System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45306, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45306 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45306 - **State**: PUBLISHED - **Published Date**: November 29, 2022 at 00:00 UTC - **Last Updated**: April 25, 2025 at 14:45 UTC - **Reserved Date**: November 14, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Insecure permissions in Chocolatey Azure-Pipelines-Agent package v2.211.1 and below grants all users in the Authenticated Users group write privileges for the subfolder C:\agent and all files located in that folder. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ycdxsb/Vuln/blob/main/azure-pipelines-agent-weak-permission-vuln/azure-pipelines-agent-weak-permission-vuln.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9829, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9829 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9829 - **State**: PUBLISHED - **Published Date**: June 23, 2017 at 22:00 UTC - **Last Updated**: September 17, 2024 at 01:26 UTC - **Reserved Date**: June 23, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description '/cgi-bin/admin/downloadMedias.cgi' of the web service in most of the VIVOTEK Network Cameras is vulnerable, which allows remote attackers to read any file on the camera's Linux filesystem via a crafted HTTP request containing ".." sequences. This vulnerability is already verified on VIVOTEK Network Camera IB8369/FD8164/FD816BA; most others have similar firmware that may be affected. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.cal1.cn/post/An%20easy%20way%20to%20pwn%20most%20of%20the%20vivotek%20network%20cameras)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21146, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21146 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21146 - **State**: PUBLISHED - **Published Date**: June 28, 2023 at 00:00 UTC - **Last Updated**: December 04, 2024 at 21:15 UTC - **Reserved Date**: November 03, 2022 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239867994References: N/A ### Affected Products **n/a - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2023-06-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-9036, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-9036 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-9036 - **State**: PUBLISHED - **Published Date**: February 23, 2019 at 12:00 UTC - **Last Updated**: August 04, 2024 at 21:38 UTC - **Reserved Date**: February 23, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is a heap-based buffer overflow in the function ReadNextFunctionHandle() in mat5.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/tbeu/matio/issues/103) 2. [](https://github.com/TeamSeri0us/pocs/tree/master/matio)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25907, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25907 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25907 - **State**: PUBLISHED - **Published Date**: August 09, 2022 at 05:00 UTC - **Last Updated**: September 16, 2024 at 20:32 UTC - **Reserved Date**: February 24, 2022 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description The package ts-deepmerge before 2.0.2 are vulnerable to Prototype Pollution due to missing sanitization of the merge function. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **n/a - ts-deepmerge** Affected versions: - unspecified (Status: affected) ### References 1. [](https://security.snyk.io/vuln/SNYK-JS-TSDEEPMERGE-2959975) 2. [](https://github.com/voodoocreation/ts-deepmerge/releases/tag/2.0.2) 3. [](https://github.com/voodoocreation/ts-deepmerge/commit/9be5148773343c57be9de39728d6ead18eddf10b) ### Credits - Aras Abbasi
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-20137, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-20137 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-20137 - **State**: PUBLISHED - **Published Date**: December 02, 2024 at 03:07 UTC - **Last Updated**: December 02, 2024 at 15:48 UTC - **Reserved Date**: November 02, 2023 at 13:35 UTC - **Assigned By**: MediaTek ### Vulnerability Description In wlan driver, there is a possible client disconnection due to improper handling of exceptional conditions. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00384543; Issue ID: MSV-1727. ### Weakness Classification (CWE) - CWE-248: Security Weakness ### Affected Products **MediaTek, Inc. - MT6890, MT7622, MT7915, MT7916, MT7981, MT7986** Affected versions: - SDK release 7.4.0.1 (MT7915) and 7.6.7.2 (MT7916, MT798X) and before (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/December-2024)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32998, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32998 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32998 - **State**: PUBLISHED - **Published Date**: January 07, 2022 at 22:39 UTC - **Last Updated**: April 17, 2025 at 18:48 UTC - **Reserved Date**: May 13, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description The FANUC R-30iA and R-30iB series controllers are vulnerable to an out-of-bounds write, which may allow an attacker to remotely execute arbitrary code. INIT START/restore from backup required. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **FANUC - R-30iA, R-30iA Mate** Affected versions: - v7 (Status: affected) **FANUC - R-30iB, R-30iB Mate, R-30iB Compact** Affected versions: - v8 (Status: affected) **FANUC - R-30iB Plus, R-30iB Mate Plus, R-30iB Compact Plus, R-30iB Mini Plus** Affected versions: - V9 (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-243-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2550, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2550 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2550 - **State**: PUBLISHED - **Published Date**: August 12, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:30 UTC - **Reserved Date**: August 12, 2005 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Format string vulnerability in Evolution 1.4 through 2.3.6.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the calendar entries such as task lists, which are not properly handled when the user selects the Calendars tab. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SA:2005:054](http://www.novell.com/linux/security/advisories/2005_54_evolution.html) 2. [14532](http://www.securityfocus.com/bid/14532) 3. [RHSA-2005:267](http://www.redhat.com/support/errata/RHSA-2005-267.html) 4. [19380](http://secunia.com/advisories/19380) 5. [DSA-1016](http://www.debian.org/security/2006/dsa-1016) 6. [FEDORA-2005-743](http://www.redhat.com/archives/fedora-announce-list/2005-August/msg00031.html) 7. [MDKSA-2005:141](http://www.mandriva.com/security/advisories?name=MDKSA-2005:141) 8. [16394](http://secunia.com/advisories/16394) 9. [oval:org.mitre.oval:def:10880](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10880) 10. [](http://www.sitic.se/eng/advisories_and_recommendations/sa05-001.html) 11. [20050810 Evolution multiple remote format string bugs](http://www.securityfocus.com/archive/1/407789) 12. [20050810 Evolution multiple remote format string bugs](http://marc.info/?l=full-disclosure&m=112368237712032&w=2) 13. [USN-166-1](https://usn.ubuntu.com/166-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14944, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14944 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14944 - **State**: PUBLISHED - **Published Date**: September 29, 2017 at 19:00 UTC - **Last Updated**: September 16, 2024 at 18:18 UTC - **Reserved Date**: September 29, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Inedo ProGet before 4.7.14 does not properly address dangerous package IDs during package addition, aka PG-1060. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://inedo.com/blog/proget-4714-released)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30870, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30870 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30870 - **State**: PUBLISHED - **Published Date**: April 01, 2025 at 05:31 UTC - **Last Updated**: April 01, 2025 at 15:57 UTC - **Reserved Date**: March 26, 2025 at 09:21 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP Travel Engine WP Travel Engine allows PHP Local File Inclusion. This issue affects WP Travel Engine: from n/a through 6.3.5. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-98: Security Weakness ### Affected Products **WP Travel Engine - WP Travel Engine** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wp-travel-engine/vulnerability/wordpress-wp-travel-engine-plugin-6-3-5-local-file-inclusion-vulnerability-2?_s_id=cve) ### Credits - LVT-tholv2k (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2623, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2623 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2623 - **State**: PUBLISHED - **Published Date**: July 27, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 14:02 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description It was discovered that rpm-ostree and rpm-ostree-client before 2017.3 fail to properly check GPG signatures on packages when doing layering. Packages with unsigned or badly signed content could fail to be rejected as expected. This issue is partially mitigated on RHEL Atomic Host, where certificate pinning is used by default. ### Weakness Classification (CWE) - CWE-295: Security Weakness ### Affected Products **Project Atomic - rpm-ostree,** Affected versions: - 2017.3 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2623) 2. [RHSA-2017:0444](https://access.redhat.com/errata/RHSA-2017:0444) 3. [96558](http://www.securityfocus.com/bid/96558)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6701, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6701 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6701 - **State**: REJECTED - **Published Date**: January 12, 2021 at 20:02 UTC - **Last Updated**: January 12, 2021 at 20:02 UTC - **Reserved Date**: January 09, 2020 at 00:00 UTC - **Assigned By**: Eaton ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7743, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7743 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7743 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3661, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3661 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3661 - **State**: PUBLISHED - **Published Date**: November 21, 2022 at 21:19 UTC - **Last Updated**: April 29, 2025 at 04:44 UTC - **Reserved Date**: July 23, 2021 at 00:21 UTC - **Assigned By**: hp ### Vulnerability Description A potential security vulnerability has been identified in certain HP Workstation BIOS (UEFI firmware) which may allow arbitrary code execution. HP is releasing firmware mitigations for the potential vulnerability. ### Affected Products **HP Inc. - HP Workstation BIOS** Affected versions: - See HP Security Bulletin reference for affected versions. (Status: affected) ### References 1. [](https://support.hp.com/us-en/document/ish_5670997-5671021-16/hpsbhf03770)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-35040, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-35040 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-35040 - **State**: PUBLISHED - **Published Date**: June 13, 2024 at 23:51 UTC - **Last Updated**: August 02, 2024 at 16:17 UTC - **Reserved Date**: June 12, 2023 at 09:05 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in SendPress SendPress Newsletters.This issue affects SendPress Newsletters: from n/a through 1.23.11.6. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **SendPress - SendPress Newsletters** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/sendpress/wordpress-sendpress-newsletters-plugin-1-22-3-31-broken-access-control-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0899, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0899 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0899 - **State**: PUBLISHED - **Published Date**: March 14, 2018 at 17:00 UTC - **Last Updated**: September 17, 2024 at 04:19 UTC - **Reserved Date**: December 01, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0900, CVE-2018-0901 and CVE-2018-0926. ### Affected Products **Microsoft Corporation - Windows kernel** Affected versions: - Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0899) 2. [1040517](http://www.securitytracker.com/id/1040517) 3. [103243](http://www.securityfocus.com/bid/103243)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3185, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3185 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3185 - **State**: PUBLISHED - **Published Date**: September 15, 2009 at 21:00 UTC - **Last Updated**: August 07, 2024 at 06:14 UTC - **Reserved Date**: September 15, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in plugin.php in the Crazy Star plugin 2.0 for Discuz! allows remote authenticated users to execute arbitrary SQL commands via the fmid parameter in a view action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2009-2432](http://www.vupen.com/english/advisories/2009/2432) 2. [9529](http://www.exploit-db.com/exploits/9529)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27727, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27727 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27727 - **State**: PUBLISHED - **Published Date**: December 24, 2020 at 15:03 UTC - **Last Updated**: August 04, 2024 at 16:18 UTC - **Reserved Date**: October 26, 2020 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description On BIG-IP version 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.3, and 13.1.0-13.1.3.4, when an authenticated administrative user installs RPMs using the iAppsLX REST installer, the BIG-IP system does not sufficiently validate user input, allowing the user read access to the filesystem. ### Affected Products **n/a - BIG-IP** Affected versions: - 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.3, 13.1.0-13.1.3.4 (Status: affected) ### References 1. [](https://support.f5.com/csp/article/K50343630)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48570, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48570 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48570 - **State**: PUBLISHED - **Published Date**: December 15, 2023 at 10:17 UTC - **Last Updated**: May 21, 2025 at 14:16 UTC - **Reserved Date**: November 16, 2023 at 23:29 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0086, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0086 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0086 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: December 04, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31801, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31801 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31801 - **State**: PUBLISHED - **Published Date**: June 21, 2022 at 08:00 UTC - **Last Updated**: September 16, 2024 at 18:50 UTC - **Reserved Date**: May 30, 2022 at 00:00 UTC - **Assigned By**: CERTVDE ### Vulnerability Description An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-345: Security Weakness ### Affected Products **PHOENIX CONTACT - MULTIPROG** Affected versions: - All Versions (Status: affected) **PHOENIX CONTACT - ProConOS** Affected versions: - All Versions (Status: affected) **PHOENIX CONTACT - ProConOS eCLR** Affected versions: - All Versions (Status: affected) ### References 1. [](https://cert.vde.com/en/advisories/VDE-2022-026/) ### Credits - This vulnerability was reported by Forescout.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39792, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39792 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39792 - **State**: PUBLISHED - **Published Date**: March 16, 2022 at 14:04 UTC - **Last Updated**: August 04, 2024 at 02:20 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In usb_gadget_giveback_request of core.c, there is a possible use after free out of bounds read due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-161010552References: Upstream kernel ### Affected Products **n/a - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2022-03-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-12551, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-12551 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-12551 - **State**: PUBLISHED - **Published Date**: March 27, 2019 at 17:26 UTC - **Last Updated**: August 05, 2024 at 08:38 UTC - **Reserved Date**: June 18, 2018 at 00:00 UTC - **Assigned By**: eclipse ### Vulnerability Description When Eclipse Mosquitto version 1.0 to 1.5.5 (inclusive) is configured to use a password file for authentication, any malformed data in the password file will be treated as valid. This typically means that the malformed data becomes a username and no password. If this occurs, clients can circumvent authentication and get access to the broker by using the malformed username. In particular, a blank line will be treated as a valid empty username. Other security measures are unaffected. Users who have only used the mosquitto_passwd utility to create and modify their password files are unaffected by this vulnerability. ### Weakness Classification (CWE) - CWE-703: Security Weakness ### Affected Products **The Eclipse Foundation - Eclipse Mosquitto** Affected versions: - 1.0 (Status: affected) - unspecified (Status: affected) ### References 1. [](https://bugs.eclipse.org/bugs/show_bug.cgi?id=543401) 2. [[debian-lts-announce] 20191026 [SECURITY] [DLA 1972-1] mosquitto security update](https://lists.debian.org/debian-lts-announce/2019/10/msg00035.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49501, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49501 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49501 - **State**: PUBLISHED - **Published Date**: November 01, 2024 at 04:07 UTC - **Last Updated**: November 01, 2024 at 15:06 UTC - **Reserved Date**: October 15, 2024 at 11:32 UTC - **Assigned By**: jpcert ### Vulnerability Description Sysmac Studio provided by OMRON Corporation contains an incorrect authorization vulnerability. If this vulnerability is exploited, an attacker may access the program which is protected by Data Protection function. ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **OMRON Corporation - SYSMAC-SE2[][][]** Affected versions: - all versions (Status: affected) ### References 1. [](https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2024-006_en.pdf) 2. [](https://www.fa.omron.co.jp/product/security/assets/pdf/ja/OMSR-2024-006_ja.pdf) 3. [](https://jvn.jp/en/vu/JVNVU95685374)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0213, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0213 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0213 - **State**: PUBLISHED - **Published Date**: April 02, 2003 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:42 UTC - **Reserved Date**: May 01, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description xkas in Xinet K-AShare 0.011.01 for IRIX allows local users to read arbitrary files via a symlink attack on the VOLICON file, which is copied to the .HSicon file in a shared directory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [kashare-xkas-icon-symlink(8002)](http://www.iss.net/security_center/static/8002.php) 2. [20020604-01-I](ftp://patches.sgi.com/support/free/security/advisories/20020604-01-I) 3. [20020128 [ Hackerslab bug_paper ] Xkas application vulnerability](http://marc.info/?l=bugtraq&m=101223525118717&w=2) 4. [3969](http://www.securityfocus.com/bid/3969)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1720, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1720 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1720 - **State**: PUBLISHED - **Published Date**: April 10, 2008 at 19:00 UTC - **Last Updated**: August 07, 2024 at 08:32 UTC - **Reserved Date**: April 10, 2008 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Buffer overflow in rsync 2.6.9 to 3.0.1, with extended attribute (xattr) support enabled, might allow remote attackers to execute arbitrary code via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [29856](http://secunia.com/advisories/29856) 2. [29788](http://secunia.com/advisories/29788) 3. [SUSE-SR:2008:011](http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html) 4. [GLSA-200804-16](http://security.gentoo.org/glsa/glsa-200804-16.xml) 5. [[rsync-announce] 20080408 Rsync 3.0.2 released w/xattr security fix (attn: 2.6.9 onward)](http://www.mail-archive.com/rsync-announce%40lists.samba.org/msg00057.html) 6. [USN-600-1](https://usn.ubuntu.com/600-1/) 7. [29781](http://secunia.com/advisories/29781) 8. [](http://sourceforge.net/project/shownotes.php?release_id=591462&group_id=69227) 9. [ADV-2008-1215](http://www.vupen.com/english/advisories/2008/1215/references) 10. [29770](http://secunia.com/advisories/29770) 11. [FEDORA-2008-3047](https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00237.html) 12. [](http://rsync.samba.org/ftp/rsync/security/rsync-3.0.1-xattr-alloc.diff) 13. [](http://samba.anu.edu.au/rsync/security.html#s3_0_2) 14. [MDVSA-2008:084](http://www.mandriva.com/security/advisories?name=MDVSA-2008:084) 15. [ADV-2008-1191](http://www.vupen.com/english/advisories/2008/1191/references) 16. [28726](http://www.securityfocus.com/bid/28726) 17. [1019835](http://www.securitytracker.com/id?1019835) 18. [29861](http://secunia.com/advisories/29861) 19. [29668](http://secunia.com/advisories/29668) 20. [DSA-1545](http://www.debian.org/security/2008/dsa-1545) 21. [HPSBMA02447](http://marc.info/?l=bugtraq&m=125017764422557&w=2) 22. [FEDORA-2008-3060](https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00247.html) 23. [29777](http://secunia.com/advisories/29777) 24. [rsync-xattr-bo(41766)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41766) 25. [SSRT090062](http://marc.info/?l=bugtraq&m=125017764422557&w=2) 26. [44369](http://www.osvdb.org/44369) 27. [44368](http://www.osvdb.org/44368)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4640, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4640 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4640 - **State**: PUBLISHED - **Published Date**: February 10, 2010 at 02:00 UTC - **Last Updated**: August 07, 2024 at 07:08 UTC - **Reserved Date**: February 09, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Array index error in vorbis_dec.c in FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Vorbis file that triggers an out-of-bounds read. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MDVSA-2011:088](http://www.mandriva.com/security/advisories?name=MDVSA-2011:088) 2. [36805](http://secunia.com/advisories/36805) 3. [36465](http://www.securityfocus.com/bid/36465) 4. [39482](http://secunia.com/advisories/39482) 5. [](https://roundup.ffmpeg.org/roundup/ffmpeg/issue1240) 6. [MDVSA-2011:061](http://www.mandriva.com/security/advisories?name=MDVSA-2011:061) 7. [MDVSA-2011:112](http://www.mandriva.com/security/advisories?name=MDVSA-2011:112) 8. [MDVSA-2011:114](http://www.mandriva.com/security/advisories?name=MDVSA-2011:114) 9. [](http://scarybeastsecurity.blogspot.com/2009/09/patching-ffmpeg-into-shape.html) 10. [38643](http://secunia.com/advisories/38643) 11. [ADV-2011-1241](http://www.vupen.com/english/advisories/2011/1241) 12. [MDVSA-2011:060](http://www.mandriva.com/security/advisories?name=MDVSA-2011:060) 13. [DSA-2000](http://www.debian.org/security/2010/dsa-2000) 14. [USN-931-1](http://www.ubuntu.com/usn/USN-931-1) 15. [ADV-2010-0935](http://www.vupen.com/english/advisories/2010/0935)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-34031, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-34031 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-34031 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 00:18 UTC - **Last Updated**: August 12, 2024 at 20:09 UTC - **Reserved Date**: April 29, 2024 at 17:56 UTC - **Assigned By**: icscert ### Vulnerability Description Delta Electronics DIAEnergie is vulnerable to an SQL injection vulnerability that exists in the script Handler_CFG.ashx. An authenticated attacker can exploit this issue to potentially compromise the system on which DIAEnergie is deployed. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Delta Electronics - DIAEnergie ** Affected versions: - 1.10.00.005 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-02) ### Credits - Michael Heinzl reported these vulnerabilities to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32785, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32785 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32785 - **State**: REJECTED - **Last Updated**: December 26, 2023 at 17:39 UTC - **Reserved Date**: May 15, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20171, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20171 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20171 - **State**: PUBLISHED - **Published Date**: December 30, 2019 at 23:53 UTC - **Last Updated**: March 04, 2025 at 21:23 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in GPAC version 0.5.2 and 0.9.0-development-20191109. There are memory leaks in metx_New in isomedia/box_code_base.c and abst_Read in isomedia/box_code_adobe.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gpac/gpac/issues/1337) 2. [[debian-lts-announce] 20200120 [SECURITY] [DLA 2072-1] gpac security update](https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html) 3. [](https://github.com/gpac/gpac/blob/v0.5.2/src/isomedia/box_code_adobe.c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30713, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30713 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30713 - **State**: PUBLISHED - **Published Date**: June 07, 2022 at 17:54 UTC - **Last Updated**: August 03, 2024 at 06:56 UTC - **Reserved Date**: May 16, 2022 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Improper validation vulnerability in LSOItemData prior to SMR Jun-2022 Release 1 allows attackers to launch certain activities. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - Q(10), R(11), S(12) (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2285, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2285 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2285 - **State**: PUBLISHED - **Published Date**: August 29, 2012 at 22:00 UTC - **Last Updated**: August 06, 2024 at 19:26 UTC - **Reserved Date**: April 19, 2012 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description EMC Cloud Tiering Appliance (aka CTA, formerly FMA) 9.0 and earlier, and Cloud Tiering Appliance Virtual Edition (CTA/VE) 9.0 and earlier, allows remote attackers to obtain GUI administrative access by sending a crafted file during the authentication phase. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [emc-cloud-gui-sec-bypass(78110)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78110) 2. [1027448](http://www.securitytracker.com/id?1027448) 3. [20120828 ESA-2012-034: EMC Cloud Tiering Appliance (CTA) Authentication Bypass Vulnerability](http://archives.neohapsis.com/archives/bugtraq/2012-08/0184.html) 4. [85050](http://osvdb.org/85050) 5. [50393](http://secunia.com/advisories/50393)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2688, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2688 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2688 - **State**: PUBLISHED - **Published Date**: May 16, 2007 at 01:00 UTC - **Last Updated**: August 07, 2024 at 13:49 UTC - **Reserved Date**: May 15, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:5465](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5465) 2. [35336](http://www.osvdb.org/35336) 3. [VU#739224](http://www.kb.cert.org/vuls/id/739224) 4. [ADV-2007-1803](http://www.vupen.com/english/advisories/2007/1803) 5. [1018053](http://www.securitytracker.com/id?1018053) 6. [](http://www.gamasec.net/english/gs07-01.html) 7. [25285](http://secunia.com/advisories/25285) 8. [1018054](http://www.securitytracker.com/id?1018054) 9. [23980](http://www.securityfocus.com/bid/23980) 10. [20070514 HTTP Full-Width and Half-Width Unicode Encoding Evasion](http://www.cisco.com/en/US/products/products_security_response09186a008083f82e.html) 11. [cisco-scanengine-unicode-security-bypass(34277)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34277) 12. [20070515 GS07-01 Full-Width and Half-Width Unicode Encoding IDS/IPS/WAF Bypass Vulnerability](http://www.securityfocus.com/archive/1/468633/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2010, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2010 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2010 - **State**: PUBLISHED - **Published Date**: April 25, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:35 UTC - **Reserved Date**: April 25, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in check_login.asp in Bloggage allow remote attackers to execute arbitrary SQL commands via the (1) acc_name and (2) password parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19751](http://secunia.com/advisories/19751) 2. [24797](http://www.osvdb.org/24797) 3. [17639](http://www.securityfocus.com/bid/17639) 4. [ADV-2006-1448](http://www.vupen.com/english/advisories/2006/1448) 5. [](http://colander.altervista.org/advisory/bloggage.txt) 6. [20060421 bloggage Remote SQL Injection](http://www.securityfocus.com/archive/1/431673/100/0/threaded) 7. [751](http://securityreason.com/securityalert/751) 8. [bloggage-checklogin-sql-injection(25955)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25955)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33897, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33897 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33897 - **State**: PUBLISHED - **Published Date**: July 12, 2023 at 08:32 UTC - **Last Updated**: January 06, 2025 at 17:26 UTC - **Reserved Date**: May 23, 2023 at 06:38 UTC - **Assigned By**: Unisoc ### Vulnerability Description In libimpl-ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8006** Affected versions: - Android10/Android11/Android12/Android13 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-29063, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-29063 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-29063 - **State**: PUBLISHED - **Published Date**: November 28, 2023 at 20:34 UTC - **Last Updated**: August 02, 2024 at 14:00 UTC - **Reserved Date**: March 30, 2023 at 21:10 UTC - **Assigned By**: BD ### Vulnerability Description The FACSChorus workstation does not prevent physical access to its PCI express (PCIe) slots, which could allow a threat actor to insert a PCI card designed for memory capture. A threat actor can then isolate sensitive information such as a BitLocker encryption key from a dump of the workstation RAM during startup. ### CVSS Metrics - **CVSS Base Score**: 2.4/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-1299: Security Weakness ### Affected Products **Becton, Dickinson and Company (BD) - FACSChorus** Affected versions: - 5.0 (Status: affected) - 3.0 (Status: affected) ### References 1. [](https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0832, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0832 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0832 - **State**: PUBLISHED - **Published Date**: February 20, 2008 at 19:00 UTC - **Last Updated**: August 07, 2024 at 08:01 UTC - **Reserved Date**: February 20, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in the Kemas Antonius com_quran 1.1 and earlier component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the surano parameter in a viewayat action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20080223 php-nuke Quran SQL Injection(surano)](http://archives.neohapsis.com/archives/bugtraq/2008-02/0399.html) 2. [28986](http://secunia.com/advisories/28986) 3. [quran-index-sql-injection(40573)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40573) 4. [5128](https://www.exploit-db.com/exploits/5128) 5. [27842](http://www.securityfocus.com/bid/27842) 6. [52226](http://osvdb.org/52226)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10454, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10454 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10454 - **State**: PUBLISHED - **Published Date**: March 12, 2020 at 13:05 UTC - **Last Updated**: August 04, 2024 at 10:58 UTC - **Reserved Date**: March 12, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/sitemap-generator.php by adding a question mark (?) followed by the payload. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://antoniocannito.it/?p=137#uxss) 2. [](https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0420 - **State**: PUBLISHED - **Published Date**: January 17, 2013 at 01:30 UTC - **Last Updated**: August 06, 2024 at 14:25 UTC - **Reserved Date**: December 07, 2012 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the VirtualBox component in Oracle Virtualization 4.0, 4.1, and 4.2 allows local users to affect integrity and availability via unknown vectors related to Core. NOTE: The previous information was obtained from the January 2013 Oracle CPU. Oracle has not commented on claims from another vendor that this issue is related to an incorrect comparison in the vga_draw_text function in Devices/Graphics/DevVGA.cpp, which can cause VirtualBox to "draw more lines than necessary." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openSUSE-SU-2013:0231](http://lists.opensuse.org/opensuse-updates/2013-02/msg00000.html) 2. [](http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html) 3. [](https://www.virtualbox.org/changeset/44055/vbox) 4. [](https://bugzilla.novell.com/show_bug.cgi?id=798776) 5. [oval:org.mitre.oval:def:15763](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15763) 6. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1113, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1113 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1113 - **State**: PUBLISHED - **Published Date**: July 29, 2019 at 14:09 UTC - **Last Updated**: August 04, 2024 at 18:06 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Framework Remote Code Execution Vulnerability'. ### Affected Products **Microsoft - Microsoft .NET Framework 4.5.2** Affected versions: - Windows 7 for 32-bit Systems Service Pack 1 (Status: affected) - Windows 7 for x64-based Systems Service Pack 1 (Status: affected) - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (Status: affected) - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) - Windows Server 2012 (Status: affected) - Windows Server 2012 (Server Core installation) (Status: affected) - Windows 8.1 for 32-bit systems (Status: affected) - Windows 8.1 for x64-based systems (Status: affected) - Windows Server 2012 R2 (Status: affected) - Windows RT 8.1 (Status: affected) - Windows Server 2012 R2 (Server Core installation) (Status: affected) - Windows Server 2008 for 32-bit Systems Service Pack 2 (Status: affected) - Windows Server 2008 for x64-based Systems Service Pack 2 (Status: affected) **Microsoft - Microsoft .NET Framework 4.6** Affected versions: - Windows Server 2008 for 32-bit Systems Service Pack 2 (Status: affected) - Windows Server 2008 for x64-based Systems Service Pack 2 (Status: affected) **Microsoft - Microsoft Visual Studio** Affected versions: - 2017 (Status: affected) **Microsoft - Microsoft .NET Framework 4.6/4.6.1/4.6.2** Affected versions: - Windows 10 for 32-bit Systems (Status: affected) - Windows 10 for x64-based Systems (Status: affected) **Microsoft - Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2** Affected versions: - Windows 7 for 32-bit Systems Service Pack 1 (Status: affected) - Windows 7 for x64-based Systems Service Pack 1 (Status: affected) - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (Status: affected) - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) - Windows Server 2012 (Status: affected) - Windows Server 2012 (Server Core installation) (Status: affected) - Windows 8.1 for 32-bit systems (Status: affected) - Windows 8.1 for x64-based systems (Status: affected) - Windows Server 2012 R2 (Status: affected) - Windows RT 8.1 (Status: affected) - Windows Server 2012 R2 (Server Core installation) (Status: affected) **Microsoft - Microsoft Visual Studio 2017** Affected versions: - version 15.9 (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows 7 for 32-bit Systems Service Pack 1** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows 7 for x64-based Systems Service Pack 1** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2012** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows 8.1 for 32-bit systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows 8.1 for x64-based systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2012 R2** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows RT 8.1** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2016** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1703 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1703 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1709 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1709 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1803 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1803 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 4.8 on Windows Server, version 1803 (Server Core Installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft Visual Studio 2019** Affected versions: - 16.0 (Status: affected) - 16.1 (Status: affected) **Microsoft - Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1903 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 3.5 AND 4.8 on Windows Server, version 1903 (Server Core installation)** Affected versions: - 1903 (Status: affected) **Microsoft - Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft .NET Framework 3.5** Affected versions: - Windows Server 2012 (Status: affected) - Windows Server 2012 (Server Core installation) (Status: affected) - Windows 8.1 for 32-bit systems (Status: affected) - Windows 8.1 for x64-based systems (Status: affected) - Windows Server 2012 R2 (Status: affected) - Windows Server 2012 R2 (Server Core installation) (Status: affected) - Windows 10 for 32-bit Systems (Status: affected) - Windows 10 for x64-based Systems (Status: affected) - Windows Server 2016 (Status: affected) - Windows 10 Version 1607 for 32-bit Systems (Status: affected) - Windows 10 Version 1607 for x64-based Systems (Status: affected) - Windows Server 2016 (Server Core installation) (Status: affected) - Windows 10 Version 1703 for 32-bit Systems (Status: affected) - Windows 10 Version 1703 for x64-based Systems (Status: affected) - Windows 10 Version 1709 for 32-bit Systems (Status: affected) - Windows 10 Version 1709 for x64-based Systems (Status: affected) - Windows 10 Version 1803 for 32-bit Systems (Status: affected) - Windows 10 Version 1803 for x64-based Systems (Status: affected) - Windows Server, version 1803 (Server Core Installation) (Status: affected) **Microsoft - Microsoft .NET Framework 3.0** Affected versions: - Service Pack 2 on Windows Server 2008 for Itanium-Based Systems Service Pack 2 (Status: affected) - Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Status: affected) - Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Status: affected) **Microsoft - Microsoft .NET Framework 2.0** Affected versions: - Service Pack 2 on Windows Server 2008 for Itanium-Based Systems Service Pack 2 (Status: affected) - Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Status: affected) - Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Status: affected) **Microsoft - Microsoft .NET Framework 3.5.1** Affected versions: - Windows 7 for 32-bit Systems Service Pack 1 (Status: affected) - Windows 7 for x64-based Systems Service Pack 1 (Status: affected) - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (Status: affected) - Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected) - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1113)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4502, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4502 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4502 - **State**: PUBLISHED - **Published Date**: May 05, 2024 at 22:00 UTC - **Last Updated**: August 01, 2024 at 20:40 UTC - **Reserved Date**: May 05, 2024 at 07:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in Ruijie RG-UAC up to 20240428. Affected is an unknown function of the file /view/dhcp/dhcpClient/dhcp_client_commit.php. The manipulation of the argument ifName leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-263106 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Ruijie - RG-UAC** Affected versions: - 20240428 (Status: affected) ### References 1. [VDB-263106 | Ruijie RG-UAC dhcp_client_commit.php os command injection](https://vuldb.com/?id.263106) 2. [VDB-263106 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263106) 3. [Submit #323811 | Ruijie Ruijie RG-UAC Unified Internet Behavior Management Audit System Ruijie RG-UAC Unified Internet Behavior Management Audit System Command Injection](https://vuldb.com/?submit.323811) 4. [](https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-view_dhcp_dhcpClient_dhcp_client_commit.php.pdf) ### Credits - H0e4a0r1t (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5540, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5540 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5540 - **State**: PUBLISHED - **Published Date**: December 03, 2012 at 21:00 UTC - **Last Updated**: September 16, 2024 at 20:11 UTC - **Reserved Date**: October 24, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the Hostip module 6.x-2.x before 6.x-2.2 and 7.x-2.x before 7.x-2.2 for Drupal allow remote attackers with control of hostip.info to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://drupal.org/node/1802048) 2. [[oss-security] 20121120 Re: CVE Request for Drupal Contributed Modules](http://www.openwall.com/lists/oss-security/2012/11/20/4) 3. [](http://drupal.org/node/1802218) 4. [](http://drupal.org/node/1802046)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4073, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4073 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4073 - **State**: PUBLISHED - **Published Date**: May 06, 2019 at 18:22 UTC - **Last Updated**: August 05, 2024 at 05:04 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable Permission Assignment vulnerability exists in the ACEManager EmbeddedAceSet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. The the binary the endpoint /cgi-bin/Embeded_Ace_TLSet_Task.cgi is a very similar endpoint that is designed for use with setting table values that can cause an arbitrary setting writes, resulting in the unverified changes to any system setting. An attacker can make an authenticated HTTP request, or run the binary as any user, to trigger this vulnerability. ### Affected Products **n/a - Sierra Wireless** Affected versions: - Sierra Wireless AirLink ES450 FW 4.9.3 (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0756)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6851, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6851 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6851 - **State**: PUBLISHED - **Published Date**: December 15, 2016 at 06:31 UTC - **Last Updated**: August 06, 2024 at 01:43 UTC - **Reserved Date**: August 18, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Open-Xchange OX Guard before 2.4.2-rev5. Script code can be provided as parameter to the OX Guard guest reader web application. This allows cross-site scripting attacks against arbitrary users since no prior authentication is needed. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.) in case the user has an active session on the same domain already. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [92920](http://www.securityfocus.com/bid/92920) 2. [](http://packetstormsecurity.com/files/138701/Open-Xchange-Guard-2.4.2-Cross-Site-Scripting.html) 3. [40377](https://www.exploit-db.com/exploits/40377/) 4. [20160913 Open-Xchange Security Advisory 2016-09-13 (2)](http://www.securityfocus.com/archive/1/539395/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12469, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12469 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12469 - **State**: PUBLISHED - **Published Date**: April 29, 2020 at 19:58 UTC - **Last Updated**: August 04, 2024 at 11:56 UTC - **Reserved Date**: April 29, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description admin/blocks.php in Subrion CMS through 4.2.1 allows PHP Object Injection (with resultant file deletion) via serialized data in the subpages value within a block to blocks/edit. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/belong2yourself/vulnerabilities/tree/master/Subrion%20CMS/Insecure%20Deserialization/Subpages%20-%20Authenticated%20PHP%20Object%20Injection)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7813, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7813 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7813 - **State**: PUBLISHED - **Published Date**: May 22, 2020 at 13:05 UTC - **Last Updated**: August 04, 2024 at 09:41 UTC - **Reserved Date**: January 22, 2020 at 00:00 UTC - **Assigned By**: krcert ### Vulnerability Description Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download and execute arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-494: Security Weakness ### Affected Products **Kaoni - ezHTTPTrans** Affected versions: - 1.0.0.70 (Status: affected) ### References 1. [](http://www.kaoni.com/) 2. [](https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35428) ### Credits - Thanks to Eunsol Lee for this vulnerability report.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3931, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3931 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3931 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31762, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31762 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31762 - **State**: PUBLISHED - **Published Date**: April 01, 2025 at 14:51 UTC - **Last Updated**: April 01, 2025 at 20:35 UTC - **Reserved Date**: April 01, 2025 at 13:19 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in andreyazimov Sheet2Site allows Stored XSS. This issue affects Sheet2Site: from n/a through 1.0.18. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **andreyazimov - Sheet2Site** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/sheet2site/vulnerability/wordpress-sheet2site-plugin-1-0-18-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Trương Hữu Phúc (truonghuuphuc) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-17391, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-17391 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-17391 - **State**: PUBLISHED - **Published Date**: August 25, 2020 at 20:20 UTC - **Last Updated**: August 04, 2024 at 13:53 UTC - **Reserved Date**: August 07, 2020 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows local attackers to disclose information on affected installations of Parallels Desktop 15.1.3-47255. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handler for HOST_IOCTL_INIT_HYPERVISOR in the prl_hypervisor kext. The issue results from the exposure of dangerous method or function to the unprivileged user. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-10518. ### Weakness Classification (CWE) - CWE-749: Security Weakness ### Affected Products **Parallels - Desktop** Affected versions: - 15.1.3-47255 (Status: affected) ### References 1. [](https://kb.parallels.com/en/125013) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1009/) ### Credits - Reno Robert
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26835, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26835 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26835 - **State**: PUBLISHED - **Published Date**: December 09, 2020 at 16:30 UTC - **Last Updated**: August 04, 2024 at 16:03 UTC - **Reserved Date**: October 07, 2020 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description SAP NetWeaver AS ABAP, versions - 740, 750, 751, 752, 753, 754 , does not sufficiently encode URL which allows an attacker to input malicious java script in the URL which could be executed in the browser resulting in Reflected Cross-Site Scripting (XSS) vulnerability. ### Affected Products **SAP SE - SAP NetWeaver AS ABAP** Affected versions: - < 740 (Status: affected) - < 750 (Status: affected) - < 751 (Status: affected) - < 752 (Status: affected) - < 753 (Status: affected) - < 754 (Status: affected) ### References 1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564757079) 2. [](https://launchpad.support.sap.com/#/notes/2996479)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28012, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28012 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28012 - **State**: PUBLISHED - **Published Date**: March 28, 2024 at 00:55 UTC - **Last Updated**: January 14, 2025 at 03:59 UTC - **Reserved Date**: February 29, 2024 at 08:40 UTC - **Assigned By**: NEC ### Vulnerability Description Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN MR02LN, WG1810HP(JE) and WG1810HP(MF) all versions allows a attacker to execute an arbitrary command with the root privilege via the internet. ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **NEC Corporation - WG1800HP4** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1200HS3** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1900HP2** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1200HP3** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1800HP3** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1200HS2** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1900HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1200HP2** Affected versions: - all versions (Status: affected) **NEC Corporation - W1200EX(-MS)** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1200HS** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1200HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WF300HP2** Affected versions: - all versions (Status: affected) **NEC Corporation - W300P** Affected versions: - all versions (Status: affected) **NEC Corporation - WF800HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8165N** Affected versions: - all versions (Status: affected) **NEC Corporation - WG2200HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WF1200HP2** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1800HP2** Affected versions: - all versions (Status: affected) **NEC Corporation - WF1200HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WG600HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WG300HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WF300HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1800HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1400HP** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8175N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR9300N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8750N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8160N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR9500N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8600N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8370N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8170N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8700N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8300N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8150N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR4100N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR4500N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8100N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8500N** Affected versions: - all versions (Status: affected) **NEC Corporation - CR2500P** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8400N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8200N** Affected versions: - all versions (Status: affected) **NEC Corporation - WR1200H** Affected versions: - all versions (Status: affected) **NEC Corporation - WR7870S** Affected versions: - all versions (Status: affected) **NEC Corporation - WR6670S** Affected versions: - all versions (Status: affected) **NEC Corporation - WR7850S** Affected versions: - all versions (Status: affected) **NEC Corporation - WR6650S** Affected versions: - all versions (Status: affected) **NEC Corporation - WR6600H** Affected versions: - all versions (Status: affected) **NEC Corporation - WR7800H** Affected versions: - all versions (Status: affected) **NEC Corporation - WM3400RN** Affected versions: - all versions (Status: affected) **NEC Corporation - WM3450RN** Affected versions: - all versions (Status: affected) **NEC Corporation - WM3500R** Affected versions: - all versions (Status: affected) **NEC Corporation - WM3600R** Affected versions: - all versions (Status: affected) **NEC Corporation - WM3800R** Affected versions: - all versions (Status: affected) **NEC Corporation - WR8166N** Affected versions: - all versions (Status: affected) **NEC Corporation - MR01LN** Affected versions: - all versions (Status: affected) **NEC Corporation - MR02LN** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1810HP(JE)** Affected versions: - all versions (Status: affected) **NEC Corporation - WG1810HP(MF)** Affected versions: - all versions (Status: affected) ### References 1. [](https://jpn.nec.com/security-info/secinfo/nv24-001_en.html) ### Credits - Katsuhiko Sato and Ryo Kashiro of 00One, Inc.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17202, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17202 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17202 - **State**: PUBLISHED - **Published Date**: January 23, 2020 at 00:00 UTC - **Last Updated**: August 05, 2024 at 01:33 UTC - **Reserved Date**: October 05, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FastTrack Admin By Request 6.1.0.0 supports group policies that are supposed to allow only a select range of users to elevate to Administrator privilege at will. If a user does not have direct access to the elevation feature through group policies, they are prompted to enter a PIN code in a challenge-response manner upon attempting to elevate privileges. The challenge's response uses a simple algorithm that can be easily emulated via data (customer ID and device name) available to all users, and thus any user can elevate to Administrator privilege. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://improsec.com/en/responsible-disclosure) 2. [](https://www.adminbyrequest.com/en/releasenotes)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20049, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20049 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20049 - **State**: PUBLISHED - **Published Date**: December 23, 2021 at 01:20 UTC - **Last Updated**: August 03, 2024 at 17:30 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: sonicwall ### Vulnerability Description A vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses. This vulnerability impacts 10.2.1.2-24sv, 10.2.0.8-37sv and earlier 10.x versions. ### Weakness Classification (CWE) - CWE-204: Improper Input Validation ### Affected Products **SonicWall - SonicWall SMA100** Affected versions: - 10.2.0.8-37sv and earlier (Status: affected) - 10.2.1.2-24sv and earlier (Status: affected) ### References 1. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0030)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-39352, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-39352 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-39352 - **State**: PUBLISHED - **Published Date**: May 19, 2025 at 19:49 UTC - **Last Updated**: May 19, 2025 at 21:19 UTC - **Reserved Date**: April 16, 2025 at 06:22 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in ThemeGoods Grand Restaurant WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Grand Restaurant WordPress: from n/a through 7.0. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **ThemeGoods - Grand Restaurant WordPress** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/theme/grandrestaurant/vulnerability/wordpress-grand-restaurant-wordpress-theme-7-0-arbitrary-options-deletion-vulnerability?_s_id=cve) ### Credits - Ananda Dhakal (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26396, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26396 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26396 - **State**: PUBLISHED - **Published Date**: April 12, 2023 at 00:00 UTC - **Last Updated**: March 05, 2025 at 19:07 UTC - **Reserved Date**: February 22, 2023 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat Reader versions 23.001.20093 (and earlier) and 20.005.30441 (and earlier) are affected by a Creation of Temporary File in Directory with Incorrect Permissions vulnerability that could result in privilege escalation in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-379: Security Weakness ### Affected Products **Adobe - Acrobat Reader** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb23-24.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2448, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2448 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2448 - **State**: PUBLISHED - **Published Date**: July 12, 2010 at 17:00 UTC - **Last Updated**: September 16, 2024 at 22:51 UTC - **Reserved Date**: June 24, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description znc.cpp in ZNC before 0.092 allows remote authenticated users to cause a denial of service (crash) by requesting traffic statistics when there is an active unauthenticated connection, which triggers a NULL pointer dereference, as demonstrated using (1) a traffic link in the web administration pages or (2) the traffic command in the /znc shell. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://znc.svn.sourceforge.net/viewvc/znc/trunk/znc.cpp?r1=2025&r2=2026&pathrev=2026) 2. [ADV-2010-1775](http://www.vupen.com/english/advisories/2010/1775) 3. [FEDORA-2010-10078](http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043043.html) 4. [40523](http://secunia.com/advisories/40523) 5. [](http://sourceforge.net/projects/znc/files/znc/0.092/znc-0.092-changelog.txt/view) 6. [40982](http://www.securityfocus.com/bid/40982) 7. [](http://znc.svn.sourceforge.net/viewvc/znc?revision=2026&view=revision) 8. [FEDORA-2010-10042](http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043000.html) 9. [FEDORA-2010-10082](http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043044.html) 10. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584929) 11. [DSA-2069](http://www.debian.org/security/2010/dsa-2069)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2045, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2045 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2045 - **State**: PUBLISHED - **Published Date**: June 22, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:15 UTC - **Reserved Date**: June 22, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in DUware DUportal PRO 3.4.3 allow remote attackers to execute arbitrary SQL commands via the (1) iChannel parameter to default.asp, (2) iData parameter to detail.asp, (3) iMem parameter to members.asp, (4) iCat parameter to cat.asp, (5) offset parameter to members_listing_approval.asp, or (6) iChannel parameter to channels_edit.asp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050622 [ECHO_ADV_19$2005] Multiple SQL INJECTION in DUWARE Products](http://marc.info/?l=bugtraq&m=111945219205114&w=2) 2. [17598](http://www.osvdb.org/17598) 3. [17599](http://www.osvdb.org/17599) 4. [17597](http://www.osvdb.org/17597) 5. [](http://echo.or.id/adv/adv19-theday-2005.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-28479, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-28479 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-28479 - **State**: PUBLISHED - **Published Date**: May 11, 2021 at 19:11 UTC - **Last Updated**: August 03, 2024 at 21:47 UTC - **Reserved Date**: March 15, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows CSC Service Information Disclosure Vulnerability ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1803** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1909 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28479)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-1959, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-1959 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-1959 - **State**: PUBLISHED - **Published Date**: March 06, 2014 at 18:00 UTC - **Last Updated**: August 06, 2024 at 09:58 UTC - **Reserved Date**: February 13, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description lib/x509/verify.c in GnuTLS before 3.1.21 and 3.2.x before 3.2.11 treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.gnutls.org/security.html) 2. [[oss-security] 20140213 CVE Request - GnuTLS corrects flaw in certificate verification (3.1.x/3.2.x)](http://seclists.org/oss-sec/2014/q1/344) 3. [[oss-security] 20140213 Re: CVE Request - GnuTLS corrects flaw in certificate verification (3.1.x/3.2.x)](http://seclists.org/oss-sec/2014/q1/345) 4. [65559](http://www.securityfocus.com/bid/65559) 5. [USN-2121-1](http://www.ubuntu.com/usn/USN-2121-1) 6. [](https://www.gitorious.org/gnutls/gnutls/commit/b1abfe3d182d68539900092eb42fc62cf1bb7e7c) 7. [DSA-2866](http://www.debian.org/security/2014/dsa-2866)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4839, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4839 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4839 - **State**: PUBLISHED - **Published Date**: October 21, 2015 at 23:00 UTC - **Last Updated**: August 06, 2024 at 06:25 UTC - **Reserved Date**: June 24, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Applications Technology Stack component in Oracle E-Business Suite 11.5.10.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to DB Listener, a different vulnerability than CVE-2015-4798. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033877](http://www.securitytracker.com/id/1033877) 2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html) 3. [77255](http://www.securityfocus.com/bid/77255)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10410, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10410 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10410 - **State**: PUBLISHED - **Published Date**: April 18, 2018 at 14:00 UTC - **Last Updated**: September 17, 2024 at 03:18 UTC - **Reserved Date**: August 16, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SD 845, SD 850, and SDX20, buffer overflow vulnerability in RTP during Volte call. ### Affected Products **Qualcomm, Inc. - Snapdragon Mobile, Snapdragon Wear** Affected versions: - MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SD 845, SD 850, SDX20 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-04-01) 2. [103671](http://www.securityfocus.com/bid/103671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0475, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0475 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0475 - **State**: PUBLISHED - **Published Date**: May 14, 2010 at 19:24 UTC - **Last Updated**: August 07, 2024 at 00:52 UTC - **Reserved Date**: February 02, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in esp/editUser.esp in the Palo Alto Networks firewall 3.0.x before 3.0.9 and 3.1.x before 3.1.1 allows remote attackers to inject arbitrary web script or HTML via the role parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [40113](http://www.securityfocus.com/bid/40113) 2. [](http://www.jeromiejackson.com/index.php?view=article&id=83:palo-alto-cross-site-scripting-vulnerability&tmpl=component&print=1&layout=default&page=) 3. [paloalto-edituser-xss(58624)](https://exchange.xforce.ibmcloud.com/vulnerabilities/58624) 4. [20100512 Palo Alto Network Vulnerability - Cross-Site Scripting (XSS)](http://archives.neohapsis.com/archives/bugtraq/2010-05/0086.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0078, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0078 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0078 - **State**: PUBLISHED - **Published Date**: January 29, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 20:57 UTC - **Reserved Date**: January 14, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The KDE screen saver in KDE before 3.0.5 does not properly check the return value from a certain function call, which allows attackers with physical access to cause a crash and access the desktop session. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [kdebase-screensaver-security-bypass(19084)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19084) 2. [oval:org.mitre.oval:def:9260](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9260) 3. [DSA-660](http://www.debian.org/security/2005/dsa-660) 4. [RHSA-2005:009](http://www.redhat.com/support/errata/RHSA-2005-009.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-38323, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-38323 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-38323 - **State**: PUBLISHED - **Published Date**: September 15, 2022 at 00:39 UTC - **Last Updated**: August 03, 2024 at 10:54 UTC - **Reserved Date**: August 15, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Event Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /Royal_Event/update_image.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Gsir97/bug_report/blob/main/vendors/Nikhil_B/event-management-system/RCE-1.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2926, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2926 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2926 - **State**: PUBLISHED - **Published Date**: September 26, 2022 at 12:35 UTC - **Last Updated**: May 21, 2025 at 16:23 UTC - **Reserved Date**: August 22, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Download Manager WordPress plugin before 3.2.55 does not validate one of its settings, which could allow high privilege users such as admin to list and read arbitrary files and folders outside of the blog directory ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Unknown - Download Manager** Affected versions: - 3.2.55 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/2a440e1a-a7e4-4106-839a-d93895e16785) ### Credits - Raad Haddad of Cloudyrion GmbH
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45613, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45613 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45613 - **State**: PUBLISHED - **Published Date**: January 18, 2023 at 00:00 UTC - **Last Updated**: April 04, 2025 at 17:27 UTC - **Reserved Date**: November 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Book Store Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in /bsms_ci/index.php/book. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the publisher parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://medium.com/%40just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e) 2. [](https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/stored-xss)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21453, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21453 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21453 - **State**: PUBLISHED - **Published Date**: March 16, 2023 at 00:00 UTC - **Last Updated**: February 26, 2025 at 21:00 UTC - **Reserved Date**: November 14, 2022 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Improper input validation vulnerability in SoftSim TA prior to SMR Mar-2023 Release 1 allows local attackers access to protected data. ### CVSS Metrics - **CVSS Base Score**: 6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - Selected Android 13 devices (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=03)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7716, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7716 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7716 - **State**: PUBLISHED - **Published Date**: October 06, 2015 at 17:00 UTC - **Last Updated**: August 06, 2024 at 07:58 UTC - **Reserved Date**: October 06, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description libstagefright in Android 5.x before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 20721050, a different vulnerability than CVE-2015-3873. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[android-security-updates] 20151005 Nexus Security Bulletin (October 2015)](https://groups.google.com/forum/message/raw?msg=android-security-updates/_Rm-lKnS2M8/dGTcilt0CAAJ)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3634, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3634 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3634 - **State**: PUBLISHED - **Published Date**: November 21, 2022 at 00:00 UTC - **Last Updated**: April 29, 2025 at 16:26 UTC - **Reserved Date**: October 21, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Contact Form 7 Database Addon WordPress plugin before 1.2.6.5 does not validate data when output it back in a CSV file, which could lead to CSV injection ### Weakness Classification (CWE) - CWE-1236 Improper Neutralization of Formula Elements in a CSV File: Security Weakness ### Affected Products **Unknown - Contact Form 7 Database Addon** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/b5eeefb0-fb5e-4ca6-a6f0-67f4be4a2b10) ### Credits - Adel Bouaricha
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25371, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25371 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25371 - **State**: PUBLISHED - **Published Date**: March 25, 2025 at 00:00 UTC - **Last Updated**: March 26, 2025 at 14:00 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description NASA cFS (Core Flight System) Aquila is vulnerable to path traversal in the OSAL module, allowing the override of any arbitrary file on the system. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-47685, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-47685 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-47685 - **State**: PUBLISHED - **Published Date**: November 18, 2023 at 20:40 UTC - **Last Updated**: August 14, 2024 at 18:00 UTC - **Reserved Date**: November 08, 2023 at 16:08 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Lukman Nakib Preloader Matrix.This issue affects Preloader Matrix: from n/a through 2.0.1. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Lukman Nakib - Preloader Matrix** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/matrix-pre-loader/wordpress-preloader-matrix-plugin-2-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Skalucy (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41131, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41131 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41131 - **State**: PUBLISHED - **Published Date**: July 22, 2024 at 14:24 UTC - **Last Updated**: August 02, 2024 at 04:46 UTC - **Reserved Date**: July 15, 2024 at 15:53 UTC - **Assigned By**: GitHub_M ### Vulnerability Description ImageSharp is a 2D graphics API. An Out-of-bounds Write vulnerability has been found in the ImageSharp gif decoder, allowing attackers to cause a crash using a specially crafted gif. This can potentially lead to denial of service. All users are advised to upgrade to v3.1.5 or v2.1.9. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **SixLabors - ImageSharp** Affected versions: - < 2.1.9 (Status: affected) - >= 3.0.0, < 3.1.5 (Status: affected) ### References 1. [https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-63p8-c4ww-9cg7](https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-63p8-c4ww-9cg7) 2. [https://github.com/SixLabors/ImageSharp/pull/2754](https://github.com/SixLabors/ImageSharp/pull/2754) 3. [https://github.com/SixLabors/ImageSharp/pull/2756](https://github.com/SixLabors/ImageSharp/pull/2756) 4. [https://github.com/SixLabors/ImageSharp/commit/9dda64a8186af67baf06b6d9c1ab599c3608b693](https://github.com/SixLabors/ImageSharp/commit/9dda64a8186af67baf06b6d9c1ab599c3608b693) 5. [https://github.com/SixLabors/ImageSharp/commit/a1f287977139109a987065643b8172c748abdadb](https://github.com/SixLabors/ImageSharp/commit/a1f287977139109a987065643b8172c748abdadb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4892, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4892 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4892 - **State**: REJECTED - **Published Date**: November 05, 2020 at 19:54 UTC - **Last Updated**: November 05, 2020 at 19:54 UTC - **Reserved Date**: December 19, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1091 - **State**: PUBLISHED - **Published Date**: March 10, 2023 at 07:02 UTC - **Last Updated**: February 27, 2025 at 21:03 UTC - **Reserved Date**: February 28, 2023 at 14:07 UTC - **Assigned By**: TR-CERT ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Alpata Licensed Warehousing Automation System allows Command Line Execution through SQL Injection.This issue affects Licensed Warehousing Automation System: through 2023.1.01. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Alpata - Licensed Warehousing Automation System** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.usom.gov.tr/bildirim/tr-23-0139) ### Credits - Resul Melih MACIT
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24300, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24300 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24300 - **State**: PUBLISHED - **Published Date**: February 02, 2022 at 06:01 UTC - **Last Updated**: August 03, 2024 at 04:07 UTC - **Reserved Date**: February 02, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Minetest before 5.4.0 allows attackers to add or modify arbitrary meta fields of the same item stack as saved user input, aka ItemStack meta injection. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.debian.org/1004223) 2. [](https://github.com/minetest/minetest/commit/b5956bde259faa240a81060ff4e598e25ad52dae) 3. [](https://github.com/minetest/minetest/security/advisories/GHSA-hwj2-xf72-r4cf) 4. [DSA-5075](https://www.debian.org/security/2022/dsa-5075)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38388, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38388 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38388 - **State**: PUBLISHED - **Published Date**: March 26, 2024 at 20:39 UTC - **Last Updated**: August 06, 2024 at 18:30 UTC - **Reserved Date**: July 17, 2023 at 15:21 UTC - **Assigned By**: Patchstack ### Vulnerability Description Unrestricted Upload of File with Dangerous Type vulnerability in Artbees JupiterX Core.This issue affects JupiterX Core: from n/a through 3.3.5. ### CVSS Metrics - **CVSS Base Score**: 9/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **Artbees - JupiterX Core** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/jupiterx-core/wordpress-jupiter-x-core-plugin-3-3-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1609, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1609 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1609 - **State**: PUBLISHED - **Published Date**: January 16, 2024 at 15:52 UTC - **Last Updated**: June 02, 2025 at 15:10 UTC - **Reserved Date**: May 06, 2022 at 13:37 UTC - **Assigned By**: WPScan ### Vulnerability Description The School Management WordPress plugin before 9.9.7 contains an obfuscated backdoor injected in it's license checking code that registers a REST API handler, allowing an unauthenticated attacker to execute arbitrary PHP code on the site. ### Weakness Classification (CWE) - CWE-94 Improper Control of Generation of Code ('Code Injection'): Code Injection ### Affected Products **Unknown - school-management-pro** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/e2d546c9-85b6-47a4-b951-781b9ae5d0f2/) ### Credits - Jetpack Scan Team + WordPress elevated support team - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15343, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15343 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15343 - **State**: PUBLISHED - **Published Date**: February 15, 2018 at 16:00 UTC - **Last Updated**: August 05, 2024 at 19:50 UTC - **Reserved Date**: October 14, 2017 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description Huawei AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30 has an integer overflow vulnerability. The software does not sufficiently validate certain field in SCTP messages, a remote unauthenticated attacker could send a crafted SCTP message to the device. Successful exploit could system reboot. ### Affected Products **Huawei Technologies Co., Ltd. - AR3200** Affected versions: - V200R006C10,V200R006C11,V200R007C00,V200R007C01,V200R007C02,V200R008C00,V200R008C10,V200R008C20,V200R008C30 (Status: affected) ### References 1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-sctp-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4769, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4769 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4769 - **State**: PUBLISHED - **Published Date**: November 03, 2023 at 10:55 UTC - **Last Updated**: September 05, 2024 at 18:05 UTC - **Reserved Date**: September 05, 2023 at 11:46 UTC - **Assigned By**: INCIBE ### Vulnerability Description A SSRF vulnerability has been found in ManageEngine Desktop Central affecting version 9.1.0, specifically the /smtpConfig.do component. This vulnerability could allow an authenticated attacker to launch targeted attacks, such as a cross-port attack, service enumeration and other attacks via HTTP requests. ### CVSS Metrics - **CVSS Base Score**: 6.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **ManageEngine - Desktop Central** Affected versions: - 9.1.0 (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-manageengine-desktop-central) ### Credits - Rafael Pedrero
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0246, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0246 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0246 - **State**: PUBLISHED - **Published Date**: May 24, 2001 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:14 UTC - **Reserved Date**: March 19, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Internet Explorer 5.5 and earlier does not properly verify the domain of a frame within a browser window, which allows remote web site operators to read certain files on the client by sending information from a local frame to a frame in a different domain, aka a variant of the "Frame Domain Verification" vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS01-027](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-027)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40140, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40140 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40140 - **State**: PUBLISHED - **Published Date**: October 27, 2023 at 20:22 UTC - **Last Updated**: September 09, 2024 at 19:38 UTC - **Reserved Date**: August 09, 2023 at 02:29 UTC - **Assigned By**: google_android ### Vulnerability Description In android_view_InputDevice_create of android_view_InputDevice.cpp, there is a possible way to execute arbitrary code due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - 13 (Status: affected) - 12L (Status: affected) - 12 (Status: affected) - 11 (Status: affected) ### References 1. [](https://android.googlesource.com/platform/frameworks/base/+/2d88a5c481df8986dbba2e02c5bf82f105b36243) 2. [](https://source.android.com/security/bulletin/2023-10-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10094, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10094 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10094 - **State**: PUBLISHED - **Published Date**: November 20, 2024 at 14:45 UTC - **Last Updated**: November 20, 2024 at 15:39 UTC - **Reserved Date**: October 17, 2024 at 16:14 UTC - **Assigned By**: Pega ### Vulnerability Description Pega Platform versions 6.x to Infinity 24.1.1 are affected by an issue with Improper Control of Generation of Code ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **Pegasystems - Pega Infinity** Affected versions: - 6.1 (Status: affected) ### References 1. [](https://support.pega.com/support-doc/pega-security-advisory-d24-vulnerability-remediation-note) ### Credits - Daniel Wiseman from Commonwealth Bank of Australia
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1805, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1805 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1805 - **State**: PUBLISHED - **Published Date**: June 03, 2020 at 22:50 UTC - **Last Updated**: August 06, 2024 at 22:37 UTC - **Reserved Date**: April 20, 2011 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Bad cast in CSS in Google Chrome prior to 11.0.0.0 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://crbug.com/82633)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4965, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4965 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4965 - **State**: PUBLISHED - **Published Date**: October 16, 2011 at 18:00 UTC - **Last Updated**: September 17, 2024 at 02:20 UTC - **Reserved Date**: October 16, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description /etc/rc.d/rc.local on the D-Link DCS-2121 camera with firmware 1.04 configures a hardcoded password of admin for the root account, which makes it easier for remote attackers to obtain shell access by leveraging a running telnetd server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://newsoft-tech.blogspot.com/2010/09/d-link-dcs-2121-and-state-of-embedded.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7474 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3556, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3556 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3556 - **State**: PUBLISHED - **Published Date**: July 08, 2023 at 13:00 UTC - **Last Updated**: August 02, 2024 at 07:01 UTC - **Reserved Date**: July 08, 2023 at 11:50 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in GZ Scripts Car Listing Script PHP 1.8. It has been declared as problematic. This vulnerability affects unknown code of the file /preview.php. The manipulation of the argument page/sort_by leads to cross site scripting. The attack can be initiated remotely. VDB-233350 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **GZ Scripts - Car Listing Script PHP** Affected versions: - 1.8 (Status: affected) ### References 1. [](https://vuldb.com/?id.233350) 2. [](https://vuldb.com/?ctiid.233350) ### Credits - skalvin (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-20173, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-20173 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-20173 - **State**: PUBLISHED - **Published Date**: February 05, 2025 at 16:35 UTC - **Last Updated**: March 13, 2025 at 12:59 UTC - **Reserved Date**: October 10, 2024 at 19:15 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.&nbsp; This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. ### CVSS Metrics - **CVSS Base Score**: 7.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H` ### Affected Products **Cisco - IOS** Affected versions: - 12.2(53)SE1 (Status: affected) - 12.2(55)SE (Status: affected) - 12.2(50)SE2 (Status: affected) - 12.2(50)SE1 (Status: affected) - 12.2(50)SE5 (Status: affected) - 12.2(53)SE (Status: affected) - 12.2(55)SE3 (Status: affected) - 12.2(55)SE2 (Status: affected) - 12.2(52)SE (Status: affected) - 12.2(58)SE (Status: affected) - 12.2(50)SE3 (Status: affected) - 12.2(55)SE1 (Status: affected) - 12.2(53)SE2 (Status: affected) - 12.2(52)SE1 (Status: affected) - 12.2(54)SE (Status: affected) - 12.2(50)SE4 (Status: affected) - 12.2(50)SE (Status: affected) - 12.2(58)SE1 (Status: affected) - 12.2(55)SE4 (Status: affected) - 12.2(58)SE2 (Status: affected) - 12.2(55)SE5 (Status: affected) - 12.2(55)SE6 (Status: affected) - 12.2(55)SE7 (Status: affected) - 12.2(55)SE8 (Status: affected) - 12.2(55)SE9 (Status: affected) - 12.2(55)SE10 (Status: affected) - 12.2(55)SE11 (Status: affected) - 12.2(55)SE12 (Status: affected) - 12.2(55)SE13 (Status: affected) - 12.2(53)EX (Status: affected) - 12.2(52)EX (Status: affected) - 12.2(55)EX (Status: affected) - 12.2(52)EX1 (Status: affected) - 12.2(55)EX1 (Status: affected) - 12.2(55)EX2 (Status: affected) - 12.2(55)EX3 (Status: affected) - 12.2(58)EX (Status: affected) - 12.2(55)EY (Status: affected) - 12.2(52)EY1 (Status: affected) - 12.2(52)EY (Status: affected) - 12.2(53)EY (Status: affected) - 12.2(52)EY2 (Status: affected) - 12.2(52)EY1b (Status: affected) - 12.2(52)EY1c (Status: affected) - 12.2(58)EY (Status: affected) - 12.2(52)EY3 (Status: affected) - 12.2(52)EY2a (Status: affected) - 12.2(58)EY1 (Status: affected) - 12.2(52)EY4 (Status: affected) - 12.2(52)EY3a (Status: affected) - 12.2(58)EY2 (Status: affected) - 12.2(58)EZ (Status: affected) - 12.2(53)EZ (Status: affected) - 12.2(55)EZ (Status: affected) - 12.2(60)EZ (Status: affected) - 12.2(60)EZ1 (Status: affected) - 12.2(60)EZ2 (Status: affected) - 12.2(60)EZ3 (Status: affected) - 12.2(60)EZ4 (Status: affected) - 12.2(60)EZ5 (Status: affected) - 12.2(60)EZ6 (Status: affected) - 12.2(60)EZ7 (Status: affected) - 12.2(60)EZ8 (Status: affected) - 12.2(60)EZ9 (Status: affected) - 12.2(60)EZ10 (Status: affected) - 12.2(60)EZ11 (Status: affected) - 12.2(60)EZ12 (Status: affected) - 12.2(60)EZ13 (Status: affected) - 12.2(60)EZ14 (Status: affected) - 12.2(60)EZ15 (Status: affected) - 12.2(50)SG3 (Status: affected) - 12.2(53)SG (Status: affected) - 12.2(50)SG6 (Status: affected) - 12.2(53)SG1 (Status: affected) - 12.2(46)SG (Status: affected) - 12.2(53)SG2 (Status: affected) - 12.2(50)SG5 (Status: affected) - 12.2(53)SG3 (Status: affected) - 12.2(50)SG8 (Status: affected) - 12.2(50)SG2 (Status: affected) - 12.2(54)SG1 (Status: affected) - 12.2(50)SG1 (Status: affected) - 12.2(52)SG (Status: affected) - 12.2(54)SG (Status: affected) - 12.2(50)SG (Status: affected) - 12.2(50)SG7 (Status: affected) - 12.2(53)SG4 (Status: affected) - 12.2(50)SG4 (Status: affected) - 12.2(46)SG1 (Status: affected) - 12.2(53)SG5 (Status: affected) - 12.2(53)SG6 (Status: affected) - 12.2(53)SG7 (Status: affected) - 12.2(53)SG8 (Status: affected) - 12.2(53)SG9 (Status: affected) - 12.2(53)SG10 (Status: affected) - 12.2(53)SG11 (Status: affected) - 12.2(52)XO (Status: affected) - 12.2(54)XO (Status: affected) - 12.2(50)SQ2 (Status: affected) - 12.2(50)SQ1 (Status: affected) - 12.2(50)SQ (Status: affected) - 12.2(50)SQ3 (Status: affected) - 12.2(50)SQ4 (Status: affected) - 12.2(50)SQ5 (Status: affected) - 12.2(50)SQ6 (Status: affected) - 12.2(50)SQ7 (Status: affected) - 15.0(1)M1 (Status: affected) - 15.0(1)M5 (Status: affected) - 15.0(1)M4 (Status: affected) - 15.0(1)M3 (Status: affected) - 15.0(1)M2 (Status: affected) - 15.0(1)M6 (Status: affected) - 15.0(1)M (Status: affected) - 15.0(1)M7 (Status: affected) - 15.0(1)M10 (Status: affected) - 15.0(1)M9 (Status: affected) - 15.0(1)M8 (Status: affected) - 15.0(1)XA2 (Status: affected) - 15.0(1)XA4 (Status: affected) - 15.0(1)XA1 (Status: affected) - 15.0(1)XA3 (Status: affected) - 15.0(1)XA (Status: affected) - 15.0(1)XA5 (Status: affected) - 15.1(2)T (Status: affected) - 15.1(1)T4 (Status: affected) - 15.1(3)T2 (Status: affected) - 15.1(1)T1 (Status: affected) - 15.1(2)T0a (Status: affected) - 15.1(3)T3 (Status: affected) - 15.1(1)T3 (Status: affected) - 15.1(2)T3 (Status: affected) - 15.1(2)T4 (Status: affected) - 15.1(1)T2 (Status: affected) - 15.1(3)T (Status: affected) - 15.1(2)T2a (Status: affected) - 15.1(3)T1 (Status: affected) - 15.1(1)T (Status: affected) - 15.1(2)T2 (Status: affected) - 15.1(2)T1 (Status: affected) - 15.1(2)T5 (Status: affected) - 15.1(3)T4 (Status: affected) - 15.1(1)T5 (Status: affected) - 15.1(1)XB (Status: affected) - 12.2(33)SRE1 (Status: affected) - 12.2(33)SRE2 (Status: affected) - 12.2(33)SRE3 (Status: affected) - 12.2(33)SRE4 (Status: affected) - 12.2(33)SRE (Status: affected) - 12.2(33)SRE0a (Status: affected) - 12.2(33)SRE5 (Status: affected) - 12.2(33)SRE6 (Status: affected) - 12.2(33)SRE8 (Status: affected) - 12.2(33)SRE7 (Status: affected) - 12.2(33)SRE9 (Status: affected) - 12.2(33)SRE7a (Status: affected) - 12.2(33)SRE10 (Status: affected) - 12.2(33)SRE11 (Status: affected) - 12.2(33)SRE9a (Status: affected) - 12.2(33)SRE12 (Status: affected) - 12.2(33)SRE13 (Status: affected) - 12.2(33)SRE14 (Status: affected) - 12.2(33)SRE15 (Status: affected) - 12.2(33)SRE15a (Status: affected) - 15.0(1)XO1 (Status: affected) - 15.0(1)XO (Status: affected) - 15.0(2)XO (Status: affected) - 15.0(1)S2 (Status: affected) - 15.0(1)S1 (Status: affected) - 15.0(1)S (Status: affected) - 15.0(1)S3a (Status: affected) - 15.0(1)S4 (Status: affected) - 15.0(1)S5 (Status: affected) - 15.0(1)S4a (Status: affected) - 15.0(1)S6 (Status: affected) - 15.2(1)S (Status: affected) - 15.2(2)S (Status: affected) - 15.2(1)S1 (Status: affected) - 15.2(4)S (Status: affected) - 15.2(1)S2 (Status: affected) - 15.2(2)S1 (Status: affected) - 15.2(2)S2 (Status: affected) - 15.2(2)S0a (Status: affected) - 15.2(2)S0c (Status: affected) - 15.2(4)S1 (Status: affected) - 15.2(4)S4 (Status: affected) - 15.2(4)S6 (Status: affected) - 15.2(4)S2 (Status: affected) - 15.2(4)S5 (Status: affected) - 15.2(4)S3 (Status: affected) - 15.2(4)S3a (Status: affected) - 15.2(4)S4a (Status: affected) - 15.2(4)S7 (Status: affected) - 15.3(1)T (Status: affected) - 15.3(2)T (Status: affected) - 15.3(1)T1 (Status: affected) - 15.3(1)T2 (Status: affected) - 15.3(1)T3 (Status: affected) - 15.3(1)T4 (Status: affected) - 15.3(2)T1 (Status: affected) - 15.3(2)T2 (Status: affected) - 15.3(2)T3 (Status: affected) - 15.3(2)T4 (Status: affected) - 15.0(1)EY (Status: affected) - 15.0(1)EY1 (Status: affected) - 15.0(1)EY2 (Status: affected) - 15.0(2)EY (Status: affected) - 15.0(2)EY1 (Status: affected) - 15.0(2)EY2 (Status: affected) - 15.0(2)EY3 (Status: affected) - 12.2(54)WO (Status: affected) - 15.1(2)S (Status: affected) - 15.1(1)S (Status: affected) - 15.1(1)S1 (Status: affected) - 15.1(3)S (Status: affected) - 15.1(1)S2 (Status: affected) - 15.1(2)S1 (Status: affected) - 15.1(2)S2 (Status: affected) - 15.1(3)S1 (Status: affected) - 15.1(3)S0a (Status: affected) - 15.1(3)S2 (Status: affected) - 15.1(3)S4 (Status: affected) - 15.1(3)S3 (Status: affected) - 15.1(3)S5 (Status: affected) - 15.1(3)S6 (Status: affected) - 15.1(3)S5a (Status: affected) - 15.1(4)M3 (Status: affected) - 15.1(4)M (Status: affected) - 15.1(4)M1 (Status: affected) - 15.1(4)M2 (Status: affected) - 15.1(4)M6 (Status: affected) - 15.1(4)M5 (Status: affected) - 15.1(4)M4 (Status: affected) - 15.1(4)M7 (Status: affected) - 15.1(4)M3a (Status: affected) - 15.1(4)M10 (Status: affected) - 15.1(4)M8 (Status: affected) - 15.1(4)M9 (Status: affected) - 15.0(1)SE (Status: affected) - 15.0(2)SE (Status: affected) - 15.0(1)SE1 (Status: affected) - 15.0(1)SE2 (Status: affected) - 15.0(1)SE3 (Status: affected) - 15.0(2)SE1 (Status: affected) - 15.0(2)SE2 (Status: affected) - 15.0(2)SE3 (Status: affected) - 15.0(2)SE4 (Status: affected) - 15.0(2)SE5 (Status: affected) - 15.0(2)SE6 (Status: affected) - 15.0(2)SE7 (Status: affected) - 15.0(2)SE8 (Status: affected) - 15.0(2)SE9 (Status: affected) - 15.0(2)SE10 (Status: affected) - 15.0(2)SE11 (Status: affected) - 15.0(2)SE10a (Status: affected) - 15.0(2)SE12 (Status: affected) - 15.0(2)SE13 (Status: affected) - 15.1(2)GC (Status: affected) - 15.1(2)GC1 (Status: affected) - 15.1(2)GC2 (Status: affected) - 15.1(4)GC (Status: affected) - 15.1(4)GC1 (Status: affected) - 15.1(4)GC2 (Status: affected) - 15.0(1)SY (Status: affected) - 15.0(1)SY1 (Status: affected) - 15.0(1)SY2 (Status: affected) - 15.0(1)SY3 (Status: affected) - 15.0(1)SY4 (Status: affected) - 15.0(1)SY5 (Status: affected) - 15.0(1)SY6 (Status: affected) - 15.0(1)SY7 (Status: affected) - 15.0(1)SY8 (Status: affected) - 15.0(1)SY7a (Status: affected) - 15.0(1)SY9 (Status: affected) - 15.0(1)SY10 (Status: affected) - 15.1(1)SG (Status: affected) - 15.1(2)SG (Status: affected) - 15.1(1)SG1 (Status: affected) - 15.1(1)SG2 (Status: affected) - 15.1(2)SG1 (Status: affected) - 15.1(2)SG2 (Status: affected) - 15.1(2)SG3 (Status: affected) - 15.1(2)SG4 (Status: affected) - 15.1(2)SG5 (Status: affected) - 15.1(2)SG6 (Status: affected) - 15.1(2)SG7 (Status: affected) - 15.1(2)SG8 (Status: affected) - 15.0(1)MR (Status: affected) - 15.0(2)MR (Status: affected) - 15.2(4)M (Status: affected) - 15.2(4)M1 (Status: affected) - 15.2(4)M2 (Status: affected) - 15.2(4)M4 (Status: affected) - 15.2(4)M3 (Status: affected) - 15.2(4)M5 (Status: affected) - 15.2(4)M8 (Status: affected) - 15.2(4)M10 (Status: affected) - 15.2(4)M7 (Status: affected) - 15.2(4)M6 (Status: affected) - 15.2(4)M9 (Status: affected) - 15.2(4)M6a (Status: affected) - 15.2(4)M11 (Status: affected) - 15.0(2)SG (Status: affected) - 15.0(2)SG1 (Status: affected) - 15.0(2)SG2 (Status: affected) - 15.0(2)SG3 (Status: affected) - 15.0(2)SG4 (Status: affected) - 15.0(2)SG5 (Status: affected) - 15.0(2)SG6 (Status: affected) - 15.0(2)SG7 (Status: affected) - 15.0(2)SG8 (Status: affected) - 15.0(2)SG9 (Status: affected) - 15.0(2)SG10 (Status: affected) - 15.0(2)SG11 (Status: affected) - 15.0(1)EX (Status: affected) - 15.0(2)EX (Status: affected) - 15.0(2)EX1 (Status: affected) - 15.0(2)EX2 (Status: affected) - 15.0(2)EX3 (Status: affected) - 15.0(2)EX4 (Status: affected) - 15.0(2)EX5 (Status: affected) - 15.0(2)EX8 (Status: affected) - 15.0(2a)EX5 (Status: affected) - 15.0(2)EX10 (Status: affected) - 15.0(2)EX11 (Status: affected) - 15.0(2)EX13 (Status: affected) - 15.0(2)EX12 (Status: affected) - 15.2(1)GC (Status: affected) - 15.2(1)GC1 (Status: affected) - 15.2(1)GC2 (Status: affected) - 15.2(2)GC (Status: affected) - 15.2(3)GC (Status: affected) - 15.2(3)GC1 (Status: affected) - 15.2(4)GC (Status: affected) - 15.2(4)GC1 (Status: affected) - 15.2(4)GC2 (Status: affected) - 15.2(4)GC3 (Status: affected) - 15.1(1)SY (Status: affected) - 15.1(1)SY1 (Status: affected) - 15.1(2)SY (Status: affected) - 15.1(2)SY1 (Status: affected) - 15.1(2)SY2 (Status: affected) - 15.1(1)SY2 (Status: affected) - 15.1(1)SY3 (Status: affected) - 15.1(2)SY3 (Status: affected) - 15.1(1)SY4 (Status: affected) - 15.1(2)SY4 (Status: affected) - 15.1(1)SY5 (Status: affected) - 15.1(2)SY5 (Status: affected) - 15.1(2)SY4a (Status: affected) - 15.1(1)SY6 (Status: affected) - 15.1(2)SY6 (Status: affected) - 15.1(2)SY7 (Status: affected) - 15.1(2)SY8 (Status: affected) - 15.1(2)SY9 (Status: affected) - 15.1(2)SY10 (Status: affected) - 15.1(2)SY11 (Status: affected) - 15.1(2)SY12 (Status: affected) - 15.1(2)SY13 (Status: affected) - 15.1(2)SY14 (Status: affected) - 15.1(2)SY15 (Status: affected) - 15.1(2)SY16 (Status: affected) - 15.3(1)S (Status: affected) - 15.3(2)S (Status: affected) - 15.3(3)S (Status: affected) - 15.3(1)S2 (Status: affected) - 15.3(1)S1 (Status: affected) - 15.3(2)S2 (Status: affected) - 15.3(2)S1 (Status: affected) - 15.3(3)S1 (Status: affected) - 15.3(3)S2 (Status: affected) - 15.3(3)S3 (Status: affected) - 15.3(3)S6 (Status: affected) - 15.3(3)S4 (Status: affected) - 15.3(3)S1a (Status: affected) - 15.3(3)S5 (Status: affected) - 15.3(3)S7 (Status: affected) - 15.3(3)S8 (Status: affected) - 15.3(3)S9 (Status: affected) - 15.3(3)S10 (Status: affected) - 15.3(3)S8a (Status: affected) - 15.4(1)T (Status: affected) - 15.4(2)T (Status: affected) - 15.4(1)T2 (Status: affected) - 15.4(1)T1 (Status: affected) - 15.4(1)T3 (Status: affected) - 15.4(2)T1 (Status: affected) - 15.4(2)T3 (Status: affected) - 15.4(2)T2 (Status: affected) - 15.4(1)T4 (Status: affected) - 15.4(2)T4 (Status: affected) - 15.0(2)EA (Status: affected) - 15.0(2)EA1 (Status: affected) - 15.2(1)E (Status: affected) - 15.2(2)E (Status: affected) - 15.2(1)E1 (Status: affected) - 15.2(3)E (Status: affected) - 15.2(1)E2 (Status: affected) - 15.2(1)E3 (Status: affected) - 15.2(2)E1 (Status: affected) - 15.2(4)E (Status: affected) - 15.2(3)E1 (Status: affected) - 15.2(2)E2 (Status: affected) - 15.2(2a)E1 (Status: affected) - 15.2(2)E3 (Status: affected) - 15.2(2a)E2 (Status: affected) - 15.2(3)E2 (Status: affected) - 15.2(3a)E (Status: affected) - 15.2(3)E3 (Status: affected) - 15.2(4)E1 (Status: affected) - 15.2(2)E4 (Status: affected) - 15.2(2)E5 (Status: affected) - 15.2(4)E2 (Status: affected) - 15.2(3)E4 (Status: affected) - 15.2(5)E (Status: affected) - 15.2(4)E3 (Status: affected) - 15.2(2)E6 (Status: affected) - 15.2(5a)E (Status: affected) - 15.2(5)E1 (Status: affected) - 15.2(5b)E (Status: affected) - 15.2(2)E5a (Status: affected) - 15.2(5c)E (Status: affected) - 15.2(2)E5b (Status: affected) - 15.2(5a)E1 (Status: affected) - 15.2(4)E4 (Status: affected) - 15.2(2)E7 (Status: affected) - 15.2(5)E2 (Status: affected) - 15.2(6)E (Status: affected) - 15.2(4)E5 (Status: affected) - 15.2(5)E2c (Status: affected) - 15.2(2)E8 (Status: affected) - 15.2(6)E0a (Status: affected) - 15.2(6)E1 (Status: affected) - 15.2(6)E0c (Status: affected) - 15.2(4)E6 (Status: affected) - 15.2(6)E2 (Status: affected) - 15.2(2)E9 (Status: affected) - 15.2(4)E7 (Status: affected) - 15.2(7)E (Status: affected) - 15.2(2)E10 (Status: affected) - 15.2(4)E8 (Status: affected) - 15.2(6)E2a (Status: affected) - 15.2(6)E2b (Status: affected) - 15.2(7)E1 (Status: affected) - 15.2(7)E0a (Status: affected) - 15.2(7)E0b (Status: affected) - 15.2(7)E0s (Status: affected) - 15.2(6)E3 (Status: affected) - 15.2(4)E9 (Status: affected) - 15.2(7)E2 (Status: affected) - 15.2(7a)E0b (Status: affected) - 15.2(4)E10 (Status: affected) - 15.2(7)E3 (Status: affected) - 15.2(7)E1a (Status: affected) - 15.2(7b)E0b (Status: affected) - 15.2(7)E2a (Status: affected) - 15.2(4)E10a (Status: affected) - 15.2(7)E4 (Status: affected) - 15.2(7)E3k (Status: affected) - 15.2(8)E (Status: affected) - 15.2(8)E1 (Status: affected) - 15.2(7)E5 (Status: affected) - 15.2(7)E6 (Status: affected) - 15.2(8)E2 (Status: affected) - 15.2(4)E10d (Status: affected) - 15.2(7)E7 (Status: affected) - 15.2(8)E3 (Status: affected) - 15.2(7)E8 (Status: affected) - 15.2(8)E4 (Status: affected) - 15.2(7)E9 (Status: affected) - 15.2(8)E5 (Status: affected) - 15.2(8)E6 (Status: affected) - 15.2(7)E10 (Status: affected) - 15.2(7)E11 (Status: affected) - 15.2(8)E7 (Status: affected) - 15.1(3)MRA (Status: affected) - 15.1(3)MRA1 (Status: affected) - 15.1(3)MRA2 (Status: affected) - 15.1(3)MRA3 (Status: affected) - 15.1(3)MRA4 (Status: affected) - 15.1(3)SVB1 (Status: affected) - 15.1(3)SVB2 (Status: affected) - 15.2(2)JB (Status: affected) - 15.2(2)JB2 (Status: affected) - 15.2(4)JB (Status: affected) - 15.2(2)JB3 (Status: affected) - 15.2(4)JB1 (Status: affected) - 15.2(4)JB2 (Status: affected) - 15.2(4)JB3 (Status: affected) - 15.2(4)JB3a (Status: affected) - 15.2(2)JB4 (Status: affected) - 15.2(4)JB4 (Status: affected) - 15.2(4)JB3h (Status: affected) - 15.2(4)JB3b (Status: affected) - 15.2(4)JB3s (Status: affected) - 15.2(4)JB5h (Status: affected) - 15.2(4)JB5 (Status: affected) - 15.2(4)JB5m (Status: affected) - 15.2(4)JB6 (Status: affected) - 15.2(2)JB5 (Status: affected) - 15.2(2)JB6 (Status: affected) - 15.4(1)S (Status: affected) - 15.4(2)S (Status: affected) - 15.4(3)S (Status: affected) - 15.4(1)S1 (Status: affected) - 15.4(1)S2 (Status: affected) - 15.4(2)S1 (Status: affected) - 15.4(1)S3 (Status: affected) - 15.4(3)S1 (Status: affected) - 15.4(2)S2 (Status: affected) - 15.4(3)S2 (Status: affected) - 15.4(3)S3 (Status: affected) - 15.4(1)S4 (Status: affected) - 15.4(2)S3 (Status: affected) - 15.4(2)S4 (Status: affected) - 15.4(3)S4 (Status: affected) - 15.4(3)S5 (Status: affected) - 15.4(3)S6 (Status: affected) - 15.4(3)S7 (Status: affected) - 15.4(3)S6a (Status: affected) - 15.4(3)S8 (Status: affected) - 15.4(3)S9 (Status: affected) - 15.4(3)S10 (Status: affected) - 15.2(2)JAX (Status: affected) - 15.3(3)M (Status: affected) - 15.3(3)M1 (Status: affected) - 15.3(3)M2 (Status: affected) - 15.3(3)M3 (Status: affected) - 15.3(3)M5 (Status: affected) - 15.3(3)M4 (Status: affected) - 15.3(3)M6 (Status: affected) - 15.3(3)M7 (Status: affected) - 15.3(3)M8 (Status: affected) - 15.3(3)M9 (Status: affected) - 15.3(3)M10 (Status: affected) - 15.3(3)M8a (Status: affected) - 15.2(4)JN (Status: affected) - 15.0(2)EZ (Status: affected) - 15.1(3)SVD (Status: affected) - 15.1(3)SVD1 (Status: affected) - 15.1(3)SVD2 (Status: affected) - 15.2(1)EY (Status: affected) - 15.0(2)EJ (Status: affected) - 15.0(2)EJ1 (Status: affected) - 15.2(1)SY (Status: affected) - 15.2(1)SY1 (Status: affected) - 15.2(1)SY0a (Status: affected) - 15.2(1)SY2 (Status: affected) - 15.2(2)SY (Status: affected) - 15.2(1)SY1a (Status: affected) - 15.2(2)SY1 (Status: affected) - 15.2(2)SY2 (Status: affected) - 15.2(1)SY3 (Status: affected) - 15.2(1)SY4 (Status: affected) - 15.2(2)SY3 (Status: affected) - 15.2(1)SY5 (Status: affected) - 15.2(1)SY6 (Status: affected) - 15.2(1)SY7 (Status: affected) - 15.2(1)SY8 (Status: affected) - 15.2(5)EX (Status: affected) - 15.1(3)SVF (Status: affected) - 15.1(3)SVF1 (Status: affected) - 15.1(3)SVE (Status: affected) - 15.0(2)EK (Status: affected) - 15.0(2)EK1 (Status: affected) - 15.4(1)CG (Status: affected) - 15.4(1)CG1 (Status: affected) - 15.4(2)CG (Status: affected) - 15.5(1)S (Status: affected) - 15.5(2)S (Status: affected) - 15.5(1)S1 (Status: affected) - 15.5(3)S (Status: affected) - 15.5(1)S2 (Status: affected) - 15.5(1)S3 (Status: affected) - 15.5(2)S1 (Status: affected) - 15.5(2)S2 (Status: affected) - 15.5(3)S1 (Status: affected) - 15.5(3)S1a (Status: affected) - 15.5(2)S3 (Status: affected) - 15.5(3)S2 (Status: affected) - 15.5(3)S0a (Status: affected) - 15.5(3)S3 (Status: affected) - 15.5(1)S4 (Status: affected) - 15.5(2)S4 (Status: affected) - 15.5(3)S4 (Status: affected) - 15.5(3)S5 (Status: affected) - 15.5(3)S6 (Status: affected) - 15.5(3)S6a (Status: affected) - 15.5(3)S7 (Status: affected) - 15.5(3)S6b (Status: affected) - 15.5(3)S8 (Status: affected) - 15.5(3)S9 (Status: affected) - 15.5(3)S10 (Status: affected) - 15.5(3)S9a (Status: affected) - 15.1(3)SVG (Status: affected) - 15.2(2)EB (Status: affected) - 15.2(2)EB1 (Status: affected) - 15.2(2)EB2 (Status: affected) - 15.2(6)EB (Status: affected) - 15.5(1)T (Status: affected) - 15.5(1)T1 (Status: affected) - 15.5(2)T (Status: affected) - 15.5(1)T2 (Status: affected) - 15.5(1)T3 (Status: affected) - 15.5(2)T1 (Status: affected) - 15.5(2)T2 (Status: affected) - 15.5(2)T3 (Status: affected) - 15.5(2)T4 (Status: affected) - 15.5(1)T4 (Status: affected) - 15.2(2)EA (Status: affected) - 15.2(2)EA1 (Status: affected) - 15.2(2)EA2 (Status: affected) - 15.2(3)EA (Status: affected) - 15.2(4)EA (Status: affected) - 15.2(4)EA1 (Status: affected) - 15.2(2)EA3 (Status: affected) - 15.2(4)EA3 (Status: affected) - 15.2(5)EA (Status: affected) - 15.2(4)EA4 (Status: affected) - 15.2(4)EA5 (Status: affected) - 15.2(4)EA6 (Status: affected) - 15.2(4)EA7 (Status: affected) - 15.2(4)EA8 (Status: affected) - 15.2(4)EA9 (Status: affected) - 15.2(4)EA9a (Status: affected) - 15.3(3)JN3 (Status: affected) - 15.3(3)JN4 (Status: affected) - 15.3(3)JN7 (Status: affected) - 15.3(3)JN8 (Status: affected) - 15.3(3)JN9 (Status: affected) - 15.5(3)M (Status: affected) - 15.5(3)M1 (Status: affected) - 15.5(3)M0a (Status: affected) - 15.5(3)M2 (Status: affected) - 15.5(3)M3 (Status: affected) - 15.5(3)M4 (Status: affected) - 15.5(3)M4a (Status: affected) - 15.5(3)M5 (Status: affected) - 15.5(3)M6 (Status: affected) - 15.5(3)M7 (Status: affected) - 15.5(3)M6a (Status: affected) - 15.5(3)M8 (Status: affected) - 15.5(3)M9 (Status: affected) - 15.5(3)M10 (Status: affected) - 15.3(3)JA (Status: affected) - 15.3(3)JA1m (Status: affected) - 15.3(3)JA1 (Status: affected) - 15.3(3)JA4 (Status: affected) - 15.3(3)JA5 (Status: affected) - 15.3(3)JA6 (Status: affected) - 15.3(3)JA7 (Status: affected) - 15.3(3)JA8 (Status: affected) - 15.3(3)JA10 (Status: affected) - 15.3(3)JA11 (Status: affected) - 15.3(3)JA12 (Status: affected) - 15.3(3)JAA (Status: affected) - 15.3(3)JAA11 (Status: affected) - 15.3(3)JAA12 (Status: affected) - 15.3(3)JAB (Status: affected) - 15.3(3)JB (Status: affected) - 15.5(3)SN (Status: affected) - 15.0(2)SQD (Status: affected) - 15.0(2)SQD1 (Status: affected) - 15.0(2)SQD2 (Status: affected) - 15.0(2)SQD3 (Status: affected) - 15.0(2)SQD4 (Status: affected) - 15.0(2)SQD5 (Status: affected) - 15.0(2)SQD6 (Status: affected) - 15.0(2)SQD7 (Status: affected) - 15.0(2)SQD8 (Status: affected) - 15.6(1)S (Status: affected) - 15.6(2)S (Status: affected) - 15.6(2)S1 (Status: affected) - 15.6(1)S1 (Status: affected) - 15.6(1)S2 (Status: affected) - 15.6(2)S2 (Status: affected) - 15.6(1)S3 (Status: affected) - 15.6(2)S3 (Status: affected) - 15.6(1)S4 (Status: affected) - 15.6(2)S4 (Status: affected) - 15.6(1)T (Status: affected) - 15.6(2)T (Status: affected) - 15.6(1)T0a (Status: affected) - 15.6(1)T1 (Status: affected) - 15.6(2)T1 (Status: affected) - 15.6(1)T2 (Status: affected) - 15.6(2)T2 (Status: affected) - 15.6(1)T3 (Status: affected) - 15.6(2)T3 (Status: affected) - 15.3(3)JNB (Status: affected) - 15.3(3)JNB1 (Status: affected) - 15.3(3)JNB2 (Status: affected) - 15.3(3)JNB3 (Status: affected) - 15.3(3)JNB4 (Status: affected) - 15.3(3)JNB6 (Status: affected) - 15.3(3)JNB5 (Status: affected) - 15.3(3)JAX (Status: affected) - 15.3(3)JAX1 (Status: affected) - 15.3(3)JAX2 (Status: affected) - 15.3(3)JBB (Status: affected) - 15.3(3)JBB1 (Status: affected) - 15.3(3)JBB2 (Status: affected) - 15.3(3)JBB4 (Status: affected) - 15.3(3)JBB5 (Status: affected) - 15.3(3)JBB6 (Status: affected) - 15.3(3)JBB8 (Status: affected) - 15.3(3)JBB6a (Status: affected) - 15.3(3)JC (Status: affected) - 15.3(3)JC1 (Status: affected) - 15.3(3)JC2 (Status: affected) - 15.3(3)JC3 (Status: affected) - 15.3(3)JC4 (Status: affected) - 15.3(3)JC5 (Status: affected) - 15.3(3)JC6 (Status: affected) - 15.3(3)JC8 (Status: affected) - 15.3(3)JC9 (Status: affected) - 15.3(3)JC14 (Status: affected) - 15.3(1)SY (Status: affected) - 15.3(1)SY1 (Status: affected) - 15.3(1)SY2 (Status: affected) - 15.3(3)JNC (Status: affected) - 15.3(3)JNC1 (Status: affected) - 15.3(3)JNC2 (Status: affected) - 15.3(3)JNC3 (Status: affected) - 15.3(3)JNC4 (Status: affected) - 15.3(3)JNP (Status: affected) - 15.3(3)JNP1 (Status: affected) - 15.3(3)JNP3 (Status: affected) - 15.6(2)SP (Status: affected) - 15.6(2)SP1 (Status: affected) - 15.6(2)SP2 (Status: affected) - 15.6(2)SP3 (Status: affected) - 15.6(2)SP4 (Status: affected) - 15.6(2)SP5 (Status: affected) - 15.6(2)SP6 (Status: affected) - 15.6(2)SP7 (Status: affected) - 15.6(2)SP8 (Status: affected) - 15.6(2)SP9 (Status: affected) - 15.6(2)SN (Status: affected) - 15.3(3)JPB (Status: affected) - 15.3(3)JPB1 (Status: affected) - 15.3(3)JD (Status: affected) - 15.3(3)JD2 (Status: affected) - 15.3(3)JD3 (Status: affected) - 15.3(3)JD4 (Status: affected) - 15.3(3)JD5 (Status: affected) - 15.3(3)JD6 (Status: affected) - 15.3(3)JD7 (Status: affected) - 15.3(3)JD8 (Status: affected) - 15.3(3)JD9 (Status: affected) - 15.3(3)JD11 (Status: affected) - 15.3(3)JD13 (Status: affected) - 15.3(3)JD14 (Status: affected) - 15.3(3)JD16 (Status: affected) - 15.3(3)JD17 (Status: affected) - 15.6(3)M (Status: affected) - 15.6(3)M1 (Status: affected) - 15.6(3)M0a (Status: affected) - 15.6(3)M1b (Status: affected) - 15.6(3)M2 (Status: affected) - 15.6(3)M2a (Status: affected) - 15.6(3)M3 (Status: affected) - 15.6(3)M3a (Status: affected) - 15.6(3)M4 (Status: affected) - 15.6(3)M5 (Status: affected) - 15.6(3)M6 (Status: affected) - 15.6(3)M7 (Status: affected) - 15.6(3)M6a (Status: affected) - 15.6(3)M6b (Status: affected) - 15.6(3)M8 (Status: affected) - 15.6(3)M9 (Status: affected) - 15.1(3)SVJ2 (Status: affected) - 15.2(4)EC1 (Status: affected) - 15.2(4)EC2 (Status: affected) - 15.3(3)JPC (Status: affected) - 15.3(3)JPC1 (Status: affected) - 15.3(3)JPC2 (Status: affected) - 15.3(3)JPC3 (Status: affected) - 15.3(3)JPC100 (Status: affected) - 15.3(3)JPC5 (Status: affected) - 15.3(3)JND (Status: affected) - 15.3(3)JND1 (Status: affected) - 15.3(3)JND2 (Status: affected) - 15.3(3)JND3 (Status: affected) - 15.4(1)SY (Status: affected) - 15.4(1)SY1 (Status: affected) - 15.4(1)SY2 (Status: affected) - 15.4(1)SY3 (Status: affected) - 15.4(1)SY4 (Status: affected) - 15.3(3)JE (Status: affected) - 15.3(3)JPD (Status: affected) - 15.3(3)JDA7 (Status: affected) - 15.3(3)JDA8 (Status: affected) - 15.3(3)JDA9 (Status: affected) - 15.3(3)JDA11 (Status: affected) - 15.3(3)JDA13 (Status: affected) - 15.3(3)JDA14 (Status: affected) - 15.3(3)JDA16 (Status: affected) - 15.3(3)JDA17 (Status: affected) - 15.5(1)SY (Status: affected) - 15.5(1)SY1 (Status: affected) - 15.5(1)SY2 (Status: affected) - 15.5(1)SY3 (Status: affected) - 15.5(1)SY4 (Status: affected) - 15.5(1)SY5 (Status: affected) - 15.5(1)SY6 (Status: affected) - 15.5(1)SY7 (Status: affected) - 15.5(1)SY8 (Status: affected) - 15.5(1)SY9 (Status: affected) - 15.5(1)SY10 (Status: affected) - 15.5(1)SY11 (Status: affected) - 15.5(1)SY12 (Status: affected) - 15.5(1)SY13 (Status: affected) - 15.5(1)SY14 (Status: affected) - 15.3(3)JF (Status: affected) - 15.3(3)JF1 (Status: affected) - 15.3(3)JF2 (Status: affected) - 15.3(3)JF4 (Status: affected) - 15.3(3)JF5 (Status: affected) - 15.3(3)JF6 (Status: affected) - 15.3(3)JF7 (Status: affected) - 15.3(3)JF8 (Status: affected) - 15.3(3)JF9 (Status: affected) - 15.3(3)JF10 (Status: affected) - 15.3(3)JF11 (Status: affected) - 15.3(3)JF12 (Status: affected) - 15.3(3)JF12i (Status: affected) - 15.3(3)JF14 (Status: affected) - 15.3(3)JF14i (Status: affected) - 15.3(3)JF15 (Status: affected) - 15.3(3)JCA7 (Status: affected) - 15.3(3)JCA8 (Status: affected) - 15.3(3)JCA9 (Status: affected) - 15.7(3)M (Status: affected) - 15.7(3)M1 (Status: affected) - 15.7(3)M0a (Status: affected) - 15.7(3)M3 (Status: affected) - 15.7(3)M2 (Status: affected) - 15.7(3)M4 (Status: affected) - 15.7(3)M5 (Status: affected) - 15.7(3)M4a (Status: affected) - 15.7(3)M4b (Status: affected) - 15.7(3)M6 (Status: affected) - 15.7(3)M7 (Status: affected) - 15.7(3)M8 (Status: affected) - 15.7(3)M9 (Status: affected) - 15.3(3)JG (Status: affected) - 15.3(3)JG1 (Status: affected) - 15.3(3)JH (Status: affected) - 15.3(3)JH1 (Status: affected) - 15.3(3)JI1 (Status: affected) - 15.3(3)JI3 (Status: affected) - 15.3(3)JI4 (Status: affected) - 15.3(3)JI5 (Status: affected) - 15.3(3)JI6 (Status: affected) - 15.8(3)M (Status: affected) - 15.8(3)M1 (Status: affected) - 15.8(3)M0a (Status: affected) - 15.8(3)M0b (Status: affected) - 15.8(3)M2 (Status: affected) - 15.8(3)M1a (Status: affected) - 15.8(3)M3 (Status: affected) - 15.8(3)M2a (Status: affected) - 15.8(3)M4 (Status: affected) - 15.8(3)M3a (Status: affected) - 15.8(3)M3b (Status: affected) - 15.8(3)M5 (Status: affected) - 15.8(3)M6 (Status: affected) - 15.8(3)M7 (Status: affected) - 15.8(3)M8 (Status: affected) - 15.8(3)M9 (Status: affected) - 15.9(3)M (Status: affected) - 15.9(3)M1 (Status: affected) - 15.9(3)M0a (Status: affected) - 15.9(3)M2 (Status: affected) - 15.9(3)M3 (Status: affected) - 15.9(3)M2a (Status: affected) - 15.9(3)M3a (Status: affected) - 15.9(3)M4 (Status: affected) - 15.9(3)M3b (Status: affected) - 15.9(3)M5 (Status: affected) - 15.9(3)M4a (Status: affected) - 15.9(3)M6 (Status: affected) - 15.9(3)M7 (Status: affected) - 15.9(3)M6a (Status: affected) - 15.9(3)M6b (Status: affected) - 15.9(3)M8 (Status: affected) - 15.9(3)M7a (Status: affected) - 15.9(3)M9 (Status: affected) - 15.9(3)M8b (Status: affected) - 15.9(3)M10 (Status: affected) - 15.3(3)JK (Status: affected) - 15.3(3)JK1 (Status: affected) - 15.3(3)JK2 (Status: affected) - 15.3(3)JK3 (Status: affected) - 15.3(3)JK2a (Status: affected) - 15.3(3)JK1t (Status: affected) - 15.3(3)JK4 (Status: affected) - 15.3(3)JK5 (Status: affected) - 15.3(3)JK6 (Status: affected) - 15.3(3)JK7 (Status: affected) - 15.3(3)JK8 (Status: affected) - 15.3(3)JK8a (Status: affected) - 15.3(3)JK8b (Status: affected) - 15.3(3)JK9 (Status: affected) - 15.3(3)JK10 (Status: affected) - 15.3(3)JK11 (Status: affected) - 15.3(3)JJ (Status: affected) - 15.3(3)JJ1 (Status: affected) - 15.3(3)JPI1 (Status: affected) - 15.3(3)JPI4 (Status: affected) - 15.3(3)JPI1t (Status: affected) - 15.3(3)JPI5 (Status: affected) - 15.3(3)JPI7 (Status: affected) - 15.3(3)JPI6a (Status: affected) - 15.3(3)JPI8a (Status: affected) - 15.3(3)JPI9 (Status: affected) - 15.3(3)JPI10 (Status: affected) - 15.3(3)JPJ2 (Status: affected) - 15.3(3)JPJ3 (Status: affected) - 15.3(3)JPJ2t (Status: affected) - 15.3(3)JPJ3a (Status: affected) - 15.3(3)JPJ4 (Status: affected) - 15.3(3)JPJ5 (Status: affected) - 15.3(3)JPJ6 (Status: affected) - 15.3(3)JPJ7 (Status: affected) - 15.3(3)JPJ7c (Status: affected) - 15.3(3)JPJ8a (Status: affected) - 15.3(3)JPJ9 (Status: affected) - 15.3(3)JPJ10 (Status: affected) - 15.3(3)JPJ11 (Status: affected) - 15.3(3)JPK (Status: affected) - 15.3(3)JPK1 (Status: affected) - 15.3(3)JPK2 (Status: affected) - 15.3(3)JPK3 (Status: affected) - 15.3(3)JPK4 (Status: affected) - 15.3(3)JPK5 (Status: affected) - 15.3(3)JPK6 (Status: affected) - 15.3(3)JPK7 (Status: affected) - 15.3(3)JPK8 (Status: affected) - 15.3(3)JPK9 (Status: affected) - 15.3(3)JPL (Status: affected) - 15.3(3)JPM (Status: affected) - 15.3(3)JPN (Status: affected) - 15.3(3)JPN1 (Status: affected) - 15.3(3)JPN2 (Status: affected) - 15.3(3)JPN3 (Status: affected) - 15.3(3)JPN4 (Status: affected) - 15.3(3)JPN5 (Status: affected) - 15.3(3)JPN6 (Status: affected) - 15.3(3)JPO (Status: affected) - 15.3(3)JPP (Status: affected) - 15.3(3)JPQ (Status: affected) - 15.3(3)JPQ1 (Status: affected) - 15.3(3)JPQ2 (Status: affected) - 15.3(3)JPQ3 (Status: affected) - 15.3(3)JPQ4 (Status: affected) - 15.3(3)JPR (Status: affected) - 15.3(3)JPS (Status: affected) - 15.3(3)JPT (Status: affected) - 15.3(3)JPT1 (Status: affected) - 15.3(3)JPU (Status: affected) **Cisco - Cisco IOS XE Software** Affected versions: - 3.2.0SG (Status: affected) - 3.2.1SG (Status: affected) - 3.2.2SG (Status: affected) - 3.2.3SG (Status: affected) - 3.2.4SG (Status: affected) - 3.2.5SG (Status: affected) - 3.2.6SG (Status: affected) - 3.2.7SG (Status: affected) - 3.2.8SG (Status: affected) - 3.2.9SG (Status: affected) - 3.2.10SG (Status: affected) - 3.2.11SG (Status: affected) - 3.7.0S (Status: affected) - 3.7.1S (Status: affected) - 3.7.2S (Status: affected) - 3.7.3S (Status: affected) - 3.7.4S (Status: affected) - 3.7.5S (Status: affected) - 3.7.6S (Status: affected) - 3.7.7S (Status: affected) - 3.7.4aS (Status: affected) - 3.7.2tS (Status: affected) - 3.7.0bS (Status: affected) - 3.7.1aS (Status: affected) - 3.3.0SG (Status: affected) - 3.3.2SG (Status: affected) - 3.3.1SG (Status: affected) - 3.8.0S (Status: affected) - 3.8.1S (Status: affected) - 3.8.2S (Status: affected) - 3.9.1S (Status: affected) - 3.9.0S (Status: affected) - 3.9.2S (Status: affected) - 3.9.1aS (Status: affected) - 3.9.0aS (Status: affected) - 3.2.0SE (Status: affected) - 3.2.1SE (Status: affected) - 3.2.2SE (Status: affected) - 3.2.3SE (Status: affected) - 3.3.0SE (Status: affected) - 3.3.1SE (Status: affected) - 3.3.2SE (Status: affected) - 3.3.3SE (Status: affected) - 3.3.4SE (Status: affected) - 3.3.5SE (Status: affected) - 3.4.0SG (Status: affected) - 3.4.2SG (Status: affected) - 3.4.1SG (Status: affected) - 3.4.3SG (Status: affected) - 3.4.4SG (Status: affected) - 3.4.5SG (Status: affected) - 3.4.6SG (Status: affected) - 3.4.7SG (Status: affected) - 3.4.8SG (Status: affected) - 3.5.0E (Status: affected) - 3.5.1E (Status: affected) - 3.5.2E (Status: affected) - 3.5.3E (Status: affected) - 3.10.0S (Status: affected) - 3.10.1S (Status: affected) - 3.10.2S (Status: affected) - 3.10.3S (Status: affected) - 3.10.4S (Status: affected) - 3.10.5S (Status: affected) - 3.10.6S (Status: affected) - 3.10.2tS (Status: affected) - 3.10.7S (Status: affected) - 3.10.1xbS (Status: affected) - 3.10.8S (Status: affected) - 3.10.8aS (Status: affected) - 3.10.9S (Status: affected) - 3.10.10S (Status: affected) - 3.11.1S (Status: affected) - 3.11.2S (Status: affected) - 3.11.0S (Status: affected) - 3.11.3S (Status: affected) - 3.11.4S (Status: affected) - 3.12.0S (Status: affected) - 3.12.1S (Status: affected) - 3.12.2S (Status: affected) - 3.12.3S (Status: affected) - 3.12.0aS (Status: affected) - 3.12.4S (Status: affected) - 3.13.0S (Status: affected) - 3.13.1S (Status: affected) - 3.13.2S (Status: affected) - 3.13.3S (Status: affected) - 3.13.4S (Status: affected) - 3.13.5S (Status: affected) - 3.13.2aS (Status: affected) - 3.13.0aS (Status: affected) - 3.13.5aS (Status: affected) - 3.13.6S (Status: affected) - 3.13.7S (Status: affected) - 3.13.6aS (Status: affected) - 3.13.7aS (Status: affected) - 3.13.8S (Status: affected) - 3.13.9S (Status: affected) - 3.13.10S (Status: affected) - 3.6.0E (Status: affected) - 3.6.1E (Status: affected) - 3.6.2aE (Status: affected) - 3.6.2E (Status: affected) - 3.6.3E (Status: affected) - 3.6.4E (Status: affected) - 3.6.5E (Status: affected) - 3.6.6E (Status: affected) - 3.6.5aE (Status: affected) - 3.6.5bE (Status: affected) - 3.6.7E (Status: affected) - 3.6.8E (Status: affected) - 3.6.7bE (Status: affected) - 3.6.9E (Status: affected) - 3.6.10E (Status: affected) - 3.14.0S (Status: affected) - 3.14.1S (Status: affected) - 3.14.2S (Status: affected) - 3.14.3S (Status: affected) - 3.14.4S (Status: affected) - 3.15.0S (Status: affected) - 3.15.1S (Status: affected) - 3.15.2S (Status: affected) - 3.15.1cS (Status: affected) - 3.15.3S (Status: affected) - 3.15.4S (Status: affected) - 3.3.0SQ (Status: affected) - 3.3.1SQ (Status: affected) - 3.4.0SQ (Status: affected) - 3.4.1SQ (Status: affected) - 3.7.0E (Status: affected) - 3.7.1E (Status: affected) - 3.7.2E (Status: affected) - 3.7.3E (Status: affected) - 3.7.4E (Status: affected) - 3.7.5E (Status: affected) - 3.5.0SQ (Status: affected) - 3.5.1SQ (Status: affected) - 3.5.2SQ (Status: affected) - 3.5.3SQ (Status: affected) - 3.5.4SQ (Status: affected) - 3.5.5SQ (Status: affected) - 3.5.6SQ (Status: affected) - 3.5.7SQ (Status: affected) - 3.5.8SQ (Status: affected) - 3.16.0S (Status: affected) - 3.16.1S (Status: affected) - 3.16.1aS (Status: affected) - 3.16.2S (Status: affected) - 3.16.2aS (Status: affected) - 3.16.0cS (Status: affected) - 3.16.3S (Status: affected) - 3.16.2bS (Status: affected) - 3.16.3aS (Status: affected) - 3.16.4S (Status: affected) - 3.16.4aS (Status: affected) - 3.16.4bS (Status: affected) - 3.16.5S (Status: affected) - 3.16.4dS (Status: affected) - 3.16.6S (Status: affected) - 3.16.7S (Status: affected) - 3.16.6bS (Status: affected) - 3.16.7aS (Status: affected) - 3.16.7bS (Status: affected) - 3.16.8S (Status: affected) - 3.16.9S (Status: affected) - 3.16.10S (Status: affected) - 3.17.0S (Status: affected) - 3.17.1S (Status: affected) - 3.17.2S (Status: affected) - 3.17.1aS (Status: affected) - 3.17.3S (Status: affected) - 3.17.4S (Status: affected) - 16.1.1 (Status: affected) - 16.1.2 (Status: affected) - 16.1.3 (Status: affected) - 16.2.1 (Status: affected) - 16.2.2 (Status: affected) - 3.8.0E (Status: affected) - 3.8.1E (Status: affected) - 3.8.2E (Status: affected) - 3.8.3E (Status: affected) - 3.8.4E (Status: affected) - 3.8.5E (Status: affected) - 3.8.5aE (Status: affected) - 3.8.6E (Status: affected) - 3.8.7E (Status: affected) - 3.8.8E (Status: affected) - 3.8.9E (Status: affected) - 3.8.10E (Status: affected) - 16.3.1 (Status: affected) - 16.3.2 (Status: affected) - 16.3.3 (Status: affected) - 16.3.1a (Status: affected) - 16.3.4 (Status: affected) - 16.3.5 (Status: affected) - 16.3.5b (Status: affected) - 16.3.6 (Status: affected) - 16.3.7 (Status: affected) - 16.3.8 (Status: affected) - 16.3.9 (Status: affected) - 16.3.10 (Status: affected) - 16.3.11 (Status: affected) - 16.4.1 (Status: affected) - 16.4.2 (Status: affected) - 16.4.3 (Status: affected) - 16.5.1 (Status: affected) - 16.5.1a (Status: affected) - 16.5.1b (Status: affected) - 16.5.2 (Status: affected) - 16.5.3 (Status: affected) - 3.18.0aS (Status: affected) - 3.18.0S (Status: affected) - 3.18.1S (Status: affected) - 3.18.2S (Status: affected) - 3.18.3S (Status: affected) - 3.18.4S (Status: affected) - 3.18.0SP (Status: affected) - 3.18.1SP (Status: affected) - 3.18.1aSP (Status: affected) - 3.18.1bSP (Status: affected) - 3.18.1cSP (Status: affected) - 3.18.2SP (Status: affected) - 3.18.2aSP (Status: affected) - 3.18.3SP (Status: affected) - 3.18.4SP (Status: affected) - 3.18.3aSP (Status: affected) - 3.18.3bSP (Status: affected) - 3.18.5SP (Status: affected) - 3.18.6SP (Status: affected) - 3.18.7SP (Status: affected) - 3.18.8aSP (Status: affected) - 3.18.9SP (Status: affected) - 3.9.0E (Status: affected) - 3.9.1E (Status: affected) - 3.9.2E (Status: affected) - 16.6.1 (Status: affected) - 16.6.2 (Status: affected) - 16.6.3 (Status: affected) - 16.6.4 (Status: affected) - 16.6.5 (Status: affected) - 16.6.4a (Status: affected) - 16.6.5a (Status: affected) - 16.6.6 (Status: affected) - 16.6.7 (Status: affected) - 16.6.8 (Status: affected) - 16.6.9 (Status: affected) - 16.6.10 (Status: affected) - 16.7.1 (Status: affected) - 16.7.1a (Status: affected) - 16.7.1b (Status: affected) - 16.7.2 (Status: affected) - 16.7.3 (Status: affected) - 16.7.4 (Status: affected) - 16.8.1 (Status: affected) - 16.8.1a (Status: affected) - 16.8.1b (Status: affected) - 16.8.1s (Status: affected) - 16.8.1c (Status: affected) - 16.8.1d (Status: affected) - 16.8.2 (Status: affected) - 16.8.1e (Status: affected) - 16.8.3 (Status: affected) - 16.9.1 (Status: affected) - 16.9.2 (Status: affected) - 16.9.1a (Status: affected) - 16.9.1b (Status: affected) - 16.9.1s (Status: affected) - 16.9.3 (Status: affected) - 16.9.4 (Status: affected) - 16.9.3a (Status: affected) - 16.9.5 (Status: affected) - 16.9.6 (Status: affected) - 16.9.7 (Status: affected) - 16.9.8 (Status: affected) - 16.10.1 (Status: affected) - 16.10.1a (Status: affected) - 16.10.1b (Status: affected) - 16.10.1s (Status: affected) - 16.10.1c (Status: affected) - 16.10.1e (Status: affected) - 16.10.1d (Status: affected) - 16.10.2 (Status: affected) - 16.10.1f (Status: affected) - 16.10.1g (Status: affected) - 16.10.3 (Status: affected) - 3.10.0E (Status: affected) - 3.10.1E (Status: affected) - 3.10.0cE (Status: affected) - 3.10.2E (Status: affected) - 3.10.3E (Status: affected) - 16.11.1 (Status: affected) - 16.11.1a (Status: affected) - 16.11.1b (Status: affected) - 16.11.2 (Status: affected) - 16.11.1s (Status: affected) - 16.12.1 (Status: affected) - 16.12.1s (Status: affected) - 16.12.1a (Status: affected) - 16.12.1c (Status: affected) - 16.12.1w (Status: affected) - 16.12.2 (Status: affected) - 16.12.1y (Status: affected) - 16.12.2a (Status: affected) - 16.12.3 (Status: affected) - 16.12.8 (Status: affected) - 16.12.2s (Status: affected) - 16.12.1x (Status: affected) - 16.12.1t (Status: affected) - 16.12.4 (Status: affected) - 16.12.3s (Status: affected) - 16.12.3a (Status: affected) - 16.12.4a (Status: affected) - 16.12.5 (Status: affected) - 16.12.6 (Status: affected) - 16.12.1z1 (Status: affected) - 16.12.5a (Status: affected) - 16.12.5b (Status: affected) - 16.12.1z2 (Status: affected) - 16.12.6a (Status: affected) - 16.12.7 (Status: affected) - 16.12.9 (Status: affected) - 16.12.10 (Status: affected) - 16.12.10a (Status: affected) - 16.12.11 (Status: affected) - 16.12.12 (Status: affected) - 3.11.0E (Status: affected) - 3.11.1E (Status: affected) - 3.11.2E (Status: affected) - 3.11.3E (Status: affected) - 3.11.1aE (Status: affected) - 3.11.4E (Status: affected) - 3.11.3aE (Status: affected) - 3.11.5E (Status: affected) - 3.11.6E (Status: affected) - 3.11.7E (Status: affected) - 3.11.8E (Status: affected) - 3.11.9E (Status: affected) - 3.11.10E (Status: affected) - 3.11.11E (Status: affected) - 17.1.1 (Status: affected) - 17.1.1a (Status: affected) - 17.1.1s (Status: affected) - 17.1.1t (Status: affected) - 17.1.3 (Status: affected) - 17.2.1 (Status: affected) - 17.2.1r (Status: affected) - 17.2.1a (Status: affected) - 17.2.1v (Status: affected) - 17.2.2 (Status: affected) - 17.2.3 (Status: affected) - 17.3.1 (Status: affected) - 17.3.2 (Status: affected) - 17.3.3 (Status: affected) - 17.3.1a (Status: affected) - 17.3.1w (Status: affected) - 17.3.2a (Status: affected) - 17.3.1x (Status: affected) - 17.3.1z (Status: affected) - 17.3.4 (Status: affected) - 17.3.5 (Status: affected) - 17.3.4a (Status: affected) - 17.3.6 (Status: affected) - 17.3.4b (Status: affected) - 17.3.4c (Status: affected) - 17.3.5a (Status: affected) - 17.3.5b (Status: affected) - 17.3.7 (Status: affected) - 17.3.8 (Status: affected) - 17.3.8a (Status: affected) - 17.4.1 (Status: affected) - 17.4.2 (Status: affected) - 17.4.1a (Status: affected) - 17.4.1b (Status: affected) - 17.4.2a (Status: affected) - 17.5.1 (Status: affected) - 17.5.1a (Status: affected) - 17.6.1 (Status: affected) - 17.6.2 (Status: affected) - 17.6.1w (Status: affected) - 17.6.1a (Status: affected) - 17.6.1x (Status: affected) - 17.6.3 (Status: affected) - 17.6.1y (Status: affected) - 17.6.1z (Status: affected) - 17.6.3a (Status: affected) - 17.6.4 (Status: affected) - 17.6.1z1 (Status: affected) - 17.6.5 (Status: affected) - 17.6.6 (Status: affected) - 17.6.6a (Status: affected) - 17.6.5a (Status: affected) - 17.6.7 (Status: affected) - 17.6.8 (Status: affected) - 17.6.8a (Status: affected) - 17.7.1 (Status: affected) - 17.7.1a (Status: affected) - 17.7.1b (Status: affected) - 17.7.2 (Status: affected) - 17.10.1 (Status: affected) - 17.10.1a (Status: affected) - 17.10.1b (Status: affected) - 17.8.1 (Status: affected) - 17.8.1a (Status: affected) - 17.9.1 (Status: affected) - 17.9.1w (Status: affected) - 17.9.2 (Status: affected) - 17.9.1a (Status: affected) - 17.9.1x (Status: affected) - 17.9.1y (Status: affected) - 17.9.3 (Status: affected) - 17.9.2a (Status: affected) - 17.9.1x1 (Status: affected) - 17.9.3a (Status: affected) - 17.9.4 (Status: affected) - 17.9.1y1 (Status: affected) - 17.9.5 (Status: affected) - 17.9.4a (Status: affected) - 17.9.5a (Status: affected) - 17.9.5b (Status: affected) - 17.9.6 (Status: affected) - 17.9.6a (Status: affected) - 17.9.5e (Status: affected) - 17.11.1 (Status: affected) - 17.11.1a (Status: affected) - 17.12.1 (Status: affected) - 17.12.1w (Status: affected) - 17.12.1a (Status: affected) - 17.12.1x (Status: affected) - 17.12.2 (Status: affected) - 17.12.3 (Status: affected) - 17.12.2a (Status: affected) - 17.12.1y (Status: affected) - 17.12.1z (Status: affected) - 17.12.4 (Status: affected) - 17.12.3a (Status: affected) - 17.12.1z1 (Status: affected) - 17.12.1z2 (Status: affected) - 17.12.4a (Status: affected) - 17.12.4b (Status: affected) - 17.13.1 (Status: affected) - 17.13.1a (Status: affected) - 17.14.1 (Status: affected) - 17.14.1a (Status: affected) - 17.11.99SW (Status: affected) - 17.15.1 (Status: affected) - 17.15.1w (Status: affected) - 17.15.1a (Status: affected) - 17.15.2 (Status: affected) - 17.15.1b (Status: affected) - 17.15.2b (Status: affected) ### References 1. [cisco-sa-snmp-dos-sdxnSUcW](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2514, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2514 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2514 - **State**: PUBLISHED - **Published Date**: September 09, 2015 at 00:00 UTC - **Last Updated**: August 06, 2024 at 05:17 UTC - **Reserved Date**: March 19, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Journal in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows remote attackers to execute arbitrary code via a crafted .jnt file, aka "Windows Journal RCE Vulnerability," a different vulnerability than CVE-2015-2513 and CVE-2015-2530. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS15-098](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-098) 2. [1033484](http://www.securitytracker.com/id/1033484)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39603, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39603 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39603 - **State**: PUBLISHED - **Published Date**: January 14, 2025 at 14:21 UTC - **Last Updated**: January 14, 2025 at 16:04 UTC - **Reserved Date**: June 28, 2024 at 18:06 UTC - **Assigned By**: talos ### Vulnerability Description A stack-based buffer overflow vulnerability exists in the wireless.cgi set_wifi_basic_mesh() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Wavlink - Wavlink AC3000** Affected versions: - M33A8.V5030.210505 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-2042](https://talosintelligence.com/vulnerability_reports/TALOS-2024-2042) ### Credits - Discovered by Lilith &gt;_&gt; of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17684, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17684 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17684 - **State**: PUBLISHED - **Published Date**: December 14, 2017 at 06:00 UTC - **Last Updated**: September 16, 2024 at 20:06 UTC - **Reserved Date**: December 14, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Panda Global Protection 17.0.1 allows a system crash via a 0xb3702c04 \\.\PSMEMDriver DeviceIoControl request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/Panda-Antivirus/Panda_Security_Antivirus_0xb3702c04_)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44333, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44333 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44333 - **State**: PUBLISHED - **Published Date**: September 09, 2024 at 00:00 UTC - **Last Updated**: September 09, 2024 at 20:43 UTC - **Reserved Date**: August 21, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description D-Link DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution. An attacker can achieve arbitrary command execution by sending a carefully crafted malicious string to the CGI function responsible for handling usb_paswd.asp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.dlink.com/en/security-bulletin/) 2. [](https://gist.github.com/Swind1er/c8656b32058e28e64f92d100c92ca12c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31658, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31658 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31658 - **State**: PUBLISHED - **Published Date**: June 10, 2021 at 14:24 UTC - **Last Updated**: August 03, 2024 at 23:03 UTC - **Reserved Date**: April 23, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TP-Link TL-SG2005, TL-SG2008, etc. 1.0.0 Build 20180529 Rel.40524 is affected by an Array index error. The interface that provides the "device description" function only judges the length of the received data, and does not filter special characters. This vulnerability will cause the application to crash, and all device configuration information will be erased. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://tp-link.com) 2. [](https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-31658)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-42487, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-42487 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-42487 - **State**: PUBLISHED - **Published Date**: September 27, 2023 at 12:15 UTC - **Last Updated**: September 23, 2024 at 20:07 UTC - **Reserved Date**: September 11, 2023 at 07:58 UTC - **Assigned By**: INCD ### Vulnerability Description Soundminer – CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Soundminer - Soundminer** Affected versions: - All versions (Status: affected) ### References 1. [](https://www.gov.il/en/Departments/faq/cve_advisories) ### Credits - Guy Hayou
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12553, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12553 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12553 - **State**: PUBLISHED - **Published Date**: December 13, 2024 at 22:34 UTC - **Last Updated**: December 16, 2024 at 17:55 UTC - **Reserved Date**: December 11, 2024 at 21:53 UTC - **Assigned By**: zdi ### Vulnerability Description GeoVision GV-ASManager Missing Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of GeoVision GV-ASManager. Although authentication is required to exploit this vulnerability, default guest credentials may be used. The specific flaw exists within the GV-ASWeb service. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-25394. ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **GeoVision - GV-ASManager** Affected versions: - 6.1.0 (Status: affected) ### References 1. [ZDI-24-1682](https://www.zerodayinitiative.com/advisories/ZDI-24-1682/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8953, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8953 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8953 - **State**: PUBLISHED - **Published Date**: April 11, 2018 at 17:00 UTC - **Last Updated**: September 16, 2024 at 20:22 UTC - **Reserved Date**: March 23, 2018 at 00:00 UTC - **Assigned By**: ca ### Vulnerability Description CA Workload Automation AE before r11.3.6 SP7 allows remote attackers to a perform SQL injection via a crafted HTTP request. ### Affected Products **CA Technologies - Workload Automation AE** Affected versions: - r11.3.5, r11.3.6 SP6 and earlier (Status: affected) ### References 1. [1040605](http://www.securitytracker.com/id/1040605) 2. [](https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20180329-01--security-notice-for-ca-workload-automation-ae.html) 3. [103742](http://www.securityfocus.com/bid/103742)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4293, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4293 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4293 - **State**: PUBLISHED - **Published Date**: August 12, 2023 at 07:42 UTC - **Last Updated**: February 05, 2025 at 19:36 UTC - **Reserved Date**: August 10, 2023 at 12:51 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Premium Packages - Sell Digital Products Securely plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.7.4 due to insufficient restriction on the 'wpdmpp_update_profile' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'profile[role]' parameter during a profile update. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **codename065 - Premium Packages – Sell Digital Products Securely** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/82137302-60ca-44d5-b087-dc96e2815fca?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wpdm-premium-packages/tags/5.7.4/wpdm-premium-packages.php#L1158) 3. [](https://plugins.trac.wordpress.org/changeset/2951917/wpdm-premium-packages#file5) ### Credits - Lana Codes
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1096, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1096 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1096 - **State**: PUBLISHED - **Published Date**: September 12, 2001 at 04:00 UTC - **Last Updated**: August 01, 2024 at 17:02 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in kscreensaver in KDE klock allows local users to gain root privileges via a long HOME environmental variable. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19980516 kde exploit](http://marc.info/?l=bugtraq&m=90221101925954&w=2) 2. [19980517 simple kde exploit fix](http://marc.info/?l=bugtraq&m=90221101925959&w=2) 3. [kde-klock-home-bo(1644)](https://exchange.xforce.ibmcloud.com/vulnerabilities/1644)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33665, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33665 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33665 - **State**: PUBLISHED - **Published Date**: June 09, 2021 at 13:33 UTC - **Last Updated**: August 03, 2024 at 23:58 UTC - **Reserved Date**: May 28, 2021 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description SAP NetWeaver Application Server ABAP (Applications based on SAP GUI for HTML), versions - KRNL64NUC - 7.49, KRNL64UC - 7.49,7.53, KERNEL - 7.49,7.53,7.77,7.81,7.84, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. ### Affected Products **SAP SE - SAP NetWeaver Application Server ABAP (Applications based on SAP GUI for HTML)** Affected versions: - < KRNL64NUC - 7.49 (Status: affected) - < KRNL64UC - 7.49 (Status: affected) - < 7.53 (Status: affected) - < KERNEL - 7.49 (Status: affected) - < 7.77 (Status: affected) - < 7.81 (Status: affected) - < 7.84 (Status: affected) ### References 1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999) 2. [](https://launchpad.support.sap.com/#/notes/3028370)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-24932, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-24932 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-24932 - **State**: PUBLISHED - **Published Date**: February 12, 2024 at 05:44 UTC - **Last Updated**: April 24, 2025 at 15:44 UTC - **Reserved Date**: February 01, 2024 at 15:26 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Djo VK Poster Group allows Reflected XSS.This issue affects VK Poster Group: from n/a through 2.0.3. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Djo - VK Poster Group** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/vk-poster-group/wordpress-vk-poster-group-plugin-2-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Le Ngoc Anh (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3838, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3838 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3838 - **State**: PUBLISHED - **Published Date**: December 24, 2011 at 19:00 UTC - **Last Updated**: August 06, 2024 at 23:46 UTC - **Reserved Date**: September 26, 2011 at 00:00 UTC - **Assigned By**: flexera ### Vulnerability Description Multiple SQL injection vulnerabilities in Wuzly 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) u parameter to fp.php, (2) epage parameter to newpage.php, (3) epost parameter to newpost.php, and (4) username parameter to login.php in admin/; or the (5) username parameter to mobile/login.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [77916](http://osvdb.org/77916) 2. [77915](http://osvdb.org/77915) 3. [77918](http://osvdb.org/77918) 4. [wuzly-multiple-sql-injection(71904)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71904) 5. [77917](http://osvdb.org/77917) 6. [46163](http://secunia.com/advisories/46163) 7. [77919](http://osvdb.org/77919) 8. [](http://secunia.com/secunia_research/2011-88/)