System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26079, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26079
- **State**: PUBLISHED
- **Published Date**: June 07, 2021 at 22:35 UTC
- **Last Updated**: October 17, 2024 at 14:29 UTC
- **Reserved Date**: January 25, 2021 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
The CardLayoutConfigTable component in Jira Server and Jira Data Center before version 8.5.15, and from version 8.6.0 before version 8.13.7, and from version 8.14.0 before 8.17.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability.
### Affected Products
**Atlassian - Jira Server**
Affected versions:
- unspecified (Status: affected)
- 8.6.0 (Status: affected)
- unspecified (Status: affected)
- 8.14.0 (Status: affected)
- unspecified (Status: affected)
**Atlassian - Jira Data Center**
Affected versions:
- unspecified (Status: affected)
- 8.6.0 (Status: affected)
- unspecified (Status: affected)
- 8.14.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/JRASERVER-72396) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28796, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28796 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28796
- **State**: PUBLISHED
- **Published Date**: October 23, 2023 at 13:28 UTC
- **Last Updated**: February 27, 2025 at 20:39 UTC
- **Reserved Date**: March 23, 2023 at 18:29 UTC
- **Assigned By**: Zscaler
### Vulnerability Description
Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**Zscaler - Client Connector**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux&applicable_version=1.3.1&deployment_date=2022-09-19)
### Credits
- Paul Gerste, SonarSource |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10871, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10871 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10871
- **State**: PUBLISHED
- **Published Date**: July 18, 2018 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 07:46 UTC
- **Reserved Date**: May 09, 2018 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.
### Weakness Classification (CWE)
- CWE-312: Security Weakness
### Affected Products
**[UNKNOWN] - 389-ds-base**
Affected versions:
- 389-ds-base 1.3.8.5 (Status: affected)
- 389-ds-base 1.4.0.12 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10871)
2. [](https://pagure.io/389-ds-base/issue/49789)
3. [[debian-lts-announce] 20180830 [SECURITY] [DLA 1483-1] 389-ds-base security update](https://lists.debian.org/debian-lts-announce/2018/08/msg00032.html)
4. [RHSA-2019:3401](https://access.redhat.com/errata/RHSA-2019:3401) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21246, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21246 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21246
- **State**: PUBLISHED
- **Published Date**: January 15, 2021 at 20:10 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 22, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, the REST UserResource endpoint performs a security check to make sure that only administrators can list user details. However for the `/users/{id}` endpoint there are no security checks enforced so it is possible to retrieve arbitrary user details including their Access Tokens! These access tokens can be used to access the API or clone code in the build spec via the HTTP(S) protocol. It has permissions to all projects accessible by the user account. This issue may lead to `Sensitive data leak` and leak the Access Token which can be used to impersonate the administrator or any other users. This issue was addressed in 4.0.3 by removing user info from restful api.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**theonedev - onedev**
Affected versions:
- < 4.0.3 (Status: affected)
### References
1. [](https://github.com/theonedev/onedev/security/advisories/GHSA-66v7-gg85-f4gx)
2. [](https://github.com/theonedev/onedev/commit/a4491e5f79dc6cc96eac20972eedc8905ddf6089) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52099, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52099 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52099
- **State**: PUBLISHED
- **Published Date**: January 16, 2024 at 09:13 UTC
- **Last Updated**: November 13, 2024 at 20:19 UTC
- **Reserved Date**: December 27, 2023 at 02:33 UTC
- **Assigned By**: huawei
### Vulnerability Description
Vulnerability of foreground service restrictions being bypassed in the NMS module. Successful exploitation of this vulnerability may affect service confidentiality.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 4.0.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
- 2.1.0 (Status: affected)
- 2.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 13.0.0 (Status: affected)
- 12.0.0 (Status: affected)
- 11.0.1 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/1/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0584, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0584 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0584
- **State**: PUBLISHED
- **Published Date**: June 26, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 03:28 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
IIJ SmartKey App for Android version 2.1.0 and earlier allows remote attackers to bypass authentication [effect_of_bypassing_authentication] via unspecified vectors.
### Affected Products
**Internet Initiative Japan Inc. - IIJ SmartKey App for Android**
Affected versions:
- version 2.1.0 and earlier (Status: affected)
### References
1. [JVN#27137002](http://jvn.jp/en/jp/JVN27137002/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4342, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4342 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4342
- **State**: PUBLISHED
- **Published Date**: August 14, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in include.php in PHPCentral Login 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the _SERVER[DOCUMENT_ROOT] parameter. NOTE: a third party disputes this vulnerability because of the special nature of the SERVER superglobal array.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070812 PHPCentral Login Script Remote Command Execution Vulnerability](http://www.securityfocus.com/archive/1/476274/100/0/threaded)
2. [phpcentrallogin-include-file-include(35980)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35980)
3. [20070814 Re: PHPCentral Login Script Remote Command Execution Vulnerability](http://www.securityfocus.com/archive/1/476437/100/0/threaded)
4. [20070815 Re: PHPCentral Login Script Remote Command Execution Vulnerability](http://www.securityfocus.com/archive/1/476608/100/0/threaded)
5. [38880](http://osvdb.org/38880)
6. [3005](http://securityreason.com/securityalert/3005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1222, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1222 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1222
- **State**: PUBLISHED
- **Published Date**: March 14, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 17:03 UTC
- **Reserved Date**: March 14, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in zeroboard 4.1 pl7 allows allow remote attackers to inject arbitrary web script or HTML via the (1) memo box title, (2) user email, and (3) homepage fields.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19214](http://secunia.com/advisories/19214)
2. [](http://www.inetcop.org/upfiles/33INCSA.2006-0x82-029-zeroboard.pdf)
3. [ADV-2006-0944](http://www.vupen.com/english/advisories/2006/0944)
4. [20060312 [INetCop Security Advisory] zeroboard IP session bypass XSS vulnerability](http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042872.html)
5. [](http://www.nzeo.com/bbs/zboard.php?id=cgi_bugreport2&no=5406)
6. [17075](http://www.securityfocus.com/bid/17075)
7. [23847](http://www.osvdb.org/23847)
8. [20060312 [INetCop Security Advisory] zeroboard IP session bypass XSS vulnerability](http://www.securityfocus.com/archive/1/427466/100/0/threaded)
9. [zeroboard-multiple-fields-xss(25212)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25212) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13666, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13666 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13666
- **State**: PUBLISHED
- **Published Date**: May 05, 2021 at 13:50 UTC
- **Last Updated**: August 04, 2024 at 12:25 UTC
- **Reserved Date**: May 28, 2020 at 00:00 UTC
- **Assigned By**: drupal
### Vulnerability Description
Cross-site scripting vulnerability in Drupal Core. Drupal AJAX API does not disable JSONP by default, allowing for an XSS attack. This issue affects: Drupal Drupal Core 7.x versions prior to 7.73; 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6.
### Affected Products
**Drupal - Drupal Core**
Affected versions:
- 7.x (Status: affected)
- 8.8.x (Status: affected)
- 8.9.x (Status: affected)
- 9.0.x (Status: affected)
### References
1. [](https://www.drupal.org/sa-core-2020-007) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7241
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 06:24 UTC
- **Reserved Date**: February 19, 2018 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
Hard coded accounts exist in Schneider Electric's Modicon Premium, Modicon Quantum, Modicon M340, and BMXNOR0200 controllers in all versions of the communication modules.
### Affected Products
**Schneider Electric SE - Modicon Premium, Modicon Quantum, Modicon M340, BMXNOR0200**
Affected versions:
- All versions of communication modules for Modicon Premium, Quantum, M340 and BMXNOR0200 (Status: affected)
### References
1. [](https://www.schneider-electric.com/en/download/document/SEVD-2018-081-01/)
2. [103542](http://www.securityfocus.com/bid/103542)
3. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-086-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41847
- **State**: PUBLISHED
- **Published Date**: October 01, 2021 at 22:25 UTC
- **Last Updated**: August 04, 2024 at 03:22 UTC
- **Reserved Date**: October 01, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in 3xLogic Infinias Access Control through 6.7.10708.0, affecting physical security. Users with login credentials assigned to a specific zone can send modified HTTP GET and POST requests, allowing them to view user data such as personal information and Prox card credentials. Also, an authorized user of one zone can send API requests to unlock electronic locks associated with zones they are unauthorized to have access to. They can also create new user logins for zones they were not authorized to access, including the root zone of the software.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.3xlogic.com/infinias-access-control)
2. [](https://grant-rose.com/infinias-access-control-vulnerability/)
3. [](https://gitlab.com/grose88/infinias) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2650
- **State**: PUBLISHED
- **Published Date**: March 23, 2025 at 14:00 UTC
- **Last Updated**: March 24, 2025 at 13:35 UTC
- **Reserved Date**: March 22, 2025 at 07:37 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in PHPGurukul Medical Card Generation System 1.0. This issue affects some unknown processing of the file /download-medical-cards.php. The manipulation of the argument searchdata leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**PHPGurukul - Medical Card Generation System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-300665 | PHPGurukul Medical Card Generation System download-medical-cards.php cross site scripting](https://vuldb.com/?id.300665)
2. [VDB-300665 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.300665)
3. [Submit #519781 | PHPGurukul Medical Card Generation System V1.0 XSS Vulnerability](https://vuldb.com/?submit.519781)
4. [](https://github.com/liuhao2638/cve/issues/13)
5. [](https://phpgurukul.com/)
### Credits
- liuhao17328 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3612, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3612 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3612
- **State**: PUBLISHED
- **Published Date**: September 17, 2013 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 22:44 UTC
- **Reserved Date**: May 21, 2013 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Dahua DVR appliances have a hardcoded password for (1) the root account and (2) an unspecified "backdoor" account, which makes it easier for remote attackers to obtain administrative access via authorization requests involving (a) ActiveX, (b) a standalone client, or (c) unknown other vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#800094](http://www.kb.cert.org/vuls/id/800094) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2321, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2321
- **State**: PUBLISHED
- **Published Date**: December 12, 2019 at 08:30 UTC
- **Last Updated**: August 04, 2024 at 18:49 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Incorrect length used while validating the qsee log buffer sent from HLOS which could then lead to remap conflict in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, IPQ4019, IPQ8074, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, QCA8081, QCS404, QCS605, QM215, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150, Snapdragon_High_Med_2016, SXR1130, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, IPQ4019, IPQ8074, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, QCA8081, QCS404, QCS605, QM215, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150, Snapdragon_High_Med_2016, SXR1130, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26583, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26583 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26583
- **State**: PUBLISHED
- **Published Date**: May 10, 2021 at 12:38 UTC
- **Last Updated**: August 03, 2024 at 20:26 UTC
- **Reserved Date**: February 02, 2021 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A potential security vulnerability was identified in HPE iLO Amplifier Pack. The vulnerabilities could be remotely exploited to allow remote code execution.
### Affected Products
**n/a - iLO Amplifier Pack**
Affected versions:
- Prior to Version 1.90 (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04129en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7730, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7730 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7730
- **State**: PUBLISHED
- **Published Date**: November 14, 2024 at 12:11 UTC
- **Last Updated**: November 14, 2024 at 19:32 UTC
- **Reserved Date**: August 13, 2024 at 09:37 UTC
- **Assigned By**: fedora
### Vulnerability Description
A heap buffer overflow was found in the virtio-snd device in QEMU. When reading input audio in the virtio-snd input callback, virtio_snd_pcm_in_cb, the function did not check whether the iov can fit the data buffer. This issue can trigger an out-of-bounds write if the size of the virtio queue element is equal to virtio_snd_pcm_status, which makes the available space for audio data zero.
### CVSS Metrics
- **CVSS Base Score**: 7.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Unknown - Unknown**
Affected versions:
- 0 (Status: affected)
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 8 Advanced Virtualization**
**Red Hat - Red Hat Enterprise Linux 9**
### References
1. [](https://access.redhat.com/security/cve/CVE-2024-7730)
2. [RHBZ#2304289](https://bugzilla.redhat.com/show_bug.cgi?id=2304289) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32550, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32550
- **State**: PUBLISHED
- **Published Date**: April 09, 2025 at 16:09 UTC
- **Last Updated**: April 09, 2025 at 18:01 UTC
- **Reserved Date**: April 09, 2025 at 11:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ClickandPledge Click & Pledge Connect Plugin allows SQL Injection. This issue affects Click & Pledge Connect Plugin: from 2.24080000 through WP6.6.1.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**ClickandPledge - Click & Pledge Connect Plugin**
Affected versions:
- 2.24080000 (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/click-pledge-connect/vulnerability/wordpress-click-pledge-connect-plugin-plugin-2-24080000-wp6-6-1-sql-injection-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0996, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0996 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0996
- **State**: PUBLISHED
- **Published Date**: December 17, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:12 UTC
- **Reserved Date**: December 16, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown "System Security Vulnerability" in Computer Associates (CA) Unicenter Remote Control (URC) 6.0 allows attackers to gain privileges via the help interface.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.ca.com/techbases/rp/urc6x-secnote.html)
2. [10420](http://www.secunia.com/advisories/10420/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56710, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56710
- **State**: PUBLISHED
- **Published Date**: December 29, 2024 at 08:48 UTC
- **Last Updated**: May 04, 2025 at 10:03 UTC
- **Reserved Date**: December 27, 2024 at 15:00 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ceph: fix memory leak in ceph_direct_read_write()
The bvecs array which is allocated in iter_get_bvecs_alloc() is leaked
and pages remain pinned if ceph_alloc_sparse_ext_map() fails.
There is no need to delay the allocation of sparse_ext map until after
the bvecs array is set up, so fix this by moving sparse_ext allocation
a bit earlier. Also, make a similar adjustment in __ceph_sync_read()
for consistency (a leak of the same kind in __ceph_sync_read() has been
addressed differently).
### Affected Products
**Linux - Linux**
Affected versions:
- 03bc06c7b0bd8d86b9f17f459acaeb1283ba2700 (Status: affected)
- 03bc06c7b0bd8d86b9f17f459acaeb1283ba2700 (Status: affected)
- 03bc06c7b0bd8d86b9f17f459acaeb1283ba2700 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.6 (Status: affected)
- 0 (Status: unaffected)
- 6.6.69 (Status: unaffected)
- 6.12.7 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/44e518abbb498075ae85c7d1d1a503a6bb05ea2d)
2. [](https://git.kernel.org/stable/c/eb9041837123f31d5897e99bb761f46cb4ce5859)
3. [](https://git.kernel.org/stable/c/66e0c4f91461d17d48071695271c824620bed4ef) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14030, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14030 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14030
- **State**: PUBLISHED
- **Published Date**: March 05, 2020 at 08:56 UTC
- **Last Updated**: August 05, 2024 at 00:05 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
The size of a buffer is determined by addition and multiplications operations that have the potential to overflow due to lack of bound check in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in MDM9205, QCS404, Rennell, SC8180X, SDM845, SDM850, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- MDM9205, QCS404, Rennell, SC8180X, SDM845, SDM850, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3487, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3487 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3487
- **State**: PUBLISHED
- **Published Date**: June 29, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:21 UTC
- **Reserved Date**: June 29, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Absolute path traversal in a certain ActiveX control in hpqxml.dll 2.0.0.133 in Hewlett-Packard (HP) Photo Digital Imaging allows remote attackers to create or overwrite arbitrary files via the argument to the saveXMLAsFile method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [37675](http://osvdb.org/37675)
2. [hp-photodigitalimaging-hpqxml-file-overwrite(35124)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35124)
3. [2846](http://securityreason.com/securityalert/2846)
4. [20070627 [GOODFELLAS - VULN] hpqxml.dll 2.0.0.133 from HP Digital ImagingArbitary Data Write.](http://www.securityfocus.com/archive/1/472384/100/0/threaded)
5. [25869](http://secunia.com/advisories/25869)
6. [4119](https://www.exploit-db.com/exploits/4119) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4571, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4571 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4571
- **State**: PUBLISHED
- **Published Date**: February 03, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 00:32 UTC
- **Reserved Date**: May 09, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mxml_write_node function in mxml-file.c in mxml 2.9, 2.7, and possibly earlier allows remote attackers to cause a denial of service (stack consumption) via crafted xml file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20160509 Re: CVE requested: two stack exhaustation parsing xml files using mxml](http://www.openwall.com/lists/oss-security/2016/05/09/16)
2. [90315](http://www.securityfocus.com/bid/90315)
3. [[debian-lts-announce] 20190125 [SECURITY] [DLA 1641-1] mxml security update](https://lists.debian.org/debian-lts-announce/2019/01/msg00018.html)
4. [[oss-security] 20160511 Re: CVE requested: two stack exhaustation parsing xml files using mxml](http://www.openwall.com/lists/oss-security/2016/05/11/14)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=1334648) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0453, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0453 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0453
- **State**: PUBLISHED
- **Published Date**: March 10, 2021 at 16:14 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In the Titan-M chip firmware, there is a possible disclosure of stack memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-175117199
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2021-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1411, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1411 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1411
- **State**: PUBLISHED
- **Published Date**: August 06, 2018 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 01:25 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 127399.
### Affected Products
**IBM - Security Identity Governance and Intelligence**
Affected versions:
- 5.2 (Status: affected)
- 5.2.1 (Status: affected)
- 5.2.2 (Status: affected)
- 5.2.2.1 (Status: affected)
- 5.2.3 (Status: affected)
- 5.2.3.1 (Status: affected)
- 5.2.3.2 (Status: affected)
### References
1. [ibm-sig-cve20171411-info-disc(127399)](https://exchange.xforce.ibmcloud.com/vulnerabilities/127399)
2. [](http://www.ibm.com/support/docview.wss?uid=swg22016869) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5533, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5533 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5533
- **State**: PUBLISHED
- **Published Date**: February 21, 2020 at 09:15 UTC
- **Last Updated**: August 04, 2024 at 08:30 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in Aterm WG2600HS firmware Ver1.3.2 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**NEC Corporation - Aterm WG2600HS**
Affected versions:
- firmware Ver1.3.2 and earlier (Status: affected)
### References
1. [](https://jvn.jp/en/jp/JVN49410695/index.html)
2. [](https://jpn.nec.com/security-info/secinfo/nv20-003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6822, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6822 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6822
- **State**: PUBLISHED
- **Published Date**: November 22, 2024 at 21:13 UTC
- **Last Updated**: November 25, 2024 at 14:55 UTC
- **Reserved Date**: July 16, 2024 at 21:40 UTC
- **Assigned By**: zdi
### Vulnerability Description
IrfanView CIN File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of CIN files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23261.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**IrfanView - IrfanView**
Affected versions:
- 4.66 64bit (Status: affected)
### References
1. [ZDI-24-974](https://www.zerodayinitiative.com/advisories/ZDI-24-974/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2900, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2900
- **State**: PUBLISHED
- **Published Date**: August 21, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 15:52 UTC
- **Reserved Date**: April 11, 2013 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The FilePath::ReferencesParent function in files/file_path.cc in Google Chrome before 29.0.1547.57 on Windows does not properly handle pathname components composed entirely of . (dot) and whitespace characters, which allows remote attackers to conduct directory traversal attacks via a crafted directory name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://src.chromium.org/viewvc/chrome?revision=200603&view=revision)
2. [](http://googlechromereleases.blogspot.com/2013/08/stable-channel-update.html)
3. [oval:org.mitre.oval:def:18381](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18381)
4. [](http://crbug.com/181617)
5. [DSA-2741](http://www.debian.org/security/2013/dsa-2741) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3942, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3942
- **State**: PUBLISHED
- **Published Date**: May 22, 2025 at 12:40 UTC
- **Last Updated**: May 22, 2025 at 13:36 UTC
- **Reserved Date**: April 25, 2025 at 15:21 UTC
- **Assigned By**: Honeywell
### Vulnerability Description
Improper Output Neutralization for Logs vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Input Data Manipulation. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-117: Security Weakness
### Affected Products
**Tridium - Niagara Framework**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
**Tridium - Niagara Enterprise Security**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
### References
1. [](https://www.tridium.com/us/en/product-security)
2. [](https://www.honeywell.com/us/en/product-security#security-notices)
### Credits
- Andrea Palanca and team at Nozomi Networks |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40755, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40755 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40755
- **State**: PUBLISHED
- **Published Date**: November 18, 2021 at 16:20 UTC
- **Last Updated**: April 23, 2025 at 19:21 UTC
- **Reserved Date**: September 08, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SGI file in the DoReadContinue function, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-788: OS Command Injection
### Affected Products
**Adobe - After Effects**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/after_effects/apsb21-79.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36272, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36272 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36272
- **State**: PUBLISHED
- **Published Date**: June 23, 2023 at 00:00 UTC
- **Last Updated**: April 08, 2025 at 18:17 UTC
- **Reserved Date**: June 21, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LibreDWG v0.10 to v0.12.5 was discovered to contain a heap buffer overflow via the function bit_utf8_to_TU at bits.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/LibreDWG/libredwg/issues/681#BUG1)
2. [](https://github.com/LibreDWG/libredwg/commit/c1ed1d91e28a6ddc7a9b5479d4795d58fb6be0ca)
3. [](https://github.com/LibreDWG/libredwg/blob/0.10/src/bits.c#L1677C11-L1683C17) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57802, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57802
- **State**: PUBLISHED
- **Published Date**: January 15, 2025 at 13:10 UTC
- **Last Updated**: May 04, 2025 at 10:05 UTC
- **Reserved Date**: January 15, 2025 at 13:08 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
netrom: check buffer length before accessing it
Syzkaller reports an uninit value read from ax25cmp when sending raw message
through ieee802154 implementation.
=====================================================
BUG: KMSAN: uninit-value in ax25cmp+0x3a5/0x460 net/ax25/ax25_addr.c:119
ax25cmp+0x3a5/0x460 net/ax25/ax25_addr.c:119
nr_dev_get+0x20e/0x450 net/netrom/nr_route.c:601
nr_route_frame+0x1a2/0xfc0 net/netrom/nr_route.c:774
nr_xmit+0x5a/0x1c0 net/netrom/nr_dev.c:144
__netdev_start_xmit include/linux/netdevice.h:4940 [inline]
netdev_start_xmit include/linux/netdevice.h:4954 [inline]
xmit_one net/core/dev.c:3548 [inline]
dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564
__dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349
dev_queue_xmit include/linux/netdevice.h:3134 [inline]
raw_sendmsg+0x654/0xc10 net/ieee802154/socket.c:299
ieee802154_sock_sendmsg+0x91/0xc0 net/ieee802154/socket.c:96
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
__sys_sendmsg net/socket.c:2667 [inline]
__do_sys_sendmsg net/socket.c:2676 [inline]
__se_sys_sendmsg net/socket.c:2674 [inline]
__x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
Uninit was created at:
slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
slab_alloc_node mm/slub.c:3478 [inline]
kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523
kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560
__alloc_skb+0x318/0x740 net/core/skbuff.c:651
alloc_skb include/linux/skbuff.h:1286 [inline]
alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334
sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2780
sock_alloc_send_skb include/net/sock.h:1884 [inline]
raw_sendmsg+0x36d/0xc10 net/ieee802154/socket.c:282
ieee802154_sock_sendmsg+0x91/0xc0 net/ieee802154/socket.c:96
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
__sys_sendmsg net/socket.c:2667 [inline]
__do_sys_sendmsg net/socket.c:2676 [inline]
__se_sys_sendmsg net/socket.c:2674 [inline]
__x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
CPU: 0 PID: 5037 Comm: syz-executor166 Not tainted 6.7.0-rc7-syzkaller-00003-gfbafc3e621c3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
=====================================================
This issue occurs because the skb buffer is too small, and it's actual
allocation is aligned. This hides an actual issue, which is that nr_route_frame
does not validate the buffer size before using it.
Fix this issue by checking skb->len before accessing any fields in skb->data.
Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.12 (Status: affected)
- 0 (Status: unaffected)
- 5.4.289 (Status: unaffected)
- 5.10.233 (Status: unaffected)
- 5.15.176 (Status: unaffected)
- 6.1.124 (Status: unaffected)
- 6.6.70 (Status: unaffected)
- 6.12.9 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/64e9f54a14f2887be8634fb85cd2f13bec18a184)
2. [](https://git.kernel.org/stable/c/cf6befa7c569787f53440274bbed1405fc07738d)
3. [](https://git.kernel.org/stable/c/769e36c2119a51070faf58819c58274f57a088db)
4. [](https://git.kernel.org/stable/c/78a110332ae268d0b005247c3b9a7d703b875c49)
5. [](https://git.kernel.org/stable/c/f647d72245aadce30618f4c8fd3803904418dbec)
6. [](https://git.kernel.org/stable/c/3ba7f80d98d4965349cfcd258dd78418496c1625)
7. [](https://git.kernel.org/stable/c/a4fd163aed2edd967a244499754dec991d8b4c7d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1289, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1289 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1289
- **State**: PUBLISHED
- **Published Date**: July 02, 2016 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 22:48 UTC
- **Reserved Date**: January 04, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The API in Cisco Prime Infrastructure 1.2 through 3.0 and Evolved Programmable Network Manager (EPNM) 1.2 allows remote attackers to execute arbitrary code or obtain sensitive management information via a crafted HTTP request, as demonstrated by discovering managed-device credentials, aka Bug ID CSCuy10231.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [91504](http://www.securityfocus.com/bid/91504)
2. [1036195](http://www.securitytracker.com/id/1036195)
3. [20160629 Cisco Prime Infrastructure and Evolved Programmable Network Manager Authentication Bypass API Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160629-piauthbypass) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24515, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24515
- **State**: PUBLISHED
- **Published Date**: June 09, 2021 at 18:48 UTC
- **Last Updated**: August 04, 2024 at 15:12 UTC
- **Reserved Date**: August 19, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Protection mechanism failure in some Intel(R) RealSense(TM) IDs may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
### Affected Products
**n/a - Intel(R) RealSense(TM) IDs**
Affected versions:
- See references (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00460.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47090, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47090
- **State**: PUBLISHED
- **Published Date**: March 04, 2024 at 18:10 UTC
- **Last Updated**: May 04, 2025 at 07:03 UTC
- **Reserved Date**: February 29, 2024 at 22:33 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()
Hulk Robot reported a panic in put_page_testzero() when testing
madvise() with MADV_SOFT_OFFLINE. The BUG() is triggered when retrying
get_any_page(). This is because we keep MF_COUNT_INCREASED flag in
second try but the refcnt is not increased.
page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0)
------------[ cut here ]------------
kernel BUG at include/linux/mm.h:737!
invalid opcode: 0000 [#1] PREEMPT SMP
CPU: 5 PID: 2135 Comm: sshd Tainted: G B 5.16.0-rc6-dirty #373
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: release_pages+0x53f/0x840
Call Trace:
free_pages_and_swap_cache+0x64/0x80
tlb_flush_mmu+0x6f/0x220
unmap_page_range+0xe6c/0x12c0
unmap_single_vma+0x90/0x170
unmap_vmas+0xc4/0x180
exit_mmap+0xde/0x3a0
mmput+0xa3/0x250
do_exit+0x564/0x1470
do_group_exit+0x3b/0x100
__do_sys_exit_group+0x13/0x20
__x64_sys_exit_group+0x16/0x20
do_syscall_64+0x34/0x80
entry_SYSCALL_64_after_hwframe+0x44/0xae
Modules linked in:
---[ end trace e99579b570fe0649 ]---
RIP: 0010:release_pages+0x53f/0x840
### Affected Products
**Linux - Linux**
Affected versions:
- b94e02822debdf0cc473556aad7dcc859f216653 (Status: affected)
- b94e02822debdf0cc473556aad7dcc859f216653 (Status: affected)
- b94e02822debdf0cc473556aad7dcc859f216653 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.10 (Status: affected)
- 0 (Status: unaffected)
- 5.10.89 (Status: unaffected)
- 5.15.12 (Status: unaffected)
- 5.16 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/1f207076740101fed87074a6bc924dbe806f08a5)
2. [](https://git.kernel.org/stable/c/c691e7575eff76e563b0199c23ec46bd454f43e3)
3. [](https://git.kernel.org/stable/c/2a57d83c78f889bf3f54eede908d0643c40d5418) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11763, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11763 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11763
- **State**: PUBLISHED
- **Published Date**: September 25, 2018 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 02:21 UTC
- **Reserved Date**: June 05, 2018 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
### Affected Products
**Apache Software Foundation - Apache HTTP Server**
Affected versions:
- 2.4.17 to 2.4.34 (Status: affected)
### References
1. [](https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html)
2. [RHSA-2018:3558](https://access.redhat.com/errata/RHSA-2018:3558)
3. [105414](http://www.securityfocus.com/bid/105414)
4. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us)
5. [](https://security.netapp.com/advisory/ntap-20190204-0004/)
6. [RHSA-2019:0367](https://access.redhat.com/errata/RHSA-2019:0367)
7. [USN-3783-1](https://usn.ubuntu.com/3783-1/)
8. [](https://httpd.apache.org/security/vulnerabilities_24.html)
9. [1041713](http://www.securitytracker.com/id/1041713)
10. [RHSA-2019:0366](https://access.redhat.com/errata/RHSA-2019:0366)
11. [](https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html)
12. [openSUSE-SU-2019:1547](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html)
13. [openSUSE-SU-2019:1814](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html)
14. [[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E)
15. [[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E)
16. [](https://www.tenable.com/security/tns-2019-09)
17. [[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E)
18. [[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E)
19. [[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E)
20. [[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/](https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E)
21. [[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E)
22. [[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E)
23. [[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/](https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E)
24. [[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E)
25. [[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E)
26. [[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12974, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12974 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12974
- **State**: REJECTED
- **Published Date**: June 11, 2021 at 21:43 UTC
- **Last Updated**: June 11, 2021 at 21:43 UTC
- **Reserved Date**: May 15, 2020 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2512, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2512
- **State**: PUBLISHED
- **Published Date**: June 02, 2008 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: June 02, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in Symantec Backup Exec System Recovery Manager 7.x before 7.0.4 and 8.x before 8.0.2 allows remote attackers to read arbitrary files via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [recoverymanager-unspecified-dir-traversal(42714)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42714)
2. [29350](http://www.securityfocus.com/bid/29350)
3. [30432](http://secunia.com/advisories/30432)
4. [1020128](http://www.securitytracker.com/id?1020128)
5. [ADV-2008-1686](http://www.vupen.com/english/advisories/2008/1686/references)
6. [](http://securityresponse.symantec.com/avcenter/security/Content/2008.05.28c.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37203, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37203 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37203
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 14:18 UTC
- **Last Updated**: November 01, 2024 at 17:34 UTC
- **Reserved Date**: June 04, 2024 at 16:45 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Laybuy Laybuy Payment Extension for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Laybuy Payment Extension for WooCommerce: from n/a through 5.3.9.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Laybuy - Laybuy Payment Extension for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/laybuy-gateway-for-woocommerce/wordpress-laybuy-payment-extension-for-woocommerce-plugin-5-3-9-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1444, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1444
- **State**: PUBLISHED
- **Published Date**: January 18, 2014 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 09:42 UTC
- **Reserved Date**: January 14, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2129-1](http://www.ubuntu.com/usn/USN-2129-1)
2. [USN-2128-1](http://www.ubuntu.com/usn/USN-2128-1)
3. [](http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7)
4. [64952](http://www.securityfocus.com/bid/64952)
5. [linux-kernel-cve20141444-info-disc(90443)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90443)
6. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=96b340406724d87e4621284ebac5e059d67b2194)
7. [[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes](http://www.openwall.com/lists/oss-security/2014/01/15/3)
8. [](https://github.com/torvalds/linux/commit/96b340406724d87e4621284ebac5e059d67b2194)
9. [](https://bugzilla.redhat.com/show_bug.cgi?id=1053610) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1049, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1049 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1049
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:44 UTC
- **Reserved Date**: January 31, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Phorecast PHP script before 0.40 allows remote attackers to include arbitrary files from remote web sites via an HTTP request that sets the includedir variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20011002 results of semi-automatic source code audit](http://archives.neohapsis.com/archives/bugtraq/2001-10/0012.html)
2. [php-includedir-code-execution(7215)](http://www.iss.net/security_center/static/7215.php)
3. [](http://phorecast.org/)
4. [3388](http://www.securityfocus.com/bid/3388) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0763, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0763 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0763
- **State**: PUBLISHED
- **Published Date**: January 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:48 UTC
- **Reserved Date**: November 25, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NetBSD on a multi-homed host allows ARP packets on one network to modify ARP entries on another connected network.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6540](http://www.osvdb.org/6540) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28964, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28964 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28964
- **State**: PUBLISHED
- **Published Date**: March 22, 2021 at 07:17 UTC
- **Last Updated**: August 03, 2024 at 21:55 UTC
- **Reserved Date**: March 22, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5)
2. [FEDORA-2021-e636ce53df](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/)
3. [FEDORA-2021-68b0dd2373](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/)
4. [FEDORA-2021-9503fffad9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/)
5. [](https://security.netapp.com/advisory/ntap-20210430-0003/)
6. [[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update](https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html)
7. [[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update](https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5566, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5566
- **State**: PUBLISHED
- **Published Date**: October 30, 2023 at 13:48 UTC
- **Last Updated**: February 05, 2025 at 18:55 UTC
- **Reserved Date**: October 13, 2023 at 00:32 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Simple Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 1.0.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**simplethemes - Simple Shortcodes**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a153d6b2-e3fd-42db-90ba-d899a07d60c1?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/smpl-shortcodes/tags/1.0.20/includes/shortcodes.php#L386)
3. [](https://plugins.trac.wordpress.org/browser/smpl-shortcodes/tags/1.0.20/includes/shortcodes.php#L292)
4. [](https://plugins.trac.wordpress.org/browser/smpl-shortcodes/tags/1.0.20/includes/shortcodes.php#L257)
### Credits
- Lana Codes |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4524, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4524
- **State**: PUBLISHED
- **Published Date**: July 04, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 11, 2015 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Unrestricted file upload vulnerability in EMC Documentum WebTop 6.7SP1 before P31, 6.7SP2 before P23, and 6.8 before P01; Documentum Administrator 6.7SP1 before P31, 6.7SP2 before P23, 7.0 before P18, 7.1 before P15, and 7.2 before P01; Documentum Digital Assets Manager 6.5SP6 before P25; Documentum Web Publishers 6.5 SP7 before P25; and Documentum Task Space 6.7SP1 before P31 and 6.7SP2 before P23 allows remote authenticated users to execute arbitrary code by uploading a file to the backend Content Server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032770](http://www.securitytracker.com/id/1032770)
2. [20150701 ESA-2015-111: EMC Documentum WebTop Client Products Multiple Vulnerabilities](http://seclists.org/bugtraq/2015/Jul/9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0406
- **State**: PUBLISHED
- **Published Date**: April 03, 2022 at 19:05 UTC
- **Last Updated**: August 02, 2024 at 23:25 UTC
- **Reserved Date**: January 28, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Improper Authorization in GitHub repository janeczku/calibre-web prior to 0.6.16.
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**janeczku - janeczku/calibre-web**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/d7498799-4797-4751-b5e2-b669e729d5db)
2. [](https://github.com/janeczku/calibre-web/commit/e0e04220109920575179a8f924543449c6de0706) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2955, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2955 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2955
- **State**: PUBLISHED
- **Published Date**: September 08, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 02:55 UTC
- **Reserved Date**: August 04, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-1000-1](http://www.ubuntu.com/usn/USN-1000-1)
2. [RHSA-2010:0771](http://www.redhat.com/support/errata/RHSA-2010-0771.html)
3. [42885](http://www.securityfocus.com/bid/42885)
4. [](http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git%3Ba=commit%3Bh=42da2f948d949efd0111309f5827bf0298bcc9a4)
5. [[linux-kernel] 20100830 Re: [PATCH] wireless: fix 64K kernel heap content leak via ioctl](http://lkml.org/lkml/2010/8/30/127)
6. [](http://grsecurity.net/~spender/wireless-infoleak-fix2.patch)
7. [SUSE-SA:2011:007](http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html)
8. [[linux-kernel] 20100830 Re: [PATCH] wireless extensions: fix kernel heap content leak](http://lkml.org/lkml/2010/8/30/351)
9. [RHSA-2010:0842](http://www.redhat.com/support/errata/RHSA-2010-0842.html)
10. [[oss-security] 20100831 CVE-2010-2955 kernel: wireless: fix 64K kernel heap content leak via ioctl](http://www.openwall.com/lists/oss-security/2010/08/31/1)
11. [ADV-2011-0298](http://www.vupen.com/english/advisories/2011/0298)
12. [[linux-kernel] 20100827 [PATCH] wireless: fix 64K kernel heap content leak via ioctl](http://lkml.org/lkml/2010/8/27/413)
13. [](http://forums.grsecurity.net/viewtopic.php?f=3&t=2290)
14. [](https://bugzilla.redhat.com/show_bug.cgi?id=628434)
15. [41245](http://secunia.com/advisories/41245)
16. [](http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2)
17. [[linux-kernel] 20100830 [PATCH] wireless extensions: fix kernel heap content leak](http://lkml.org/lkml/2010/8/30/146)
18. [SUSE-SA:2010:054](http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19353, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19353 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19353
- **State**: PUBLISHED
- **Published Date**: November 18, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 18, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ansilove_ansi function in loaders/ansi.c in libansilove 1.0.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ansilove/libansilove/issues/4)
2. [](https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-libansilove-1.0.0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37668
- **State**: PUBLISHED
- **Published Date**: August 12, 2021 at 22:30 UTC
- **Last Updated**: August 04, 2024 at 01:23 UTC
- **Reserved Date**: July 29, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause denial of service in applications serving models using `tf.raw_ops.UnravelIndex` by triggering a division by 0. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/unravel_index_op.cc#L36) does not check that the tensor subsumed by `dims` is not empty. Hence, if one element of `dims` is 0, the implementation does a division by 0. We have patched the issue in GitHub commit a776040a5e7ebf76eeb7eb923bf1ae417dd4d233. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-369: Security Weakness
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- >= 2.5.0, < 2.5.1 (Status: affected)
- >= 2.4.0, < 2.4.3 (Status: affected)
- < 2.3.4 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2wmv-37vq-52g5)
2. [](https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42303, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42303
- **State**: PUBLISHED
- **Published Date**: August 17, 2024 at 09:09 UTC
- **Last Updated**: May 04, 2025 at 09:26 UTC
- **Reserved Date**: July 30, 2024 at 07:40 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
media: imx-pxp: Fix ERR_PTR dereference in pxp_probe()
devm_regmap_init_mmio() can fail, add a check and bail out in case of
error.
### Affected Products
**Linux - Linux**
Affected versions:
- 4e5bd3fdbeb3100d1f120999130afb2a7d41d82a (Status: affected)
- 4e5bd3fdbeb3100d1f120999130afb2a7d41d82a (Status: affected)
- 4e5bd3fdbeb3100d1f120999130afb2a7d41d82a (Status: affected)
**Linux - Linux**
Affected versions:
- 6.3 (Status: affected)
- 0 (Status: unaffected)
- 6.6.44 (Status: unaffected)
- 6.10.3 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/358bc85269d6a359fea597ef9fbb429cd3626e08)
2. [](https://git.kernel.org/stable/c/5ab6ac4e9e165b0fe8a326308218337007224f05)
3. [](https://git.kernel.org/stable/c/57e9ce68ae98551da9c161aaab12b41fe8601856) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23973, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23973 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23973
- **State**: PUBLISHED
- **Published Date**: March 01, 2023 at 12:49 UTC
- **Last Updated**: January 13, 2025 at 15:55 UTC
- **Reserved Date**: January 20, 2023 at 09:29 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in a3rev Software Contact Us Page – Contact People plugin <= 3.7.0.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**a3rev Software - Contact Us Page – Contact People**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/contact-us-page-contact-people/wordpress-contact-us-page-contact-people-plugin-3-7-0-cross-site-request-forgery-csrf-leading-to-contact-creation-vulnerability?_s_id=cve)
### Credits
- Rio Darmawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39187, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39187
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 09:20 UTC
- **Last Updated**: October 10, 2024 at 17:51 UTC
- **Reserved Date**: July 25, 2023 at 15:52 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted DFT files. This could allow an attacker to execute code in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Siemens - Solid Edge SE2023**
Affected versions:
- All versions < V223.0 Update 7 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35655
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 10:51 UTC
- **Last Updated**: September 25, 2024 at 14:53 UTC
- **Reserved Date**: June 28, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Essbase Administration Services product of Oracle Essbase (component: EAS Console). The supported versions that are affected are Prior to 11.1.2.4.046 and Prior to 21.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Essbase Administration Services. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Essbase Administration Services accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Oracle Corporation - Hyperion Essbase Administration Services**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9021, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9021
- **State**: REJECTED
- **Published Date**: May 26, 2017 at 20:00 UTC
- **Last Updated**: May 31, 2017 at 12:57 UTC
- **Reserved Date**: May 16, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6381, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6381
- **State**: PUBLISHED
- **Published Date**: December 12, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 12:17 UTC
- **Reserved Date**: September 11, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when "Proxy ARP" or "No Broadcast" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [71612](http://www.securityfocus.com/bid/71612)
2. [](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10662)
3. [1031360](http://www.securitytracker.com/id/1031360) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13689, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13689 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13689
- **State**: PUBLISHED
- **Published Date**: September 14, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 19:05 UTC
- **Reserved Date**: August 25, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The IKEv1 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:ikev1_id_print().
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201709-23](https://security.gentoo.org/glsa/201709-23)
2. [](https://support.apple.com/HT208221)
3. [DSA-3971](http://www.debian.org/security/2017/dsa-3971)
4. [1039307](http://www.securitytracker.com/id/1039307)
5. [](https://github.com/the-tcpdump-group/tcpdump/commit/061e7371a944588f231cb1b66d6fb070b646e376)
6. [](http://www.tcpdump.org/tcpdump-changes.txt)
7. [RHEA-2018:0705](https://access.redhat.com/errata/RHEA-2018:0705) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21686, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21686 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21686
- **State**: REJECTED
- **Published Date**: February 10, 2025 at 15:58 UTC
- **Last Updated**: May 20, 2025 at 13:55 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3479, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3479 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3479
- **State**: PUBLISHED
- **Published Date**: July 09, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:43 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT204659)
2. [](https://github.com/file/file/commit/36fadd29849b8087af9f4586f89dbf74ea45be67)
3. [RHSA-2014:1766](http://rhn.redhat.com/errata/RHSA-2014-1766.html)
4. [DSA-3021](http://www.debian.org/security/2014/dsa-3021)
5. [HPSBUX03102](http://marc.info/?l=bugtraq&m=141017844705317&w=2)
6. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html)
7. [DSA-2974](http://www.debian.org/security/2014/dsa-2974)
8. [59794](http://secunia.com/advisories/59794)
9. [](http://www.php.net/ChangeLog-5.php)
10. [[file] 20140612 file-5.19 is now available](http://mx.gw.com/pipermail/file/2014/001553.html)
11. [APPLE-SA-2015-04-08-2](http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html)
12. [](http://support.apple.com/kb/HT6443)
13. [](http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html)
14. [RHSA-2014:1765](http://rhn.redhat.com/errata/RHSA-2014-1765.html)
15. [](https://bugs.php.net/bug.php?id=67411)
16. [SSRT101681](http://marc.info/?l=bugtraq&m=141017844705317&w=2)
17. [68241](http://www.securityfocus.com/bid/68241)
18. [59831](http://secunia.com/advisories/59831)
19. [openSUSE-SU-2014:1236](http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16171, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16171 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16171
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 17:37 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
hcbserver is a static file server. hcbserver is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**HackerOne - hcbserver node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/hcbserver)
2. [](https://nodesecurity.io/advisories/414) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6519, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6519 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6519
- **State**: PUBLISHED
- **Published Date**: August 18, 2015 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 18:34 UTC
- **Reserved Date**: August 18, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in Arab Portal 3 allows remote attackers to execute arbitrary SQL commands via the showemail parameter in a signup action to members.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [37594](https://www.exploit-db.com/exploits/37594/)
2. [](http://packetstormsecurity.com/files/132648/Arab-Portal-3-SQL-Injection.html)
3. [](https://youtu.be/5nFblYE90Vk) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22902, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22902 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22902
- **State**: PUBLISHED
- **Published Date**: February 02, 2024 at 00:00 UTC
- **Last Updated**: May 15, 2025 at 19:50 UTC
- **Reserved Date**: January 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vinchin Backup & Recovery v7.2 was discovered to be configured with default root credentials.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://vinchin.com)
2. [](http://default.com)
3. [](https://seclists.org/fulldisclosure/2024/Jan/31)
4. [](https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0968, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0968
- **State**: PUBLISHED
- **Published Date**: March 16, 2010 at 18:26 UTC
- **Last Updated**: August 07, 2024 at 01:06 UTC
- **Reserved Date**: March 16, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in bannershow.php in Geekhelps ADMP 1.01 allows remote attackers to execute arbitrary SQL commands via the click parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [11721](http://www.exploit-db.com/exploits/11721)
2. [ADV-2010-0612](http://www.vupen.com/english/advisories/2010/0612) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-20994, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-20994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20994
- **State**: PUBLISHED
- **Published Date**: June 04, 2025 at 04:56 UTC
- **Last Updated**: June 04, 2025 at 13:46 UTC
- **Reserved Date**: November 06, 2024 at 02:30 UTC
- **Assigned By**: SamsungMobile
### Vulnerability Description
Improper handling of insufficient permission in SyncClientProvider in Samsung Internet installed on non-Samsung Device prior to version 28.0.0.59 allows local attackers to access read and write arbitrary files.
### CVSS Metrics
- **CVSS Base Score**: 4.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L`
### Affected Products
**Samsung Mobile - Samsung Internet**
Affected versions:
- 28.0.0.59 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=06) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47450, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47450
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 14:19 UTC
- **Last Updated**: May 07, 2025 at 16:37 UTC
- **Reserved Date**: May 07, 2025 at 09:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Mitchell Bennis Simple File List allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Simple File List: from n/a through 6.1.13.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Mitchell Bennis - Simple File List**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/simple-file-list/vulnerability/wordpress-simple-file-list-6-1-13-settings-change-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4182
- **State**: PUBLISHED
- **Published Date**: November 04, 2010 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 20:22 UTC
- **Reserved Date**: November 04, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in the Data Access Objects (DAO) library (dao360.dll) in Microsoft Windows XP Professional SP3, Windows Server 2003 R2 Enterprise Edition SP3, Windows Vista Business SP1, and Windows 7 Professional allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse msjet49.dll that is located in the same folder as a file that is processed by dao360.dll. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44541](http://www.securityfocus.com/bid/44541)
2. [41986](http://secunia.com/advisories/41986)
3. [68946](http://osvdb.org/68946) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34947, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34947
- **State**: PUBLISHED
- **Published Date**: May 07, 2024 at 22:54 UTC
- **Last Updated**: August 04, 2024 at 00:26 UTC
- **Reserved Date**: June 17, 2021 at 19:27 UTC
- **Assigned By**: zdi
### Vulnerability Description
NETGEAR R7800 net-cgi Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the parsing of the soap_block_table file. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-13055.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**NETGEAR - R7800**
Affected versions:
- 1.0.2.82 (Status: affected)
### References
1. [ZDI-21-1116](https://www.zerodayinitiative.com/advisories/ZDI-21-1116/)
2. [vendor-provided URL](https://kb.netgear.com/000064044/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2021-0129) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1277, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1277
- **State**: REJECTED
- **Published Date**: June 26, 2005 at 04:00 UTC
- **Last Updated**: November 02, 2005 at 10:00 UTC
- **Reserved Date**: April 26, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23610, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23610 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23610
- **State**: PUBLISHED
- **Published Date**: March 11, 2024 at 15:12 UTC
- **Last Updated**: August 08, 2024 at 15:09 UTC
- **Reserved Date**: January 18, 2024 at 20:48 UTC
- **Assigned By**: NI
### Vulnerability Description
An out of bounds write due to a missing bounds check in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**NI - LabVIEW**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-due-to-missing-bounds-check-in-labview.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3647
- **State**: PUBLISHED
- **Published Date**: November 07, 2010 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 03:18 UTC
- **Reserved Date**: September 28, 2010 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2011-0192](http://www.vupen.com/english/advisories/2011/0192)
2. [42183](http://secunia.com/advisories/42183)
3. [](http://support.apple.com/kb/HT4435)
4. [](http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1)
5. [43026](http://secunia.com/advisories/43026)
6. [GLSA-201101-09](http://security.gentoo.org/glsa/glsa-201101-09.xml)
7. [ADV-2010-2918](http://www.vupen.com/english/advisories/2010/2918)
8. [oval:org.mitre.oval:def:12095](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12095)
9. [APPLE-SA-2010-11-10-1](http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html)
10. [RHSA-2010:0834](http://www.redhat.com/support/errata/RHSA-2010-0834.html)
11. [SUSE-SA:2010:055](http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html)
12. [42926](http://secunia.com/advisories/42926)
13. [SSRT100428](http://marc.info/?l=bugtraq&m=130331642631603&w=2)
14. [ADV-2010-2903](http://www.vupen.com/english/advisories/2010/2903)
15. [HPSBMA02663](http://marc.info/?l=bugtraq&m=130331642631603&w=2)
16. [ADV-2011-0173](http://www.vupen.com/english/advisories/2011/0173)
17. [44683](http://www.securityfocus.com/bid/44683)
18. [](http://www.adobe.com/support/security/bulletins/apsb10-26.html)
19. [oval:org.mitre.oval:def:16160](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16160)
20. [ADV-2010-2906](http://www.vupen.com/english/advisories/2010/2906)
21. [RHSA-2010:0867](http://www.redhat.com/support/errata/RHSA-2010-0867.html)
22. [RHSA-2010:0829](http://www.redhat.com/support/errata/RHSA-2010-0829.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27199, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27199 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27199
- **State**: PUBLISHED
- **Published Date**: July 05, 2023 at 00:00 UTC
- **Last Updated**: December 04, 2024 at 15:53 UTC
- **Reserved Date**: February 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PAX Technology A930 PayDroid_7.1.1_Virgo_V04.5.02_20220722 allows attackers to compile a malicious shared library and use LD_PRELOAD to bypass authorization checks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2023/CVEs/CVE-2023-27199.md)
2. [](https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2023/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46421
- **State**: PUBLISHED
- **Published Date**: December 20, 2022 at 10:20 UTC
- **Last Updated**: April 16, 2025 at 18:10 UTC
- **Reserved Date**: December 04, 2022 at 22:42 UTC
- **Assigned By**: apache
### Vulnerability Description
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache Airflow Hive Provider.This issue affects Apache Airflow Hive Provider: before 5.0.0.
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Apache Software Foundation - Apache Airflow Hive Provider**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/apache/airflow/pull/28101)
2. [](https://lists.apache.org/thread/09twdoyoybldlfj5gvk0qswtofh0rmp4)
### Credits
- id_No2015429 of 3H Security Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29676, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29676
- **State**: PUBLISHED
- **Published Date**: June 25, 2021 at 17:40 UTC
- **Last Updated**: September 17, 2024 at 02:47 UTC
- **Reserved Date**: March 31, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Verify (IBM Security Verify Privilege Vault 10.9.66) is vulnerable to link injection. By persuading a victim to click on a specially-crafted URL link, a remote attacker could exploit this vulnerability to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking
### Affected Products
**IBM - Security Verify Privilege Vault**
Affected versions:
- 10.9.66 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6467045)
2. [ibm-sv-cve202129676-link-injection (199575)](https://exchange.xforce.ibmcloud.com/vulnerabilities/199575) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22661, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22661 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22661
- **State**: PUBLISHED
- **Published Date**: May 10, 2023 at 13:17 UTC
- **Last Updated**: January 27, 2025 at 18:03 UTC
- **Reserved Date**: February 15, 2023 at 04:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Buffer overflow in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**n/a - Intel(R) Server Board BMC firmware**
Affected versions:
- before version 2.90 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1376, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1376 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1376
- **State**: PUBLISHED
- **Published Date**: January 28, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 04:40 UTC
- **Reserved Date**: January 27, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
pixabay-images.php in the Pixabay Images plugin before 2.4 for WordPress does not validate hostnames, which allows remote authenticated users to write to arbitrary files via an upload URL with a host other than pixabay.com.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150120 MSA-2015-01: Wordpress Plugin Pixabay Images Multiple Vulnerabilities](http://seclists.org/fulldisclosure/2015/Jan/75)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=1067992%40pixabay-images%2Ftrunk%2Fpixabay-images.php&old=926633%40pixabay-images%2Ftrunk%2Fpixabay-images.php)
3. [35846](http://www.exploit-db.com/exploits/35846)
4. [20150119 MSA-2015-01: Wordpress Plugin Pixabay Images Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/534505/100/0/threaded)
5. [[oss-security] 20150125 CVE request: MSA-2015-01: Wordpress Plugin Pixabay Images Multiple Vulnerabilities](http://www.openwall.com/lists/oss-security/2015/01/25/5)
6. [](http://packetstormsecurity.com/files/130017/WordPress-Pixarbay-Images-2.3-XSS-Bypass-Upload-Traversal.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0334, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0334
- **State**: PUBLISHED
- **Published Date**: February 27, 2023 at 15:24 UTC
- **Last Updated**: March 10, 2025 at 18:06 UTC
- **Reserved Date**: January 17, 2023 at 09:19 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The ShortPixel Adaptive Images WordPress plugin before 3.6.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against any high privilege users such as admin
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - ShortPixel Adaptive Images**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/b027a8db-0fd6-444d-b14a-0ae58f04f931)
### Credits
- dc11
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23711, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23711 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23711
- **State**: PUBLISHED
- **Published Date**: January 24, 2025 at 10:52 UTC
- **Last Updated**: January 27, 2025 at 15:19 UTC
- **Reserved Date**: January 16, 2025 at 11:28 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Quote me allows Reflected XSS. This issue affects Quote me: from n/a through 1.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NotFound - Quote me**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/quote-me/vulnerability/wordpress-quote-me-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4216, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4216 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4216
- **State**: PUBLISHED
- **Published Date**: July 17, 2014 at 02:36 UTC
- **Last Updated**: August 06, 2024 at 11:04 UTC
- **Reserved Date**: June 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-2987](http://www.debian.org/security/2014/dsa-2987)
2. [60129](http://secunia.com/advisories/60129)
3. [](http://www.vmware.com/security/advisories/VMSA-2014-0012.html)
4. [HPSBUX03091](http://marc.info/?l=bugtraq&m=140852886808946&w=2)
5. [DSA-2980](http://www.debian.org/security/2014/dsa-2980)
6. [1030577](http://www.securitytracker.com/id/1030577)
7. [SSRT101667](http://marc.info/?l=bugtraq&m=140852886808946&w=2)
8. [HPSBUX03092](http://marc.info/?l=bugtraq&m=140852974709252&w=2)
9. [60812](http://secunia.com/advisories/60812)
10. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://www.securityfocus.com/archive/1/534161/100/0/threaded)
11. [60245](http://secunia.com/advisories/60245)
12. [68562](http://www.securityfocus.com/bid/68562)
13. [RHSA-2014:0908](https://access.redhat.com/errata/RHSA-2014:0908)
14. [SSRT101668](http://marc.info/?l=bugtraq&m=140852974709252&w=2)
15. [oracle-cpujul2014-cve20144216(94591)](https://exchange.xforce.ibmcloud.com/vulnerabilities/94591)
16. [](http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html)
17. [60485](http://secunia.com/advisories/60485)
18. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://seclists.org/fulldisclosure/2014/Dec/23)
19. [RHSA-2014:0902](https://access.redhat.com/errata/RHSA-2014:0902)
20. [GLSA-201502-12](http://security.gentoo.org/glsa/glsa-201502-12.xml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20895, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20895 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20895
- **State**: PUBLISHED
- **Published Date**: July 02, 2024 at 09:20 UTC
- **Last Updated**: August 01, 2024 at 22:06 UTC
- **Reserved Date**: December 05, 2023 at 04:57 UTC
- **Assigned By**: SamsungMobile
### Vulnerability Description
Improper access control in Dar service prior to SMR Jul-2024 Release 1 allows local attackers to bypass restriction for calling SDP features.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H`
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- SMR Jul-2024 Release in Android 12, 13, 14 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11331, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11331
- **State**: PUBLISHED
- **Published Date**: December 20, 2024 at 06:59 UTC
- **Last Updated**: December 20, 2024 at 17:37 UTC
- **Reserved Date**: November 18, 2024 at 15:19 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The استخراج محصولات ووکامرس برای آیسی plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.1.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**sisoog - استخراج محصولات ووکامرس برای آیسی**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/af0cc02a-b6dd-4058-b686-9c9a3a4a5962?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/isee-products-extractor/tags/2.1.2/admin/pages/products_list.php#L92)
3. [](https://plugins.trac.wordpress.org/browser/isee-products-extractor/tags/2.1.2/admin/pages/products_list.php#L99)
4. [](https://plugins.trac.wordpress.org/browser/isee-products-extractor/tags/2.1.2/admin/pages/products_list.php#L105)
### Credits
- Dale Mavers |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8751, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8751
- **State**: PUBLISHED
- **Published Date**: November 12, 2020 at 18:08 UTC
- **Last Updated**: August 04, 2024 at 10:12 UTC
- **Reserved Date**: February 06, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, Intel(R) TXE versions before 3.1.80 may allow an unauthenticated user to potentially enable information disclosure via physical access.
### Affected Products
**n/a - Intel(R) CSME, Intel(R) TXE**
Affected versions:
- versions before 11.8.80, Intel(R) TXE versions before 3.1.80 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391)
2. [](https://security.netapp.com/advisory/ntap-20201113-0005/)
3. [](https://security.netapp.com/advisory/ntap-20201113-0002/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22760, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22760 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22760
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 00:00 UTC
- **Last Updated**: April 16, 2025 at 14:35 UTC
- **Reserved Date**: January 07, 2022 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
When importing resources using Web Workers, error messages would distinguish the difference between <code>application/javascript</code> responses and non-script responses. This could have been abused to learn information cross-origin. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2022-05/)
2. [](https://www.mozilla.org/security/advisories/mfsa2022-04/)
3. [](https://www.mozilla.org/security/advisories/mfsa2022-06/)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1740985)
5. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1748503) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2591, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2591
- **State**: PUBLISHED
- **Published Date**: July 31, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 00:39 UTC
- **Reserved Date**: July 31, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in TEM FLEX-1085 1.6.0. Affected is an unknown function of the file /sistema/flash/reboot. The manipulation leads to denial of service. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-404: Security Weakness
### Affected Products
**TEM - FLEX-1085**
Affected versions:
- 1.6.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.205344)
2. [](http://packetstormsecurity.com/files/172323/FLEX-Denial-Of-Service.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2309, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2309 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2309
- **State**: PUBLISHED
- **Published Date**: July 24, 2023 at 10:20 UTC
- **Last Updated**: October 24, 2024 at 15:02 UTC
- **Reserved Date**: April 26, 2023 at 18:21 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The wpForo Forum WordPress plugin before 2.1.9 does not escape some request parameters while in debug mode, leading to a Reflected Cross-Site Scripting vulnerability.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - wpForo Forum**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/1b3f4558-ea41-4749-9aa2-d3971fc9ca0d)
### Credits
- Alex Sanford
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13723, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13723 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13723
- **State**: PUBLISHED
- **Published Date**: October 09, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 19:05 UTC
- **Reserved Date**: August 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In X.Org Server (aka xserver and xorg-server) before 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [101253](http://www.securityfocus.com/bid/101253)
2. [](https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac)
3. [[debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update](https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html)
4. [GLSA-201710-30](https://security.gentoo.org/glsa/201710-30)
5. [[oss-security] 20171004 Fwd: X server fixes for CVE-2017-13721 & CVE-2017-13723](http://www.openwall.com/lists/oss-security/2017/10/04/10)
6. [DSA-4000](http://www.debian.org/security/2017/dsa-4000)
7. [[xorg-announce] 20171004 [ANNOUNCE] xorg-server 1.19.4](https://lists.x.org/archives/xorg-announce/2017-October/002808.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46520, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46520 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46520
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 00:00 UTC
- **Last Updated**: September 11, 2024 at 15:26 UTC
- **Reserved Date**: October 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function uninstallPluginReqHandle.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165)
2. [](https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/1/1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23872, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23872 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23872
- **State**: PUBLISHED
- **Published Date**: January 31, 2022 at 21:26 UTC
- **Last Updated**: August 03, 2024 at 03:51 UTC
- **Reserved Date**: January 24, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Emlog pro v1.1.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the component /admin/configure.php via the parameter footer_info.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/truonghuuphuc/CVE)
2. [](https://github.com/emlog/emlog/issues/147) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39086, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39086
- **State**: PUBLISHED
- **Published Date**: January 04, 2023 at 00:00 UTC
- **Last Updated**: April 10, 2025 at 15:07 UTC
- **Reserved Date**: September 01, 2022 at 00:00 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9843, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9843
- **State**: PUBLISHED
- **Published Date**: June 09, 2020 at 16:18 UTC
- **Last Updated**: August 04, 2024 at 10:43 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site scripting attack.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows (Legacy)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT211168)
2. [](https://support.apple.com/HT211171)
3. [](https://support.apple.com/HT211175)
4. [](https://support.apple.com/HT211178)
5. [](https://support.apple.com/HT211179)
6. [](https://support.apple.com/HT211181)
7. [](https://support.apple.com/HT211177) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8801, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8801 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8801
- **State**: PUBLISHED
- **Published Date**: April 02, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 02:35 UTC
- **Reserved Date**: October 18, 2016 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei OceanStor 5600 V3 with V300R003C00C10 and earlier versions allows attackers with administrator privilege to inject a command into a specific command's parameters, and run this injected command with root privilege.
### Affected Products
**n/a - OceanStor 5600 V3 V300R003C00C10 and earlier versions**
Affected versions:
- OceanStor 5600 V3 V300R003C00C10 and earlier versions (Status: affected)
### References
1. [94832](http://www.securityfocus.com/bid/94832)
2. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-storage-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1545, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1545 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1545
- **State**: PUBLISHED
- **Published Date**: February 20, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:53 UTC
- **Reserved Date**: February 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
UploadFile.php in MoniWiki 1.0.9.2 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.hwp, which allows remote attackers to upload and execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [13478](http://secunia.com/advisories/13478)
2. [11951](http://www.securityfocus.com/bid/11951)
3. [20041215 STG Security Advisory: [SSA-20041215-15] Vulnerability of uploading files with multiple extensions in MoniWiki](http://archives.neohapsis.com/archives/fulldisclosure/2004-12/0448.html)
4. [](http://kldp.net/scm/cvsweb.php/moniwiki/plugin/UploadFile.php.diff?cvsroot=moniwiki&only_with_tag=HEAD&r1=text&tr1=1.17&r2=text&tr2=1.16&f=h)
5. [20041215 STG Security Advisory: [SSA-20041215-15] Vulnerability of uploading files with multiple extensions in MoniWiki](http://marc.info/?l=bugtraq&m=110314544711884&w=2)
6. [moniwiki-file-upload(18493)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18493) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1148, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1148
- **State**: PUBLISHED
- **Published Date**: March 18, 2011 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 22:14 UTC
- **Reserved Date**: March 03, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBOV02763](http://marc.info/?l=bugtraq&m=133469208622507&w=2)
2. [](http://support.apple.com/kb/HT5130)
3. [49241](http://www.securityfocus.com/bid/49241)
4. [[oss-security] 20110313 CVE request: PHP substr_replace() use-after-free](http://openwall.com/lists/oss-security/2011/03/13/2)
5. [MDVSA-2011:165](http://www.mandriva.com/security/advisories?name=MDVSA-2011:165)
6. [[oss-security] 20110313 Re: CVE request: PHP substr_replace() use-after-free](http://openwall.com/lists/oss-security/2011/03/13/9)
7. [APPLE-SA-2012-02-01-1](http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html)
8. [[oss-security] 20110313 Re: CVE request: PHP substr_replace() use-after-free](http://openwall.com/lists/oss-security/2011/03/13/3)
9. [](http://bugs.php.net/bug.php?id=54238)
10. [SSRT100826](http://marc.info/?l=bugtraq&m=133469208622507&w=2)
11. [RHSA-2011:1423](http://www.redhat.com/support/errata/RHSA-2011-1423.html)
12. [](http://www.php.net/ChangeLog-5.php#5.3.7)
13. [php-substrreplace-code-exec(66080)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66080)
14. [46843](http://www.securityfocus.com/bid/46843)
15. [](http://www.php.net/archive/2011.php#id2011-08-18-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28865, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28865
- **State**: PUBLISHED
- **Published Date**: June 16, 2022 at 20:36 UTC
- **Last Updated**: August 04, 2024 at 16:40 UTC
- **Reserved Date**: November 16, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in PowerJob through 3.2.2, allows attackers to change arbitrary user passwords via the id parameter to /appinfo/save.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/KFCFans/PowerJob/issues/99) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26042, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26042 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26042
- **State**: PUBLISHED
- **Published Date**: March 18, 2024 at 17:54 UTC
- **Last Updated**: October 07, 2024 at 13:44 UTC
- **Reserved Date**: February 14, 2024 at 17:37 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.19 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable web pages. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable script. This could result in arbitrary code execution in the context of the victim's browser.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4425, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4425 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4425
- **State**: PUBLISHED
- **Published Date**: December 20, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:46 UTC
- **Reserved Date**: December 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Kerio WinRoute Firewall before 6.1.3 allows remote attackers to cause a denial of service (crash) via certain RTSP streams.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2005-2391](http://www.vupen.com/english/advisories/2005/2391)
2. [15387](http://www.securityfocus.com/bid/15387)
3. [17519](http://secunia.com/advisories/17519)
4. [](http://www.kerio.com/kwf_history.html)
5. [kerio-winroute-rtsp-dos(23034)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23034) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4028
- **State**: PUBLISHED
- **Published Date**: October 28, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 03:34 UTC
- **Reserved Date**: October 21, 2010 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in LoadRunner Web Tours 9.10 in HP LoadRunner 9.1 and earlier allows remote attackers to cause a denial of service, and possibly obtain sensitive information or modify data, via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBMA02533](http://marc.info/?l=bugtraq&m=128821242731749&w=2)
2. [SSRT080049](http://marc.info/?l=bugtraq&m=128821242731749&w=2)
3. [1024657](http://www.securitytracker.com/id?1024657) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12831, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12831 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12831
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: August 11, 2017 at 00:00 UTC
- **Assigned By**: airbus
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19252, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19252 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19252
- **State**: PUBLISHED
- **Published Date**: November 25, 2019 at 17:26 UTC
- **Last Updated**: August 05, 2024 at 02:09 UTC
- **Reserved Date**: November 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://lore.kernel.org/lkml/c30fc539-68a8-65d7-226c-6f8e6fd8bdfb%40suse.com/)
2. [](https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=0c9acb1af77a3cb8707e43f45b72c95266903cee)
3. [](https://security.netapp.com/advisory/ntap-20200103-0001/)
4. [USN-4258-1](https://usn.ubuntu.com/4258-1/)
5. [USN-4284-1](https://usn.ubuntu.com/4284-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3175
- **State**: PUBLISHED
- **Published Date**: April 09, 2012 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 23:22 UTC
- **Reserved Date**: August 19, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x6c request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.novell.com/support/viewContent.do?externalId=7010044)
2. [](http://download.novell.com/Download?buildid=rs4B5jhWKf8~)
3. [20120314 Novell ZENworks Configuration Management PreBoot Service Opcode 0x6c Stack Buffer Overflow Vulnerability](http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=973)
4. [19958](http://www.exploit-db.com/exploits/19958)
5. [](http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5127930.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8686, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8686 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8686
- **State**: PUBLISHED
- **Published Date**: December 18, 2019 at 17:33 UTC
- **Last Updated**: August 04, 2024 at 21:24 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows (Microsoft Store)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT210346)
2. [](https://support.apple.com/HT210348)
3. [](https://support.apple.com/HT210351)
4. [](https://support.apple.com/HT210355)
5. [](https://support.apple.com/HT210356)
6. [](https://support.apple.com/HT210357)
7. [](https://support.apple.com/HT210358) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22803, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22803 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22803
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 15:39 UTC
- **Last Updated**: January 10, 2025 at 20:42 UTC
- **Reserved Date**: January 07, 2025 at 21:05 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VillaTheme Advanced Product Information for WooCommerce allows Stored XSS.This issue affects Advanced Product Information for WooCommerce: from n/a through 1.1.4.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**VillaTheme - Advanced Product Information for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/woo-advanced-product-information/vulnerability/wordpress-advanced-product-information-for-woocommerce-plugin-1-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- 0xd4rk5id3 (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0869, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0869
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:37 UTC
- **Reserved Date**: October 18, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The default configuration of Apache 1.3.12 in SuSE Linux 6.4 enables WebDAV, which allows remote attackers to list arbitrary directories via the PROPFIND HTTP request method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20000907](http://archives.neohapsis.com/archives/linux/suse/2000-q3/0906.html)
2. [apache-webdav-directory-listings(5204)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5204)
3. [A090700-3](http://www.atstake.com/research/advisories/2000/a090700-3.txt)
4. [1656](http://www.securityfocus.com/bid/1656) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.