System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2722, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2722 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2722 - **State**: PUBLISHED - **Published Date**: May 16, 2013 at 10:00 UTC - **Last Updated**: August 06, 2024 at 15:44 UTC - **Reserved Date**: March 28, 2013 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.adobe.com/support/security/bulletins/apsb13-15.html) 2. [oval:org.mitre.oval:def:16789](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16789) 3. [SUSE-SU-2013:0809](http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html) 4. [RHSA-2013:0826](http://rhn.redhat.com/errata/RHSA-2013-0826.html) 5. [GLSA-201308-03](http://security.gentoo.org/glsa/glsa-201308-03.xml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3760, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3760 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3760 - **State**: PUBLISHED - **Published Date**: April 17, 2025 at 12:53 UTC - **Last Updated**: April 17, 2025 at 13:22 UTC - **Reserved Date**: April 17, 2025 at 11:55 UTC - **Assigned By**: Liferay ### Vulnerability Description A stored cross-site scripting (XSS) vulnerability exists with radio button type custom fields in Liferay Portal 7.2.0 through 7.4.3.129, and Liferay DXP 2024.Q4.1 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.9, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.12, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, 7.3 GA through update 36, and 7.2 GA through fix pack 20 allows remote authenticated attackers to inject malicious JavaScript into a page. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Liferay - Portal** Affected versions: - 7.0.0 (Status: affected) **Liferay - DXP** Affected versions: - 7.2.10 (Status: affected) - 7.3.10 (Status: affected) - 7.4.13 (Status: affected) - 2023.Q3.1 (Status: affected) - 2023.Q4.0 (Status: affected) - 2024.Q1.1 (Status: affected) - 2024.Q2.0 (Status: affected) - 2024.Q3.1 (Status: affected) - 2024.Q4.0 (Status: affected) ### References 1. [](https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-3760) ### Credits - Lucas Machado from Devoteam Cyber Trust - milCERT AT
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0312, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0312 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0312 - **State**: PUBLISHED - **Published Date**: January 19, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 16:34 UTC - **Reserved Date**: January 19, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description create.php in aoblogger 2.3 allows remote attackers to bypass authentication and create new blog entries by setting the uza parameter to 1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [16889](http://secunia.com/advisories/16889) 2. [aoblogger-create-security-bypass(24143)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24143) 3. [ADV-2006-0240](http://www.vupen.com/english/advisories/2006/0240) 4. [20060117 [eVuln] aoblogger Multiple Vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2006-01/0322.html) 5. [](http://mikeheltonisawesome.com/viewcomments.php?idd=46) 6. [](http://evuln.com/vulns/37/summary.html) 7. [16286](http://www.securityfocus.com/bid/16286)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5272, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5272 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5272 - **State**: PUBLISHED - **Published Date**: October 08, 2007 at 23:00 UTC - **Last Updated**: August 07, 2024 at 15:24 UTC - **Reserved Date**: October 08, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in kategori.asp in Furkan Tastan Blog allows remote attackers to execute arbitrary SQL commands via the id parameter in a goster kat action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [25934](http://www.securityfocus.com/bid/25934) 2. [4486](https://www.exploit-db.com/exploits/4486) 3. [furkan-kategori-sql-injection(36971)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36971) 4. [37457](http://osvdb.org/37457) 5. [27070](http://secunia.com/advisories/27070)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32411, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32411 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32411 - **State**: PUBLISHED - **Published Date**: July 01, 2022 at 21:32 UTC - **Last Updated**: August 03, 2024 at 07:39 UTC - **Reserved Date**: June 05, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in the languages config file of HongCMS v3.0 allows attackers to getshell. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Neeke/HongCMS/issues/18)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11941, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11941 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11941 - **State**: REJECTED - **Published Date**: August 30, 2019 at 15:37 UTC - **Last Updated**: August 30, 2019 at 15:37 UTC - **Reserved Date**: June 07, 2018 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0187, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0187 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0187 - **State**: PUBLISHED - **Published Date**: June 22, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 18:16 UTC - **Reserved Date**: December 14, 2011 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Untrusted search path vulnerability in IBM Lotus Expeditor 6.1.x and 6.2.x before 6.2 FP5+Security Pack allows local users to gain privileges via a Trojan horse DLL in the current working directory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.ibm.com/support/docview.wss?uid=swg21575642) 2. [lotusexpeditor-dll-code-execution(72097)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72097)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20376, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20376 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20376 - **State**: PUBLISHED - **Published Date**: October 07, 2021 at 18:05 UTC - **Last Updated**: September 17, 2024 at 03:38 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 could allow an authenticated attacker to enumerate usernames due to there being an observable discrepancy in returned messages. IBM X-Force ID: 195568. ### Affected Products **IBM - Sterling File Gateway** Affected versions: - 2.2.0.0 (Status: affected) - 6.0.0.0 (Status: affected) - 5.2.6.5_3 (Status: affected) - 6.0.3.4 (Status: affected) - 6.1.0.0 (Status: affected) - 6.1.0.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6496789) 2. [ibm-sterling-cve202120376-info-disc (195568)](https://exchange.xforce.ibmcloud.com/vulnerabilities/195568)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13844, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13844 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13844 - **State**: PUBLISHED - **Published Date**: June 08, 2020 at 22:46 UTC - **Last Updated**: August 04, 2024 at 12:32 UTC - **Reserved Date**: June 04, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability) 2. [](https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions) 3. [](https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation) 4. [](https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html) 5. [](http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html) 6. [openSUSE-SU-2020:1692](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html) 7. [openSUSE-SU-2020:1693](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-2111, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-2111 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-2111 - **State**: PUBLISHED - **Published Date**: August 05, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:51 UTC - **Reserved Date**: August 05, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Fwmon before 1.0.10 allows remote attackers to cause a denial of service (crash) by causing the kernel to return a large packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.scaramanga.co.uk/fwmon/fwmon-1.0.10.tar.gz) 2. [3984](http://www.securityfocus.com/bid/3984) 3. [fwmon-large-packet-bo(8104)](https://exchange.xforce.ibmcloud.com/vulnerabilities/8104)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3422, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3422 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3422 - **State**: PUBLISHED - **Published Date**: July 31, 2008 at 21:00 UTC - **Last Updated**: August 07, 2024 at 09:37 UTC - **Reserved Date**: July 31, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the ASP.net class libraries in Mono 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via crafted attributes related to (1) HtmlControl.cs (PreProcessRelativeReference), (2) HtmlForm.cs (RenderAttributes), (3) HtmlInputButton (RenderAttributes), (4) HtmlInputRadioButton (RenderAttributes), and (5) HtmlSelect (RenderChildren). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [36494](http://secunia.com/advisories/36494) 2. [31982](http://secunia.com/advisories/31982) 3. [](https://bugzilla.novell.com/show_bug.cgi?id=413534) 4. [SUSE-SR:2008:018](http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html) 5. [31338](http://secunia.com/advisories/31338) 6. [mono-aspnet-xss(44229)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44229) 7. [[mono-devel-list] 20080726 [PATCH] HTML encode attributes that might need encoding](http://lists.ximian.com/pipermail/mono-devel-list/2008-July/028633.html) 8. [30471](http://www.securityfocus.com/bid/30471) 9. [USN-826-1](https://usn.ubuntu.com/826-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30487, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30487 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30487 - **State**: PUBLISHED - **Published Date**: May 18, 2023 at 08:37 UTC - **Last Updated**: August 02, 2024 at 14:47 UTC - **Reserved Date**: April 11, 2023 at 14:13 UTC - **Assigned By**: Patchstack ### Vulnerability Description Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ThimPress LearnPress Export Import plugin <= 4.0.2 versions. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **ThimPress - LearnPress Export Import** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/learnpress-import-export/wordpress-learnpress-export-import-plugin-4-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - LEE SE HYOUNG (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8144, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8144 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8144 - **State**: PUBLISHED - **Published Date**: December 31, 2014 at 22:00 UTC - **Last Updated**: August 06, 2024 at 13:10 UTC - **Reserved Date**: October 10, 2014 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in doorkeeper before 1.4.1 allows remote attackers to hijack the authentication of unspecified victims for requests that read a user OAuth authorization code via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/doorkeeper-gem/doorkeeper/blob/master/CHANGELOG.md) 2. [doorkeeper-cve20148144-csrf(99342)](https://exchange.xforce.ibmcloud.com/vulnerabilities/99342) 3. [[oss-security] 20141217 [CVE-2014-8144] CSRF vulnerability in doorkeeper](http://seclists.org/oss-sec/2014/q4/1076)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27418, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27418 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27418 - **State**: PUBLISHED - **Published Date**: August 22, 2023 at 00:00 UTC - **Last Updated**: October 03, 2024 at 19:23 UTC - **Reserved Date**: October 21, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Use After Free vulnerability in Fedora Linux kernel 5.9.0-rc9 allows attackers to obatin sensitive information via vgacon_invert_region() function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://fedora.com) 2. [](https://patchwork.freedesktop.org/patch/356372/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2384, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2384 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2384 - **State**: PUBLISHED - **Published Date**: April 27, 2016 at 17:00 UTC - **Last Updated**: August 05, 2024 at 23:24 UTC - **Reserved Date**: February 14, 2016 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1035072](http://www.securitytracker.com/id/1035072) 2. [USN-2930-1](http://www.ubuntu.com/usn/USN-2930-1) 3. [[oss-security] 20160214 CVE Request: Linux: ALSA: usb-audio: double-free triggered by invalid USB descriptor](http://www.openwall.com/lists/oss-security/2016/02/14/2) 4. [SUSE-SU-2016:1038](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html) 5. [SUSE-SU-2016:1033](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html) 6. [USN-2930-2](http://www.ubuntu.com/usn/USN-2930-2) 7. [DSA-3503](http://www.debian.org/security/2016/dsa-3503) 8. [SUSE-SU-2016:1034](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html) 9. [RHSA-2016:2584](http://rhn.redhat.com/errata/RHSA-2016-2584.html) 10. [SUSE-SU-2016:1035](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html) 11. [RHSA-2016:2574](http://rhn.redhat.com/errata/RHSA-2016-2574.html) 12. [SUSE-SU-2016:1764](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html) 13. [SUSE-SU-2016:1031](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html) 14. [USN-2930-3](http://www.ubuntu.com/usn/USN-2930-3) 15. [](https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-2384) 16. [SUSE-SU-2016:1102](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html) 17. [](https://github.com/torvalds/linux/commit/07d86ca93db7e5cdf4743564d98292042ec21af7) 18. [RHSA-2017:0817](http://rhn.redhat.com/errata/RHSA-2017-0817.html) 19. [](https://bugzilla.redhat.com/show_bug.cgi?id=1308444) 20. [SUSE-SU-2016:1019](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html) 21. [SUSE-SU-2016:1037](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html) 22. [SUSE-SU-2016:1045](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html) 23. [USN-2929-1](http://www.ubuntu.com/usn/USN-2929-1) 24. [USN-2932-1](http://www.ubuntu.com/usn/USN-2932-1) 25. [SUSE-SU-2016:1032](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html) 26. [SUSE-SU-2016:1039](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html) 27. [SUSE-SU-2016:2074](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html) 28. [SUSE-SU-2016:1041](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html) 29. [SUSE-SU-2016:1046](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html) 30. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07d86ca93db7e5cdf4743564d98292042ec21af7) 31. [USN-2928-1](http://www.ubuntu.com/usn/USN-2928-1) 32. [USN-2931-1](http://www.ubuntu.com/usn/USN-2931-1) 33. [USN-2928-2](http://www.ubuntu.com/usn/USN-2928-2) 34. [83256](http://www.securityfocus.com/bid/83256) 35. [openSUSE-SU-2016:1008](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html) 36. [USN-2929-2](http://www.ubuntu.com/usn/USN-2929-2) 37. [SUSE-SU-2016:1040](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html) 38. [SUSE-SU-2016:0911](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10653, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10653 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10653 - **State**: PUBLISHED - **Published Date**: May 23, 2018 at 17:00 UTC - **Last Updated**: August 05, 2024 at 07:46 UTC - **Reserved Date**: May 02, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description There is an XML External Entity (XXE) Processing Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.citrix.com/article/CTX234879) 2. [](http://packetstormsecurity.com/files/156037/Citrix-XenMobile-Server-10.8-XML-Injection.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37342, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37342 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37342 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 01:58 UTC - **Last Updated**: August 02, 2024 at 17:09 UTC - **Reserved Date**: June 30, 2023 at 17:27 UTC - **Assigned By**: zdi ### Vulnerability Description Kofax Power PDF PNG File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PNG files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20439. ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Kofax - Power PDF** Affected versions: - 5.0.0.19 (Status: affected) ### References 1. [ZDI-23-937](https://www.zerodayinitiative.com/advisories/ZDI-23-937/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1287, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1287 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1287 - **State**: PUBLISHED - **Published Date**: April 13, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 05:04 UTC - **Reserved Date**: April 13, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Cisco Subscriber Edge Services Manager (SESM) allows remote attackers to inject arbitrary web script or HTML via the URI. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1022030](http://securitytracker.com/id?1022030) 2. [34454](http://www.securityfocus.com/bid/34454) 3. [sesm-unspecified-xss(50349)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50349) 4. [](http://www.xc0re.net/index.php?p=1_17_Cisco-Subscriber-Edge-Services-Manager-Multiple-Vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17196, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17196 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17196 - **State**: PUBLISHED - **Published Date**: July 11, 2019 at 20:37 UTC - **Last Updated**: August 05, 2024 at 10:39 UTC - **Reserved Date**: September 19, 2018 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description In Apache Kafka versions between 0.11.0.0 and 2.1.0, it is possible to manually craft a Produce request which bypasses transaction/idempotent ACL validation. Only authenticated clients with Write permission on the respective topics are able to exploit this vulnerability. Users should upgrade to 2.1.1 or later where this vulnerability has been fixed. ### Affected Products **Apache - Kafka** Affected versions: - 0.11.0.0 to 2.1.0 (Status: affected) ### References 1. [109139](http://www.securityfocus.com/bid/109139) 2. [[kafka-commits] 20190802 [kafka-site] branch asf-site updated: Add CVE-2018-17196, fix some links. (#223)](https://lists.apache.org/thread.html/d1581fb6464c9bec8a72575c01f5097d68e2fbb230aff24622622a58%40%3Ccommits.kafka.apache.org%3E) 3. [[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities](https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E) 4. [[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities](https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E) 5. [[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities](https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E) 6. [[kafka-commits] 20200115 [kafka-site] branch asf-site updated: Add CVE-2019-12399 (#250)](https://lists.apache.org/thread.html/rc27d424d0bdeaf31081c3e246db3c66e882243ae3f342dfa845e0261%40%3Ccommits.kafka.apache.org%3E) 7. [[druid-commits] 20200406 [GitHub] [druid] ccaominh commented on issue #9579: Add Apache Ranger Authorization](https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740%40%3Ccommits.druid.apache.org%3E) 8. [](https://www.oracle.com/security-alerts/cpujul2020.html) 9. [](https://www.mail-archive.com/dev%40kafka.apache.org/msg99277.html) 10. [](https://www.oracle.com/security-alerts/cpuoct2020.html) 11. [[flink-user] 20210703 Re: owasp-dependency-check is flagging flink 1.13 for scala 2.12.7](https://lists.apache.org/thread.html/r66de86b9a608c1da70b2d27d765c11ec88edf6e5dd6f379ab33e072a%40%3Cuser.flink.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11879, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11879 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11879 - **State**: PUBLISHED - **Published Date**: April 17, 2020 at 17:07 UTC - **Last Updated**: August 04, 2024 at 11:42 UTC - **Reserved Date**: April 17, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in GNOME Evolution before 3.35.91. By using the proprietary (non-RFC6068) "mailto?attach=..." parameter, a website (or other source of mailto links) can make Evolution attach local files or directories to a composed email message without showing a warning to the user, as demonstrated by an attach=. value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.gnome.org/GNOME/evolution/issues/784) 2. [](https://gitlab.gnome.org/GNOME/evolution/-/blob/master/NEWS) 3. [](https://www.nds.ruhr-uni-bochum.de/media/nds/veroeffentlichungen/2020/08/15/mailto-paper.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0521, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0521 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0521 - **State**: PUBLISHED - **Published Date**: March 08, 2017 at 01:00 UTC - **Last Updated**: August 05, 2024 at 13:11 UTC - **Reserved Date**: November 29, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description An elevation of privilege vulnerability in the Qualcomm camera driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32919951. References: QC-CR#1097709. ### Affected Products **Google Inc. - Android** Affected versions: - Kernel-3.10 (Status: affected) - Kernel-3.18 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-03-01) 2. [1037968](http://www.securitytracker.com/id/1037968) 3. [](https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=dbe4f26f200db10deaf38676b96d8738afcc10c8) 4. [96951](http://www.securityfocus.com/bid/96951)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1563, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1563 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1563 - **State**: PUBLISHED - **Published Date**: June 04, 2021 at 16:46 UTC - **Last Updated**: November 07, 2024 at 22:09 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in the implementation of the Cisco Discovery Protocol and Link Layer Discovery Protocol (LLDP) for Cisco Video Surveillance 7000 Series IP Cameras could allow an unauthenticated, adjacent attacker to cause a memory leak, which could lead to a denial of service (DoS) condition on an affected device. These vulnerabilities are due to incorrect processing of certain Cisco Discovery Protocol and LLDP packets at ingress time. An attacker could exploit these vulnerabilities by sending crafted Cisco Discovery Protocol or LLDP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to continuously consume memory, which could cause the device to crash and reload, resulting in a DoS condition. Note: Cisco Discovery Protocol and LLDP are Layer 2 protocols. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **Cisco - Cisco Video Surveillance 7000 Series IP Cameras** Affected versions: - n/a (Status: affected) ### References 1. [20210602 Cisco Video Surveillance 7000 Series IP Cameras Cisco Discovery and Link Layer Discovery Protocol Memory Leak Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldpcdp-mem-yTQDmjRO)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5441, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5441 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5441 - **State**: PUBLISHED - **Published Date**: July 21, 2016 at 10:00 UTC - **Last Updated**: October 11, 2024 at 20:39 UTC - **Reserved Date**: June 16, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle MySQL 5.7.12 and earlier allows remote administrators to affect availability via vectors related to Server: Replication. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-3040-1](http://www.ubuntu.com/usn/USN-3040-1) 2. [91915](http://www.securityfocus.com/bid/91915) 3. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html) 4. [1036362](http://www.securitytracker.com/id/1036362) 5. [91787](http://www.securityfocus.com/bid/91787)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2872, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2872 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2872 - **State**: REJECTED - **Last Updated**: May 27, 2025 at 18:14 UTC - **Reserved Date**: March 27, 2025 at 14:28 UTC - **Assigned By**: Wordfence ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3830, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3830 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3830 - **State**: PUBLISHED - **Published Date**: January 15, 2014 at 00:30 UTC - **Last Updated**: August 06, 2024 at 16:22 UTC - **Reserved Date**: June 03, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Hyperion Strategic Finance component in Oracle Hyperion 11.1.2.1 and 11.1.2.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [56470](http://secunia.com/advisories/56470) 2. [64821](http://www.securityfocus.com/bid/64821) 3. [64758](http://www.securityfocus.com/bid/64758) 4. [](http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html) 5. [102113](http://osvdb.org/102113)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7912, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7912 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7912 - **State**: PUBLISHED - **Published Date**: August 18, 2024 at 21:31 UTC - **Last Updated**: August 19, 2024 at 13:34 UTC - **Reserved Date**: August 17, 2024 at 20:49 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in CodeAstro Online Railway Reservation System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/assets/. The manipulation leads to exposure of information through directory listing. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-548: Security Weakness ### Affected Products **CodeAstro - Online Railway Reservation System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-275038 | CodeAstro Online Railway Reservation System assets exposure of information through directory listing](https://vuldb.com/?id.275038) 2. [VDB-275038 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275038) 3. [Submit #391658 | CodeAstro Online Railway Reservation System 1.0 Exposure of Information Through Directory Listing](https://vuldb.com/?submit.391658) 4. [](https://github.com/CYB84/CVE_Writeup/blob/main/Online%20Railway%20Reservation%20System/Directory%20Listing.md) ### Credits - Raj Nandi (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7429, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7429 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7429 - **State**: PUBLISHED - **Published Date**: January 02, 2016 at 02:00 UTC - **Last Updated**: August 06, 2024 at 07:51 UTC - **Reserved Date**: September 29, 2015 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description The Data Protection extension in the VMware GUI in IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (aka Spectrum Protect for Virtual Environments) 7.1 before 7.1.4 and Tivoli Storage FlashCopy Manager for VMware (aka Spectrum Protect Snapshot) 4.1 before 4.1.4 allows remote authenticated users to restore arbitrary virtual machines and consequently obtain sensitive information by visiting the vSphere inventory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21973087) 2. [79541](http://www.securityfocus.com/bid/79541)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1858, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1858 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1858 - **State**: PUBLISHED - **Published Date**: May 07, 2010 at 20:00 UTC - **Last Updated**: August 07, 2024 at 01:35 UTC - **Reserved Date**: May 07, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in the SMEStorage (com_smestorage) component before 1.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.org/1003-exploits/joomlasmestorage-lfi.txt) 2. [11853](http://www.exploit-db.com/exploits/11853) 3. [38911](http://www.securityfocus.com/bid/38911) 4. [39071](http://secunia.com/advisories/39071) 5. [smestorage-index-file-include(57108)](https://exchange.xforce.ibmcloud.com/vulnerabilities/57108)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-42242, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-42242 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-42242 - **State**: PUBLISHED - **Published Date**: January 13, 2025 at 00:00 UTC - **Last Updated**: January 31, 2025 at 18:31 UTC - **Reserved Date**: September 08, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in a GET parameter of /monitor/s_terminal.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4938, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4938 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4938 - **State**: PUBLISHED - **Published Date**: February 11, 2020 at 20:04 UTC - **Last Updated**: August 07, 2024 at 00:23 UTC - **Reserved Date**: December 23, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Ariadne 2.7.6 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO parameter to (1) index.php and (2) loader.php. ### Affected Products **Ariadne - Ariadne** Affected versions: - 2.7.6 (Status: affected) ### References 1. [](http://www.rul3z.de/advisories/SSCHADV2011-038.txt) 2. [](http://www.openwall.com/lists/oss-security/2012/03/09/4) 3. [](http://www.openwall.com/lists/oss-security/2012/03/10/6) 4. [](http://bugs.ariadne-cms.org/view.php?id=277) 5. [](https://seclists.org/bugtraq/2011/Dec/7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23832, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23832 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23832 - **State**: PUBLISHED - **Published Date**: February 01, 2024 at 16:18 UTC - **Last Updated**: February 13, 2025 at 17:39 UTC - **Reserved Date**: January 22, 2024 at 22:23 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Mastodon is a free, open-source social network server based on ActivityPub Mastodon allows configuration of LDAP for authentication. Due to insufficient origin validation in all Mastodon, attackers can impersonate and take over any remote account. Every Mastodon version prior to 3.5.17 is vulnerable, as well as 4.0.x versions prior to 4.0.13, 4.1.x version prior to 4.1.13, and 4.2.x versions prior to 4.2.5. ### CVSS Metrics - **CVSS Base Score**: 9.4/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H` ### Weakness Classification (CWE) - CWE-290: Security Weakness ### Affected Products **mastodon - mastodon** Affected versions: - < 3.5.17 (Status: affected) - >= 4.0.0, < 4.0.13 (Status: affected) - >= 4.1.0, < 4.1.13 (Status: affected) - >= 4.2.0, < 4.2.5 (Status: affected) ### References 1. [https://github.com/mastodon/mastodon/security/advisories/GHSA-3fjr-858r-92rw](https://github.com/mastodon/mastodon/security/advisories/GHSA-3fjr-858r-92rw) 2. [https://github.com/mastodon/mastodon/commit/1726085db5cd73dd30953da858f9887bcc90b958](https://github.com/mastodon/mastodon/commit/1726085db5cd73dd30953da858f9887bcc90b958) 3. [](http://www.openwall.com/lists/oss-security/2024/02/02/4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8789, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8789 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8789 - **State**: PUBLISHED - **Published Date**: April 02, 2017 at 20:00 UTC - **Last Updated**: August 06, 2024 at 02:35 UTC - **Reserved Date**: October 18, 2016 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description Huawei eSpace Integrated Access Device (IAD) with software V300R001C03, V300R001C04, V300R001C06, V300R001C20, and V300R001C07 allows an attacker to trick a user into clicking a URL containing malicious scripts to obtain user information or hijack the session, aka XSS. ### Affected Products **n/a - eSpace IAD V300R001C03, V300R001C04, V300R001C06, V300R001C20 and V300R001C07** Affected versions: - eSpace IAD V300R001C03, V300R001C04, V300R001C06, V300R001C20 and V300R001C07 (Status: affected) ### References 1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161130-01-espace-en) 2. [94613](http://www.securityfocus.com/bid/94613)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34765, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34765 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34765 - **State**: PUBLISHED - **Published Date**: September 02, 2021 at 03:05 UTC - **Last Updated**: November 07, 2024 at 22:01 UTC - **Reserved Date**: June 15, 2021 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web UI for Cisco Nexus Insights could allow an authenticated, remote attacker to view and download files related to the web application. The attacker requires valid device credentials. This vulnerability exists because proper role-based access control (RBAC) filters are not applied to file download actions. An attacker could exploit this vulnerability by logging in to the application and then navigating to the directory listing and download functions. A successful exploit could allow the attacker to download sensitive files that should be restricted, which could result in disclosure of sensitive information. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-552: Security Weakness ### Affected Products **Cisco - Cisco Nexus Insights** Affected versions: - n/a (Status: affected) ### References 1. [20210901 Cisco Nexus Insights Authenticated Information Disclosure Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-insight-infodis-2By2ZpBB)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3393, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3393 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3393 - **State**: PUBLISHED - **Published Date**: June 23, 2023 at 18:11 UTC - **Last Updated**: November 07, 2024 at 20:37 UTC - **Reserved Date**: June 23, 2023 at 18:11 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Code Injection in GitHub repository fossbilling/fossbilling prior to 0.5.1. ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **fossbilling - fossbilling/fossbilling** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/e4df9280-900a-407a-a07e-e7fef3345914) 2. [](https://github.com/fossbilling/fossbilling/commit/47343fb58db5c17c14bc6941dacbeb9c96957351)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26002, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26002 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26002 - **State**: PUBLISHED - **Published Date**: May 12, 2022 at 17:01 UTC - **Last Updated**: April 15, 2025 at 19:03 UTC - **Reserved Date**: February 25, 2022 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description A stack-based buffer overflow vulnerability exists in the console factory functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted network request can lead to remote code execution. An attacker can send a sequence of malicious packets to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **InHand Networks - InRouter302** Affected versions: - V3.5.4 (Status: affected) ### References 1. [](https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf) 2. [](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1476)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22843, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22843 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22843 - **State**: PUBLISHED - **Published Date**: August 09, 2023 at 08:46 UTC - **Last Updated**: September 20, 2024 at 12:04 UTC - **Reserved Date**: January 24, 2023 at 10:39 UTC - **Assigned By**: Nozomi ### Vulnerability Description An authenticated attacker with administrative access to the web management interface can inject malicious JavaScript code inside the definition of a Threat Intelligence rule, that will be stored and can later be executed by another legitimate user viewing the details of such a rule. Via stored Cross-Site Scripting (XSS), an attacker may be able to perform unauthorized actions on behalf of legitimate users and/or gather sensitive information. JavaScript injection was possible in the contents for Yara rules, while limited HTML injection has been proven for packet and STYX rules. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Nozomi Networks - Guardian** Affected versions: - 0 (Status: affected) **Nozomi Networks - CMC** Affected versions: - 0 (Status: affected) ### References 1. [](https://security.nozominetworks.com/NN-2023:4-01) ### Credits - This issue was found by Stefano Libero of Nozomi Networks Product Security team during a scheduled internal VAPT testing session.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45587, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45587 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45587 - **State**: PUBLISHED - **Published Date**: December 13, 2023 at 06:40 UTC - **Last Updated**: August 28, 2024 at 13:45 UTC - **Reserved Date**: October 09, 2023 at 08:01 UTC - **Assigned By**: fortinet ### Vulnerability Description An improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 allows attacker to execute unauthorized code or commands via crafted HTTP requests ### CVSS Metrics - **CVSS Base Score**: 3.4/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:F/RL:X/RC:X` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Fortinet - FortiSandbox** Affected versions: - 4.4.0 (Status: affected) - 4.2.0 (Status: affected) - 4.0.0 (Status: affected) - 3.2.0 (Status: affected) - 3.1.0 (Status: affected) ### References 1. [https://fortiguard.com/psirt/FG-IR-23-360](https://fortiguard.com/psirt/FG-IR-23-360)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36758, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36758 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36758 - **State**: PUBLISHED - **Published Date**: July 15, 2021 at 23:14 UTC - **Last Updated**: August 04, 2024 at 01:01 UTC - **Reserved Date**: July 15, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description 1Password Connect server before 1.2 is missing validation checks, permitting users to create Secrets Automation access tokens that can be used to perform privilege escalation. Malicious users authorized to create Secrets Automation access tokens can create tokens that have access beyond what the user is authorized to access, but limited to the existing authorizations of the Secret Automation the token is created in. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.1password.com/kb/202106/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43233, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43233 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43233 - **State**: PUBLISHED - **Published Date**: August 12, 2024 at 21:02 UTC - **Last Updated**: August 13, 2024 at 16:10 UTC - **Reserved Date**: August 09, 2024 at 09:20 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BannerSky BSK Forms Blacklist allows Reflected XSS.This issue affects BSK Forms Blacklist: from n/a through 3.8. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **BannerSky - BSK Forms Blacklist** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/bsk-gravityforms-blacklist/wordpress-bsk-forms-blacklist-plugin-3-8-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - LVT-tholv2k (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10784, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10784 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10784 - **State**: PUBLISHED - **Published Date**: September 19, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 17:50 UTC - **Reserved Date**: July 01, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-3685-1](https://usn.ubuntu.com/3685-1/) 2. [RHSA-2018:0585](https://access.redhat.com/errata/RHSA-2018:0585) 3. [USN-3528-1](https://usn.ubuntu.com/3528-1/) 4. [100853](http://www.securityfocus.com/bid/100853) 5. [](https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/) 6. [RHSA-2018:0378](https://access.redhat.com/errata/RHSA-2018:0378) 7. [1042004](http://www.securitytracker.com/id/1042004) 8. [DSA-4031](https://www.debian.org/security/2017/dsa-4031) 9. [](https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/) 10. [1039363](http://www.securitytracker.com/id/1039363) 11. [RHSA-2017:3485](https://access.redhat.com/errata/RHSA-2017:3485) 12. [[debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html) 13. [RHSA-2018:0583](https://access.redhat.com/errata/RHSA-2018:0583) 14. [](https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/) 15. [GLSA-201710-18](https://security.gentoo.org/glsa/201710-18)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1536, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1536 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1536 - **State**: PUBLISHED - **Published Date**: April 29, 2022 at 13:10 UTC - **Last Updated**: April 15, 2025 at 14:40 UTC - **Reserved Date**: April 29, 2022 at 00:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in automad up to 1.10.9 and classified as problematic. This vulnerability affects the Dashboard. The manipulation of the argument title with the input Home</title><script>alert("home")</script><title> leads to a cross site scripting. The attack can be initiated remotely but requires an authentication. The exploit details have disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **unspecified - automad** Affected versions: - 1.10.0 (Status: affected) - 1.10.1 (Status: affected) - 1.10.2 (Status: affected) - 1.10.3 (Status: affected) - 1.10.4 (Status: affected) - 1.10.5 (Status: affected) - 1.10.6 (Status: affected) - 1.10.7 (Status: affected) - 1.10.8 (Status: affected) - 1.10.9 (Status: affected) ### References 1. [](https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/automad%3C%3D1.10.9%20Stored%20Cross-Site%20Scripting%28XSS%29.md) 2. [](https://vuldb.com/?id.198706)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5414, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5414 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5414 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: July 07, 2015 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0179, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0179 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0179 - **State**: PUBLISHED - **Published Date**: May 07, 2001 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:14 UTC - **Reserved Date**: March 08, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Allaire JRun 3.0 allows remote attackers to list contents of the WEB-INF directory, and the web.xml file in the WEB-INF directory, via a malformed URL that contains a "." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [jrun-webinf-file-retrieval(6008)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6008) 2. [ASB01-02](http://www.allaire.com/handlers/index.cfm?ID=19546&Method=Full)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29854, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29854 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29854 - **State**: PUBLISHED - **Published Date**: May 03, 2022 at 18:20 UTC - **Last Updated**: September 16, 2024 at 19:51 UTC - **Reserved Date**: March 31, 2021 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Maximo Asset Management 7.6.1.1 and 7.6.1.2 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. By sending a specially crafted HTTP request, a remote attacker could exploit this vulnerability to inject HTTP HOST header, which will allow the attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 205680. ### Affected Products **IBM - Maximo Asset Management** Affected versions: - 7.6.1.1 (Status: affected) - 7.6.1.2 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6579187) 2. [ibm-maximo-cve202129854-header-injection (205680)](https://exchange.xforce.ibmcloud.com/vulnerabilities/205680)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4456, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4456 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4456 - **State**: PUBLISHED - **Published Date**: August 21, 2023 at 15:19 UTC - **Last Updated**: November 23, 2024 at 00:16 UTC - **Reserved Date**: August 21, 2023 at 11:46 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in openshift-logging LokiStack. The key used for caching is just the token, which is too broad. This issue allows a user with a token valid for one action to execute other actions as long as the authorization allowing the original action is still cached. ### CVSS Metrics - **CVSS Base Score**: 5.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-1220: Heap-based Buffer Overflow ### Affected Products **Red Hat - RHOL-5.5-RHEL-8** Affected versions: - v0.1.0-327 (Status: unaffected) **Red Hat - RHOL-5.6-RHEL-8** Affected versions: - v0.1.0-326 (Status: unaffected) **Red Hat - RHOL-5.7-RHEL-8** Affected versions: - v0.1.0-325 (Status: unaffected) ### References 1. [RHSA-2023:4933](https://access.redhat.com/errata/RHSA-2023:4933) 2. [RHSA-2023:5095](https://access.redhat.com/errata/RHSA-2023:5095) 3. [RHSA-2023:5096](https://access.redhat.com/errata/RHSA-2023:5096) 4. [](https://access.redhat.com/security/cve/CVE-2023-4456) 5. [RHBZ#2233087](https://bugzilla.redhat.com/show_bug.cgi?id=2233087) ### Credits - This issue was discovered by Robert Jacob (Red Hat).
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0574, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0574 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0574 - **State**: PUBLISHED - **Published Date**: November 11, 2014 at 23:00 UTC - **Last Updated**: August 06, 2024 at 09:20 UTC - **Reserved Date**: December 20, 2013 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Double free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://helpx.adobe.com/security/products/flash-player/apsb14-24.html) 2. [](https://code.google.com/p/chromium/issues/detail?id=423703) 3. [](http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html) 4. [openSUSE-SU-2015:0725](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3865, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3865 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3865 - **State**: PUBLISHED - **Published Date**: January 11, 2011 at 01:00 UTC - **Last Updated**: August 07, 2024 at 03:26 UTC - **Reserved Date**: October 08, 2010 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [42789](http://secunia.com/advisories/42789) 2. [ADV-2011-0024](http://www.vupen.com/english/advisories/2011/0024) 3. [42778](http://secunia.com/advisories/42778) 4. [RHSA-2011:0004](http://www.redhat.com/support/errata/RHSA-2011-0004.html) 5. [42801](http://secunia.com/advisories/42801) 6. [20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console](http://www.securityfocus.com/archive/1/520102/100/0/threaded) 7. [46397](http://secunia.com/advisories/46397) 8. [SUSE-SA:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html) 9. [[oss-security] 20101101 Re: CVE request: kernel: iovec overflow in rds_rdma_pages()](http://www.openwall.com/lists/oss-security/2010/11/01/1) 10. [[netdev] 20101028 Re: [Security] TIPC security issues](http://www.spinics.net/lists/netdev/msg145359.html) 11. [SUSE-SA:2011:001](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html) 12. [RHSA-2011:0007](http://www.redhat.com/support/errata/RHSA-2011-0007.html) 13. [44549](http://www.securityfocus.com/bid/44549) 14. [SUSE-SA:2011:007](http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html) 15. [ADV-2011-0298](http://www.vupen.com/english/advisories/2011/0298) 16. [SUSE-SA:2010:057](http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html) 17. [](http://www.vmware.com/security/advisories/VMSA-2011-0012.html) 18. [42890](http://secunia.com/advisories/42890) 19. [ADV-2011-0012](http://www.vupen.com/english/advisories/2011/0012) 20. [kernel-rdsrdmapages-overflow(62881)](https://exchange.xforce.ibmcloud.com/vulnerabilities/62881) 21. [[oss-security] 20101029 CVE request: kernel: iovec overflow in rds_rdma_pages()](http://www.openwall.com/lists/oss-security/2010/10/29/1) 22. [[netdev] 20101028 Re: [Security] TIPC security issues](http://www.spinics.net/lists/netdev/msg145397.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23899, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23899 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23899 - **State**: PUBLISHED - **Published Date**: January 16, 2025 at 20:07 UTC - **Last Updated**: January 17, 2025 at 19:00 UTC - **Reserved Date**: January 16, 2025 at 11:31 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BnB Select Ltd Bookalet allows Stored XSS.This issue affects Bookalet: from n/a through 1.0.3. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **BnB Select Ltd - Bookalet** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/bookalet/vulnerability/wordpress-bookalet-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-23751, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-23751 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-23751 - **State**: PUBLISHED - **Published Date**: February 01, 2023 at 21:12 UTC - **Last Updated**: March 29, 2025 at 04:35 UTC - **Reserved Date**: January 17, 2023 at 19:02 UTC - **Assigned By**: Joomla ### Vulnerability Description An issue was discovered in Joomla! 4.0.0 through 4.2.4. A missing ACL check allows non super-admin users to access com_actionlogs. ### Affected Products **Joomla! Project - Joomla! CMS** Affected versions: - 4.0.0-4.2.6 (Status: affected) ### References 1. [](https://developer.joomla.org/security-centre/891-20230102-core-missing-acl-checks-for-com-actionlogs.html) ### Credits - Faizan Wani
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2777, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2777 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2777 - **State**: PUBLISHED - **Published Date**: January 28, 2011 at 21:13 UTC - **Last Updated**: September 16, 2024 at 20:43 UTC - **Reserved Date**: July 21, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in the IMAP server component in GroupWise Internet Agent (GWIA) in Novell GroupWise 7.x before 7.0 post-SP4 FTF and 8.x before 8.0 SP2 allows remote attackers to execute arbitrary code via a long mailbox name in a CREATE command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.novell.com/show_bug.cgi?id=597331) 2. [](http://zerodayinitiative.com/advisories/ZDI-10-129/) 3. [](http://www.novell.com/support/viewContent.do?externalId=7006374&sliceId=1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0941, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0941 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0941 - **State**: PUBLISHED - **Published Date**: February 04, 2000 at 05:00 UTC - **Last Updated**: August 01, 2024 at 16:55 UTC - **Reserved Date**: December 08, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Mutt mail client allows a remote attacker to execute commands via shell metacharacters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19980728 mutt x.x](http://marc.info/?l=bugtraq&m=90221104526154&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9084, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9084 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9084 - **State**: PUBLISHED - **Published Date**: November 27, 2018 at 14:00 UTC - **Last Updated**: August 05, 2024 at 07:17 UTC - **Reserved Date**: March 27, 2018 at 00:00 UTC - **Assigned By**: lenovo ### Vulnerability Description In System Management Module (SMM) versions prior to 1.06, if an attacker manages to log in to the device OS, the validation of software updates can be circumvented. ### Affected Products **Lenovo - ThinkSystem SMM** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.lenovo.com/us/en/solutions/LEN-24374)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-22720, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-22720 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-22720 - **State**: PUBLISHED - **Published Date**: January 24, 2024 at 00:00 UTC - **Last Updated**: June 05, 2025 at 16:11 UTC - **Reserved Date**: January 11, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Kanboard 1.2.34 is vulnerable to Html Injection in the group management feature. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cupc4k3.medium.com/html-injection-vulnerability-in-kanboard-group-management-d9fe5154bb1b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24094, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24094 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24094 - **State**: PUBLISHED - **Published Date**: March 27, 2023 at 00:00 UTC - **Last Updated**: February 19, 2025 at 18:46 UTC - **Reserved Date**: January 23, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in the bridge2 component of MikroTik RouterOS v6.40.5 allows attackers to cause a Denial of Service (DoS) via crafted packets. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://mikrotik.com) 2. [](http://routeros.com) 3. [](https://github.com/ZYen12138/RouterOS/blob/main/CVE-2023-24094.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0347, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0347 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0347 - **State**: PUBLISHED - **Published Date**: February 10, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:13 UTC - **Reserved Date**: February 10, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer overflow in RealArcade 1.2.0.994 and earlier allows remote attackers to execute arbitrary code via an RGS file with an invalid size string for the GUID and game name, which leads to a buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [14187](http://secunia.com/advisories/14187/) 2. [1013128](http://securitytracker.com/id?1013128) 3. [realarcade-rgs-bo(19259)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19259) 4. [20050208 Integer overflow and arbitrary files deletion in RealArcade](http://marc.info/?l=bugtraq&m=110792779115794&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-46560, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-46560 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-46560 - **State**: PUBLISHED - **Published Date**: April 30, 2025 at 00:24 UTC - **Last Updated**: April 30, 2025 at 13:09 UTC - **Reserved Date**: April 24, 2025 at 21:10 UTC - **Assigned By**: GitHub_M ### Vulnerability Description vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.8.0 and prior to 0.8.5 are affected by a critical performance vulnerability in the input preprocessing logic of the multimodal tokenizer. The code dynamically replaces placeholder tokens (e.g., <|audio_|>, <|image_|>) with repeated tokens based on precomputed lengths. Due to ​​inefficient list concatenation operations​​, the algorithm exhibits ​​quadratic time complexity (O(n²))​​, allowing malicious actors to trigger resource exhaustion via specially crafted inputs. This issue has been patched in version 0.8.5. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-1333: Security Weakness ### Affected Products **vllm-project - vllm** Affected versions: - >= 0.8.0, < 0.8.5 (Status: affected) ### References 1. [https://github.com/vllm-project/vllm/security/advisories/GHSA-vc6m-hm49-g9qg](https://github.com/vllm-project/vllm/security/advisories/GHSA-vc6m-hm49-g9qg) 2. [https://github.com/vllm-project/vllm/blob/8cac35ba435906fb7eb07e44fe1a8c26e8744f4e/vllm/model_executor/models/phi4mm.py#L1182-L1197](https://github.com/vllm-project/vllm/blob/8cac35ba435906fb7eb07e44fe1a8c26e8744f4e/vllm/model_executor/models/phi4mm.py#L1182-L1197)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12613, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12613 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12613 - **State**: PUBLISHED - **Published Date**: October 24, 2017 at 01:00 UTC - **Last Updated**: August 05, 2024 at 18:43 UTC - **Reserved Date**: August 07, 2017 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input. ### Affected Products **Apache Software Foundation - Apache Portable Runtime** Affected versions: - 1.6.2 and prior (Status: affected) ### References 1. [[debian-lts-announce] 20171106 [SECURITY] [DLA 1162-1] apr security update](https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html) 2. [RHSA-2018:0316](https://access.redhat.com/errata/RHSA-2018:0316) 3. [](https://svn.apache.org/viewvc?view=revision&revision=1807976) 4. [1042004](http://www.securitytracker.com/id/1042004) 5. [RHSA-2017:3475](https://access.redhat.com/errata/RHSA-2017:3475) 6. [RHSA-2018:0465](https://access.redhat.com/errata/RHSA-2018:0465) 7. [](http://www.apache.org/dist/apr/Announcement1.x.html) 8. [RHSA-2017:3270](https://access.redhat.com/errata/RHSA-2017:3270) 9. [[announce] 20171023 Apache Portable Runtime APR 1.6.3, APR-util 1.6.1 and APR-iconv 1.2.2 Released](https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3Cannounce.apache.org%3E) 10. [RHSA-2017:3476](https://access.redhat.com/errata/RHSA-2017:3476) 11. [RHSA-2018:1253](https://access.redhat.com/errata/RHSA-2018:1253) 12. [RHSA-2017:3477](https://access.redhat.com/errata/RHSA-2017:3477) 13. [RHSA-2018:0466](https://access.redhat.com/errata/RHSA-2018:0466) 14. [101560](http://www.securityfocus.com/bid/101560) 15. [[apr-commits] 20210816 svn commit: r1892358 - /apr/apr/branches/1.7.x/CHANGES](https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9%40%3Ccommits.apr.apache.org%3E) 16. [[apr-commits] 20210820 svn commit: r49582 - /release/apr/patches/apr-1.7.0-CVE-2021-35940.patch](https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339%40%3Ccommits.apr.apache.org%3E) 17. [[apr-dev] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613](https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e%40%3Cdev.apr.apache.org%3E) 18. [[oss-security] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613](http://www.openwall.com/lists/oss-security/2021/08/23/1) 19. [[announce] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613](https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b%40%3Cannounce.apache.org%3E) 20. [[apr-dev] 20210916 Re: CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613](https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8%40%3Cdev.apr.apache.org%3E) 21. [[debian-lts-announce] 20220124 [SECURITY] [DLA 2897-1] apr security update](https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3239, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3239 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3239 - **State**: PUBLISHED - **Published Date**: June 14, 2023 at 08:31 UTC - **Last Updated**: August 02, 2024 at 06:48 UTC - **Reserved Date**: June 14, 2023 at 06:12 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as problematic, was found in OTCMS up to 6.62. Affected is an unknown function of the file admin/readDeal.php?mudi=readQrCode. The manipulation of the argument img leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. VDB-231510 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-24: Security Weakness ### Affected Products **n/a - OTCMS** Affected versions: - 6.0 (Status: affected) - 6.1 (Status: affected) - 6.2 (Status: affected) - 6.3 (Status: affected) - 6.4 (Status: affected) - 6.5 (Status: affected) - 6.6 (Status: affected) - 6.7 (Status: affected) - 6.8 (Status: affected) - 6.9 (Status: affected) - 6.10 (Status: affected) - 6.11 (Status: affected) - 6.12 (Status: affected) - 6.13 (Status: affected) - 6.14 (Status: affected) - 6.15 (Status: affected) - 6.16 (Status: affected) - 6.17 (Status: affected) - 6.18 (Status: affected) - 6.19 (Status: affected) - 6.20 (Status: affected) - 6.21 (Status: affected) - 6.22 (Status: affected) - 6.23 (Status: affected) - 6.24 (Status: affected) - 6.25 (Status: affected) - 6.26 (Status: affected) - 6.27 (Status: affected) - 6.28 (Status: affected) - 6.29 (Status: affected) - 6.30 (Status: affected) - 6.31 (Status: affected) - 6.32 (Status: affected) - 6.33 (Status: affected) - 6.34 (Status: affected) - 6.35 (Status: affected) - 6.36 (Status: affected) - 6.37 (Status: affected) - 6.38 (Status: affected) - 6.39 (Status: affected) - 6.40 (Status: affected) - 6.41 (Status: affected) - 6.42 (Status: affected) - 6.43 (Status: affected) - 6.44 (Status: affected) - 6.45 (Status: affected) - 6.46 (Status: affected) - 6.47 (Status: affected) - 6.48 (Status: affected) - 6.49 (Status: affected) - 6.50 (Status: affected) - 6.51 (Status: affected) - 6.52 (Status: affected) - 6.53 (Status: affected) - 6.54 (Status: affected) - 6.55 (Status: affected) - 6.56 (Status: affected) - 6.57 (Status: affected) - 6.58 (Status: affected) - 6.59 (Status: affected) - 6.60 (Status: affected) - 6.61 (Status: affected) - 6.62 (Status: affected) ### References 1. [](https://vuldb.com/?id.231510) 2. [](https://vuldb.com/?ctiid.231510) 3. [](https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20obtain%20the%20web%20directory%20path%20and%20other%20information%20leaked%20.md) ### Credits - p0ison (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-28647, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-28647 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-28647 - **State**: PUBLISHED - **Published Date**: November 17, 2020 at 13:08 UTC - **Last Updated**: August 04, 2024 at 16:40 UTC - **Reserved Date**: November 16, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Progress MOVEit Transfer before 2020.1, a malicious user could craft and store a payload within the application. If a victim within the MOVEit Transfer instance interacts with the stored payload, it could invoke and execute arbitrary code within the context of the victim's browser (XSS). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.progress.com/) 2. [](https://community.progress.com/s/article/MOVEit-Transfer-Vulnerability-Nov-2020) 3. [](https://labs.secforce.com/posts/progress-moveit-transfer-2020.1-stored-xss-cve-2020-28647/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31137, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31137 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31137 - **State**: REJECTED - **Published Date**: August 24, 2021 at 18:53 UTC - **Last Updated**: August 24, 2021 at 18:53 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9661, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9661 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9661 - **State**: PUBLISHED - **Published Date**: June 25, 2020 at 21:06 UTC - **Last Updated**: August 04, 2024 at 10:34 UTC - **Reserved Date**: March 02, 2020 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe After Effects versions 17.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution . ### Affected Products **Adobe - Adobe After Effects** Affected versions: - 17.1 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/after_effects/apsb20-35.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8623, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8623 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8623 - **State**: PUBLISHED - **Published Date**: August 01, 2018 at 06:00 UTC - **Last Updated**: August 06, 2024 at 02:27 UTC - **Reserved Date**: October 12, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **The Curl Project - curl** Affected versions: - 7.51.0 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623) 2. [RHSA-2018:3558](https://access.redhat.com/errata/RHSA-2018:3558) 3. [](https://curl.haxx.se/docs/adv_20161102I.html) 4. [94106](http://www.securityfocus.com/bid/94106) 5. [](https://www.tenable.com/security/tns-2016-21) 6. [1037192](http://www.securitytracker.com/id/1037192) 7. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html) 8. [](https://curl.haxx.se/CVE-2016-8623.patch) 9. [RHSA-2018:2486](https://access.redhat.com/errata/RHSA-2018:2486) 10. [GLSA-201701-47](https://security.gentoo.org/glsa/201701-47) 11. [[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E) 12. [[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23998, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23998 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23998 - **State**: PUBLISHED - **Published Date**: July 05, 2024 at 00:00 UTC - **Last Updated**: August 01, 2024 at 23:13 UTC - **Reserved Date**: January 25, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description goanother Another Redis Desktop Manager =<1.6.1 is vulnerable to Cross Site Scripting (XSS) via src/components/Setting.vue. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/EQSTLab/PoC/tree/main/2024/LCE/CVE-2024-23998)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4892, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4892 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4892 - **State**: REJECTED - **Published Date**: July 16, 2018 at 15:00 UTC - **Last Updated**: July 16, 2018 at 14:57 UTC - **Reserved Date**: December 22, 2011 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7583, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7583 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7583 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 29, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23650, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23650 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23650 - **State**: PUBLISHED - **Published Date**: February 18, 2022 at 22:00 UTC - **Last Updated**: April 23, 2025 at 19:02 UTC - **Reserved Date**: January 19, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Netmaker is a platform for creating and managing virtual overlay networks using WireGuard. Prior to versions 0.8.5, 0.9.4, and 010.0, there is a hard-coded cryptographic key in the code base which can be exploited to run admin commands on a remote server if the exploiter know the address and username of the admin. This effects the server (netmaker) component, and not clients. This has been patched in Netmaker v0.8.5, v0.9.4, and v0.10.0. There are currently no known workarounds. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-321: Security Weakness ### Affected Products **gravitl - netmaker** Affected versions: - < 0.8.5 (Status: affected) - >= 0.9.0, < 0.9.4 (Status: affected) ### References 1. [](https://github.com/gravitl/netmaker/security/advisories/GHSA-86f3-hf24-76q4) 2. [](https://github.com/gravitl/netmaker/pull/781/commits/1bec97c662670dfdab804343fc42ae4b1d050a87) 3. [](https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee) 4. [](https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-46461, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-46461 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-46461 - **State**: PUBLISHED - **Published Date**: September 25, 2024 at 00:00 UTC - **Last Updated**: September 25, 2024 at 15:39 UTC - **Reserved Date**: September 11, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description VLC media player 3.0.20 and earlier is vulnerable to denial of service through an integer overflow which could be triggered with a maliciously crafted mms stream (heap based overflow). If successful, a malicious third party could trigger either a crash of VLC or an arbitrary code execution with the target user's privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.videolan.org/security/sb-vlc3021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10201, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10201 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10201 - **State**: PUBLISHED - **Published Date**: October 21, 2024 at 03:13 UTC - **Last Updated**: October 21, 2024 at 13:13 UTC - **Reserved Date**: October 21, 2024 at 02:32 UTC - **Assigned By**: twcert ### Vulnerability Description Administrative Management System from Wellchoose does not properly validate uploaded file types, allowing remote attackers with regular privileges to upload and execute webshells. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **Wellchoose - Administrative Management System** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.twcert.org.tw/tw/cp-132-8160-756b6-1.html) 2. [](https://www.twcert.org.tw/en/cp-139-8161-b8a6d-2.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5326, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5326 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5326 - **State**: PUBLISHED - **Published Date**: November 24, 2014 at 02:00 UTC - **Last Updated**: August 06, 2024 at 11:41 UTC - **Reserved Date**: August 18, 2014 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [JVN#52422792](http://jvn.jp/en/jp/JVN52422792/index.html) 2. [JVNDB-2014-000118](http://jvndb.jvn.jp/jvndb/JVNDB-2014-000118)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1204, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1204 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1204 - **State**: PUBLISHED - **Published Date**: May 03, 2023 at 00:00 UTC - **Last Updated**: January 30, 2025 at 15:23 UTC - **Reserved Date**: March 06, 2023 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.1 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A user could use an unverified email as a public email and commit email by sending a specifically crafted request on user update settings. ### Affected Products **GitLab - GitLab** Affected versions: - >=10.0, <12.9.8 (Status: affected) - >=12.10, <12.10.7 (Status: affected) - >=13.0, <13.0.1 (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/394745) 2. [](https://hackerone.com/reports/1881598) 3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1204.json) ### Credits - Thanks [theluci](https://hackerone.com/theluci) for reporting this vulnerability through our HackerOne bug bounty program
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22621, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22621 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22621 - **State**: PUBLISHED - **Published Date**: January 07, 2025 at 16:48 UTC - **Last Updated**: February 28, 2025 at 11:03 UTC - **Reserved Date**: January 07, 2025 at 16:13 UTC - **Assigned By**: Splunk ### Vulnerability Description In versions 1.0.67 and lower of the Splunk App for SOAR, the Splunk documentation for that app recommended adding the `admin_all_objects` capability to the `splunk_app_soar` role. This addition could lead to improper access control for a low-privileged user that does not hold the "admin" Splunk roles. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N` ### Affected Products **Splunk - Splunk App for SOAR** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://advisory.splunk.com/advisories/SVD-2025-0101) ### Credits - Gabriel Nitu, Splunk
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0246, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0246 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0246 - **State**: REJECTED - **Published Date**: February 09, 2015 at 15:00 UTC - **Last Updated**: February 09, 2015 at 14:57 UTC - **Reserved Date**: November 18, 2014 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4364, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4364 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4364 - **State**: PUBLISHED - **Published Date**: December 08, 2022 at 00:00 UTC - **Last Updated**: April 14, 2025 at 15:55 UTC - **Reserved Date**: December 08, 2022 at 00:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in Teledyne FLIR AX8 up to 1.46.16. Affected is an unknown function of the file palette.php of the component Web Service Handler. The manipulation of the argument palette leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-215118 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-707: Security Weakness ### Affected Products **Teledyne FLIR - AX8** Affected versions: - 1.46.0 (Status: affected) - 1.46.1 (Status: affected) - 1.46.2 (Status: affected) - 1.46.3 (Status: affected) - 1.46.4 (Status: affected) - 1.46.5 (Status: affected) - 1.46.6 (Status: affected) - 1.46.7 (Status: affected) - 1.46.8 (Status: affected) - 1.46.9 (Status: affected) - 1.46.10 (Status: affected) - 1.46.11 (Status: affected) - 1.46.12 (Status: affected) - 1.46.13 (Status: affected) - 1.46.14 (Status: affected) - 1.46.15 (Status: affected) - 1.46.16 (Status: affected) ### References 1. [](https://github.com/siriuswhiter/VulnHub/blob/main/Flir/02-FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E1.md) 2. [](https://vuldb.com/?id.215118)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43399, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43399 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43399 - **State**: PUBLISHED - **Published Date**: August 19, 2024 at 14:44 UTC - **Last Updated**: August 19, 2024 at 15:27 UTC - **Reserved Date**: August 12, 2024 at 18:02 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. Before 4.0.7, there is a flaw in the Static Libraries analysis section. Specifically, during the extraction of .a extension files, the measure intended to prevent Zip Slip attacks is improperly implemented. Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running MobSF. This vulnerability is fixed in 4.0.7. ### CVSS Metrics - **CVSS Base Score**: 8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-23: Security Weakness ### Affected Products **MobSF - Mobile-Security-Framework-MobSF** Affected versions: - < 4.0.7 (Status: affected) ### References 1. [https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-4hh3-vj32-gr6j](https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-4hh3-vj32-gr6j) 2. [https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/cc625fe8430f3437a473e82aa2966d100a4dc883](https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/cc625fe8430f3437a473e82aa2966d100a4dc883)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26103, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26103 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26103 - **State**: PUBLISHED - **Published Date**: February 25, 2023 at 05:00 UTC - **Last Updated**: March 11, 2025 at 15:31 UTC - **Reserved Date**: February 20, 2023 at 10:28 UTC - **Assigned By**: snyk ### Vulnerability Description Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Affected Products **n/a - deno** Affected versions: - 0 (Status: affected) ### References 1. [](https://security.snyk.io/vuln/SNYK-RUST-DENO-3315970) 2. [](https://github.com/denoland/deno/blob/2b247be517d789a37e532849e2e40b724af0918f/ext/http/01_http.js%23L395-L409) 3. [](https://github.com/denoland/deno/pull/17722) 4. [](https://github.com/denoland/deno/commit/cf06a7c7e672880e1b38598fe445e2c50b4a9d06) 5. [](https://github.com/denoland/deno/releases/tag/v1.31.0) ### Credits - Alessio Della Libera - Snyk
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2448, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2448 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2448 - **State**: PUBLISHED - **Published Date**: August 20, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:29 UTC - **Reserved Date**: August 20, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description S-Mart Shopping Cart or RediCart 3.9.5b stores smart.cfg under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as the database name. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [smart-cart-information-disclosure(18219)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18219) 2. [12117](http://www.osvdb.org/12117) 3. [13301](http://secunia.com/advisories/13301) 4. [1012306](http://securitytracker.com/id?1012306)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-42343, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-42343 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-42343 - **State**: PUBLISHED - **Published Date**: December 19, 2022 at 10:00 UTC - **Last Updated**: April 23, 2025 at 16:28 UTC - **Reserved Date**: October 03, 2022 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Campaign version 7.3.1 (and earlier) and 8.3.9 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. A low-privilege authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **Adobe - Adobe Campaign Classic (ACC)** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/campaign/apsb22-58.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23933, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23933 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23933 - **State**: PUBLISHED - **Published Date**: January 16, 2025 at 20:07 UTC - **Last Updated**: January 17, 2025 at 18:56 UTC - **Reserved Date**: January 16, 2025 at 11:32 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WpFreeware WpF Ultimate Carousel allows Stored XSS.This issue affects WpF Ultimate Carousel: from n/a through 1.0.11. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **WpFreeware - WpF Ultimate Carousel** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wpf-ultimate-carousel/vulnerability/wordpress-wpf-ultimate-carousel-plugin-1-0-11-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-5118, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-5118 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-5118 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: April 30, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0078, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0078 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0078 - **State**: PUBLISHED - **Published Date**: May 07, 2011 at 18:00 UTC - **Last Updated**: August 06, 2024 at 21:43 UTC - **Reserved Date**: December 21, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0075, and CVE-2011-0077. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-2228](http://www.debian.org/security/2011/dsa-2228) 2. [MDVSA-2011:079](http://www.mandriva.com/security/advisories?name=MDVSA-2011:079) 3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=635705) 4. [](http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird) 5. [DSA-2235](http://www.debian.org/security/2011/dsa-2235) 6. [](http://downloads.avaya.com/css/P8/documents/100134543) 7. [](http://www.mozilla.org/security/announce/2011/mfsa2011-12.html) 8. [47651](http://www.securityfocus.com/bid/47651) 9. [MDVSA-2011:080](http://www.mandriva.com/security/advisories?name=MDVSA-2011:080) 10. [DSA-2227](http://www.debian.org/security/2011/dsa-2227) 11. [oval:org.mitre.oval:def:14246](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14246) 12. [](http://downloads.avaya.com/css/P8/documents/100144158)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27172, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27172 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27172 - **State**: PUBLISHED - **Published Date**: June 14, 2024 at 04:00 UTC - **Last Updated**: February 13, 2025 at 17:46 UTC - **Reserved Date**: February 21, 2024 at 02:12 UTC - **Assigned By**: Toshiba ### Vulnerability Description Remote Command program allows an attacker to get Remote Code Execution. As for the affected products/models/versions, see the reference URL. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Toshiba Tec Corporation - Toshiba Tec e-Studio multi-function peripheral (MFP)** Affected versions: - see the reference URL (Status: affected) ### References 1. [](https://www.toshibatec.com/information/20240531_01.html) 2. [](https://www.toshibatec.com/information/pdf/information20240531_01.pdf) 3. [](https://jvn.jp/en/vu/JVNVU97136265/index.html) 4. [](http://seclists.org/fulldisclosure/2024/Jul/1) ### Credits - We expresses its gratitude to Pierre Barre for reporting relevant security vulnerabilities for our products.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0475, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0475 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0475 - **State**: PUBLISHED - **Published Date**: May 20, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 00:17 UTC - **Reserved Date**: May 17, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The showHelp function in Internet Explorer 6 on Windows XP Pro allows remote attackers to execute arbitrary local .CHM files via a double backward slash ("\\") before the target CHM file, as demonstrated using an "ms-its" URL to ntshared.chm. NOTE: this bug may overlap CVE-2003-1041. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [10348](http://www.securityfocus.com/bid/10348) 2. [20040513 Showhelp() local CHM file execution](http://www.securityfocus.com/archive/1/363202) 3. [ie-showhelp-chm-execution(16147)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16147)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18362, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18362 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18362 - **State**: PUBLISHED - **Published Date**: October 31, 2019 at 14:43 UTC - **Last Updated**: August 05, 2024 at 01:54 UTC - **Reserved Date**: October 23, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description JetBrains MPS before 2019.2.2 exposed listening ports to the network. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.jetbrains.com/blog/2019/10/29/jetbrains-security-bulletin-q3-2019/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13901, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13901 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13901 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:41 UTC - **Reserved Date**: August 30, 2017 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22942, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22942 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22942 - **State**: PUBLISHED - **Published Date**: December 13, 2023 at 08:16 UTC - **Last Updated**: August 03, 2024 at 03:28 UTC - **Reserved Date**: January 10, 2022 at 15:34 UTC - **Assigned By**: vmware ### Vulnerability Description The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **n/a - Photon OS** Affected versions: - 3.0, 4.0 (Status: affected) ### References 1. [](https://github.com/vmware/photon/wiki/Security-Update-3.0-356) 2. [](https://github.com/vmware/photon/wiki/Security-Update-4.0-148) 3. [](https://www.openwall.com/lists/oss-security/2022/01/27/4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36659, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36659 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36659 - **State**: PUBLISHED - **Published Date**: January 27, 2023 at 00:00 UTC - **Last Updated**: April 03, 2025 at 12:58 UTC - **Reserved Date**: January 27, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/LemonLDAPNG/Apache-Session-Browseable/commit/fdf393235140b293cae5578ef136055a78f3574f) 2. [[debian-lts-announce] 20230128 [SECURITY] [DLA 3285-1] libapache-session-browseable-perl security update](https://lists.debian.org/debian-lts-announce/2023/01/msg00025.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10685, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10685 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10685 - **State**: PUBLISHED - **Published Date**: June 04, 2018 at 16:00 UTC - **Last Updated**: September 16, 2024 at 20:17 UTC - **Reserved Date**: October 29, 2017 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description pk-app-wonderbox is an integration with wonderbox pk-app-wonderbox downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server. ### Weakness Classification (CWE) - CWE-311: Security Weakness ### Affected Products **HackerOne - pk-app-wonderbox node module** Affected versions: - All versions (Status: affected) ### References 1. [](https://nodesecurity.io/advisories/289)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8973, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8973 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8973 - **State**: PUBLISHED - **Published Date**: October 17, 2022 at 21:17 UTC - **Last Updated**: May 13, 2025 at 15:00 UTC - **Reserved Date**: February 13, 2020 at 00:00 UTC - **Assigned By**: INCIBE ### Vulnerability Description ZGR TPS200 NG in its 2.00 firmware version and 1.01 hardware version, does not properly accept specially constructed requests. This allows an attacker with access to the network where the affected asset is located, to operate and change several parameters without having to be registered as a user on the web that owns the device. ### CVSS Metrics - **CVSS Base Score**: 9.3/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **ZGR - ZGR TPS200 NG** Affected versions: - 2.00 firmware version 2.00 (Status: affected) - 1.01 hardware version 1.01 (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-zgr-tps200-ng) ### Credits - Discovered by the Industrial Cybersecurity team of S21sec, special mention to Aar�n Flecha Men�ndez.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48886, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48886 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48886 - **State**: PUBLISHED - **Published Date**: January 14, 2025 at 14:09 UTC - **Last Updated**: January 14, 2025 at 20:54 UTC - **Reserved Date**: October 09, 2024 at 09:03 UTC - **Assigned By**: fortinet ### Vulnerability Description A weak authentication in Fortinet FortiOS versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, FortiProxy versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack. ### CVSS Metrics - **CVSS Base Score**: 8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:R` ### Weakness Classification (CWE) - CWE-1390: Security Weakness ### Affected Products **Fortinet - FortiOS** Affected versions: - 7.4.0 (Status: affected) - 7.2.0 (Status: affected) - 7.0.0 (Status: affected) - 6.4.0 (Status: affected) **Fortinet - FortiProxy** Affected versions: - 7.4.0 (Status: affected) - 7.2.0 (Status: affected) - 7.0.0 (Status: affected) - 2.0.0 (Status: affected) ### References 1. [https://fortiguard.fortinet.com/psirt/FG-IR-24-221](https://fortiguard.fortinet.com/psirt/FG-IR-24-221)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27519, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27519 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27519 - **State**: PUBLISHED - **Published Date**: March 19, 2021 at 18:54 UTC - **Last Updated**: August 03, 2024 at 21:26 UTC - **Reserved Date**: February 22, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site scripting (XSS) issue in FUDForum 3.1.0 allows remote attackers to inject JavaScript via index.php in the "srch" parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/fudforum/FUDforum/issues/2) 2. [](http://packetstormsecurity.com/files/162942/FUDForum-3.1.0-Cross-Site-Scripting.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2688, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2688 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2688 - **State**: PUBLISHED - **Published Date**: July 12, 2013 at 16:00 UTC - **Last Updated**: September 16, 2024 at 19:05 UTC - **Reserved Date**: March 25, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in phrelay in BlackBerry QNX Neutrino RTOS through 6.5.0 SP1 in the QNX Software Development Platform allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted packets to TCP port 4868 that leverage improper handling of the /dev/photon device file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://aluigi.altervista.org/adv/qnxph_1-adv.txt) 2. [](http://ics-cert.us-cert.gov/advisories/ICSA-13-189-01) 3. [](http://www.qnx.com/download/feature.html?programid=24850)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2285, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2285 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2285 - **State**: PUBLISHED - **Published Date**: May 09, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 17:43 UTC - **Reserved Date**: May 09, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in authldap.php in Dokeos 1.6.4 allows remote attackers to execute arbitrary PHP code via a URL in the includePath parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19980](http://secunia.com/advisories/19980) 2. [1016089](http://securitytracker.com/id?1016089) 3. [25437](http://www.osvdb.org/25437) 4. [20060508 Dokeos Learning Management System 1.6.4 Remote File Include](http://www.securityfocus.com/archive/1/433247/100/0/threaded) 5. [dokeos-authldap-file-include(26274)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26274) 6. [ADV-2006-1680](http://www.vupen.com/english/advisories/2006/1680) 7. [856](http://securityreason.com/securityalert/856) 8. [17915](http://www.securityfocus.com/bid/17915) 9. [17873](http://www.securityfocus.com/bid/17873)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10752, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10752 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10752 - **State**: PUBLISHED - **Published Date**: October 17, 2019 at 18:12 UTC - **Last Updated**: August 04, 2024 at 22:32 UTC - **Reserved Date**: April 03, 2019 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description Sequelize, all versions prior to version 4.44.3 and 5.15.1, is vulnerable to SQL Injection due to sequelize.json() helper function not escaping values properly when formatting sub paths for JSON queries for MySQL, MariaDB and SQLite. ### Affected Products **n/a - sequelize** Affected versions: - All versions prior to version 4.44.3 and 5.15.1 (Status: affected) ### References 1. [](https://github.com/sequelize/sequelize/commit/9bd0bc1%2C) 2. [](https://github.com/sequelize/sequelize/commit/9bd0bc111b6f502223edf7e902680f7cc2ed541e) 3. [](https://snyk.io/vuln/SNYK-JS-SEQUELIZE-459751%2C)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2010, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2010 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2010 - **State**: PUBLISHED - **Published Date**: May 18, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 19:17 UTC - **Reserved Date**: April 02, 2012 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description The ACMELOGIN implementation in HP OpenVMS 8.3 and 8.4 on the Alpha platform, and 8.3, 8.3-1H1, and 8.4 on the Itanium platform, when the SYS$ACM system service is enabled, allows local users to gain privileges via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SSRT100766](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03333494) 2. [53613](http://www.securityfocus.com/bid/53613) 3. [1027074](http://www.securitytracker.com/id?1027074) 4. [82015](http://osvdb.org/82015) 5. [HPSBOV02780](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03333494) 6. [hp-openvms-acmelogin-priv-esc(75729)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75729)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-6443, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-6443 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-6443 - **State**: PUBLISHED - **Published Date**: January 16, 2019 at 05:00 UTC - **Last Updated**: August 04, 2024 at 20:23 UTC - **Reserved Date**: January 15, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in NTPsec before 1.1.3. Because of a bug in ctl_getitem, there is a stack-based buffer over-read in read_sysvars in ntp_control.c in ntpd. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://dumpco.re/blog/ntpsec-bugs) 2. [](https://dumpco.re/bugs/ntpsec-oobread1) 3. [](https://github.com/ntpsec/ntpsec/blob/NTPsec_1_1_3/NEWS) 4. [46175](https://www.exploit-db.com/exploits/46175/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3052 - **State**: PUBLISHED - **Published Date**: April 26, 2024 at 21:27 UTC - **Last Updated**: February 05, 2025 at 21:25 UTC - **Reserved Date**: March 28, 2024 at 19:05 UTC - **Assigned By**: Silabs ### Vulnerability Description Malformed S2 Nonce Get command classes can be sent to crash the gateway. A hard reset is required to recover the gateway. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-248: Security Weakness ### Affected Products **silabs.com - Z/IP Gateway SDK** Affected versions: - 0 (Status: affected) ### References 1. [](https://community.silabs.com/068Vm0000045w2j)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15139, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15139 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15139 - **State**: PUBLISHED - **Published Date**: August 10, 2020 at 21:35 UTC - **Last Updated**: August 04, 2024 at 13:08 UTC - **Reserved Date**: June 25, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In MyBB before version 1.8.24, the custom MyCode (BBCode) for the visual editor doesn't escape input properly when rendering HTML, resulting in a DOM-based XSS vulnerability. The weakness can be exploited by pointing a victim to a page where the visual editor is active (e.g. as a post or Private Message) and operates on a maliciously crafted MyCode message. This may occur on pages where message content is pre-filled using a GET/POST parameter, or on reply pages where a previously saved malicious message is quoted. After upgrading MyBB to 1.8.24, make sure to update the version attribute in the `codebuttons` template for non-default themes to serve the latest version of the patched `jscripts/bbcodes_sceditor.js` file. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **MyBB - MyBB** Affected versions: - < 1.8.24 (Status: affected) ### References 1. [](https://github.com/mybb/mybb/security/advisories/GHSA-37h7-vfv6-f8rj) 2. [](https://github.com/mybb/mybb/commit/37ad29dcd25489a37bdd89ebac761f22492558b0) 3. [](https://mybb.com/versions/1.8.24/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30586, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30586 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30586 - **State**: PUBLISHED - **Published Date**: June 06, 2022 at 18:33 UTC - **Last Updated**: August 03, 2024 at 06:56 UTC - **Reserved Date**: May 11, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Gradle Enterprise through 2022.2.2 has Incorrect Access Control that leads to code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://security.gradle.com) 2. [](https://security.gradle.com/advisory/2022-09)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0420 - **State**: PUBLISHED - **Published Date**: January 23, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 12:19 UTC - **Reserved Date**: January 22, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description BEA WebLogic Server 9.0, 9.1, and 9.2 Gold allows remote attackers to obtain sensitive information via malformed HTTP requests, which reveal data from previous requests. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1017525](http://securitytracker.com/id?1017525) 2. [23750](http://secunia.com/advisories/23750) 3. [22082](http://www.securityfocus.com/bid/22082) 4. [ADV-2007-0213](http://www.vupen.com/english/advisories/2007/0213) 5. [38514](http://osvdb.org/38514) 6. [BEA07-147.00](http://dev2dev.bea.com/pub/advisory/214)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-53003, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-53003 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-53003 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 16:43 UTC - **Last Updated**: May 04, 2025 at 07:47 UTC - **Reserved Date**: March 27, 2025 at 16:40 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: EDAC/qcom: Do not pass llcc_driv_data as edac_device_ctl_info's pvt_info The memory for llcc_driv_data is allocated by the LLCC driver. But when it is passed as the private driver info to the EDAC core, it will get freed during the qcom_edac driver release. So when the qcom_edac driver gets probed again, it will try to use the freed data leading to the use-after-free bug. Hence, do not pass llcc_driv_data as pvt_info but rather reference it using the platform_data pointer in the qcom_edac driver. ### Affected Products **Linux - Linux** Affected versions: - 27450653f1db0b9d5b5048a246c850c52ee4aa61 (Status: affected) - 27450653f1db0b9d5b5048a246c850c52ee4aa61 (Status: affected) - 27450653f1db0b9d5b5048a246c850c52ee4aa61 (Status: affected) - 27450653f1db0b9d5b5048a246c850c52ee4aa61 (Status: affected) - 27450653f1db0b9d5b5048a246c850c52ee4aa61 (Status: affected) **Linux - Linux** Affected versions: - 4.20 (Status: affected) - 0 (Status: unaffected) - 5.4.231 (Status: unaffected) - 5.10.166 (Status: unaffected) - 5.15.91 (Status: unaffected) - 6.1.9 (Status: unaffected) - 6.2 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/66e10d5f399629ef7877304d9ba2b35d0474e7eb) 2. [](https://git.kernel.org/stable/c/76d9ebb7f0bc10fbc78b6d576751552edf743968) 3. [](https://git.kernel.org/stable/c/bff5243bd32661cf9ce66f6d9210fc8f89bda145) 4. [](https://git.kernel.org/stable/c/6f0351d0c311951b8b3064db91e61841e85b2b96) 5. [](https://git.kernel.org/stable/c/977c6ba624f24ae20cf0faee871257a39348d4a9)