**: REJECTED
- **Last Updated**: March 22, 2023 at 00:00 UTC
- **Reserved Date**: December 07, 2022 at 00:00 UTC
- **Assigned By**: Baidu
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1865, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1865
- **State**: PUBLISHED
- **Published Date**: July 27, 2022 at 21:18 UTC
- **Last Updated**: August 03, 2024 at 00:17 UTC
- **Reserved Date**: May 24, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Bookmarks in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/05/stable-channel-update-for-desktop_24.html)
2. [](https://crbug.com/1289192)
3. [GLSA-202208-25](https://security.gentoo.org/glsa/202208-25) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0827, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0827 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0827
- **State**: PUBLISHED
- **Published Date**: April 05, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 09:27 UTC
- **Reserved Date**: January 06, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in IBM InfoSphere Optim Workload Replay 1.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21669093)
2. [ibm-infosphere-cve20140827-xss(90503)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90503)
3. [66621](http://www.securityfocus.com/bid/66621) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29507, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29507
- **State**: PUBLISHED
- **Published Date**: May 28, 2021 at 21:00 UTC
- **Last Updated**: August 03, 2024 at 22:11 UTC
- **Reserved Date**: March 30, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GENIVI Diagnostic Log and Trace (DLT) provides a log and trace interface. In versions of GENIVI DLT between 2.10.0 and 2.18.6, a configuration file containing the special characters could cause a vulnerable component to crash. All the applications which are using the configuration file could fail to generate their dlt logs in system. As of time of publication, no patch exists. As a workaround, one may check the integrity of information in configuration file manually.
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**GENIVI - dlt-daemon**
Affected versions:
- > 2.10.0, <= 2.18.6 (Status: affected)
### References
1. [](https://github.com/GENIVI/dlt-daemon/security/advisories/GHSA-7cqp-2hqj-mh3f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4905, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4905
- **State**: PUBLISHED
- **Published Date**: September 12, 2023 at 20:47 UTC
- **Last Updated**: February 13, 2025 at 17:18 UTC
- **Reserved Date**: September 12, 2023 at 01:31 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
### Affected Products
**Google - Chrome**
Affected versions:
- 117.0.5938.62 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html)
2. [](https://crbug.com/1441228)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/)
4. [](https://www.debian.org/security/2023/dsa-5499)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/)
6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/)
7. [](https://security.gentoo.org/glsa/202401-34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37519, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37519 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37519
- **State**: PUBLISHED
- **Published Date**: February 03, 2023 at 00:00 UTC
- **Last Updated**: March 26, 2025 at 18:16 UTC
- **Reserved Date**: July 26, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow vulnerability in authfile.c memcached 1.6.9 allows attackers to cause a denial of service via crafted authenticattion file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/memcached/memcached/issues/805)
2. [](https://github.com/memcached/memcached/pull/806/commits/264722ae4e248b453be00e97197dadc685b60fd0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42072, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42072 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42072
- **State**: PUBLISHED
- **Published Date**: July 29, 2024 at 15:52 UTC
- **Last Updated**: May 04, 2025 at 09:22 UTC
- **Reserved Date**: July 29, 2024 at 15:50 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix may_goto with negative offset.
Zac's syzbot crafted a bpf prog that exposed two bugs in may_goto.
The 1st bug is the way may_goto is patched. When offset is negative
it should be patched differently.
The 2nd bug is in the verifier:
when current state may_goto_depth is equal to visited state may_goto_depth
it means there is an actual infinite loop. It's not correct to prune
exploration of the program at this point.
Note, that this check doesn't limit the program to only one may_goto insn,
since 2nd and any further may_goto will increment may_goto_depth only
in the queued state pushed for future exploration. The current state
will have may_goto_depth == 0 regardless of number of may_goto insns
and the verifier has to explore the program until bpf_exit.
### Affected Products
**Linux - Linux**
Affected versions:
- 011832b97b311bb9e3c27945bc0d1089a14209c9 (Status: affected)
- 011832b97b311bb9e3c27945bc0d1089a14209c9 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.9 (Status: affected)
- 0 (Status: unaffected)
- 6.9.8 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/175827e04f4be53f3dfb57edf12d0d49b18fd939)
2. [](https://git.kernel.org/stable/c/2b2efe1937ca9f8815884bd4dcd5b32733025103) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0412, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0412 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0412
- **State**: PUBLISHED
- **Published Date**: September 29, 1999 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:41 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In IIS and other web servers, an attacker can attack commands as SYSTEM if the server is running as SYSTEM and loading an ISAPI extension.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [501](http://www.securityfocus.com/bid/501) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5617, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5617
- **State**: PUBLISHED
- **Published Date**: February 28, 2024 at 22:30 UTC
- **Last Updated**: August 29, 2024 at 14:47 UTC
- **Reserved Date**: October 17, 2023 at 15:42 UTC
- **Assigned By**: HITVAN
### Vulnerability Description
Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.1.0.0 and 9.3.0.6, including 9.5.x and 8.3.x, display the version of Tomcat when a server error is encountered.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-550: Security Weakness
### Affected Products
**Hitachi Vantara - Pentaho Data Integration & Analytics**
Affected versions:
- 1.0 (Status: affected)
- 9.4.0.0 (Status: affected)
### References
1. [](https://support.pentaho.com/hc/en-us/articles/24313358254861--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Server-generated-Error-Message-Containing-Sensitive-Information-Versions-before-10-1-0-0-and-9-3-0-6-including-all-versions-before-10-0-x-Impacted-CVE-2023-5617)
### Credits
- Hitachi Group Member |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20586, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20586 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20586
- **State**: PUBLISHED
- **Published Date**: December 16, 2022 at 00:00 UTC
- **Last Updated**: April 18, 2025 at 14:51 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In valid_out_of_special_sec_dram_addr of drm_access_control.c, there is a possible EoP due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238718854References: N/A
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2022-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1338
- **State**: PUBLISHED
- **Published Date**: May 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:51 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Beck IPC GmbH IPC@CHIP TelnetD server generates different responses when given valid and invalid login names, which allows remote attackers to determine accounts on the system.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2773](http://www.securityfocus.com/bid/2773)
2. [VU#198979](http://www.kb.cert.org/vuls/id/198979)
3. [ipcchip-telnet-verify-account(6595)](http://www.iss.net/security_center/static/6595.php)
4. [20010524 IPC@Chip Security](http://www.securityfocus.com/archive/1/186418)
5. [20010602 IPC@Chip - Fixes](http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1735, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1735 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1735
- **State**: PUBLISHED
- **Published Date**: April 26, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 09:50 UTC
- **Reserved Date**: January 29, 2014 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Multiple unspecified vulnerabilities in Google V8 before 3.24.35.33, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [58301](http://secunia.com/advisories/58301)
2. [](http://googlechromereleases.blogspot.com/2014/04/stable-channel-update_24.html)
3. [](https://code.google.com/p/v8/source/detail?r=20622)
4. [](https://code.google.com/p/v8/source/detail?r=20501)
5. [openSUSE-SU-2014:0669](http://lists.opensuse.org/opensuse-updates/2014-05/msg00050.html)
6. [](https://code.google.com/p/chromium/issues/detail?id=359525)
7. [](https://src.chromium.org/viewvc/blink?revision=171077&view=revision)
8. [GLSA-201408-16](http://security.gentoo.org/glsa/glsa-201408-16.xml)
9. [60372](http://secunia.com/advisories/60372)
10. [openSUSE-SU-2014:0668](http://lists.opensuse.org/opensuse-updates/2014-05/msg00049.html)
11. [DSA-2920](http://www.debian.org/security/2014/dsa-2920)
12. [](https://src.chromium.org/viewvc/blink?revision=171127&view=revision)
13. [](https://code.google.com/p/v8/source/detail?r=20624)
14. [](https://code.google.com/p/chromium/issues/detail?id=359130)
15. [](https://code.google.com/p/chromium/issues/detail?id=360429) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0777, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0777 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0777
- **State**: PUBLISHED
- **Published Date**: March 01, 2022 at 08:50 UTC
- **Last Updated**: August 02, 2024 at 23:40 UTC
- **Reserved Date**: February 28, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Weak Password Recovery Mechanism for Forgotten Password in GitHub repository microweber/microweber prior to 1.3.
### Weakness Classification (CWE)
- CWE-640: Security Weakness
### Affected Products
**microweber - microweber/microweber**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/b36be8cd-544f-42bd-990d-aa1a46df44d7)
2. [](https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4655
- **State**: PUBLISHED
- **Published Date**: June 18, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 18, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Synology DiskStation Manager (DSM) before 5.2-5565 Update 1 allows remote attackers to inject arbitrary web script or HTML via the "compound" parameter to entry.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150525 Reflected Cross-Site Scripting in Synology DiskStation Manager](http://seclists.org/fulldisclosure/2015/May/109)
2. [](https://www.synology.com/en-global/releaseNote/DS214play)
3. [74811](http://www.securityfocus.com/bid/74811)
4. [](https://www.securify.nl/advisory/SFY20150503/reflected_cross_site_scripting_in_synology_diskstation_manager.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3708, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3708
- **State**: PUBLISHED
- **Published Date**: October 31, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:50 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
OpenStack Compute (Nova) before 2014.1.4 and 2014.2.x before 2014.2.1 allows remote authenticated users to cause a denial of service (CPU consumption) via an IP filter in a list active servers API request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [70777](http://www.securityfocus.com/bid/70777)
2. [RHSA-2015:0844](http://rhn.redhat.com/errata/RHSA-2015-0844.html)
3. [RHSA-2015:0843](http://rhn.redhat.com/errata/RHSA-2015-0843.html)
4. [](https://bugs.launchpad.net/nova/+bug/1358583)
5. [[openstack-announce] 20141028 [OSSA 2014-038] Nova network DoS through API filtering (CVE-2014-3708)](http://lists.openstack.org/pipermail/openstack-announce/2014-October/000301.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16200, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16200 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16200
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 02:00 UTC
- **Last Updated**: September 17, 2024 at 02:11 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
uv-tj-demo is a static file server. uv-tj-demo is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**HackerOne - uv-tj-demo node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/428)
2. [](https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uv-tj-demo) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38287, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38287
- **State**: PUBLISHED
- **Published Date**: July 25, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 04:04 UTC
- **Reserved Date**: June 13, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The password-reset mechanism in the Forgot Password functionality in R-HUB TurboMeeting through 8.x allows unauthenticated remote attackers to force the application into resetting the administrator's password to a random insecure 8-digit value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.rhubcom.com/v5/manuals.html)
2. [](https://github.com/google/security-research/security/advisories/GHSA-c84v-4pjw-4mh2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6668
- **State**: PUBLISHED
- **Published Date**: October 19, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 07:29 UTC
- **Reserved Date**: August 24, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Job Manager plugin before 0.7.25 allows remote attackers to read arbitrary CV files via a brute force attack to the WordPress upload directory structure, related to an insecure direct object reference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/8167)
2. [](https://vagmour.eu/cve-2015-6668-cv-filename-disclosure-on-job-manager-wordpress-plugin/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9350, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9350 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9350
- **State**: PUBLISHED
- **Published Date**: June 02, 2017 at 05:04 UTC
- **Last Updated**: August 05, 2024 at 17:02 UTC
- **Reserved Date**: June 01, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by checking for a negative length.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13649)
2. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dbc7cb0bbdd501fa96e0cb98668f6d6bf17ac4e6)
3. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1212)
4. [98806](http://www.securityfocus.com/bid/98806)
5. [1038612](http://www.securitytracker.com/id/1038612)
6. [](https://www.wireshark.org/security/wnpa-sec-2017-28.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3190, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3190 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3190
- **State**: PUBLISHED
- **Published Date**: May 25, 2017 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 05:39 UTC
- **Reserved Date**: April 10, 2015 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the UAA logout link is susceptible to an open redirect which allows an attacker to insert malicious web page as a redirect parameter.
### Affected Products
**Pivotal - Cloud Foundry**
Affected versions:
- Runtime cf-release versions v209 or earlier (Status: affected)
- UAA Standalone versions 2.2.6 or earlier (Status: affected)
- Runtime 1.4.5 or earlier (Status: affected)
### References
1. [](https://pivotal.io/security/cve-2015-3190) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46833
- **State**: PUBLISHED
- **Published Date**: May 08, 2025 at 19:27 UTC
- **Last Updated**: May 08, 2025 at 19:49 UTC
- **Reserved Date**: April 30, 2025 at 19:41 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Programs/P73_SimplePythonEncryption.py illustrates a simple Python encryption example using the RSA Algorithm. In versions prior to commit 6ce60b1, an attacker may be able to decrypt the data using brute force attacks and because of this the whole application can be impacted. This issue has been patched in commit 6ce60b1. A workaround involves increasing the key size, for RSA or DSA this is at least 2048 bits, for ECC this is at least 256 bits.
### Weakness Classification (CWE)
- CWE-326: Security Weakness
### Affected Products
**ShashikantSingh09 - python-progrrames**
Affected versions:
- < 6ce60b1 (Status: affected)
### References
1. [https://github.com/ShashikantSingh09/python-progrrames/security/advisories/GHSA-5h26-2c6g-4ch4](https://github.com/ShashikantSingh09/python-progrrames/security/advisories/GHSA-5h26-2c6g-4ch4)
2. [https://github.com/ShashikantSingh09/python-progrrames/commit/6ce60b1b2116a579a2e89de96d738a98f6ad4f27](https://github.com/ShashikantSingh09/python-progrrames/commit/6ce60b1b2116a579a2e89de96d738a98f6ad4f27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27243, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27243 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27243
- **State**: PUBLISHED
- **Published Date**: March 18, 2022 at 17:15 UTC
- **Last Updated**: August 03, 2024 at 05:25 UTC
- **Reserved Date**: March 18, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in MISP before 2.4.156. app/View/Users/terms.ctp allows Local File Inclusion via the custom terms file setting.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/MISP/MISP/commit/8cc93687dcd68e1774b55a5c4e8125c0c8ddc288) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26553, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26553
- **State**: PUBLISHED
- **Published Date**: April 11, 2023 at 00:00 UTC
- **Last Updated**: February 11, 2025 at 15:27 UTC
- **Reserved Date**: February 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26553)
2. [](https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41897, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41897 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41897
- **State**: PUBLISHED
- **Published Date**: October 19, 2023 at 22:23 UTC
- **Last Updated**: September 12, 2024 at 15:08 UTC
- **Reserved Date**: September 04, 2023 at 16:31 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Home assistant is an open source home automation. Home Assistant server does not set any HTTP security headers, including the X-Frame-Options header, which specifies whether the web page is allowed to be framed. The omission of this and correlating headers facilitates covert clickjacking attacks and alternative exploit opportunities, such as the vector described in this security advisory. This fault incurs major risk, considering the ability to trick users into installing an external and malicious add-on with minimal user interaction, which would enable Remote Code Execution (RCE) within the Home Assistant application. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-1021: Security Weakness
### Affected Products
**home-assistant - core**
Affected versions:
- < 2023.9.0 (Status: affected)
### References
1. [https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw](https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw)
2. [https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q](https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q)
3. [https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/](https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2680, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2680 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2680
- **State**: PUBLISHED
- **Published Date**: August 23, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:45 UTC
- **Reserved Date**: August 23, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in BEA WebLogic Portal 8.1 through SP4, when using entitlements, allows remote attackers to bypass access restrictions for the pages of a Book via crafted URLs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [BEA05-84.00](http://dev2dev.bea.com/pub/advisory/137) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11943, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11943 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11943
- **State**: PUBLISHED
- **Published Date**: December 07, 2024 at 01:45 UTC
- **Last Updated**: December 09, 2024 at 18:04 UTC
- **Reserved Date**: November 27, 2024 at 23:34 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The 워드프레스 결제 심플페이 – 우커머스 결제 플러그인 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 5.2.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**codemstory - 워드프레스 결제 심플페이 – 우커머스 결제 플러그인**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3d85d609-781b-4f82-af57-124767f9d333?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/pgall-for-woocommerce/trunk/includes/admin/class-pafw-admin-notice.php#L81)
3. [](https://wordpress.org/plugins/pgall-for-woocommerce/#developers)
4. [](https://plugins.trac.wordpress.org/changeset/3202085/)
### Credits
- Peter Thaleikis |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1904, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1904
- **State**: PUBLISHED
- **Published Date**: August 01, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 04:54 UTC
- **Reserved Date**: February 19, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Business Process Manager (BPM) 8.0.x through 8.0.1.3, 8.5.0 through 8.5.0.1, 8.5.5 through 8.5.5.0, and 8.5.6 through 8.5.6.0, when external Enterprise Content Management (ECM) integration is enabled with a certain technical system account configuration, allows remote authenticated users to bypass intended document-access restrictions via a (1) upload or (2) download action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21960293)
2. [JR53209](http://www-01.ibm.com/support/docview.wss?uid=swg1JR53209)
3. [1033159](http://www.securitytracker.com/id/1033159) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4864, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4864 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4864
- **State**: PUBLISHED
- **Published Date**: September 10, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 11:27 UTC
- **Reserved Date**: July 10, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The NETGEAR ProSafe Plus Configuration Utility creates configuration backup files containing cleartext passwords, which might allow remote attackers to obtain sensitive information by reading a file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#396212](http://www.kb.cert.org/vuls/id/396212) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0946
- **State**: PUBLISHED
- **Published Date**: February 21, 2023 at 20:05 UTC
- **Last Updated**: March 12, 2025 at 15:11 UTC
- **Reserved Date**: February 21, 2023 at 20:02 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in SourceCodester Best POS Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file billing/index.php?id=9. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The identifier VDB-221593 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Best POS Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.221593)
2. [](https://vuldb.com/?ctiid.221593)
### Credits
- mroz1l (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-39597, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-39597 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-39597
- **State**: PUBLISHED
- **Published Date**: April 16, 2025 at 12:44 UTC
- **Last Updated**: April 16, 2025 at 14:32 UTC
- **Reserved Date**: April 16, 2025 at 06:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Arthur Yarwood Fast eBay Listings allows Phishing. This issue affects Fast eBay Listings: from n/a through 2.12.15.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**Arthur Yarwood - Fast eBay Listings**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/fast-ebay-listings/vulnerability/wordpress-fast-ebay-listings-2-12-15-open-redirection-vulnerability?_s_id=cve)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2018, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2018
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:15 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in index.php in Php-Nuke 6.x through 7.3 allows remote attackers to execute arbitrary PHP code by modifying the modpath parameter to reference a URL on a remote web server that contains the code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.waraxe.us/index.php?modname=sa&id=29)
2. [6222](http://www.osvdb.org/6222)
3. [20040517 [waraxe-2004-SA#029 - Possible remote file inclusion in PhpNuke 6.x - 7.3]](http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0870.html)
4. [phpnuke-modpath-file-include(16218)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16218)
5. [11625](http://secunia.com/advisories/11625)
6. [20040517 [waraxe-2004-SA#029 - Possible remote file inclusion in PhpNuke 6.x - 7.3]](http://marc.info/?l=bugtraq&m=108482888621896&w=2)
7. [10365](http://www.securityfocus.com/bid/10365) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2415, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2415 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2415
- **State**: PUBLISHED
- **Published Date**: August 10, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 23:00 UTC
- **Reserved Date**: June 06, 2011 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2414.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SA:2011:033](http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html)
2. [48308](http://secunia.com/advisories/48308)
3. [TA11-222A](http://www.us-cert.gov/cas/techalerts/TA11-222A.html)
4. [oval:org.mitre.oval:def:16070](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16070)
5. [oval:org.mitre.oval:def:13940](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13940)
6. [](http://www.adobe.com/support/security/bulletins/apsb11-21.html)
7. [49077](http://www.securityfocus.com/bid/49077)
8. [SUSE-SU-2011:0894](http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html)
9. [RHSA-2011:1144](http://www.redhat.com/support/errata/RHSA-2011-1144.html)
10. [openSUSE-SU-2011:0897](http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3939
- **State**: PUBLISHED
- **Published Date**: May 31, 2015 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 06:04 UTC
- **Reserved Date**: May 12, 2015 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Directory traversal vulnerability in the NC854 and NC856 modules for IDS RTU 850C devices allows remote authenticated users to read arbitrary files via unspecified vectors involving an internal web server, as demonstrated by reading a TELNET credentials file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-15-148-01)
2. [74900](http://www.securityfocus.com/bid/74900) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18732
- **State**: REJECTED
- **Published Date**: November 04, 2019 at 20:17 UTC
- **Last Updated**: November 04, 2019 at 20:17 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6859
- **State**: PUBLISHED
- **Published Date**: October 02, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:31 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Daum Maps - Subway (aka net.daum.android.map) application 3.9.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#139505](http://www.kb.cert.org/vuls/id/139505)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21296, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21296 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21296
- **State**: PUBLISHED
- **Published Date**: October 30, 2023 at 16:18 UTC
- **Last Updated**: September 06, 2024 at 20:33 UTC
- **Reserved Date**: November 03, 2022 at 22:37 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Permission, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
### References
1. [](https://source.android.com/docs/security/bulletin/android-14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0428, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0428 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0428
- **State**: PUBLISHED
- **Published Date**: October 29, 2019 at 17:28 UTC
- **Last Updated**: August 06, 2024 at 21:51 UTC
- **Reserved Date**: January 12, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) in ikiwiki before 3.20110122 could allow remote attackers to insert arbitrary JavaScript due to insufficient checking in comments.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2011-0428)
2. [](https://ikiwiki.info/security/#index38h2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36209, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36209 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36209
- **State**: PUBLISHED
- **Published Date**: January 22, 2021 at 09:06 UTC
- **Last Updated**: August 04, 2024 at 17:23 UTC
- **Reserved Date**: January 22, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the late-static crate before 0.4.0 for Rust. Because Sync is implemented for LateStatic with T: Send, a data race can occur.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2020-0102.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28217, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28217
- **State**: PUBLISHED
- **Published Date**: December 11, 2020 at 00:51 UTC
- **Last Updated**: August 04, 2024 at 16:33 UTC
- **Reserved Date**: November 05, 2020 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-311: Missing Encryption of Sensitive Data vulnerability exists in Easergy T300 (firmware 2.7 and older), that would allow an attacker to read network traffic over HTTP protocol.
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**n/a - Easergy T300 (firmware 2.7 and older)**
Affected versions:
- Easergy T300 (firmware 2.7 and older) (Status: affected)
### References
1. [](https://www.se.com/ww/en/download/document/SEVD-2020-315-06/)
2. [](https://us-cert.cisa.gov/ics/advisories/icsa-20-343-03) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47040, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47040 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47040
- **State**: PUBLISHED
- **Published Date**: November 16, 2023 at 14:42 UTC
- **Last Updated**: September 04, 2024 at 20:48 UTC
- **Reserved Date**: October 30, 2023 at 16:23 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Media Encoder version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Media Encoder**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/media-encoder/apsb23-63.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3669, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3669 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3669
- **State**: PUBLISHED
- **Published Date**: August 03, 2023 at 11:11 UTC
- **Last Updated**: February 27, 2025 at 21:11 UTC
- **Reserved Date**: July 14, 2023 at 07:42 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
A missing Brute-Force protection in CODESYS Development System prior to 3.5.19.20 allows a local attacker to have unlimited attempts of guessing the password within an import dialog.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-307: Security Weakness
### Affected Products
**CODESYS - CODESYS Development System**
Affected versions:
- 3.0.0.0 (Status: affected)
### References
1. [](https://cert.vde.com/en/advisories/VDE-2023-023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12243, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12243 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12243
- **State**: PUBLISHED
- **Published Date**: November 02, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 18:28 UTC
- **Reserved Date**: August 03, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Cisco Unified Computing System (UCS) Manager, Cisco Firepower 4100 Series Next-Generation Firewall (NGFW), and Cisco Firepower 9300 Security Appliance could allow an authenticated, local attacker to obtain root shell privileges on the device, aka Command Injection. The vulnerability is due to improper validation of string input in the shell application. An attacker could exploit this vulnerability through the use of malicious commands. A successful exploit could allow the attacker to obtain root shell privileges on the device. Cisco Bug IDs: CSCvf20741, CSCvf60078.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**n/a - Cisco UCS Manager, Cisco Firepower 4100 Series NGFW, and Cisco Firepower 9300 Security Appliance**
Affected versions:
- Cisco UCS Manager, Cisco Firepower 4100 Series NGFW, and Cisco Firepower 9300 Security Appliance (Status: affected)
### References
1. [101652](http://www.securityfocus.com/bid/101652)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-arce)
3. [1039719](http://www.securitytracker.com/id/1039719) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19820, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19820
- **State**: PUBLISHED
- **Published Date**: December 16, 2019 at 20:07 UTC
- **Last Updated**: August 05, 2024 at 02:25 UTC
- **Reserved Date**: December 16, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An invalid pointer vulnerability in IOCTL Handling in the kyrld.sys driver in Kyrol Internet Security 9.0.6.9 allows an attacker to achieve privilege escalation, denial-of-service, and code execution via usermode because 0x9C402405 using METHOD_NEITHER results in a read primitive.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://nafiez.github.io/security/vulnerability/2019/12/04/kyrol-internet-security-invalid-pointer-vulnerability.html)
2. [](https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-12-04-kyrol-internet-security-invalid-pointer-vulnerability.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23200, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23200 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23200
- **State**: PUBLISHED
- **Published Date**: February 16, 2022 at 16:38 UTC
- **Last Updated**: April 23, 2025 at 19:03 UTC
- **Reserved Date**: January 12, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe After Effects versions 22.1.1 (and earlier) and 18.4.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Adobe - After Effects**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/after_effects/apsb22-09.html)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-376/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6191, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6191
- **State**: PUBLISHED
- **Published Date**: March 29, 2024 at 11:40 UTC
- **Last Updated**: August 27, 2024 at 16:03 UTC
- **Reserved Date**: November 17, 2023 at 14:04 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Egehan Security WebPDKS allows SQL Injection.This issue affects WebPDKS: through 20240329. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Egehan Security - WebPDKS**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-24-0253)
### Credits
- Sarp Abdurrahman Aydemir |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31567
- **State**: PUBLISHED
- **Published Date**: January 28, 2022 at 19:09 UTC
- **Last Updated**: February 20, 2025 at 20:32 UTC
- **Reserved Date**: January 13, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authenticated (admin+) Arbitrary File Download vulnerability discovered in Download Monitor WordPress plugin (versions <= 4.4.6). The plugin allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the &downloadable_file_urls[0] parameter data. It's also possible to escape from the web server home directory and download any file within the OS.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/download-monitor/#developers)
2. [](https://github.com/WPChill/download-monitor/blob/master/changelog.txt)
3. [](https://patchstack.com/database/vulnerability/download-monitor/wordpress-download-monitor-plugin-4-4-6-authenticated-arbitrary-file-download-vulnerability)
### Credits
- Vulnerability discovered by Ex.Mi (Patchstack). |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8273, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8273 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8273
- **State**: PUBLISHED
- **Published Date**: April 02, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 02:13 UTC
- **Reserved Date**: September 18, 2016 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei PC client software HiSuite 4.0.5.300_OVE uses insecure HTTP for upgrade software package download and does not check the integrity of the software package before installing; an attacker can launch an MITM attack to interrupt or replace the downloaded software package and further compromise the PC.
### Affected Products
**n/a - HiSuite 4.0.5.300_OVE**
Affected versions:
- HiSuite 4.0.5.300_OVE (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160905-01-hisuite-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0483, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0483 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0483
- **State**: PUBLISHED
- **Published Date**: May 24, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:21 UTC
- **Reserved Date**: May 24, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Configuration error in Axent Raptor Firewall 6.5 allows remote attackers to use the firewall as a proxy to access internal web resources when the http.noproxy Rule is not set.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010327 RE: Raptor 6.5 http vulnerability](http://www.securityfocus.com/archive/1/171953)
2. [20010324 Raptor 6.5 http vulnerability](http://archives.neohapsis.com/archives/bugtraq/2001-03/0359.html)
3. [2517](http://www.securityfocus.com/bid/2517) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18799, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18799 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18799
- **State**: PUBLISHED
- **Published Date**: November 16, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 11:23 UTC
- **Reserved Date**: October 28, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
School Attendance Monitoring System 1.0 has CSRF via event/controller.php?action=photos.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/150009/School-Attendance-Monitoring-System-1.0-Shell-Upload.html)
2. [45726](https://www.exploit-db.com/exploits/45726/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10651, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10651 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10651
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 09:53 UTC
- **Last Updated**: November 01, 2024 at 13:32 UTC
- **Reserved Date**: November 01, 2024 at 02:35 UTC
- **Assigned By**: twcert
### Vulnerability Description
IDExpert from CHANGING Information Technology does not properly validate a specific parameter in the administrator interface, allowing remote attackers with administrator privileges to exploit this vulnerability to read arbitrary system files.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-36: Security Weakness
### Affected Products
**CHANGING Information Technology - IDExpert**
Affected versions:
- 2.5 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-8170-48a4e-1.html)
2. [](https://www.twcert.org.tw/en/cp-139-8171-29297-2.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3992, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3992 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3992
- **State**: PUBLISHED
- **Published Date**: December 04, 2005 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 23:31 UTC
- **Reserved Date**: December 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in WinEggDropShell remote access trojan (RAT) 1.7 allow remote attackers to execute arbitrary code via (1) a long GET request to the HTTP server, or a long (2) USER or (3) PASS command to the FTP server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20051201 WinEggDropShell Multiple Remote Stack Overflow](http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0059.html)
2. [](http://secway.org/advisory/AD20051202.txt)
3. [226](http://securityreason.com/securityalert/226)
4. [15682](http://www.securityfocus.com/bid/15682)
5. [20051202 WinEggDropShell Multiple Remote Stack Overflow](http://www.securityfocus.com/archive/1/418398) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1654, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1654
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 00:00 UTC
- **Last Updated**: February 19, 2025 at 16:30 UTC
- **Reserved Date**: March 27, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Denial of Service in GitHub repository gpac/gpac prior to 2.4.0.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**gpac - gpac/gpac**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/33652b56-128f-41a7-afcc-10641f69ff14)
2. [](https://github.com/gpac/gpac/commit/2c055153d401b8c49422971e3a0159869652d3da)
3. [DSA-5411](https://www.debian.org/security/2023/dsa-5411) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22271, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22271 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22271
- **State**: PUBLISHED
- **Published Date**: February 28, 2025 at 12:32 UTC
- **Last Updated**: March 05, 2025 at 15:49 UTC
- **Reserved Date**: January 02, 2025 at 13:12 UTC
- **Assigned By**: CERT-PL
### Vulnerability Description
The application or its infrastructure allows for IP address spoofing by providing its own value in the "X-Forwarded-For" header. Thus, the action logging mechanism in the application loses accountability
This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer.
### Weakness Classification (CWE)
- CWE-290: Security Weakness
### Affected Products
**CyberArk - Endpoint Privilege Manager**
Affected versions:
- 24.7.1 (Status: affected)
### References
1. [](https://cert.pl/en/posts/2025/02/CVE-2025-22270/)
2. [](https://cert.pl/posts/2025/02/CVE-2025-22270/)
3. [](https://docs.cyberark.com/epm/24.7.1/en/content/resources/_topnav/cc_home.htm)
### Credits
- Karol Mazurek (Afine Team)
- Maksymilian Kubiak (Afine Team) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5776, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5776 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5776
- **State**: PUBLISHED
- **Published Date**: September 09, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 11:55 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The PlayMemories Online (aka jp.co.sony.tablet.PersonalSpace) application 4.2.0.05070 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#358009](http://www.kb.cert.org/vuls/id/358009)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4734
- **State**: PUBLISHED
- **Published Date**: December 25, 2022 at 00:00 UTC
- **Last Updated**: April 10, 2025 at 18:18 UTC
- **Reserved Date**: December 25, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository usememos/memos prior to 0.9.1.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-212: Security Weakness
### Affected Products
**usememos - usememos/memos**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/4b4421dc-73af-4dec-884c-836f9732cb5b)
2. [](https://github.com/usememos/memos/commit/05b41804e33a34102f1f75bb2d69195dda6a1210) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43801, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43801 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43801
- **State**: REJECTED
- **Last Updated**: November 15, 2023 at 06:43 UTC
- **Reserved Date**: October 26, 2022 at 14:49 UTC
- **Assigned By**: atlassian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0616, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0616
- **State**: PUBLISHED
- **Published Date**: April 03, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 04:17 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, and 9.x before 9.1(2)SU2, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) by improperly terminating SIP TCP connections, aka Bug ID CSCul69819.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150401 Multiple Vulnerabilities in Cisco Unity Connection](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc)
2. [1032010](http://www.securitytracker.com/id/1032010) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35685, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35685
- **State**: PUBLISHED
- **Published Date**: January 08, 2025 at 17:35 UTC
- **Last Updated**: January 31, 2025 at 17:59 UTC
- **Reserved Date**: June 15, 2023 at 02:50 UTC
- **Assigned By**: google_android
### Vulnerability Description
In DevmemIntMapPages of devicemem_server.c, there is a possible physical page uaf due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- Android SoC (Status: affected)
### References
1. [](https://issuetracker.google.com/issues/42420027) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6620, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6620 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6620
- **State**: PUBLISHED
- **Published Date**: April 06, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 11:34 UTC
- **Reserved Date**: April 06, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in javascript/editor/editor/filemanager/browser/mcpuk/connectors/php/connector.php in GraFX miniCWB 2.1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) errcontext, (2) _GET, (3) _POST, (4) _SESSION, (5) _SERVER, and (6) fckphp_config[Debug_SERVER] parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29368](http://www.securityfocus.com/bid/29368)
2. [20080526 Mini-CWB <= 2.1.1 Remote XSS Vulnerability](http://marc.info/?l=bugtraq&m=121181445919047&w=2)
3. [30390](http://secunia.com/advisories/30390)
4. [45647](http://osvdb.org/45647)
5. [minicwb-connector-xss(42630)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42630) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15451, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15451 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15451
- **State**: PUBLISHED
- **Published Date**: November 08, 2018 at 20:00 UTC
- **Last Updated**: November 26, 2024 at 14:21 UTC
- **Reserved Date**: August 17, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Prime Service Catalog could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Cisco - Cisco Prime Service Catalog**
Affected versions:
- n/a (Status: affected)
### References
1. [105857](http://www.securityfocus.com/bid/105857)
2. [20181107 Cisco Prime Service Catalog Cross-Site Scripting Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-psc-xss) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36901, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36901 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36901
- **State**: PUBLISHED
- **Published Date**: July 27, 2022 at 14:25 UTC
- **Last Updated**: August 03, 2024 at 10:14 UTC
- **Reserved Date**: July 27, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins HTTP Request Plugin 1.15 and earlier stores HTTP Request passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
### Affected Products
**Jenkins project - Jenkins HTTP Request Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 1.15 (Status: unknown)
### References
1. [](https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2053)
2. [[oss-security] 20220727 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/07/27/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7186, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7186 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7186
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8226
- **State**: PUBLISHED
- **Published Date**: January 08, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 08:13 UTC
- **Reserved Date**: November 17, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Joint Photographic Experts Group Processing Unit (JPU) driver in Huawei ALE smartphones with software before ALE-UL00C00B220 and ALE-TL00C01B220 and GEM-703L smartphones with software before V100R001C233B111 allows remote attackers to cause a denial of service (crash) via a crafted application with the system or camera permission, a different vulnerability than CVE-2015-8225.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-465532.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1099, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1099 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1099
- **State**: PUBLISHED
- **Published Date**: July 21, 2021 at 02:55 UTC
- **Last Updated**: August 03, 2024 at 15:55 UTC
- **Reserved Date**: November 12, 2020 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin) that could allow an attacker to cause stack-based buffer overflow and put a customized ROP gadget on the stack. Such an attack may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8).
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**NVIDIA - NVIDIA Virtual GPU Software**
Affected versions:
- vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8). (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5211) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-20627, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-20627 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-20627
- **State**: PUBLISHED
- **Published Date**: August 31, 2020 at 16:00 UTC
- **Last Updated**: August 04, 2024 at 14:22 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The includes/gateways/stripe/includes/admin/admin-actions.php in GiveWP plugin through 2.5.9 for WordPress allows unauthenticated settings change.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.nintechnet.com/multiple-vulnerabilities-fixed-in-wordpress-givewp-plugin/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4085, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4085 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4085
- **State**: PUBLISHED
- **Published Date**: November 27, 2009 at 20:45 UTC
- **Last Updated**: August 07, 2024 at 06:54 UTC
- **Reserved Date**: November 27, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in assets/plugins/mp3_id/mp3_id.php in PHP Traverser 0.8.0 allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[BASE] parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [phptraverser-mp3id-file-include(54378)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54378)
2. [37455](http://secunia.com/advisories/37455)
3. [60466](http://osvdb.org/60466) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7999, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7999
- **State**: PUBLISHED
- **Published Date**: March 09, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 06:37 UTC
- **Reserved Date**: March 09, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In libgraphite2 in graphite2 1.3.11, a NULL pointer dereference vulnerability was found in Segment.cpp during a dumbRendering operation, which may allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .ttf file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/silnrsi/graphite/commit/db132b4731a9b4c9534144ba3a18e65b390e9ff6)
2. [](https://github.com/silnrsi/graphite/issues/22)
3. [FEDORA-2019-644ef7ebec](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVWOKYZZDEMG6VSG53KAGUOHUIIQ7CND/)
4. [FEDORA-2019-d0b1feb995](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5F3CK2IPXFCLQZEBEEXONWIABN2E7H2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32140, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32140
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 01:56 UTC
- **Last Updated**: February 05, 2025 at 20:46 UTC
- **Reserved Date**: May 03, 2023 at 20:10 UTC
- **Assigned By**: zdi
### Vulnerability Description
D-Link DAP-1360 webproc var:sys_Token Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling requests to the /cgi-bin/webproc endpoint. When parsing the var:sys_Token parameter, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-18418.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**D-Link - DAP-1360**
Affected versions:
- 6.14B01 EU HOTFIX (Status: affected)
### References
1. [ZDI-23-532](https://www.zerodayinitiative.com/advisories/ZDI-23-532/)
2. [vendor-provided URL](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10324) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44467, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44467 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44467
- **State**: PUBLISHED
- **Published Date**: October 24, 2022 at 00:00 UTC
- **Last Updated**: May 07, 2025 at 15:48 UTC
- **Reserved Date**: May 13, 2022 at 00:00 UTC
- **Assigned By**: Nozomi
### Vulnerability Description
A broken access control vulnerability in the KillDupUsr_func function of spx_restservice allows an attacker to arbitrarily terminate active sessions of other users, causing a Denial-of-Service (DoS) condition, if an input parameter is correctly guessed. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Lanner Inc - IAC-AST2500A**
Affected versions:
- 1.10.0 (Status: affected)
### References
1. [](https://www.nozominetworks.com/blog/vulnerabilities-in-bmc-firmware-affect-ot-iot-device-security-part-1/)
2. [](https://www.nozominetworks.com/labs/vulnerability-advisories/cve-2021-44467/)
### Credits
- Andrea Palanca of Nozomi Networks found this bug during a security research activity. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0643, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0643 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0643
- **State**: PUBLISHED
- **Published Date**: April 21, 2016 at 10:00 UTC
- **Last Updated**: October 15, 2024 at 19:16 UTC
- **Reserved Date**: December 09, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect confidentiality via vectors related to DML.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2016:1620](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html)
2. [RHSA-2016:1481](http://rhn.redhat.com/errata/RHSA-2016-1481.html)
3. [RHSA-2016:1132](https://access.redhat.com/errata/RHSA-2016:1132)
4. [1035606](http://www.securitytracker.com/id/1035606)
5. [USN-2953-1](http://www.ubuntu.com/usn/USN-2953-1)
6. [](https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/)
7. [openSUSE-SU-2016:1332](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html)
8. [USN-2954-1](http://www.ubuntu.com/usn/USN-2954-1)
9. [SUSE-SU-2016:1619](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html)
10. [RHSA-2016:1480](http://rhn.redhat.com/errata/RHSA-2016-1480.html)
11. [86486](http://www.securityfocus.com/bid/86486)
12. [openSUSE-SU-2016:1664](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html)
13. [](https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/)
14. [](http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168)
15. [DSA-3557](http://www.debian.org/security/2016/dsa-3557)
16. [RHSA-2016:1602](http://rhn.redhat.com/errata/RHSA-2016-1602.html)
17. [DSA-3595](http://www.debian.org/security/2016/dsa-3595)
18. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html)
19. [openSUSE-SU-2016:1686](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html)
20. [RHSA-2016:0705](http://rhn.redhat.com/errata/RHSA-2016-0705.html)
21. [](https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/)
22. [SUSE-SU-2016:1279](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1601, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1601 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1601
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 08:40 UTC
- **Last Updated**: September 17, 2024 at 04:25 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
Certain types of malformed Path Computation Element Protocol (PCEP) packets when received and processed by a Juniper Networks Junos OS device serving as a Path Computation Client (PCC) in a PCEP environment using Juniper's path computational element protocol daemon (pccd) process allows an attacker to cause the pccd process to crash and generate a core file thereby causing a Denial of Service (DoS). Continued receipt of this family of malformed PCEP packets will cause an extended Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 15.1 versions prior to 15.1F6-S13, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D180 on SRX Series; 15.1X53 versions prior to 15.1X53-D238, 15.1X53-D496, 15.1X53-D592; 16.1 versions prior to 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R2-S11, 17.1R3; 17.2 versions prior to 17.2R1-S9; 17.2 version 17.2R2 and later prior to 17.2R3-S2; 17.3 versions prior to 17.3R3-S3; 17.4 versions prior to 17.4R2-S2, 17.4R3; 18.1 versions prior to 18.1R3-S2; 18.2 versions prior to 18.2R2-S6, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2. This issue does not affect releases of Junos OS prior to 15.1R1.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 15.1 (Status: affected)
- 16.1 (Status: affected)
- 16.2 (Status: affected)
- 17.1 (Status: affected)
- 17.2 (Status: affected)
- 17.3 (Status: affected)
- 17.4 (Status: affected)
- 18.1 (Status: affected)
- 18.2 (Status: affected)
- 18.2X75 (Status: affected)
- 18.3 (Status: affected)
- 18.4 (Status: affected)
- 15.1X53 (Status: affected)
**Juniper Networks - Junos OS**
Affected versions:
- 15.1X49 (Status: affected)
### References
1. [](https://prsearch.juniper.net/InfoCenter/index?page=prcontent&id=PR1395205)
2. [](https://kb.juniper.net/JSA10980) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5723, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5723 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5723
- **State**: REJECTED
- **Published Date**: June 11, 2021 at 20:07 UTC
- **Last Updated**: June 11, 2021 at 20:07 UTC
- **Reserved Date**: February 01, 2017 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39157
- **State**: PUBLISHED
- **Published Date**: August 24, 2021 at 18:15 UTC
- **Last Updated**: August 04, 2024 at 01:58 UTC
- **Reserved Date**: August 16, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
detect-character-encoding is an open source character encoding inspection library. In detect-character-encoding v0.6.0 and earlier, data matching no charset causes the Node.js process to crash. The problem has been patched in [detect-character-encoding v0.7.0](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0). No workaround are available and all users should update to resolve this issue.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-755: Security Weakness
### Affected Products
**sonicdoe - detect-character-encoding**
Affected versions:
- < 0.7.0 (Status: affected)
### References
1. [](https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-jqfh-8hw5-fqjr)
2. [](https://github.com/sonicdoe/detect-character-encoding/issues/15)
3. [](https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37970, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37970 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37970
- **State**: PUBLISHED
- **Published Date**: May 20, 2025 at 16:47 UTC
- **Last Updated**: June 04, 2025 at 12:57 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo
Prevent st_lsm6dsx_read_fifo from falling in an infinite loop in case
pattern_len is equal to zero and the device FIFO is not empty.
### Affected Products
**Linux - Linux**
Affected versions:
- 290a6ce11d938be52634b3ce1bbc6b78be4d23c1 (Status: affected)
- 290a6ce11d938be52634b3ce1bbc6b78be4d23c1 (Status: affected)
- 290a6ce11d938be52634b3ce1bbc6b78be4d23c1 (Status: affected)
- 290a6ce11d938be52634b3ce1bbc6b78be4d23c1 (Status: affected)
- 290a6ce11d938be52634b3ce1bbc6b78be4d23c1 (Status: affected)
- 290a6ce11d938be52634b3ce1bbc6b78be4d23c1 (Status: affected)
- 290a6ce11d938be52634b3ce1bbc6b78be4d23c1 (Status: affected)
- 290a6ce11d938be52634b3ce1bbc6b78be4d23c1 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.11 (Status: affected)
- 0 (Status: unaffected)
- 5.4.294 (Status: unaffected)
- 5.10.238 (Status: unaffected)
- 5.15.183 (Status: unaffected)
- 6.1.139 (Status: unaffected)
- 6.6.91 (Status: unaffected)
- 6.12.29 (Status: unaffected)
- 6.14.7 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/f06a1a1954527cc4ed086d926c81ff236b2adde9)
2. [](https://git.kernel.org/stable/c/84e39f628a3a3333add99076e4d6c8b42b12d3a0)
3. [](https://git.kernel.org/stable/c/f3cf233c946531a92fe651ff2bd15ebbe60630a7)
4. [](https://git.kernel.org/stable/c/6c4a5000618a8c44200d455c92e2f2a4db264717)
5. [](https://git.kernel.org/stable/c/da33c4167b9cc1266a97215114cb74679f881d0c)
6. [](https://git.kernel.org/stable/c/a1cad8a3bca41dead9980615d35efc7bff1fd534)
7. [](https://git.kernel.org/stable/c/3bb6c02d6fe8347ce1785016d135ff539c20043c)
8. [](https://git.kernel.org/stable/c/159ca7f18129834b6f4c7eae67de48e96c752fc9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52422, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52422 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52422
- **State**: PUBLISHED
- **Published Date**: November 18, 2024 at 16:05 UTC
- **Last Updated**: November 18, 2024 at 16:20 UTC
- **Reserved Date**: November 11, 2024 at 06:39 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Terry Lin WP Githuber MD allows Stored XSS.This issue affects WP Githuber MD: from n/a through 1.16.3.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Terry Lin - WP Githuber MD**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-githuber-md/wordpress-wp-githuber-md-plugin-1-16-3-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Fazle Mawla (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27149
- **State**: PUBLISHED
- **Published Date**: February 10, 2021 at 18:39 UTC
- **Last Updated**: August 03, 2024 at 20:40 UTC
- **Reserved Date**: February 10, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded adminpldt / z6dUABtl270qRxt7a2uGTiw credentials for an ISP.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pierrekim.github.io/blog/2021-01-12-fiberhome-ont-0day-vulnerabilities.html#httpd-hardcoded-credentials) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10302
- **State**: PUBLISHED
- **Published Date**: April 18, 2019 at 16:54 UTC
- **Last Updated**: August 04, 2024 at 22:17 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins jira-ext Plugin 0.8 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
### Affected Products
**Jenkins project - Jenkins jira-ext Plugin**
Affected versions:
- 0.8 and earlier (Status: affected)
### References
1. [108045](http://www.securityfocus.com/bid/108045)
2. [](https://jenkins.io/security/advisory/2019-04-17/#SECURITY-836) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-21935, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-21935 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-21935
- **State**: PUBLISHED
- **Published Date**: July 21, 2021 at 13:24 UTC
- **Last Updated**: August 04, 2024 at 14:30 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A command injection vulnerability in HNAP1/GetNetworkTomographySettings of Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n allows attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cc-crack/router/blob/master/motocx2.md)
2. [](https://l0n0l.xyz/post/motocx2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10291, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10291
- **State**: PUBLISHED
- **Published Date**: November 06, 2020 at 11:20 UTC
- **Last Updated**: September 16, 2024 at 18:13 UTC
- **Reserved Date**: March 10, 2020 at 00:00 UTC
- **Assigned By**: Alias
### Vulnerability Description
Visual Components (owned by KUKA) is a robotic simulator that allows simulating factories and robots in order toimprove planning and decision-making processes. Visual Components software requires a special license which can beobtained from a network license server. The network license server binds to all interfaces (0.0.0.0) and listensfor packets over UDP port 5093. No authentication/authorization is required in order to communicate with theserver. The protocol being used is a property protocol by RMS Sentinel which provides the licensing infrastructurefor the network license server. RMS Sentinel license manager service exposes UDP port 5093 which provides sensitivesystem information that could be leveraged for further exploitation without any kind of authentication. Thisinformation includes detailed hardware and OS characteristics.After a decryption process, a textual protocol is found which contains a simple header with the requested command,application-identifier, and some arguments. The protocol leaks information regarding the receiving serverinformation, license information and managing licenses, among others.Through this flaw, attackers can retreive information about a KUKA simulation system, particularly, the version ofthe licensing server, which is connected to the simulator, and which will allow them to launch local simulationswith similar characteristics, further understanding the dynamics of motion virtualization and opening doors toother attacks (see RVDP#711 and RVDP#712 for subsequent vulnerabilities that compromise integrity andavailability).Beyond compromising simulations, Visual Components provides capabilities to interface with industrial machinery.Particularly, their PLC Connectivity feature 'makes it easy' to connect simulations with control systems usingeither the industry standard OPC UA or other supported vendor specific interfaces. This fills the gap of jumpingfrom simulation to real and enables attackers to pivot from the Visual Components simulator to robots or otherIndustrial Control System (ICS) devices, such as PLCs.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**KUKA Roboter GmbH - Visual Components Network License Server 2.0.8**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/aliasrobotics/RVD/issues/3336)
### Credits
- Sharon Brizinov (Claroty) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4831, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4831 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4831
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0913, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0913 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0913
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 15:12 UTC
- **Last Updated**: August 04, 2024 at 06:18 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1000, CVE-2020-1003, CVE-2020-1027.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0913) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15569, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15569
- **State**: PUBLISHED
- **Published Date**: July 06, 2020 at 13:48 UTC
- **Last Updated**: August 04, 2024 at 13:22 UTC
- **Reserved Date**: July 06, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PlayerGeneric.cpp in MilkyTracker through 1.02.00 has a use-after-free in the PlayerGeneric destructor.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/milkytracker/MilkyTracker/commit/7afd55c42ad80d01a339197a2d8b5461d214edaf)
2. [[debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update](https://lists.debian.org/debian-lts-announce/2020/07/msg00023.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1951, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1951 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1951
- **State**: PUBLISHED
- **Published Date**: August 07, 2016 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 23:10 UTC
- **Reserved Date**: January 20, 2016 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Multiple integer overflows in io/prprf.c in Mozilla Netscape Portable Runtime (NSPR) before 4.12 allow remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long string to a PR_*printf function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[dev-tech-nspr] 20160217 [ANNOUNCE] NSPR 4.12 Release](https://groups.google.com/forum/message/raw?msg=mozilla.dev.tech.nspr/dV4MyMsg6jw/hhWcXOgJDQAJ)
2. [92385](http://www.securityfocus.com/bid/92385)
3. [1036590](http://www.securitytracker.com/id/1036590)
4. [](https://hg.mozilla.org/projects/nspr/rev/96381e3aaae2)
5. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1174015)
6. [USN-3023-1](http://www.ubuntu.com/usn/USN-3023-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2440, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2440 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2440
- **State**: PUBLISHED
- **Published Date**: April 28, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 19:34 UTC
- **Reserved Date**: April 27, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The default configuration of the TP-Link 8840T router enables web-based administration on the WAN interface, which allows remote attackers to establish an HTTP connection and possibly have unspecified other impact via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#834723](http://www.kb.cert.org/vuls/id/834723)
2. [tplink-dsl-webinterface-security-bypass(74624)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74624) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3173, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3173 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3173
- **State**: PUBLISHED
- **Published Date**: October 17, 2018 at 01:00 UTC
- **Last Updated**: October 02, 2024 at 19:40 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.7.23 and prior (Status: affected)
- 8.0.12 and prior (Status: affected)
### References
1. [1041888](http://www.securitytracker.com/id/1041888)
2. [RHSA-2018:3655](https://access.redhat.com/errata/RHSA-2018:3655)
3. [USN-3799-1](https://usn.ubuntu.com/3799-1/)
4. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html)
5. [105594](http://www.securityfocus.com/bid/105594)
6. [](https://security.netapp.com/advisory/ntap-20181018-0002/)
7. [RHSA-2019:1258](https://access.redhat.com/errata/RHSA-2019:1258)
8. [GLSA-201908-24](https://security.gentoo.org/glsa/201908-24) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3402, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3402 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3402
- **State**: PUBLISHED
- **Published Date**: June 06, 2024 at 18:24 UTC
- **Last Updated**: August 01, 2024 at 20:12 UTC
- **Reserved Date**: April 05, 2024 at 17:58 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
A stored Cross-Site Scripting (XSS) vulnerability existed in version (20240121) of gaizhenbiao/chuanhuchatgpt due to inadequate sanitization and validation of model output data. Despite user-input validation efforts, the application fails to properly sanitize or validate the output from the model, allowing for the injection and execution of malicious JavaScript code within the context of a user's browser. This vulnerability can lead to the execution of arbitrary JavaScript code in the context of other users' browsers, potentially resulting in the hijacking of victims' browsers.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**gaizhenbiao - gaizhenbiao/chuanhuchatgpt**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/389570c4-0bf2-4bc3-84f5-2e7afdba8ed1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6013, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6013 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6013
- **State**: PUBLISHED
- **Published Date**: December 26, 2019 at 15:16 UTC
- **Last Updated**: August 04, 2024 at 20:09 UTC
- **Reserved Date**: January 10, 2019 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
DBA-1510P firmware 1.70b009 and earlier allows authenticated attackers to execute arbitrary OS commands via Command Line Interface (CLI).
### Affected Products
**D-Link Japan K.K. - DBA-1510P**
Affected versions:
- firmware 1.70b009 and earlier (Status: affected)
### References
1. [](https://www.dlink-jp.com/product/dba-1510p#product_firmware)
2. [](http://jvn.jp/en/jp/JVN95875796/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2852, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2852 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2852
- **State**: PUBLISHED
- **Published Date**: August 18, 2009 at 20:41 UTC
- **Last Updated**: August 07, 2024 at 06:07 UTC
- **Reserved Date**: August 18, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WP-Syntax plugin 0.9.1 and earlier for Wordpress, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via the test_filter[wp_head] array parameter to test/index.php, which is used in a call to the call_user_func_array function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [9431](http://www.exploit-db.com/exploits/9431)
2. [wpsyntax-index-code-execution(52457)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52457)
3. [ADV-2009-2456](http://www.vupen.com/english/advisories/2009/2456)
4. [36040](http://www.securityfocus.com/bid/36040) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34997, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34997
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 19:04 UTC
- **Last Updated**: August 30, 2024 at 17:39 UTC
- **Reserved Date**: June 22, 2023 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Insecure inherited permissions in the installer for some Intel Server Configuration Utility software before version 16.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-277: Security Weakness
### Affected Products
**n/a - Intel Server Configuration Utility software**
Affected versions:
- before version 16.0.9 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00925.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00925.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5110, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5110 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5110
- **State**: PUBLISHED
- **Published Date**: October 02, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 19:41 UTC
- **Reserved Date**: October 02, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in home.php in PHP Invoice 2.2 allows remote attackers to inject arbitrary web script or HTML via the msg parameter, a different vector than CVE-2006-5074. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-3795](http://www.vupen.com/english/advisories/2006/3795)
2. [33389](http://osvdb.org/33389)
3. [22123](http://secunia.com/advisories/22123)
4. [phpinvoice-home-xss(29181)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29181) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25174, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25174 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25174
- **State**: PUBLISHED
- **Published Date**: January 18, 2021 at 07:14 UTC
- **Last Updated**: August 03, 2024 at 19:56 UTC
- **Reserved Date**: January 15, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.opendesign.com/security-advisories)
2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-21-226/)
4. [](https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5788, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5788 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5788
- **State**: PUBLISHED
- **Published Date**: November 01, 2007 at 16:04 UTC
- **Last Updated**: August 07, 2024 at 15:47 UTC
- **Reserved Date**: November 01, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the SIP parser on the Grandstream HT-488 0.1 allows remote attackers to cause a denial of service (device crash) via a crafted SIP INVITE message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27401](http://secunia.com/advisories/27401)
2. [](http://www.sipera.com/index.php?action=resources%2Cthreat_advisory&tid=361)
3. [40187](http://osvdb.org/40187)
4. [grandstream-adapter-sip-invite-dos(37411)](https://exchange.xforce.ibmcloud.com/vulnerabilities/37411) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5385, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5385 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5385
- **State**: PUBLISHED
- **Published Date**: October 11, 2012 at 15:00 UTC
- **Last Updated**: September 17, 2024 at 00:11 UTC
- **Reserved Date**: October 11, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
install/index.php in Craig Knudsen WebCalendar before 1.2.5 allows remote attackers to modify settings.php and possibly execute arbitrary code via vectors related to the user theme preference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://webcalendar.cvs.sourceforge.net/viewvc/webcalendar/webcalendar/ChangeLog?pathrev=REL_1_2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15093, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15093 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15093
- **State**: PUBLISHED
- **Published Date**: July 09, 2020 at 18:45 UTC
- **Last Updated**: August 04, 2024 at 13:08 UTC
- **Reserved Date**: June 25, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A fix is available in version 0.7.1. CVE-2020-6174 is assigned to the same vulnerability in the TUF reference implementation.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-347: Security Weakness
### Affected Products
**awslabs - tough**
Affected versions:
- < 0.7.1 (Status: affected)
### References
1. [](https://github.com/awslabs/tough/security/advisories/GHSA-5q2r-92f9-4m49)
2. [](https://crates.io/crates/tough)
3. [](https://github.com/theupdateframework/tuf/pull/974)
4. [](https://github.com/theupdateframework/tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57620, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57620 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57620
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 00:00 UTC
- **Last Updated**: January 15, 2025 at 16:06 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the trimchars component of MonetDB Server v11.47.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/MonetDB/MonetDB/issues/7417) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6600, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6600
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 14:25 UTC
- **Last Updated**: October 29, 2024 at 19:36 UTC
- **Reserved Date**: July 09, 2024 at 14:12 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Due to large allocation checks in Angle for GLSL shaders being too lenient an out-of-bounds access could occur when allocating more than 8192 ints in private shader memory on mac OS. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1888340)
2. [](https://www.mozilla.org/security/advisories/mfsa2024-29/)
3. [](https://www.mozilla.org/security/advisories/mfsa2024-30/)
4. [](https://www.mozilla.org/security/advisories/mfsa2024-31/)
5. [](https://www.mozilla.org/security/advisories/mfsa2024-32/)
### Credits
- pwn2car |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.