System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29442, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29442 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29442 - **State**: PUBLISHED - **Published Date**: April 27, 2021 at 20:20 UTC - **Last Updated**: August 03, 2024 at 22:02 UTC - **Reserved Date**: March 30, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, the ConfigOpsController lets the user perform management operations like querying the database or even wiping it out. While the /data/remove endpoint is properly protected with the @Secured annotation, the /derby endpoint is not protected and can be openly accessed by unauthenticated users. These endpoints are only valid when using embedded storage (derby DB) so this issue should not affect those installations using external storage (e.g. mysql) ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **alibaba - nacos** Affected versions: - < 1.4.1 (Status: affected) ### References 1. [](https://github.com/alibaba/nacos/issues/4463) 2. [](https://github.com/advisories/GHSA-36hp-jr8h-556f) 3. [](https://github.com/alibaba/nacos/pull/4517)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4840, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4840 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4840 - **State**: PUBLISHED - **Published Date**: September 12, 2023 at 01:52 UTC - **Last Updated**: February 05, 2025 at 19:29 UTC - **Reserved Date**: September 08, 2023 at 13:20 UTC - **Assigned By**: Wordfence ### Vulnerability Description The MapPress Maps for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'mappress' shortcode in versions up to, and including, 2.88.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **chrisvrichardson - MapPress Maps for WordPress** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c3d2c9a4-32f7-484f-86ce-a33ef1174b28?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/mappress-google-maps-for-wordpress/tags/2.88.4/mappress_map.php#L381) 3. [](https://plugins.trac.wordpress.org/browser/mappress-google-maps-for-wordpress/tags/2.88.5/mappress.php?rev=2965022#L919) ### Credits - Lana Codes
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3473, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3473 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3473 - **State**: PUBLISHED - **Published Date**: September 20, 2010 at 21:00 UTC - **Last Updated**: September 16, 2024 at 19:31 UTC - **Reserved Date**: September 20, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Open redirect vulnerability in the Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 3.5.1 before 3.5.1-021 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://download2.boulder.ibm.com/sar/CMA/IMA/00yrk/0/readme-ae351-021.htm) 2. [PJ37180](http://www-01.ibm.com/support/docview.wss?uid=swg1PJ37180) 3. [43272](http://www.securityfocus.com/bid/43272) 4. [41458](http://secunia.com/advisories/41458) 5. [ADV-2010-2419](http://www.vupen.com/english/advisories/2010/2419)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21419, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21419 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21419 - **State**: PUBLISHED - **Published Date**: March 12, 2024 at 16:58 UTC - **Last Updated**: May 03, 2025 at 00:46 UTC - **Reserved Date**: December 08, 2023 at 22:45 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Microsoft - Microsoft Dynamics 365 (on-premises) version 9.1** Affected versions: - 9.0 (Status: affected) ### References 1. [Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21419)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-44628, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-44628 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-44628 - **State**: PUBLISHED - **Published Date**: November 03, 2022 at 19:32 UTC - **Last Updated**: February 20, 2025 at 19:56 UTC - **Reserved Date**: November 02, 2022 at 00:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in JumpDEMAND Inc. 4ECPS Web Forms plugin <= 0.2.17 on WordPress. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **JumpDEMAND Inc. - 4ECPS Web Forms (WordPress plugin)** Affected versions: - <= 0.2.17 (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/4ecps-webforms/wordpress-4ecps-web-forms-plugin-0-2-17-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) 2. [](https://wordpress.org/plugins/4ecps-webforms/) ### Credits - Vulnerability discovered by Hoang Van Hiep aka sk4rl1ghT (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39318, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39318 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39318 - **State**: PUBLISHED - **Published Date**: November 16, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 12:00 UTC - **Reserved Date**: September 02, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malicious server can trick a FreeRDP based client to crash with division by zero. This issue has been addressed in version 2.9.0. All users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation - CWE-369: Security Weakness ### Affected Products **FreeRDP - FreeRDP** Affected versions: - < 2.9.0 (Status: affected) ### References 1. [](https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-387j-8j96-7q35) 2. [](https://github.com/FreeRDP/FreeRDP/commit/80adde17ddc4b596ed1dae0922a0c54ab3d4b8ea) 3. [FEDORA-2022-fd6e43dec8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/) 4. [FEDORA-2022-076b1c9978](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/) 5. [[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update](https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html) 6. [GLSA-202401-16](https://security.gentoo.org/glsa/202401-16)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1043, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1043 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1043 - **State**: PUBLISHED - **Published Date**: April 12, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:35 UTC - **Reserved Date**: April 12, 2005 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description exif.c in PHP before 4.3.11 allows remote attackers to cause a denial of service (memory consumption and crash) via an EXIF header with a large IFD nesting level, which causes significant stack recursion. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2005:406](http://www.redhat.com/support/errata/RHSA-2005-406.html) 2. [MDKSA-2005:072](http://www.mandriva.com/security/advisories?name=MDKSA-2005:072) 3. [](https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=154025) 4. [GLSA-200504-15](http://www.gentoo.org/security/en/glsa/glsa-200504-15.xml) 5. [APPLE-SA-2005-06-08](http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html) 6. [oval:org.mitre.oval:def:10307](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10307) 7. [USN-112-1](https://usn.ubuntu.com/112-1/) 8. [](http://cvs.php.net/diff.php/php-src/ext/exif/exif.c?r1=1.118.2.29&r2=1.118.2.30&ty=u)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23424, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23424 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23424 - **State**: REJECTED - **Last Updated**: January 01, 2025 at 00:01 UTC - **Reserved Date**: January 16, 2024 at 17:32 UTC - **Assigned By**: atlassian ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-47664, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-47664 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-47664 - **State**: PUBLISHED - **Published Date**: May 07, 2025 at 14:20 UTC - **Last Updated**: May 07, 2025 at 18:10 UTC - **Reserved Date**: May 07, 2025 at 10:45 UTC - **Assigned By**: Patchstack ### Vulnerability Description Server-Side Request Forgery (SSRF) vulnerability in ThimPress WP Pipes allows Server Side Request Forgery. This issue affects WP Pipes: from n/a through 1.4.2. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **ThimPress - WP Pipes** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wp-pipes/vulnerability/wordpress-wp-pipes-1-4-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve) ### Credits - domiee13 (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13092, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13092 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13092 - **State**: PUBLISHED - **Published Date**: January 02, 2025 at 08:31 UTC - **Last Updated**: January 06, 2025 at 20:24 UTC - **Reserved Date**: December 31, 2024 at 16:24 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical was found in code-projects Job Recruitment 1.0. This vulnerability affects unknown code of the file /_parse/_call_job/search_ajax.php of the component Job Post Handler. The manipulation of the argument n leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **code-projects - Job Recruitment** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-289900 | code-projects Job Recruitment Job Post search_ajax.php sql injection](https://vuldb.com/?id.289900) 2. [VDB-289900 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.289900) 3. [Submit #472441 | code-projects job-recruitmen-php v1.0 Sql injection](https://vuldb.com/?submit.472441) 4. [](https://github.com/UnrealdDei/cve/blob/main/sql9.md) 5. [](https://code-projects.org/) ### Credits - UnrealDawn (VulDB User) - UnrealDawn (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16345, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16345 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16345 - **State**: PUBLISHED - **Published Date**: August 02, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 20:20 UTC - **Reserved Date**: October 31, 2017 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c318 the value for the s_port key is copied using strcpy to the buffer at 0xa00017f4. This buffer is 6 bytes large, sending anything longer will cause a buffer overflow. The destination can also be shifted by using an sn_speaker parameter between "0" and "3". ### Affected Products **Insteon - Insteon** Affected versions: - Insteon Hub 2245-222 - Firmware version 1012 (Status: affected) ### References 1. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2097, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2097 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2097 - **State**: PUBLISHED - **Published Date**: April 15, 2023 at 11:00 UTC - **Last Updated**: November 22, 2024 at 16:05 UTC - **Reserved Date**: April 15, 2023 at 09:11 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226105 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Vehicle Service Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.226105) 2. [](https://vuldb.com/?ctiid.226105) 3. [](https://github.com/E1CHO/cve_hub/blob/main/Vehicle%20Service%20Management%20System/Vehicle%20Service%20Management%20System%20-%20vuln%206.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27306, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27306 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27306 - **State**: REJECTED - **Published Date**: April 01, 2022 at 21:24 UTC - **Last Updated**: April 03, 2022 at 00:12 UTC - **Reserved Date**: March 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4188, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4188 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4188 - **State**: PUBLISHED - **Published Date**: June 17, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 11:04 UTC - **Reserved Date**: June 17, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in Hitachi Tuning Manager before 7.6.1-06 and 8.x before 8.0.0-04 and JP1/Performance Management - Manager Web Option 07-00 through 07-54 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-013/index.html) 2. [58899](http://secunia.com/advisories/58899) 3. [58528](http://secunia.com/advisories/58528) 4. [68015](http://www.securityfocus.com/bid/68015)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11480, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11480 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11480 - **State**: PUBLISHED - **Published Date**: December 08, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 18:12 UTC - **Reserved Date**: July 20, 2017 at 00:00 UTC - **Assigned By**: elastic ### Vulnerability Description Packetbeat versions prior to 5.6.4 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker could prevent Packetbeat from properly logging other PostgreSQL traffic. ### Weakness Classification (CWE) - CWE-404: Security Weakness ### Affected Products **Elastic - Packetbeat** Affected versions: - before 5.6.4 (Status: affected) ### References 1. [](https://discuss.elastic.co/t/beats-5-6-4-security-update/106739)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42137, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42137 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42137 - **State**: PUBLISHED - **Published Date**: July 30, 2024 at 07:46 UTC - **Last Updated**: May 04, 2025 at 09:23 UTC - **Reserved Date**: July 29, 2024 at 15:50 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot Commit 272970be3dab ("Bluetooth: hci_qca: Fix driver shutdown on closed serdev") will cause below regression issue: BT can't be enabled after below steps: cold boot -> enable BT -> disable BT -> warm reboot -> BT enable failure if property enable-gpios is not configured within DT|ACPI for QCA6390. The commit is to fix a use-after-free issue within qca_serdev_shutdown() by adding condition to avoid the serdev is flushed or wrote after closed but also introduces this regression issue regarding above steps since the VSC is not sent to reset controller during warm reboot. Fixed by sending the VSC to reset controller within qca_serdev_shutdown() once BT was ever enabled, and the use-after-free issue is also fixed by this change since the serdev is still opened before it is flushed or wrote. Verified by the reported machine Dell XPS 13 9310 laptop over below two kernel commits: commit e00fc2700a3f ("Bluetooth: btusb: Fix triggering coredump implementation for QCA") of bluetooth-next tree. commit b23d98d46d28 ("Bluetooth: btusb: Fix triggering coredump implementation for QCA") of linus mainline tree. ### Affected Products **Linux - Linux** Affected versions: - e84ec6e25df9bb0968599e92eacedaf3a0a5b587 (Status: affected) - 908d1742b6e694e84ead5c62e4b7c1bfbb8b46a3 (Status: affected) - ea3ebda47dd56f6e1c62f2e0e1b6e1b0a973e447 (Status: affected) - 272970be3dabd24cbe50e393ffee8f04aec3b9a8 (Status: affected) - 272970be3dabd24cbe50e393ffee8f04aec3b9a8 (Status: affected) - 272970be3dabd24cbe50e393ffee8f04aec3b9a8 (Status: affected) **Linux - Linux** Affected versions: - 6.2 (Status: affected) - 0 (Status: unaffected) - 5.10.222 (Status: unaffected) - 5.15.163 (Status: unaffected) - 6.1.98 (Status: unaffected) - 6.6.39 (Status: unaffected) - 6.9.9 (Status: unaffected) - 6.10 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/215a26c2404fa34625c725d446967fa328a703eb) 2. [](https://git.kernel.org/stable/c/4ca6013cd18e58ac1044908c40d4006a92093a11) 3. [](https://git.kernel.org/stable/c/e6e200b264271f62a3fadb51ada9423015ece37b) 4. [](https://git.kernel.org/stable/c/e2d8aa4c763593704ac21e7591aed4f13e32f3b5) 5. [](https://git.kernel.org/stable/c/977b9dc65e14fb80de4763d949c7dec2ecb15b9b) 6. [](https://git.kernel.org/stable/c/88e72239ead9814b886db54fc4ee39ef3c2b8f26)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19167, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19167 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19167 - **State**: PUBLISHED - **Published Date**: November 05, 2019 at 20:15 UTC - **Last Updated**: August 05, 2024 at 11:30 UTC - **Reserved Date**: November 10, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CloakCoin through 2.2.2.0 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://medium.com/%40dsl_uiuc/fake-stake-attacks-on-chain-based-proof-of-stake-cryptocurrencies-b8b05723f806) 2. [](http://fc19.ifca.ai/preproceedings/180-preproceedings.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-1670, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-1670 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-1670 - **State**: PUBLISHED - **Published Date**: January 25, 2014 at 16:00 UTC - **Last Updated**: August 06, 2024 at 09:50 UTC - **Reserved Date**: January 25, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Microsoft Bing application before 4.2.1 for Android allows remote attackers to install arbitrary APK files via vectors involving a crafted DNS response. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://blog.trustlook.com/2014/01/23/trustlook-reported-microsofts-first-ever-android-vulnerability/) 2. [](http://www.youtube.com/watch?v=_j1RKtTxZ3k) 3. [102575](http://osvdb.org/102575) 4. [ms-bing-cve20141670-code-exec(90977)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90977) 5. [65128](http://www.securityfocus.com/bid/65128) 6. [](https://play.google.com/store/apps/details?id=com.microsoft.bing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14378, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14378 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14378 - **State**: PUBLISHED - **Published Date**: November 29, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 19:27 UTC - **Reserved Date**: September 12, 2017 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description EMC RSA Authentication Agent API 8.5 for C and RSA Authentication Agent SDK 8.6 for C allow attackers to bypass authentication, aka an "Error Handling Vulnerability." ### Affected Products **n/a - RSA Authentication Agent SDK RSA Authentication Agent API 8.5 for C and RSA Authentication Agent SDK 8.6 for C** Affected versions: - RSA Authentication Agent SDK RSA Authentication Agent API 8.5 for C and RSA Authentication Agent SDK 8.6 for C (Status: affected) ### References 1. [1039877](http://www.securitytracker.com/id/1039877) 2. [](http://seclists.org/fulldisclosure/2017/Nov/48) 3. [101979](http://www.securityfocus.com/bid/101979)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5752, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5752 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5752 - **State**: PUBLISHED - **Published Date**: October 24, 2023 at 20:56 UTC - **Last Updated**: February 13, 2025 at 17:25 UTC - **Reserved Date**: October 24, 2023 at 15:04 UTC - **Assigned By**: PSF ### Vulnerability Description When installing a package from a Mercurial VCS URL (ie "pip install hg+...") with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the "hg clone" call (ie "--config"). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-77: Security Weakness ### Affected Products **Pip maintainers - pip** Affected versions: - 23.3 (Status: unaffected) ### References 1. [](https://github.com/pypa/pip/pull/12306) 2. [](https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL/) 3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YBSB3SUPQ3VIFYUMHPO3MEQI4BJAXKCZ/) 4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFC2SPFG5FLCZBYY2K3T5MFW2D22NG6E/) 5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/622OZXWG72ISQPLM5Y57YCVIMWHD4C3U/) 6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65UKKF5LBHEFDCUSPBHUN4IHYX7SRMHH/) 7. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXUVMJM25PUAZRQZBF54OFVKTY3MINPW/) ### Credits - Paul Gerste
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26377, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26377 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26377 - **State**: PUBLISHED - **Published Date**: February 12, 2025 at 13:30 UTC - **Last Updated**: February 17, 2025 at 10:11 UTC - **Reserved Date**: February 07, 2025 at 09:03 UTC - **Assigned By**: Nozomi ### Vulnerability Description A CWE-862 "Missing Authorization" in maxprofile/users/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to remove users via crafted HTTP requests. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Q-Free - MaxTime** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26377) ### Credits - Diego Giubertoni of Nozomi Networks found this bug during a security research activity. - Q-Free
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0632, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0632 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0632 - **State**: PUBLISHED - **Published Date**: February 19, 2022 at 14:00 UTC - **Last Updated**: August 02, 2024 at 23:32 UTC - **Reserved Date**: February 16, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description NULL Pointer Dereference in Homebrew mruby prior to 3.2. ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **mruby - mruby/mruby** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/3e5bb8f6-30fd-4553-86dd-761e9459ce1b) 2. [](https://github.com/mruby/mruby/commit/44f591aa8f7091e6ca6cb418e428ae6d4ceaf77d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13147, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13147 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13147 - **State**: PUBLISHED - **Published Date**: August 23, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 18:58 UTC - **Reserved Date**: August 23, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In GraphicsMagick 1.3.26, an allocation failure vulnerability was found in the function ReadMNGImage in coders/png.c when a small MNG file has a MEND chunk with a large length value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/p/graphicsmagick/bugs/446/) 2. [USN-4206-1](https://usn.ubuntu.com/4206-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46344, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46344 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46344 - **State**: PUBLISHED - **Published Date**: February 02, 2024 at 00:00 UTC - **Last Updated**: May 07, 2025 at 20:11 UTC - **Reserved Date**: October 23, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks. NOTE: The vendor states that this vulnerability has been fixed with 3.0.0-60 11.10.2013 for SL 200, 500, 1000 / not existing for SL 250, 300, 1200, 2000, SL 50 Gateway, SL Base. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.solar-log.com/en/support/firmware-database-1) 2. [](http://solar-log.com) 3. [](https://github.com/vinnie1717/CVE-2023-46344/blob/main/Solar-Log%20XSS)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27934, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27934 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27934 - **State**: PUBLISHED - **Published Date**: March 06, 2024 at 20:56 UTC - **Last Updated**: August 02, 2024 at 19:24 UTC - **Reserved Date**: February 28, 2024 at 15:14 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.36.2 and prior to version 1.40.3, use of inherently unsafe `*const c_void` and `ExternalPointer` leads to use-after-free access of the underlying structure, resulting in arbitrary code execution. Use of inherently unsafe `*const c_void` and `ExternalPointer` leads to use-after-free access of the underlying structure, which is exploitable by an attacker controlling the code executed inside a Deno runtime to obtain arbitrary code execution on the host machine regardless of permissions. This bug is known to be exploitable for both `*const c_void` and `ExternalPointer` implementations. Version 1.40.3 fixes this issue. ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **denoland - deno** Affected versions: - >= 1.36.2, < 1.40.3 (Status: affected) ### References 1. [https://github.com/denoland/deno/security/advisories/GHSA-3j27-563v-28wf](https://github.com/denoland/deno/security/advisories/GHSA-3j27-563v-28wf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9177, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9177 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9177 - **State**: PUBLISHED - **Published Date**: November 04, 2016 at 10:00 UTC - **Last Updated**: August 06, 2024 at 02:42 UTC - **Reserved Date**: November 04, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in Spark 2.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2017:0868](https://access.redhat.com/errata/RHSA-2017:0868) 2. [94218](http://www.securityfocus.com/bid/94218) 3. [](https://github.com/perwendel/spark/issues/700) 4. [](http://seclists.org/fulldisclosure/2016/Nov/13)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24978, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24978 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24978 - **State**: PUBLISHED - **Published Date**: February 14, 2023 at 10:36 UTC - **Last Updated**: March 20, 2025 at 14:10 UTC - **Reserved Date**: February 01, 2023 at 09:35 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted SPP files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-19788) ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-824: Security Weakness ### Affected Products **Siemens - Tecnomatix Plant Simulation** Affected versions: - All versions < V2201.0006 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30663, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30663 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30663 - **State**: PUBLISHED - **Published Date**: September 08, 2021 at 14:49 UTC - **Last Updated**: February 04, 2025 at 16:33 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An integer overflow was addressed with improved input validation. This issue is fixed in iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, Safari 14.1.1, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT212532) 2. [](https://support.apple.com/en-us/HT212534) 3. [](https://support.apple.com/en-us/HT212341) 4. [](https://support.apple.com/en-us/HT212335) 5. [](https://support.apple.com/en-us/HT212336)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45308, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45308 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45308 - **State**: PUBLISHED - **Published Date**: September 02, 2024 at 16:40 UTC - **Last Updated**: September 03, 2024 at 14:06 UTC - **Reserved Date**: August 26, 2024 at 18:25 UTC - **Assigned By**: GitHub_M ### Vulnerability Description HedgeDoc is an open source, real-time, collaborative, markdown notes application. When using HedgeDoc 1 with MySQL or MariaDB, it is possible to create notes with an alias matching the ID of existing notes. The affected existing note can then not be accessed anymore and is effectively hidden by the new one. When the freeURL feature is enabled (by setting the `allowFreeURL` config option or the `CMD_ALLOW_FREEURL` environment variable to `true`), any user with the appropriate permissions can create a note with an arbitrary alias, e.g. by accessing it in the browser. When MySQL or MariaDB are used, it is possible to create a new note with an alias that matches the lower-cased ID of a different note. HedgeDoc then always presents the new note to users, as these databases perform case-insensitive matching and the lower-cased alias is found first. This issue only affects HedgeDoc instances that use MySQL or MariaDB. Depending on the permission settings of the HedgeDoc instance, the issue can be exploited only by logged-in users or by all (including non-logged-in) users. The exploit requires knowledge of the ID of the target note. Attackers could use this issue to present a manipulated copy of the original note to the user, e.g. by replacing the links with malicious ones. Attackers can also use this issue to prevent access to the original note, causing a denial of service. No data is lost, as the original content of the affected notes is still present in the database. Users are advised to upgrade to version 1.10.0 which addresses this issue. Users unable to upgrade may disable freeURL mode which prevents the exploitation of this issue. The impact can also be limited by restricting freeURL note creation to trusted, logged-in users by enabling `requireFreeURLAuthentication`/`CMD_REQUIRE_FREEURL_AUTHENTICATION`. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L` ### Weakness Classification (CWE) - CWE-1289: Security Weakness ### Affected Products **hedgedoc - hedgedoc** Affected versions: - < 1.10.0 (Status: affected) ### References 1. [https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-pjf2-269h-cx7p](https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-pjf2-269h-cx7p) 2. [https://github.com/hedgedoc/hedgedoc/commit/380587b7fd65bc1eb71eef51a3aab324f9877650](https://github.com/hedgedoc/hedgedoc/commit/380587b7fd65bc1eb71eef51a3aab324f9877650)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13568, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13568 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13568 - **State**: PUBLISHED - **Published Date**: March 01, 2025 at 04:21 UTC - **Last Updated**: March 03, 2025 at 20:57 UTC - **Reserved Date**: January 21, 2025 at 03:19 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Fluent Support – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.5 via the 'fluent-support' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/fluent-support directory which can contain file attachments included in support tickets. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **techjewel - Fluent Support – Helpdesk & Customer Support Ticket System** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/17f40832-8ae5-443a-aa98-f0e61d1152cc?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/fluent-support/trunk/app/Services/Includes/FileSystem.php) ### Credits - Tim Coen
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8135, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8135 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8135 - **State**: PUBLISHED - **Published Date**: March 20, 2020 at 18:26 UTC - **Last Updated**: August 04, 2024 at 09:48 UTC - **Reserved Date**: January 28, 2020 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description The uppy npm package < 1.9.3 is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability, which allows an attacker to scan local or external network or otherwise interact with internal systems. ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **n/a - uppy** Affected versions: - Fixed Version: 1.9.3 (Status: affected) ### References 1. [](https://hackerone.com/reports/786956)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22104, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22104 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22104 - **State**: PUBLISHED - **Published Date**: September 02, 2022 at 11:31 UTC - **Last Updated**: August 03, 2024 at 03:00 UTC - **Reserved Date**: December 21, 2021 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory corruption in multimedia due to improper check on the messages received. in Snapdragon Auto ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Qualcomm, Inc. - Snapdragon Auto** Affected versions: - APQ8096AU, MSM8996AU, QAM8295P, QCA6564A, QCA6564AU, QCA6574A, QCA6574AU, QCA6584AU, QCA6696, SA6145P, SA6150P, SA6155P, SA8145P, SA8150P, SA8155P, SA8195P, SA8295P, SA8540P, SA9000P (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/july-2022-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-7295, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-7295 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-7295 - **State**: PUBLISHED - **Published Date**: October 16, 2024 at 07:31 UTC - **Last Updated**: October 16, 2024 at 12:58 UTC - **Reserved Date**: October 15, 2024 at 18:45 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Video Grid plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.21 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **nik00726 - Video Grid** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/db5247ad-dbbf-4d8e-92f5-3a673b97d080?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2824307%40video-grid%2Ftags%2F1.21&new=2900422%40video-grid%2Ftags%2F1.22) ### Credits - Marco Wotschka
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38638, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38638 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38638 - **State**: PUBLISHED - **Published Date**: March 07, 2025 at 16:12 UTC - **Last Updated**: March 07, 2025 at 17:58 UTC - **Reserved Date**: June 19, 2024 at 00:17 UTC - **Assigned By**: qnap ### Vulnerability Description An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory. QTS 5.2.x/QuTS hero h5.2.x are not affected. We have already fixed the vulnerability in the following versions: QTS 5.1.9.2954 build 20241120 and later QuTS hero h5.1.9.2954 build 20241120 and later ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **QNAP Systems Inc. - QTS** Affected versions: - 5.1.x (Status: affected) - 5.2.x (Status: unaffected) **QNAP Systems Inc. - QuTS hero** Affected versions: - h5.1.x (Status: affected) - h5.2.x (Status: unaffected) ### References 1. [](https://www.qnap.com/en/security-advisory/qsa-24-52) ### Credits - leeya_bug
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47335, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47335 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47335 - **State**: PUBLISHED - **Published Date**: October 07, 2024 at 05:31 UTC - **Last Updated**: October 07, 2024 at 13:02 UTC - **Reserved Date**: September 24, 2024 at 13:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Bit Form Bit Form – Contact Form Plugin allows SQL Injection.This issue affects Bit Form – Contact Form Plugin: from n/a through 2.13.11. ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Bit Form - Bit Form – Contact Form Plugin** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/bit-form/wordpress-bit-form-plugin-2-13-11-sql-injection-vulnerability?_s_id=cve) ### Credits - Certus Cybersecurity (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11555, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11555 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11555 - **State**: PUBLISHED - **Published Date**: November 22, 2024 at 20:46 UTC - **Last Updated**: November 22, 2024 at 21:45 UTC - **Reserved Date**: November 20, 2024 at 21:55 UTC - **Assigned By**: zdi ### Vulnerability Description IrfanView DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24780. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **IrfanView - IrfanView** Affected versions: - 4.67.0.0 (Status: affected) ### References 1. [ZDI-24-1559](https://www.zerodayinitiative.com/advisories/ZDI-24-1559/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14682, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14682 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14682 - **State**: PUBLISHED - **Published Date**: September 21, 2017 at 22:00 UTC - **Last Updated**: August 05, 2024 at 19:34 UTC - **Reserved Date**: September 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GetNextToken in MagickCore/token.c in ImageMagick 7.0.6 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted SVG document, a different vulnerability than CVE-2017-10928. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32726) 2. [DSA-4040](https://www.debian.org/security/2017/dsa-4040) 3. [USN-3681-1](https://usn.ubuntu.com/3681-1/) 4. [DSA-4032](https://www.debian.org/security/2017/dsa-4032)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9968, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9968 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9968 - **State**: PUBLISHED - **Published Date**: May 17, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 07:24 UTC - **Reserved Date**: April 10, 2018 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Keystroke actions of TextBox objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5572. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Foxit - Foxit Reader** Affected versions: - 9.0.1.1049 (Status: affected) ### References 1. [](https://www.foxitsoftware.com/support/security-bulletins.php) 2. [](https://zerodayinitiative.com/advisories/ZDI-18-352)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39649, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39649 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39649 - **State**: PUBLISHED - **Published Date**: October 03, 2023 at 00:00 UTC - **Last Updated**: September 20, 2024 at 16:26 UTC - **Reserved Date**: August 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Improper neutralization of SQL parameter in Theme Volty CMS Category Slider module for PrestaShop. In the module “Theme Volty CMS Category Slider” (tvcmscategoryslider) up to version 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://security.friendsofpresta.org/modules/2023/09/26/tvcmscategoryslider.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1512, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1512 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1512 - **State**: PUBLISHED - **Published Date**: February 06, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 04:47 UTC - **Reserved Date**: February 06, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in FancyFon FAMOC before 3.17.4 allow remote attackers to inject arbitrary web script or HTML via the (1) LoginForm[username] to ui/system/login or the (2) order or (3) myorgs to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2014-011.txt) 2. [famoc-index-xss(100410)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100410) 3. [](http://packetstormsecurity.com/files/130119/FancyFon-FAMOC-3.16.5-Cross-Site-Scripting.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4472, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4472 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4472 - **State**: PUBLISHED - **Published Date**: December 10, 2014 at 21:00 UTC - **Last Updated**: August 06, 2024 at 11:20 UTC - **Reserved Date**: June 20, 2014 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/HT204245) 2. [](http://support.apple.com/HT204246) 3. [APPLE-SA-2015-06-30-6](http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html) 4. [71442](http://www.securityfocus.com/bid/71442) 5. [APPLE-SA-2015-01-27-2](http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html) 6. [](https://support.apple.com/kb/HT204949) 7. [APPLE-SA-2015-01-27-1](http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html) 8. [](http://support.apple.com/kb/HT6596) 9. [APPLE-SA-2014-12-2-1](http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0550, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0550 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0550 - **State**: PUBLISHED - **Published Date**: January 27, 2023 at 20:17 UTC - **Last Updated**: January 13, 2025 at 17:10 UTC - **Reserved Date**: January 27, 2023 at 19:20 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Quick Restaurant Menu plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the fact that during menu item deletion/modification, the plugin does not verify that the post ID provided to the AJAX action is indeed a menu item. This makes it possible for authenticated attackers, with subscriber-level access or higher, to modify or delete arbitrary posts. ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L` ### Affected Products **alejandropascual - Quick Restaurant Menu** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/faa4fba5-cd19-4b96-aa09-07ed6d52a107) 2. [](https://plugins.trac.wordpress.org/browser/quick-restaurant-menu/tags/2.0.2/includes/admin/ajax-functions.php) 3. [](https://plugins.trac.wordpress.org/changeset/2851871/quick-restaurant-menu/trunk?contextall=1&old=2788636&old_path=%2Fquick-restaurant-menu%2Ftrunk) ### Credits - Marco Wotschka
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23175, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23175 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23175 - **State**: PUBLISHED - **Published Date**: April 22, 2025 at 12:24 UTC - **Last Updated**: April 22, 2025 at 13:06 UTC - **Reserved Date**: January 12, 2025 at 08:45 UTC - **Assigned By**: INCD ### Vulnerability Description Multiple XSS (CWE-79) ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Tecnick - TCExam** Affected versions: - 16.3.2 (Status: affected) ### References 1. [](https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0) ### Credits - Guy Hayou
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-44379, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-44379 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-44379 - **State**: PUBLISHED - **Published Date**: February 22, 2024 at 14:47 UTC - **Last Updated**: April 22, 2025 at 16:19 UTC - **Reserved Date**: September 28, 2023 at 17:56 UTC - **Assigned By**: GitHub_M ### Vulnerability Description baserCMS is a website development framework. Prior to version 5.0.9, there is a cross-site scripting vulnerability in the site search feature. Version 5.0.9 contains a fix for this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **baserproject - basercms** Affected versions: - < 5.0.9 (Status: affected) ### References 1. [https://github.com/baserproject/basercms/security/advisories/GHSA-66c2-p8rh-qx87](https://github.com/baserproject/basercms/security/advisories/GHSA-66c2-p8rh-qx87) 2. [https://github.com/baserproject/basercms/commit/18549396e5a9b8294306a54a876af164b0b57da4](https://github.com/baserproject/basercms/commit/18549396e5a9b8294306a54a876af164b0b57da4) 3. [https://basercms.net/security/JVN_73283159](https://basercms.net/security/JVN_73283159)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2803, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2803 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2803 - **State**: PUBLISHED - **Published Date**: August 03, 2011 at 00:00 UTC - **Last Updated**: August 06, 2024 at 23:15 UTC - **Reserved Date**: July 20, 2011 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Google Chrome before 13.0.782.107 does not properly handle Skia paths, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html) 2. [google-chrome-skia-code-exec(68965)](https://exchange.xforce.ibmcloud.com/vulnerabilities/68965) 3. [74254](http://osvdb.org/74254) 4. [](http://code.google.com/p/chromium/issues/detail?id=88827) 5. [oval:org.mitre.oval:def:14333](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14333)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25909, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25909 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25909 - **State**: PUBLISHED - **Published Date**: February 26, 2024 at 15:28 UTC - **Last Updated**: August 05, 2024 at 15:09 UTC - **Reserved Date**: February 12, 2024 at 08:34 UTC - **Assigned By**: Patchstack ### Vulnerability Description Unrestricted Upload of File with Dangerous Type vulnerability in JoomUnited WP Media folder.This issue affects WP Media folder: from n/a through 5.7.2. ### CVSS Metrics - **CVSS Base Score**: 9.9/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **JoomUnited - WP Media folder** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-media-folder/wordpress-wp-media-folder-plugin-5-7-2-subscriber-arbitrary-file-upload-vulnerability?_s_id=cve) ### Credits - Dave Jong (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0895, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0895 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0895 - **State**: PUBLISHED - **Published Date**: June 25, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:37 UTC - **Reserved Date**: January 31, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple Cisco networking products allow remote attackers to cause a denial of service on the local network via a series of ARP packets sent to the router's interface that contains a different MAC address for the router, which eventually causes the router to overwrite the MAC address in its ARP table. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#399355](http://www.kb.cert.org/vuls/id/399355) 2. [20011115 Cisco IOS ARP Table Overwrite Vulnerability](http://www.cisco.com/warp/public/707/IOS-arp-overwrite-vuln-pub.shtml) 3. [807](http://www.osvdb.org/807) 4. [3547](http://www.securityfocus.com/bid/3547) 5. [cisco-arp-overwrite-table(7547)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7547)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15990, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15990 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15990 - **State**: PUBLISHED - **Published Date**: October 31, 2017 at 07:00 UTC - **Last Updated**: August 05, 2024 at 20:13 UTC - **Reserved Date**: October 28, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Php Inventory & Invoice Management System allows Arbitrary File Upload via dashboard/edit_myaccountdetail/. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [43069](https://www.exploit-db.com/exploits/43069/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3189, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3189 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3189 - **State**: PUBLISHED - **Published Date**: August 31, 2010 at 19:25 UTC - **Last Updated**: August 07, 2024 at 03:03 UTC - **Reserved Date**: August 31, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The extSetOwner function in the UfProxyBrowserCtrl ActiveX control (UfPBCtrl.dll) in Trend Micro Internet Security Pro 2010 allows remote attackers to execute arbitrary code via an invalid address that is dereferenced as a pointer. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.zerodayinitiative.com/advisories/ZDI-10-165) 2. [20100825 ZDI-10-165: Trend Micro Internet Security Pro 2010 ActiveX extSetOwner Remote Code Execution Vulnerability](http://www.securityfocus.com/archive/1/513327/100/0/threaded) 3. [1024364](http://www.securitytracker.com/id?1024364) 4. [oval:org.mitre.oval:def:7633](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7633) 5. [41140](http://secunia.com/advisories/41140) 6. [ADV-2010-2185](http://www.vupen.com/english/advisories/2010/2185) 7. [trend-micro-activex-code-execution(61397)](https://exchange.xforce.ibmcloud.com/vulnerabilities/61397) 8. [](http://esupport.trendmicro.com/pages/Hot-Fix-UfPBCtrldll-is-vulnerable-to-remote-attackers.aspx)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3584, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3584 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3584 - **State**: PUBLISHED - **Published Date**: November 16, 2005 at 07:37 UTC - **Last Updated**: August 07, 2024 at 23:17 UTC - **Reserved Date**: November 16, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in forum.php in PhpWebThings 1.4.4 allows remote attackers to inject arbitrary web script or HTML via the forum parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20051105 XSS & SQL injection in phpWebThing](http://marc.info/?l=bugtraq&m=113122187101383&w=2) 2. [15276](http://www.securityfocus.com/bid/15276)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3711, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3711 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3711 - **State**: PUBLISHED - **Published Date**: September 23, 2011 at 23:00 UTC - **Last Updated**: September 16, 2024 at 22:50 UTC - **Reserved Date**: September 23, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description BIGACE 2.7.5 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by system/libs/javascript.inc.php and certain other files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/bigace_2.7.5) 2. [[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability](http://www.openwall.com/lists/oss-security/2011/06/27/6) 3. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43417, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43417 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43417 - **State**: PUBLISHED - **Published Date**: October 19, 2022 at 00:00 UTC - **Last Updated**: May 08, 2025 at 19:11 UTC - **Reserved Date**: October 18, 2022 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins Katalon Plugin 1.0.32 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. ### Affected Products **Jenkins project - Jenkins Katalon Plugin** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2845%20%281%29) 2. [[oss-security] 20221019 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/10/19/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20192, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20192 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20192 - **State**: PUBLISHED - **Published Date**: June 28, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 09:05 UTC - **Reserved Date**: October 27, 2022 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated attacker with Administrator-level read-only credentials to elevate their privileges to Administrator with read-write credentials on an affected system. Note: "Cisco Expressway Series" refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices. For more information about these vulnerabilities, see the Details section of this advisory. ### CVSS Metrics - **CVSS Base Score**: 9.6/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Cisco - Cisco TelePresence Video Communication Server (VCS) Expressway ** Affected versions: - n/a (Status: affected) ### References 1. [20230607 Cisco Expressway Series and Cisco TelePresence Video Communication Server Privilege Escalation Vulnerabilities](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-priv-esc-Ls2B9t7b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26626, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26626 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26626 - **State**: PUBLISHED - **Published Date**: March 06, 2024 at 06:45 UTC - **Last Updated**: May 04, 2025 at 08:52 UTC - **Reserved Date**: February 19, 2024 at 14:20 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: ipmr: fix kernel panic when forwarding mcast packets The stacktrace was: [ 86.305548] BUG: kernel NULL pointer dereference, address: 0000000000000092 [ 86.306815] #PF: supervisor read access in kernel mode [ 86.307717] #PF: error_code(0x0000) - not-present page [ 86.308624] PGD 0 P4D 0 [ 86.309091] Oops: 0000 [#1] PREEMPT SMP NOPTI [ 86.309883] CPU: 2 PID: 3139 Comm: pimd Tainted: G U 6.8.0-6wind-knet #1 [ 86.311027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.11.1-0-g0551a4be2c-prebuilt.qemu-project.org 04/01/2014 [ 86.312728] RIP: 0010:ip_mr_forward (/build/work/knet/net/ipv4/ipmr.c:1985) [ 86.313399] Code: f9 1f 0f 87 85 03 00 00 48 8d 04 5b 48 8d 04 83 49 8d 44 c5 00 48 8b 40 70 48 39 c2 0f 84 d9 00 00 00 49 8b 46 58 48 83 e0 fe <80> b8 92 00 00 00 00 0f 84 55 ff ff ff 49 83 47 38 01 45 85 e4 0f [ 86.316565] RSP: 0018:ffffad21c0583ae0 EFLAGS: 00010246 [ 86.317497] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 86.318596] RDX: ffff9559cb46c000 RSI: 0000000000000000 RDI: 0000000000000000 [ 86.319627] RBP: ffffad21c0583b30 R08: 0000000000000000 R09: 0000000000000000 [ 86.320650] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 86.321672] R13: ffff9559c093a000 R14: ffff9559cc00b800 R15: ffff9559c09c1d80 [ 86.322873] FS: 00007f85db661980(0000) GS:ffff955a79d00000(0000) knlGS:0000000000000000 [ 86.324291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 86.325314] CR2: 0000000000000092 CR3: 000000002f13a000 CR4: 0000000000350ef0 [ 86.326589] Call Trace: [ 86.327036] <TASK> [ 86.327434] ? show_regs (/build/work/knet/arch/x86/kernel/dumpstack.c:479) [ 86.328049] ? __die (/build/work/knet/arch/x86/kernel/dumpstack.c:421 /build/work/knet/arch/x86/kernel/dumpstack.c:434) [ 86.328508] ? page_fault_oops (/build/work/knet/arch/x86/mm/fault.c:707) [ 86.329107] ? do_user_addr_fault (/build/work/knet/arch/x86/mm/fault.c:1264) [ 86.329756] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.330350] ? __irq_work_queue_local (/build/work/knet/kernel/irq_work.c:111 (discriminator 1)) [ 86.331013] ? exc_page_fault (/build/work/knet/./arch/x86/include/asm/paravirt.h:693 /build/work/knet/arch/x86/mm/fault.c:1515 /build/work/knet/arch/x86/mm/fault.c:1563) [ 86.331702] ? asm_exc_page_fault (/build/work/knet/./arch/x86/include/asm/idtentry.h:570) [ 86.332468] ? ip_mr_forward (/build/work/knet/net/ipv4/ipmr.c:1985) [ 86.333183] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.333920] ipmr_mfc_add (/build/work/knet/./include/linux/rcupdate.h:782 /build/work/knet/net/ipv4/ipmr.c:1009 /build/work/knet/net/ipv4/ipmr.c:1273) [ 86.334583] ? __pfx_ipmr_hash_cmp (/build/work/knet/net/ipv4/ipmr.c:363) [ 86.335357] ip_mroute_setsockopt (/build/work/knet/net/ipv4/ipmr.c:1470) [ 86.336135] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.336854] ? ip_mroute_setsockopt (/build/work/knet/net/ipv4/ipmr.c:1470) [ 86.337679] do_ip_setsockopt (/build/work/knet/net/ipv4/ip_sockglue.c:944) [ 86.338408] ? __pfx_unix_stream_read_actor (/build/work/knet/net/unix/af_unix.c:2862) [ 86.339232] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223) [ 86.339809] ? aa_sk_perm (/build/work/knet/security/apparmor/include/cred.h:153 /build/work/knet/security/apparmor/net.c:181) [ 86.340342] ip_setsockopt (/build/work/knet/net/ipv4/ip_sockglue.c:1415) [ 86.340859] raw_setsockopt (/build/work/knet/net/ipv4/raw.c:836) [ 86.341408] ? security_socket_setsockopt (/build/work/knet/security/security.c:4561 (discriminator 13)) [ 86.342116] sock_common_setsockopt (/build/work/knet/net/core/sock.c:3716) [ 86.342747] do_sock_setsockopt (/build/work/knet/net/socket.c:2313) [ 86.343363] __sys_setsockopt (/build/work/knet/./include/linux/file.h:32 /build/work/kn ---truncated--- ### Affected Products **Linux - Linux** Affected versions: - f69365e3a7cab819099249c50b39f4450fdddc60 (Status: affected) - 7b32e63f881432bf30f282328b8e64c6aa494ba2 (Status: affected) - 7d97858e21fbc472acda7d908357c5fe54a8e439 (Status: affected) - bb7403655b3c3eb245d0ee330047cd3e20b3c4af (Status: affected) **Linux - Linux** Affected versions: - 6.1.75 (Status: affected) - 6.6.14 (Status: affected) - 6.7.2 (Status: affected) ### References 1. [](https://git.kernel.org/stable/c/d2f1b7fe74afd66298dbb3c7b39e7b62e4df1724) 2. [](https://git.kernel.org/stable/c/dcaafdba6c6162bb49f1192850bc3bbc3707738c) 3. [](https://git.kernel.org/stable/c/2e8c9ae40adda2be1ba41c05fd3cd1e61cce3207) 4. [](https://git.kernel.org/stable/c/e622502c310f1069fd9f41cd38210553115f610a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1321, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1321 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1321 - **State**: PUBLISHED - **Published Date**: January 06, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:46 UTC - **Reserved Date**: January 06, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The configuration backup in Asante FM2008 running firmware 1.06 stores the username and password in cleartext, which could allow remote attackers to gain unauthorized access. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20041215 Asante FM2008 10/100 Ethernet switch backdoor login](http://marc.info/?l=bugtraq&m=110312733624864&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4241, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4241 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4241 - **State**: PUBLISHED - **Published Date**: December 14, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:38 UTC - **Reserved Date**: December 14, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the category page in VCD-db 0.98 and earlier allows remote attackers to inject arbitrary web script or HTML via the batch parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [15840](http://www.securityfocus.com/bid/15840) 2. [18034](http://secunia.com/advisories/18034) 3. [](http://pridels0.blogspot.com/2005/12/vcd-db-vuln.html) 4. [21700](http://www.osvdb.org/21700) 5. [ADV-2005-2885](http://www.vupen.com/english/advisories/2005/2885)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31971, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31971 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31971 - **State**: PUBLISHED - **Published Date**: June 08, 2021 at 22:46 UTC - **Last Updated**: August 03, 2024 at 23:10 UTC - **Reserved Date**: April 30, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows HTML Platforms Security Feature Bypass Vulnerability ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.0 (Status: affected) - 6.3.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.0 (Status: affected) - 6.2.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) - 6.3.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) - 6.1.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) - 6.0.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) - 6.1.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) - 6.1.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) - 6.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H1** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31971)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11195, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11195 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11195 - **State**: PUBLISHED - **Published Date**: February 22, 2021 at 06:25 UTC - **Last Updated**: August 04, 2024 at 11:28 UTC - **Reserved Date**: March 31, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Out of bound write and read in TA while processing command from NS side due to improper length check on command and response buffers in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music** Affected versions: - APQ8009, APQ8016, APQ8064AU, APQ8096AU, AQT1000, AR8031, AR8035, CSRA6620, CSRA6640, CSRB31024, FSM10055, FSM10056, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8916, MSM8996AU, PM3003A, PM4125, PM4250, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM6350, PM640A, PM640L, PM640P, PM660, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8019, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350C, PM855, PM855A, PM855B, PM855L, PM855P, PM8909, PM8916, PM8996, PM8998, PMC1000H, PMD9607, PMD9655, PMD9655AU, PME605, PMI632, PMI8994, PMI8996, PMI8998, PMK8001, PMK8002, PMK8003, PMK8350, PMM6155AU, PMM8155AU, PMM8195AU, PMM855AU, PMM8996AU, PMR525, PMR735A, PMR735B, PMX24, PMX50, PMX55, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT1000, QBT1500, QBT2000, QCA1990, QCA40 ...[truncated*] (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11006 - **State**: PUBLISHED - **Published Date**: April 08, 2019 at 18:17 UTC - **Last Updated**: August 04, 2024 at 22:40 UTC - **Reserved Date**: April 08, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadMIFFImage of coders/miff.c, which allows attackers to cause a denial of service or information disclosure via an RLE packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/p/graphicsmagick/bugs/598/) 2. [](http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/f7610c1281c1) 3. [[debian-lts-announce] 20190413 [SECURITY] [DLA 1755-1] graphicsmagick security update](https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html) 4. [openSUSE-SU-2019:1272](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html) 5. [openSUSE-SU-2019:1295](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html) 6. [USN-4207-1](https://usn.ubuntu.com/4207-1/) 7. [DSA-4640](https://www.debian.org/security/2020/dsa-4640)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53726, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53726 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53726 - **State**: PUBLISHED - **Published Date**: December 02, 2024 at 13:48 UTC - **Last Updated**: December 02, 2024 at 15:40 UTC - **Reserved Date**: November 22, 2024 at 13:51 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Realty Candy RealtyCandy IDX Broker Extended allows Stored XSS.This issue affects RealtyCandy IDX Broker Extended: from n/a through 1.5.1. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Realty Candy - RealtyCandy IDX Broker Extended** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/realtycandy-idx-broker-extended/vulnerability/wordpress-realtycandy-idx-broker-extended-plugin-1-5-1-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6624, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6624 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6624 - **State**: PUBLISHED - **Published Date**: November 13, 2013 at 15:00 UTC - **Last Updated**: August 06, 2024 at 17:46 UTC - **Reserved Date**: November 05, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the string values of id attributes. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openSUSE-SU-2014:0065](http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html) 2. [oval:org.mitre.oval:def:19168](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19168) 3. [](http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html) 4. [openSUSE-SU-2013:1776](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html) 5. [DSA-2799](http://www.debian.org/security/2013/dsa-2799) 6. [openSUSE-SU-2013:1861](http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html) 7. [openSUSE-SU-2013:1777](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html) 8. [](https://code.google.com/p/chromium/issues/detail?id=290566)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7317, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7317 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7317 - **State**: PUBLISHED - **Published Date**: February 04, 2019 at 07:00 UTC - **Last Updated**: August 04, 2024 at 20:46 UTC - **Reserved Date**: February 04, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20190417 [slackware-security] libpng (SSA:2019-107-01)](https://seclists.org/bugtraq/2019/Apr/30) 2. [DSA-4435](https://www.debian.org/security/2019/dsa-4435) 3. [20190429 [SECURITY] [DSA 4435-1] libpng1.6 security update](https://seclists.org/bugtraq/2019/Apr/36) 4. [USN-3962-1](https://usn.ubuntu.com/3962-1/) 5. [USN-3991-1](https://usn.ubuntu.com/3991-1/) 6. [20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)](https://seclists.org/bugtraq/2019/May/56) 7. [20190523 [SECURITY] [DSA 4448-1] firefox-esr security update](https://seclists.org/bugtraq/2019/May/59) 8. [DSA-4448](https://www.debian.org/security/2019/dsa-4448) 9. [[debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update](https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html) 10. [RHSA-2019:1265](https://access.redhat.com/errata/RHSA-2019:1265) 11. [RHSA-2019:1267](https://access.redhat.com/errata/RHSA-2019:1267) 12. [RHSA-2019:1269](https://access.redhat.com/errata/RHSA-2019:1269) 13. [DSA-4451](https://www.debian.org/security/2019/dsa-4451) 14. [20190527 [SECURITY] [DSA 4451-1] thunderbird security update](https://seclists.org/bugtraq/2019/May/67) 15. [[debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update](https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html) 16. [USN-3997-1](https://usn.ubuntu.com/3997-1/) 17. [openSUSE-SU-2019:1484](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html) 18. [RHSA-2019:1310](https://access.redhat.com/errata/RHSA-2019:1310) 19. [RHSA-2019:1308](https://access.redhat.com/errata/RHSA-2019:1308) 20. [RHSA-2019:1309](https://access.redhat.com/errata/RHSA-2019:1309) 21. [openSUSE-SU-2019:1534](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html) 22. [openSUSE-SU-2019:1664](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html) 23. [108098](http://www.securityfocus.com/bid/108098) 24. [USN-4080-1](https://usn.ubuntu.com/4080-1/) 25. [USN-4083-1](https://usn.ubuntu.com/4083-1/) 26. [GLSA-201908-02](https://security.gentoo.org/glsa/201908-02) 27. [RHSA-2019:2494](https://access.redhat.com/errata/RHSA-2019:2494) 28. [RHSA-2019:2495](https://access.redhat.com/errata/RHSA-2019:2495) 29. [openSUSE-SU-2019:1916](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html) 30. [openSUSE-SU-2019:1912](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html) 31. [RHSA-2019:2585](https://access.redhat.com/errata/RHSA-2019:2585) 32. [RHSA-2019:2590](https://access.redhat.com/errata/RHSA-2019:2590) 33. [RHSA-2019:2592](https://access.redhat.com/errata/RHSA-2019:2592) 34. [RHSA-2019:2737](https://access.redhat.com/errata/RHSA-2019:2737) 35. [](https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html) 36. [](https://www.oracle.com/security-alerts/cpuApr2021.html) 37. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803) 38. [](https://github.com/glennrp/libpng/issues/275) 39. [](http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html) 40. [](https://security.netapp.com/advisory/ntap-20190719-0005/) 41. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us) 42. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2706, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2706 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2706 - **State**: PUBLISHED - **Published Date**: March 20, 2024 at 16:31 UTC - **Last Updated**: August 21, 2024 at 22:59 UTC - **Reserved Date**: March 20, 2024 at 09:50 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in Tenda AC10U 15.03.06.49. This affects the function formWifiWpsStart of the file /goform/WifiWpsStart. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257457 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Tenda - AC10U** Affected versions: - 15.03.06.49 (Status: affected) ### References 1. [VDB-257457 | Tenda AC10U WifiWpsStart formWifiWpsStart stack-based overflow](https://vuldb.com/?id.257457) 2. [VDB-257457 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.257457) 3. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formWifiWpsStart.md) ### Credits - yhryhryhr_mie (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6229, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6229 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6229 - **State**: PUBLISHED - **Published Date**: December 02, 2006 at 02:00 UTC - **Last Updated**: August 07, 2024 at 20:19 UTC - **Reserved Date**: December 01, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Codewalkers ltwCalendar (aka PHP Event Calendar) before 4.2.1 logs failed passwords, which might allow attackers to infer correct passwords from the log file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://ltwcalendar.sourceforge.net/changelog.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3744, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3744 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3744 - **State**: PUBLISHED - **Published Date**: September 20, 2012 at 21:00 UTC - **Last Updated**: August 06, 2024 at 20:21 UTC - **Reserved Date**: June 19, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Telephony in Apple iOS before 6 uses an SMS message's return address as the displayed sender address, which allows remote attackers to spoof text communication via a message in which the return address does not match the originating address. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html) 2. [](http://support.apple.com/kb/HT5503) 3. [85622](http://osvdb.org/85622) 4. [apple-ios-telephony-cve20123744(78687)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78687)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2277, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2277 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2277 - **State**: REJECTED - **Published Date**: January 22, 2019 at 20:00 UTC - **Last Updated**: January 22, 2019 at 17:57 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3349, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3349 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3349 - **State**: PUBLISHED - **Published Date**: June 22, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 14:14 UTC - **Reserved Date**: June 22, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Aastra 9112i SIP Phone with firmware 1.4.0.1048 and boot version 1.1.0.10 allows remote attackers to (1) cause a denial of service (device freeze) via a malformed SIP message of a certain length or (2) cause a denial of service (continuous ring) via a malformed SIP message of a certain other length. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [25806](http://secunia.com/advisories/25806) 2. [](http://www.sipera.com/index.php?action=resources%2Cthreat_advisory&tid=277&) 3. [aastra-sip-message-dos(35060)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35060) 4. [37496](http://osvdb.org/37496) 5. [24537](http://www.securityfocus.com/bid/24537) 6. [ADV-2007-2318](http://www.vupen.com/english/advisories/2007/2318)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52757, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52757 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52757 - **State**: PUBLISHED - **Published Date**: May 21, 2024 at 15:30 UTC - **Last Updated**: May 04, 2025 at 07:42 UTC - **Reserved Date**: May 21, 2024 at 15:19 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential deadlock when releasing mids All release_mid() callers seem to hold a reference of @mid so there is no need to call kref_put(&mid->refcount, __release_mid) under @server->mid_lock spinlock. If they don't, then an use-after-free bug would have occurred anyways. By getting rid of such spinlock also fixes a potential deadlock as shown below CPU 0 CPU 1 ------------------------------------------------------------------ cifs_demultiplex_thread() cifs_debug_data_proc_show() release_mid() spin_lock(&server->mid_lock); spin_lock(&cifs_tcp_ses_lock) spin_lock(&server->mid_lock) __release_mid() smb2_find_smb_tcon() spin_lock(&cifs_tcp_ses_lock) *deadlock* ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 5.10.237 (Status: unaffected) - 5.15.181 (Status: unaffected) - 6.1.64 (Status: unaffected) - 6.5.13 (Status: unaffected) - 6.6.3 (Status: unaffected) - 6.7 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/99f476e27aad5964ab13777d84fda67d1356dec1) 2. [](https://git.kernel.org/stable/c/ce49569079a9d4cad26c0f1d4653382fd9a5ca7a) 3. [](https://git.kernel.org/stable/c/9eb44db68c5b7f5aa22b8fc7de74a3e2e08d1f29) 4. [](https://git.kernel.org/stable/c/b9bb9607b1fc12fca51f5632da25b36975f599bf) 5. [](https://git.kernel.org/stable/c/c1a5962f1462b64fe7b69f20a4b6af8067bc2d26) 6. [](https://git.kernel.org/stable/c/e6322fd177c6885a21dd4609dc5e5c973d1a2eb7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4619, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4619 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4619 - **State**: PUBLISHED - **Published Date**: August 09, 2013 at 21:00 UTC - **Last Updated**: September 17, 2024 at 02:26 UTC - **Reserved Date**: June 18, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in OpenEMR 4.1.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) start or (2) end parameter to interface/reports/custom_report_range.php, or the (3) form_newid parameter to custom/chart_tracker.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://sourceforge.net/p/openemr/code/ci/8a8a4607ba5ae2b9eb6b6a3b1b8ed7c6ea7e03b1/) 2. [54083](http://secunia.com/advisories/54083) 3. [](https://www.trustwave.com/spiderlabs/advisories/TWSL2013-018.txt) 4. [](http://sourceforge.net/p/openemr/discussion/202506/thread/4854b2b1/#9658)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21588, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21588 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21588 - **State**: PUBLISHED - **Published Date**: July 12, 2021 at 15:40 UTC - **Last Updated**: September 17, 2024 at 00:15 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell EMC PowerFlex, v3.5.x contain a Cross-Site WebSocket Hijacking Vulnerability in the Presentation Server/WebUI. An unauthenticated attacker could potentially exploit this vulnerability by tricking the user into performing unwanted actions on the Presentation Server and perform which may lead to configuration changes. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-345: Security Weakness ### Affected Products **Dell - PowerFlex** Affected versions: - 3.5.x (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/000189265)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4214, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4214 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4214 - **State**: PUBLISHED - **Published Date**: August 17, 2006 at 21:00 UTC - **Last Updated**: August 07, 2024 at 18:57 UTC - **Reserved Date**: August 17, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in Zen Cart 1.3.0.2 and earlier allow remote attackers to execute arbitrary SQL commands via (1) GPC data to the ipn_get_stored_session function in ipn_main_handler.php, which can be leveraged to modify elements of $_SESSION; and allow remote authenticated users to execute arbitrary SQL commands via (2) a session id within a cookie to whos_online_session_recreate, (3) the quantity field to the add_cart function, (4) an id[] parameter when adding an item to a shopping cart, or (5) a redemption code when checking out (dc_redeem_code parameter to includes/modules/order_total/ot_coupon.php). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [28144](http://www.osvdb.org/28144) 2. [ADV-2006-3283](http://www.vupen.com/english/advisories/2006/3283) 3. [zencart-multiple-scripts-sql-injection(28393)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28393) 4. [28145](http://www.osvdb.org/28145) 5. [19542](http://www.securityfocus.com/bid/19542) 6. [28148](http://www.osvdb.org/28148) 7. [28147](http://www.osvdb.org/28147) 8. [](http://www.gulftech.org/?node=research&article_id=00109-08152006) 9. [21484](http://secunia.com/advisories/21484) 10. [](http://www.zen-cart.com/forum/showthread.php?t=43579) 11. [28146](http://www.osvdb.org/28146)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1779, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1779 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1779 - **State**: PUBLISHED - **Published Date**: March 19, 2012 at 18:00 UTC - **Last Updated**: August 06, 2024 at 19:08 UTC - **Reserved Date**: March 19, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in IDevSpot idev-BusinessDirectory 3.0 allows remote attackers to inject arbitrary web script or HTML via the SEARCH parameter to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.org/files/110212/idev-BusinessDirectory-3.0-Cross-Site-Scripting.html) 2. [idevbusinessdirectory-index-xss(73505)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73505) 3. [79636](http://osvdb.org/79636) 4. [48173](http://secunia.com/advisories/48173) 5. [52171](http://www.securityfocus.com/bid/52171)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1374, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1374 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1374 - **State**: PUBLISHED - **Published Date**: March 10, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 12:50 UTC - **Reserved Date**: March 09, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in pop_profile.asp in Snitz Forums 2000 3.4.06 allows remote attackers to inject arbitrary web script or HTML via the MSN parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33885](http://osvdb.org/33885) 2. [snitzforums-popprofile-xss(32879)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32879) 3. [24358](http://secunia.com/advisories/24358) 4. [22869](http://www.securityfocus.com/bid/22869)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16650, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16650 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16650 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:46 UTC - **Last Updated**: December 20, 2021 at 22:46 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15847, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15847 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15847 - **State**: PUBLISHED - **Published Date**: August 25, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 10:01 UTC - **Reserved Date**: August 24, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in puppyCMS 5.1. There is an XSS vulnerability via menu.php in the "Add Page/URL" URL link field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/choregus/puppyCMS/issues/12)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36517, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36517 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36517 - **State**: PUBLISHED - **Published Date**: August 25, 2022 at 13:58 UTC - **Last Updated**: August 03, 2024 at 10:07 UTC - **Reserved Date**: July 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function debug_wlan_advance. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4081, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4081 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4081 - **State**: PUBLISHED - **Published Date**: September 20, 2013 at 18:00 UTC - **Last Updated**: August 06, 2024 at 20:28 UTC - **Reserved Date**: July 31, 2012 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description MCServer in the Cisco Management Controller in Cisco Unified Computing System (UCS) allows local users to cause a denial of service (application crash) via invalid MCTools parameters, aka Bug ID CSCtg20734. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1029065](http://www.securitytracker.com/id/1029065) 2. [20130918 Cisco Unified Computing System Cisco Management Controller Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4081)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24270, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24270 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24270 - **State**: PUBLISHED - **Published Date**: May 05, 2021 at 18:28 UTC - **Last Updated**: August 03, 2024 at 19:28 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The “DeTheme Kit for Elementor” WordPress Plugin before 1.5.5.5 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - DethemeKit For Elementor** Affected versions: - 1.5.5.5 (Status: affected) ### References 1. [](https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/) 2. [](https://wpscan.com/vulnerability/67967784-18b6-4e41-9597-3a4c051f3978) ### Credits - Ramuel Gall
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2538, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2538 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2538 - **State**: PUBLISHED - **Published Date**: January 15, 2020 at 16:33 UTC - **Last Updated**: September 30, 2024 at 17:27 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle WebCenter Sites product of Oracle Fusion Middleware (component: Advanced UI). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data as well as unauthorized read access to a subset of Oracle WebCenter Sites accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebCenter Sites. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L). ### Affected Products **Oracle Corporation - WebCenter Sites** Affected versions: - 12.2.1.3.0 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2444, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2444 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2444 - **State**: PUBLISHED - **Published Date**: July 13, 2009 at 14:00 UTC - **Last Updated**: August 07, 2024 at 05:52 UTC - **Reserved Date**: July 13, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in maillinglist/setup/step1.php.inc in ADbNewsSender before 1.5.6, and 2.0 before RC2, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the path_to_lang parameter to setup/index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://r00tsecurity.org/forums/index.php?showtopic=9460) 2. [ADV-2009-1808](http://www.vupen.com/english/advisories/2009/1808) 3. [](http://sourceforge.net/project/shownotes.php?release_id=694644) 4. [](http://sourceforge.net/apps/mantisbt/adbnewssender/view.php?id=22) 5. [35596](http://www.securityfocus.com/bid/35596) 6. [adbnewssender-step1-file-include(51720)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51720) 7. [35845](http://secunia.com/advisories/35845)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4949, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4949 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4949 - **State**: PUBLISHED - **Published Date**: May 21, 2025 at 06:47 UTC - **Last Updated**: May 23, 2025 at 07:00 UTC - **Reserved Date**: May 19, 2025 at 07:02 UTC - **Assigned By**: eclipse ### Vulnerability Description In Eclipse JGit versions 7.2.0.202503040940-r and older, the ManifestParser class used by the repo command and the AmazonS3 class used to implement the experimental amazons3 git transport protocol allowing to store git pack files in an Amazon S3 bucket, are vulnerable to XML External Entity (XXE) attacks when parsing XML files. This vulnerability can lead to information disclosure, denial of service, and other security issues. ### Weakness Classification (CWE) - CWE-611: Security Weakness - CWE-827: Security Weakness ### Affected Products **Eclipse JGit - Eclipse JGit** Affected versions: - 7.2.0 (Status: affected) - 7.1.0 (Status: affected) - 7.0.0 (Status: affected) - 0 (Status: affected) **Eclipse JGit - Eclipse JGit** Affected versions: - 7.2.0 (Status: affected) - 7.1.0 (Status: affected) - 7.0.0 (Status: affected) - 0 (Status: affected) ### References 1. [](https://projects.eclipse.org/projects/technology.jgit/releases/7.2.1) 2. [](https://projects.eclipse.org/projects/technology.jgit/releases/7.1.1) 3. [](https://projects.eclipse.org/projects/technology.jgit/releases/7.0.1) 4. [](https://projects.eclipse.org/projects/technology.jgit/releases/6.10.1) 5. [](https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281) 6. [](https://gitlab.eclipse.org/security/cve-assignement/-/issues/64) ### Credits - Simon Gerst (intrigus-lgtm) https://intrigus.org
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34581, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34581 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34581 - **State**: PUBLISHED - **Published Date**: June 12, 2023 at 00:00 UTC - **Last Updated**: January 03, 2025 at 23:30 UTC - **Reserved Date**: June 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Sourcecodester Service Provider Management System v1.0 is vulnerable to SQL Injection via the ID parameter in /php-spms/?page=services/view&id=2 ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ashikkunjumon/cve-reports/blob/main/README.md) 2. [](https://www.exploit-db.com/exploits/51482) 3. [](https://vulners.com/packetstorm/PACKETSTORM:172559) 4. [](https://packetstormsecurity.com/files/172559/Service-Provider-Management-System-1.0-SQL-Injection.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1829, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1829 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1829 - **State**: PUBLISHED - **Published Date**: February 23, 2024 at 18:00 UTC - **Last Updated**: August 01, 2024 at 18:56 UTC - **Reserved Date**: February 23, 2024 at 10:33 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in code-projects Library System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file Source/librarian/user/student/registration.php. The manipulation of the argument email/regno/phone/username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-254617 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **code-projects - Library System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-254617 | code-projects Library System registration.php sql injection](https://vuldb.com/?id.254617) 2. [VDB-254617 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.254617) 3. [](https://github.com/jxp98/VulResearch/blob/main/2024/02/3.4Library%20System%20In%20PHP%20-%20SQL%20Injection-student_reg.md) ### Credits - jxp. (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50809, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50809 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50809 - **State**: PUBLISHED - **Published Date**: November 08, 2024 at 00:00 UTC - **Last Updated**: November 18, 2024 at 14:08 UTC - **Reserved Date**: October 28, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The theme.php file in SDCMS 2.8 has a command execution vulnerability that allows for the execution of system commands ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/v9d0g/CVEs/blob/main/CVE-2024-50809.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-31279, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-31279 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-31279 - **State**: PUBLISHED - **Published Date**: December 20, 2024 at 23:35 UTC - **Last Updated**: December 24, 2024 at 00:40 UTC - **Reserved Date**: April 26, 2023 at 19:52 UTC - **Assigned By**: SWI ### Vulnerability Description The AirVantage platform is vulnerable to an unauthorized attacker registering previously unregistered devices on the AirVantage platform when the owner has not disabled the AirVantage Management Service on the devices or registered the device. This could enable an attacker to configure, manage, and execute AT commands on an unsuspecting user’s devices. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **Sierra Wireless - AirVantage, AirVantage-Capable Devices: All Sierra Wireless devices.** Affected versions: - Devices not registered in AirVantage with the AirVantage Management Service enabled. (Status: affected) ### References 1. [](https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-002/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000120, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000120 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000120 - **State**: PUBLISHED - **Published Date**: October 04, 2017 at 01:00 UTC - **Last Updated**: September 17, 2024 at 01:40 UTC - **Reserved Date**: October 03, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description [ERPNext][Frappe Version <= 7.1.27] SQL injection vulnerability in frappe.share.get_users allows remote authenticated users to execute arbitrary SQL commands via the fields parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://tech.mantz-it.com/2016/12/sql-injection-in-frappe-framework.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9122, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9122 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9122 - **State**: PUBLISHED - **Published Date**: April 18, 2018 at 14:00 UTC - **Last Updated**: September 16, 2024 at 19:14 UTC - **Reserved Date**: August 16, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, and SD 835, possible buffer overflow if SIM card sends a response greater than 64KB of data for stream APDU command. ### Affected Products **Qualcomm, Inc. - Snapdragon Mobile, Snapdragon Wear** Affected versions: - MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-04-01) 2. [103671](http://www.securityfocus.com/bid/103671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52834, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52834 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52834 - **State**: PUBLISHED - **Published Date**: December 10, 2024 at 22:04 UTC - **Last Updated**: December 11, 2024 at 14:46 UTC - **Reserved Date**: November 15, 2024 at 18:03 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33244, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33244 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33244 - **State**: PUBLISHED - **Published Date**: May 20, 2023 at 00:00 UTC - **Last Updated**: January 31, 2025 at 17:28 UTC - **Reserved Date**: May 20, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Obsidian before 1.2.2 allows calls to unintended APIs (for microphone access, camera access, and desktop notification) via an embedded web page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://vuln.ryotak.net/advisories/66) 2. [](https://forum.obsidian.md/t/obsidian-release-v1-2-2-insider-build/57488)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-21523, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-21523 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-21523 - **State**: PUBLISHED - **Published Date**: September 30, 2020 at 14:29 UTC - **Last Updated**: August 04, 2024 at 14:30 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Server-Side Freemarker template injection vulnerability in halo CMS v1.1.3 In the Edit Theme File function. The ftl file can be edited. This is the Freemarker template file. This file can cause arbitrary code execution when it is rendered in the background. exp: <#assign test="freemarker.template.utility.Execute"?new()> ${test("touch /tmp/freemarkerPwned")} ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/halo-dev/halo/issues/419)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16768 - **State**: PUBLISHED - **Published Date**: September 10, 2018 at 04:00 UTC - **Last Updated**: August 05, 2024 at 10:32 UTC - **Reserved Date**: September 09, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In WAVM through 2018-07-26, a crafted file sent to the WebAssembly Virtual Machine may cause a denial of service (application crash) or possibly have unspecified other impact because of an unspecified "heap-buffer-overflow" condition in IR::FunctionValidationContext::end. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/AndrewScheidecker/WAVM/issues/98)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4427, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4427 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4427 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0505, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0505 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0505 - **State**: PUBLISHED - **Published Date**: March 12, 2020 at 17:43 UTC - **Last Updated**: August 04, 2024 at 06:02 UTC - **Reserved Date**: October 28, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper conditions check in Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable information disclosure and denial of service via local ### Affected Products **Intel - Intel(R) Graphics Drivers** Affected versions: - before versions 15.33.49.5100 (Status: affected) - 15.36.38.5117 (Status: affected) - 15.40.44.5107 (Status: affected) - 15.45.30.5103 (Status: affected) - 26.20.100.7212 (Status: affected) - See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html) 2. [](https://security.netapp.com/advisory/ntap-20200320-0003/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5519, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5519 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5519 - **State**: PUBLISHED - **Published Date**: April 09, 2009 at 15:00 UTC - **Last Updated**: August 07, 2024 at 10:56 UTC - **Reserved Date**: December 12, 2008 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2009-0973](http://www.vupen.com/english/advisories/2009/0973) 2. [](http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html) 3. [34621](http://secunia.com/advisories/34621) 4. [SUSE-SR:2009:018](http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html) 5. [1022001](http://securitytracker.com/id?1022001) 6. [34412](http://www.securityfocus.com/bid/34412) 7. [[oss-security] 20090408 CVE-2008-5519: mod_jk session information leak vulnerability](http://www.openwall.com/lists/oss-security/2009/04/08/10) 8. [](http://svn.eu.apache.org/viewvc/tomcat/connectors/trunk/jk/native/common/jk_ajp_common.c?r1=702387&r2=702540&pathrev=702540&diff_format=h) 9. [RHSA-2009:0446](http://www.redhat.com/support/errata/RHSA-2009-0446.html) 10. [[www-announce] 20090407 [SECURITY] CVE-2008-5519: Apache Tomcat mod_jk information disclosure vulnerability](http://mail-archives.apache.org/mod_mbox/www-announce/200904.mbox/%3C49DBBAC0.2080400%40apache.org%3E) 11. [](http://svn.eu.apache.org/viewvc?view=rev&revision=702540) 12. [[tomcat-dev] 20090407 [SECURITY] CVE-2008-5519: Apache Tomcat mod_jk information disclosure vulnerability](http://marc.info/?l=tomcat-dev&m=123913700700879) 13. [20090407 [SECURITY] CVE-2008-5519: Apache Tomcat mod_jk information disclosure vulnerability](http://www.securityfocus.com/archive/1/502530/100/0/threaded) 14. [](https://bugzilla.redhat.com/show_bug.cgi?id=490201) 15. [29283](http://secunia.com/advisories/29283) 16. [](http://tomcat.apache.org/security-jk.html) 17. [35537](http://secunia.com/advisories/35537) 18. [DSA-1810](http://www.debian.org/security/2009/dsa-1810) 19. [262468](http://sunsolve.sun.com/search/document.do?assetkey=1-26-262468-1) 20. [](http://svn.eu.apache.org/viewvc/tomcat/connectors/trunk/jk/xdocs/miscellaneous/changelog.xml?view=markup&pathrev=702540) 21. [[tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E) 22. [[tomcat-dev] 20190325 svn commit: r1856174 [25/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E) 23. [[tomcat-dev] 20190413 svn commit: r1857494 [18/20] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E) 24. [[tomcat-dev] 20190415 svn commit: r1857582 [20/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E) 25. [[tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E) 26. [[tomcat-dev] 20200213 svn commit: r1873980 [30/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13090, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13090 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13090 - **State**: PUBLISHED - **Published Date**: July 02, 2018 at 23:00 UTC - **Last Updated**: September 16, 2024 at 19:41 UTC - **Reserved Date**: July 02, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The mintToken function of a smart contract implementation for YiTongCoin (YTC), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/VenusADLab/EtherTokens/blob/master/YiTongCoin/YiTongCoin.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1547, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1547 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1547 - **State**: PUBLISHED - **Published Date**: January 06, 2017 at 21:00 UTC - **Last Updated**: August 05, 2024 at 23:02 UTC - **Reserved Date**: January 07, 2016 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled. ### Affected Products **NTP Project - NTP** Affected versions: - 4.2.8p3 (Status: affected) - 4.2.8p4 (Status: affected) **NTPsec Project - NTPSec** Affected versions: - a5fb34b9cc89b92a8fef2f459004865c93bb7f92 (Status: affected) ### References 1. [88276](http://www.securityfocus.com/bid/88276) 2. [DSA-3629](http://www.debian.org/security/2016/dsa-3629) 3. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html) 4. [RHSA-2016:1141](https://access.redhat.com/errata/RHSA-2016:1141) 5. [RHSA-2016:1552](http://rhn.redhat.com/errata/RHSA-2016-1552.html) 6. [1035705](http://www.securitytracker.com/id/1035705) 7. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html) 8. [](https://security.netapp.com/advisory/ntap-20171004-0002/) 9. [](http://www.talosintelligence.com/reports/TALOS-2016-0081/) 10. [FreeBSD-SA-16:16](https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc) 11. [GLSA-201607-15](https://security.gentoo.org/glsa/201607-15) 12. [](https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf) 13. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11) 14. [](https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf) 15. [](https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0479, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0479 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0479 - **State**: PUBLISHED - **Published Date**: February 09, 2009 at 01:00 UTC - **Last Updated**: September 17, 2024 at 02:57 UTC - **Reserved Date**: February 08, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in admin/admin_login.php in Online Grades 3.2.4 allow remote attackers to execute arbitrary SQL commands via the (1) uname or (2) pword parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [51711](http://osvdb.org/51711) 2. [33767](http://secunia.com/advisories/33767)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45763, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45763 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45763 - **State**: PUBLISHED - **Published Date**: January 14, 2022 at 00:00 UTC - **Last Updated**: August 04, 2024 at 04:47 UTC - **Reserved Date**: December 27, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GPAC v1.1.0 was discovered to contain an invalid call in the function gf_node_changed(). This vulnerability can lead to a Denial of Service (DoS). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gpac/gpac/issues/1974) 2. [DSA-5411](https://www.debian.org/security/2023/dsa-5411)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30208, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30208 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30208 - **State**: PUBLISHED - **Published Date**: May 14, 2024 at 10:02 UTC - **Last Updated**: August 02, 2024 at 01:25 UTC - **Reserved Date**: March 25, 2024 at 14:21 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in SIMATIC RTLS Locating Manager (6GT2780-0DA00) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA30) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA30) (All versions < V3.0.1.1). The "DBTest" tool of SIMATIC RTLS Locating Manager does not properly enforce access restriction. This could allow an authenticated local attacker to extract sensitive information from memory. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-732: Security Weakness ### Affected Products **Siemens - SIMATIC RTLS Locating Manager** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RTLS Locating Manager** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RTLS Locating Manager** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RTLS Locating Manager** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RTLS Locating Manager** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RTLS Locating Manager** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC RTLS Locating Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/html/ssa-093430.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2856, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2856 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2856 - **State**: PUBLISHED - **Published Date**: August 06, 2012 at 15:00 UTC - **Last Updated**: August 06, 2024 at 19:50 UTC - **Reserved Date**: May 19, 2012 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description The PDF functionality in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger out-of-bounds write operations. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:15053](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15053) 2. [](http://code.google.com/p/chromium/issues/detail?id=135264) 3. [](http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html) 4. [](http://code.google.com/p/chromium/issues/detail?id=134954)