System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0809, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0809 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0809 - **State**: PUBLISHED - **Published Date**: April 05, 2022 at 00:26 UTC - **Last Updated**: August 02, 2024 at 23:40 UTC - **Reserved Date**: March 01, 2022 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Out of bounds memory access in WebXR in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html) 2. [](https://crbug.com/1293428) 3. [GLSA-202208-25](https://security.gentoo.org/glsa/202208-25)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5969, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5969 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5969 - **State**: PUBLISHED - **Published Date**: November 06, 2023 at 15:48 UTC - **Last Updated**: September 17, 2024 at 13:07 UTC - **Reserved Date**: November 06, 2023 at 15:45 UTC - **Assigned By**: Mattermost ### Vulnerability Description Mattermost fails to properly sanitize the request to /api/v4/redirect_location allowing an attacker, sending a specially crafted request to /api/v4/redirect_location, to fill up the memory due to caching large items. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **Mattermost - Mattermost** Affected versions: - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 7.8.12 (Status: unaffected) - 8.0.4 (Status: unaffected) - 8.1.3 (Status: unaffected) - 9.0.1 (Status: unaffected) ### References 1. [](https://mattermost.com/security-updates) ### Credits - vultza (vultza)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0567, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0567 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0567 - **State**: PUBLISHED - **Published Date**: February 19, 2010 at 17:00 UTC - **Last Updated**: August 07, 2024 at 00:52 UTC - **Reserved Date**: February 10, 2010 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 before 7.0(8.10), 7.2 before 7.2(4.45), 8.0 before 8.0(5.1), 8.1 before 8.1(2.37), and 8.2 before 8.2(1.15); and Cisco PIX 500 Series Security Appliance; allows remote attackers to cause a denial of service (active IPsec tunnel loss and prevention of new tunnels) via a malformed IKE message through an existing tunnel to UDP port 4500, aka Bug ID CSCtc47782. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20100217 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances](http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910c.shtml) 2. [cisco-asa-ike-dos(56341)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56341) 3. [38279](http://www.securityfocus.com/bid/38279) 4. [38618](http://secunia.com/advisories/38618) 5. [38636](http://secunia.com/advisories/38636) 6. [62436](http://osvdb.org/62436) 7. [1023612](http://www.securitytracker.com/id?1023612) 8. [ADV-2010-0415](http://www.vupen.com/english/advisories/2010/0415)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-38231, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-38231 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-38231 - **State**: PUBLISHED - **Published Date**: August 16, 2022 at 20:13 UTC - **Last Updated**: August 03, 2024 at 10:45 UTC - **Reserved Date**: August 15, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::getChar() at /xpdf/Stream.cc. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/jhcloos/xpdf/issues/11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10502, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10502 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10502 - **State**: PUBLISHED - **Published Date**: December 10, 2018 at 15:00 UTC - **Last Updated**: August 06, 2024 at 03:21 UTC - **Reserved Date**: August 16, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description While generating trusted application id, An integer overflow can occur giving the trusted application an invalid identity in Snapdragon Mobile and Snapdragon Wear in versions MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 835 and SDA660. ### Affected Products **Qualcomm, Inc. - Snapdragon Mobile, Snapdragon Wear** Affected versions: - MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 835, SDA660 (Status: affected) ### References 1. [105838](http://www.securityfocus.com/bid/105838) 2. [](https://source.android.com/security/bulletin/2018-11-01#qualcomm-components)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2834, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2834 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2834 - **State**: PUBLISHED - **Published Date**: October 17, 2022 at 00:00 UTC - **Last Updated**: May 13, 2025 at 19:11 UTC - **Reserved Date**: August 16, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Helpful WordPress plugin before 4.5.26 puts the exported logs and feedbacks in a publicly accessible location and guessable names, which could allow attackers to download them and retrieve sensitive information such as IP, Names and Email Address depending on the plugin's settings ### Weakness Classification (CWE) - CWE-552 Files or Directories Accessible to External Parties: Security Weakness ### Affected Products **Unknown - Helpful** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/468d5fc7-04c6-4354-b134-85ebb25b37ae) ### Credits - Aleksi Kistauri - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45701, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45701 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45701 - **State**: PUBLISHED - **Published Date**: February 17, 2023 at 00:00 UTC - **Last Updated**: March 18, 2025 at 16:07 UTC - **Reserved Date**: November 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Arris TG2482A firmware through 9.1.103GEM9 allow Remote Code Execution (RCE) via the ping utility feature. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://arris.com) 2. [](https://packetstormsecurity.com/files/171001/Arris-Router-Firmware-9.1.103-Remote-Code-Execution.htmlhttps://github.com/yerodin/CVE-2022-45701)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3876, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3876 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3876 - **State**: PUBLISHED - **Published Date**: June 18, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 10:57 UTC - **Reserved Date**: May 27, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Frams' Fast File EXchange (F*EX, aka fex) before fex-20140530 allow remote attackers to inject arbitrary web script or HTML via the (1) akey parameter to rup or (2) disclaimer or (3) gm parameter to fuc. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html) 2. [](http://fex.rus.uni-stuttgart.de/fex.html) 3. [](https://www.lsexperts.de/advisories/lse-2014-05-22.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21541, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21541 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21541 - **State**: PUBLISHED - **Published Date**: January 10, 2023 at 00:00 UTC - **Last Updated**: January 01, 2025 at 00:35 UTC - **Reserved Date**: December 01, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Task Scheduler Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Task Scheduler Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21541)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2764, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2764 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2764 - **State**: PUBLISHED - **Published Date**: June 11, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 10:21 UTC - **Reserved Date**: April 10, 2014 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1772, CVE-2014-1780, CVE-2014-1794, CVE-2014-1797, CVE-2014-1802, CVE-2014-2756, CVE-2014-2763, CVE-2014-2769, and CVE-2014-2771. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [67848](http://www.securityfocus.com/bid/67848) 2. [1030370](http://www.securitytracker.com/id/1030370) 3. [MS14-035](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6646, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6646 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6646 - **State**: PUBLISHED - **Published Date**: December 09, 2023 at 21:31 UTC - **Last Updated**: May 27, 2025 at 15:11 UTC - **Reserved Date**: December 09, 2023 at 08:13 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic has been found in linkding 1.23.0. Affected is an unknown function. The manipulation of the argument q leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.23.1 is able to address this issue. It is recommended to upgrade the affected component. VDB-247338 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early, responded in a very professional manner and immediately released a fixed version of the affected product. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **n/a - linkding** Affected versions: - 1.23.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.247338) 2. [](https://vuldb.com/?ctiid.247338) 3. [](https://treasure-blarney-085.notion.site/linkding-XSS-12709fa5ec664c8ebf6a4a02141252a8) 4. [](https://github.com/sissbruecker/linkding/releases/tag/v1.23.1) ### Credits - zgbsm (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7604, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7604 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7604 - **State**: PUBLISHED - **Published Date**: September 29, 2015 at 19:00 UTC - **Last Updated**: September 16, 2024 at 19:24 UTC - **Reserved Date**: September 29, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Splunk Web in Splunk Enterprise 6.2.x before 6.2.6 and Splunk Light 6.2.x before 6.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033655](http://www.securitytracker.com/id/1033655) 2. [](http://www.splunk.com/view/SP-CAAAPAM)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3726, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3726 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3726 - **State**: PUBLISHED - **Published Date**: November 09, 2022 at 00:00 UTC - **Last Updated**: May 01, 2025 at 19:23 UTC - **Reserved Date**: October 27, 2022 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description Lack of sand-boxing of OpenAPI documents in GitLab CE/EE affecting all versions from 12.6 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to trick a user to click on the Swagger OpenAPI viewer and issue HTTP requests that affect the victim's account. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N` ### Affected Products **GitLab - GitLab** Affected versions: - >=12.6, <15.3.5 (Status: affected) - >=15.4, <15.4.4 (Status: affected) - >=15.5, <15.5.2 (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/362509) 2. [](https://hackerone.com/reports/1563383) 3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3726.json) ### Credits - Thanks [yvvdwf](https://hackerone.com/yvvdwf) for reporting this vulnerability through our HackerOne bug bounty program
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-47797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-47797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-47797 - **State**: PUBLISHED - **Published Date**: November 17, 2023 at 06:03 UTC - **Last Updated**: August 29, 2024 at 14:15 UTC - **Reserved Date**: November 10, 2023 at 01:49 UTC - **Assigned By**: Liferay ### Vulnerability Description Reflected cross-site scripting (XSS) vulnerability on a content page’s edit page in Liferay Portal 7.4.3.94 through 7.4.3.95 allows remote attackers to inject arbitrary web script or HTML via the `p_l_back_url_title` parameter. ### CVSS Metrics - **CVSS Base Score**: 9.6/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Liferay - Portal** Affected versions: - 7.4.3.94 (Status: affected) ### References 1. [](https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-47797)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34548, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34548 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34548 - **State**: PUBLISHED - **Published Date**: June 29, 2021 at 11:00 UTC - **Last Updated**: August 04, 2024 at 00:12 UTC - **Reserved Date**: June 10, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.torproject.org/tpo/core/tor/-/issues/40389) 2. [](https://blog.torproject.org/node/2041) 3. [GLSA-202107-25](https://security.gentoo.org/glsa/202107-25) 4. [](http://packetstormsecurity.com/files/163510/Tor-Half-Closed-Connection-Stream-Confusion.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41023, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41023 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41023 - **State**: PUBLISHED - **Published Date**: July 29, 2024 at 14:31 UTC - **Last Updated**: May 04, 2025 at 12:57 UTC - **Reserved Date**: July 12, 2024 at 12:17 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: sched/deadline: Fix task_struct reference leak During the execution of the following stress test with linux-rt: stress-ng --cyclic 30 --timeout 30 --minimize --quiet kmemleak frequently reported a memory leak concerning the task_struct: unreferenced object 0xffff8881305b8000 (size 16136): comm "stress-ng", pid 614, jiffies 4294883961 (age 286.412s) object hex dump (first 32 bytes): 02 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .@.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ debug hex dump (first 16 bytes): 53 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 S............... backtrace: [<00000000046b6790>] dup_task_struct+0x30/0x540 [<00000000c5ca0f0b>] copy_process+0x3d9/0x50e0 [<00000000ced59777>] kernel_clone+0xb0/0x770 [<00000000a50befdc>] __do_sys_clone+0xb6/0xf0 [<000000001dbf2008>] do_syscall_64+0x5d/0xf0 [<00000000552900ff>] entry_SYSCALL_64_after_hwframe+0x6e/0x76 The issue occurs in start_dl_timer(), which increments the task_struct reference count and sets a timer. The timer callback, dl_task_timer, is supposed to decrement the reference count upon expiration. However, if enqueue_task_dl() is called before the timer expires and cancels it, the reference count is not decremented, leading to the leak. This patch fixes the reference leak by ensuring the task_struct reference count is properly decremented when the timer is canceled. ### Affected Products **Linux - Linux** Affected versions: - feff2e65efd8d84cf831668e182b2ce73c604bbb (Status: affected) - feff2e65efd8d84cf831668e182b2ce73c604bbb (Status: affected) - f0e1c1d8ff908a39dd42e723d08f104505dfa601 (Status: affected) - 184c8ab5342450c4ae6fc5d937f9bb06c620dcf1 (Status: affected) **Linux - Linux** Affected versions: - 5.10 (Status: affected) - 0 (Status: unaffected) - 6.9.10 (Status: unaffected) - 6.10 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/7a54d31face626f62de415ebe77b43f76c3ffaf4) 2. [](https://git.kernel.org/stable/c/b58652db66c910c2245f5bee7deca41c12d707b9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-45862, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-45862 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-45862 - **State**: PUBLISHED - **Published Date**: May 20, 2025 at 00:00 UTC - **Last Updated**: May 20, 2025 at 18:02 UTC - **Reserved Date**: April 22, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the interfacenameds parameter in the formDhcpv6s interface. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/258/ids/36.html) 2. [](https://github.com/Jiangxiazhe/IOT_hack/blob/main/TOTOLINK/A3002R/7/overflow.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1183, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1183 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1183 - **State**: PUBLISHED - **Published Date**: July 10, 2023 at 15:04 UTC - **Last Updated**: February 13, 2025 at 16:39 UTC - **Reserved Date**: March 06, 2023 at 04:37 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in the Libreoffice package. An attacker can craft an odb containing a "database/script" file with a SCRIPT command where the contents of the file could be written to a new file whose location was determined by the attacker. ### CVSS Metrics - **CVSS Base Score**: 5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **n/a - libreoffice** Affected versions: - 7.4.6 (Status: unaffected) - 7.5.1 (Status: unaffected) **Red Hat - Red Hat Enterprise Linux 6** **Red Hat - Red Hat Enterprise Linux 7** **Red Hat - Red Hat Enterprise Linux 8** **Red Hat - Red Hat Enterprise Linux 9** **Fedora - Fedora** ### References 1. [](https://access.redhat.com/security/cve/CVE-2023-1183) 2. [RHBZ#2208506](https://bugzilla.redhat.com/show_bug.cgi?id=2208506) 3. [](https://www.libreoffice.org/about-us/security/advisories/cve-2023-1183/) 4. [](http://www.openwall.com/lists/oss-security/2023/12/28/4) 5. [](http://www.openwall.com/lists/oss-security/2024/01/03/4) ### Credits - Red Hat would like to thank Gregor Kopf (Secfault Security GmbH) for reporting this issue.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0759, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0759 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0759 - **State**: PUBLISHED - **Published Date**: February 28, 2014 at 02:00 UTC - **Last Updated**: August 06, 2024 at 09:27 UTC - **Reserved Date**: January 02, 2014 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Unquoted Windows search path vulnerability in Schneider Electric Floating License Manager 1.0.0 through 1.4.0 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://ics-cert.us-cert.gov/advisories/ICSA-14-058-01) 2. [](http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-015-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15251, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15251 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15251 - **State**: PUBLISHED - **Published Date**: October 11, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 19:50 UTC - **Reserved Date**: October 11, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at PDF!xmlParserInputRead+0x00000000000e7326." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15251)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0354, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0354 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0354 - **State**: PUBLISHED - **Published Date**: May 24, 2001 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:14 UTC - **Reserved Date**: May 24, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TheNet CheckBO 1.56 allows remote attackers to cause a denial of service via a flood of characters to the TCP ports which it is listening on. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2634](http://www.securityfocus.com/bid/2634) 2. [20010420 CheckBO Win9x memo overflow](http://www.securityfocus.com/archive/1/178061)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5639, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5639 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5639 - **State**: PUBLISHED - **Published Date**: October 10, 2017 at 16:00 UTC - **Last Updated**: August 06, 2024 at 06:59 UTC - **Reserved Date**: July 24, 2015 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description niconico App for iOS before 6.38 does not verify SSL certificates which could allow remote attackers to execute man-in-the-middle attacks. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [JVN#20355129](http://jvn.jp/en/jp/JVN20355129/index.html) 2. [JVNDB-2015-000137](http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000137.html) 3. [](http://blog.nicovideo.jp/niconews/ni055746.html) 4. [76906](http://www.securityfocus.com/bid/76906)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40052 - **State**: PUBLISHED - **Published Date**: January 18, 2024 at 15:11 UTC - **Last Updated**: August 29, 2024 at 19:52 UTC - **Reserved Date**: August 08, 2023 at 19:44 UTC - **Assigned By**: ProgressSoftware ### Vulnerability Description This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0 .  An attacker who can produce a malformed web request may cause the crash of a PASOE agent potentially disrupting the thread activities of many web application clients. Multiple of these DoS attacks could lead to the flooding of invalid requests as compared to the server’s remaining ability to process valid requests. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **Progress Software Corporation - OpenEdge** Affected versions: - 11.7.0 (Status: affected) - 12.2.0 (Status: affected) - Innovation Releases (Status: affected) ### References 1. [](https://www.progress.com/openedge) 2. [](https://community.progress.com/s/article/Important-Progress-OpenEdge-Product-Alert-for-Progress-Application-Server-for-OpenEdge-PASOE-Denial-of-Service-Vulnerability-in-WEB-Transport)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10186, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10186 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10186 - **State**: PUBLISHED - **Published Date**: November 06, 2024 at 12:43 UTC - **Last Updated**: November 06, 2024 at 13:19 UTC - **Reserved Date**: October 18, 2024 at 23:11 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Event post plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's events_cal shortcode in all versions up to, and including, 5.9.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **bastho - Event post** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/f3ae1c32-18a7-4109-a7ea-dfd18fa3a8e2?source=cve) 2. [](https://wordpress.org/plugins/event-post/#developers) 3. [](https://plugins.trac.wordpress.org/changeset/3182549/) ### Credits - Peter Thaleikis
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4877, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4877 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4877 - **State**: PUBLISHED - **Published Date**: October 07, 2011 at 10:00 UTC - **Last Updated**: August 07, 2024 at 04:02 UTC - **Reserved Date**: October 07, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in index.php in OneCMS 2.6.1 allows remote attackers to inject arbitrary web script or HTML via the view parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [8432](http://securityreason.com/securityalert/8432) 2. [42949](http://www.securityfocus.com/bid/42949) 3. [](http://packetstormsecurity.org/1009-exploits/onecms-xss.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2406, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2406 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2406 - **State**: PUBLISHED - **Published Date**: July 14, 2015 at 21:00 UTC - **Last Updated**: August 06, 2024 at 05:10 UTC - **Reserved Date**: March 19, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2385, CVE-2015-2390, CVE-2015-2397, CVE-2015-2404, and CVE-2015-2422. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1032894](http://www.securitytracker.com/id/1032894) 2. [MS15-065](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7566, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7566 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7566 - **State**: PUBLISHED - **Published Date**: October 20, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:56 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Stift Neuburg (aka de.appack.project.neuburg) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#275993](http://www.kb.cert.org/vuls/id/275993) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3444, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3444 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3444 - **State**: PUBLISHED - **Published Date**: July 13, 2023 at 02:08 UTC - **Last Updated**: November 05, 2024 at 15:15 UTC - **Reserved Date**: June 28, 2023 at 13:19 UTC - **Assigned By**: GitLab ### Vulnerability Description An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.3 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to merge arbitrary code into protected branches. ### CVSS Metrics - **CVSS Base Score**: 5.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **GitLab - GitLab** Affected versions: - 15.3 (Status: affected) - 16.0 (Status: affected) - 16.1 (Status: affected) ### References 1. [GitLab Issue #406803](https://gitlab.com/gitlab-org/gitlab/-/issues/406803) 2. [HackerOne Bug Bounty Report #1928709](https://hackerone.com/reports/1928709) ### Credits - Thanks [glan1k](https://hackerone.com/glan1k) for reporting this vulnerability through our HackerOne bug bounty program
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-20061, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-20061 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-20061 - **State**: PUBLISHED - **Published Date**: January 29, 2025 at 19:52 UTC - **Last Updated**: February 12, 2025 at 19:51 UTC - **Reserved Date**: January 14, 2025 at 16:31 UTC - **Assigned By**: icscert ### Vulnerability Description mySCADA myPRO does not properly neutralize POST requests sent to a specific port with email information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **mySCADA - myPRO Manager** Affected versions: - 0 (Status: affected) **mySCADA - myPRO Runtime** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-25-023-01) ### Credits - Mehmet INCE from PRODAFT.com working with Trend Micro Zero Day Initiative reported these vulnerabilities to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17796, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17796 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17796 - **State**: PUBLISHED - **Published Date**: December 20, 2017 at 09:00 UTC - **Last Updated**: August 05, 2024 at 20:59 UTC - **Reserved Date**: December 20, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In TG Soft Vir.IT eXplorer Lite 8.5.65, the driver file (VIRAGTLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x827300A4. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/rubyfly/Vir.IT-explorer_POC/tree/master/8.5.65/0x827300A4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25799, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25799 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25799 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 00:00 UTC - **Last Updated**: March 06, 2025 at 17:53 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SeaCMS 13.3 was discovered to contain an arbitrary file read vulnerability in the file_get_contents function at admin_safe.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://seacms.com) 2. [](https://www.seacms.com/) 3. [](https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-lrf.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39711, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39711 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39711 - **State**: PUBLISHED - **Published Date**: November 13, 2024 at 01:54 UTC - **Last Updated**: December 01, 2024 at 18:25 UTC - **Reserved Date**: June 28, 2024 at 01:04 UTC - **Assigned By**: hackerone ### Vulnerability Description Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution. ### Affected Products **Ivanti - Connect Secure** Affected versions: - 22.7R2.1 (Status: affected) - 9.1R18.7 (Status: affected) **Ivanti - Policy Secure** Affected versions: - 22.7R1.1 (Status: affected) ### References 1. [](https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12441, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12441 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12441 - **State**: PUBLISHED - **Published Date**: December 12, 2024 at 04:23 UTC - **Last Updated**: December 12, 2024 at 15:46 UTC - **Reserved Date**: December 10, 2024 at 19:01 UTC - **Assigned By**: Wordfence ### Vulnerability Description The BP Email Assign Templates plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 1.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **shanebp - BP Email Assign Templates** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/da81eb8b-4b38-462d-a85b-c0bad39f61a2?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/bp-email-assign-templates/trunk/pp-email-templates-admin.php#L297) ### Credits - Dale Mavers
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4381, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4381 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4381 - **State**: PUBLISHED - **Published Date**: August 16, 2023 at 11:02 UTC - **Last Updated**: October 03, 2024 at 13:37 UTC - **Reserved Date**: August 16, 2023 at 11:02 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Unverified Password Change in GitHub repository instantsoft/icms2 prior to 2.16.1-git. ### Weakness Classification (CWE) - CWE-620: Security Weakness ### Affected Products **instantsoft - instantsoft/icms2** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/666c2617-e3e9-4955-9c97-2f8ed5262cc3) 2. [](https://github.com/instantsoft/icms2/commit/58f8b9941b53b606a1b15a4364005cd2b1965507)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1184, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1184 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1184 - **State**: PUBLISHED - **Published Date**: September 12, 2001 at 04:00 UTC - **Last Updated**: August 01, 2024 at 17:02 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in Elm 2.4 and earlier allows local users to gain privileges via a long TERM environmental variable. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19970513](http://marc.info/?l=bugtraq&m=87602167420967&w=2) 2. [19970514 Re: ELM overflow](http://marc.info/?l=bugtraq&m=87602167420970&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8841, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8841 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8841 - **State**: PUBLISHED - **Published Date**: May 15, 2018 at 22:00 UTC - **Last Updated**: September 16, 2024 at 16:14 UTC - **Reserved Date**: March 20, 2018 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an improper privilege management vulnerability may allow an authenticated user to modify files when read access should only be given to the user. ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **Advantech - WebAccess** Affected versions: - WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, WebAccess/NMS 2.0.3 and prior. (Status: affected) ### References 1. [104190](http://www.securityfocus.com/bid/104190) 2. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-135-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33777, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33777 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33777 - **State**: PUBLISHED - **Published Date**: July 14, 2021 at 17:53 UTC - **Last Updated**: August 03, 2024 at 23:58 UTC - **Reserved Date**: May 28, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description HEVC Video Extensions Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - HEVC Video Extensions** Affected versions: - N/A (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33777)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-24820, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-24820 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-24820 - **State**: PUBLISHED - **Published Date**: February 09, 2024 at 00:00 UTC - **Last Updated**: August 01, 2024 at 23:28 UTC - **Reserved Date**: January 31, 2024 at 16:28 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Icinga Director is a tool designed to make Icinga 2 configuration handling easy. Not any of Icinga Director's configuration forms used to manipulate the monitoring environment are protected against cross site request forgery (CSRF). It enables attackers to perform changes in the monitoring environment managed by Icinga Director without the awareness of the victim. Users of the map module in version 1.x, should immediately upgrade to v2.0. The mentioned XSS vulnerabilities in Icinga Web are already fixed as well and upgrades to the most recent release of the 2.9, 2.10 or 2.11 branch must be performed if not done yet. Any later major release is also suitable. Icinga Director will receive minor updates to the 1.8, 1.9, 1.10 and 1.11 branches to remedy this issue. Upgrade immediately to a patched release. If that is not feasible, disable the director module for the time being. ### CVSS Metrics - **CVSS Base Score**: 8.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Icinga - icingaweb2-module-director** Affected versions: - >=1.0.0, < 1.8.2 (Status: affected) - >= 1.9.0, < 1.9.2 (Status: affected) - >= 1.10.0, < 1.10.3 (Status: affected) - >= 1.11.0, < 1.11.1 (Status: affected) ### References 1. [https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3mwp-5p5v-j6q3](https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3mwp-5p5v-j6q3) 2. [https://github.com/nbuchwitz/icingaweb2-module-map/pull/86](https://github.com/nbuchwitz/icingaweb2-module-map/pull/86) 3. [https://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/](https://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/) 4. [https://github.com/Icinga/icingaweb2/issues?q=is%3Aissue++is%3Aclosed+4979+4960+4947](https://github.com/Icinga/icingaweb2/issues?q=is%3Aissue++is%3Aclosed+4979+4960+4947) 5. [https://support.apple.com/en-is/guide/safari/sfri11471/16.0](https://support.apple.com/en-is/guide/safari/sfri11471/16.0) 6. [https://www.chromium.org/updates/same-site/](https://www.chromium.org/updates/same-site/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38760, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38760 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38760 - **State**: PUBLISHED - **Published Date**: August 08, 2023 at 00:00 UTC - **Last Updated**: October 15, 2024 at 18:20 UTC - **Reserved Date**: July 25, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the role and gender parameters within the /QueryView.php component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://churchcrm.io/) 2. [](https://demo.churchcrm.io/master) 3. [](https://github.com/ChurchCRM/CRM/wiki) 4. [](https://github.com/0x72303074/CVE-Disclosures)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0036, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0036 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0036 - **State**: PUBLISHED - **Published Date**: March 22, 2000 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:05 UTC - **Reserved Date**: January 11, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Outlook Express 5 for Macintosh downloads attachments to HTML mail without prompting the user, aka the "HTML Mail Attachment" vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [Q249082](http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ249082) 2. [MS99-060](https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-060)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4519, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4519 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4519 - **State**: PUBLISHED - **Published Date**: December 15, 2022 at 19:19 UTC - **Last Updated**: January 23, 2025 at 20:26 UTC - **Reserved Date**: December 15, 2022 at 19:19 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP User plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters in versions up to, and including, 7.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **walkeprashant - WP User – Custom Registration Forms, Login and User Profile** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/8ee21796-5340-4f84-b1c4-a95137a27223) 2. [](https://wordpress.org/plugins/wp-user/#description) ### Credits - Marco Wotschka
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10053, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10053 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10053 - **State**: PUBLISHED - **Published Date**: August 08, 2017 at 15:00 UTC - **Last Updated**: October 04, 2024 at 19:09 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). ### Affected Products **Oracle Corporation - Java** Affected versions: - Java SE: 6u151 (Status: affected) - 7u141 (Status: affected) - 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14 (Status: affected) ### References 1. [99842](http://www.securityfocus.com/bid/99842) 2. [RHSA-2017:1791](https://access.redhat.com/errata/RHSA-2017:1791) 3. [RHSA-2017:1790](https://access.redhat.com/errata/RHSA-2017:1790) 4. [](https://security.netapp.com/advisory/ntap-20170720-0001/) 5. [RHSA-2017:1789](https://access.redhat.com/errata/RHSA-2017:1789) 6. [](https://cert.vde.com/en-us/advisories/vde-2017-002) 7. [RHSA-2017:2424](https://access.redhat.com/errata/RHSA-2017:2424) 8. [1038931](http://www.securitytracker.com/id/1038931) 9. [RHSA-2017:1792](https://access.redhat.com/errata/RHSA-2017:1792) 10. [GLSA-201709-22](https://security.gentoo.org/glsa/201709-22) 11. [DSA-3919](http://www.debian.org/security/2017/dsa-3919) 12. [RHSA-2017:2481](https://access.redhat.com/errata/RHSA-2017:2481) 13. [RHSA-2017:2530](https://access.redhat.com/errata/RHSA-2017:2530) 14. [RHSA-2017:3453](https://access.redhat.com/errata/RHSA-2017:3453) 15. [RHSA-2017:2469](https://access.redhat.com/errata/RHSA-2017:2469) 16. [DSA-3954](http://www.debian.org/security/2017/dsa-3954) 17. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1479, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1479 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1479 - **State**: PUBLISHED - **Published Date**: March 18, 2023 at 08:25 UTC - **Last Updated**: August 02, 2024 at 05:49 UTC - **Reserved Date**: March 18, 2023 at 08:25 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in SourceCodester Simple Music Player 1.0. Affected is an unknown function of the file save_music.php. The manipulation of the argument filename leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-223362 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **SourceCodester - Simple Music Player** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.223362) 2. [](https://vuldb.com/?ctiid.223362) 3. [](https://github.com/xyaly163/bug_report/blob/main/UPLOAD.md) ### Credits - Xue Yue (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32865, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32865 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32865 - **State**: REJECTED - **Last Updated**: December 02, 2022 at 00:00 UTC - **Reserved Date**: May 12, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-28091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-28091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-28091 - **State**: PUBLISHED - **Published Date**: June 04, 2021 at 14:39 UTC - **Last Updated**: August 03, 2024 at 21:33 UTC - **Reserved Date**: March 08, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Lasso all versions prior to 2.7.0 has improper verification of a cryptographic signature. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://listes.entrouvert.com/arc/lasso/) 2. [](https://git.entrouvert.org/lasso.git/commit/?id=076a37d7f0eb74001127481da2d355683693cde9) 3. [](https://git.entrouvert.org/lasso.git/tree/NEWS?id=v2.7.0) 4. [DSA-4926](https://www.debian.org/security/2021/dsa-4926) 5. [[debian-lts-announce] 20210610 [SECURITY] [DLA 2684-1] lasso security update](https://lists.debian.org/debian-lts-announce/2021/06/msg00013.html) 6. [FEDORA-2021-bb3ea1e191](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SI4YAQF4VEV2KHQ6OXXZL7CJK7IZQ3EG/) 7. [FEDORA-2021-508acb1153](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YSVWOHBBWLI2RB5C6TXINFEJRT4YSD3D/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9222, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9222 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9222 - **State**: PUBLISHED - **Published Date**: October 02, 2024 at 07:35 UTC - **Last Updated**: October 02, 2024 at 18:56 UTC - **Reserved Date**: September 26, 2024 at 17:12 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.12.8. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **madalinungureanu - Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/6d43235b-9c5e-4d7f-99f0-28dcab4b2a91?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/paid-member-subscriptions/tags/2.12.8/includes/admin/class-admin-payments-list-table.php#L155) 3. [](https://plugins.trac.wordpress.org/changeset/3160323/#file10) ### Credits - Colin Xu
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2638, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2638 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2638 - **State**: PUBLISHED - **Published Date**: July 01, 2011 at 10:00 UTC - **Last Updated**: September 17, 2024 at 00:55 UTC - **Reserved Date**: July 01, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Opera before 11.10 allows remote attackers to cause a denial of service (application crash) via unknown content on a web page, as demonstrated by games on zylom.com. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.opera.com/docs/changelogs/windows/1110/) 2. [](http://www.opera.com/docs/changelogs/mac/1110/) 3. [](http://www.opera.com/docs/changelogs/unix/1110/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-23086, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-23086 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-23086 - **State**: PUBLISHED - **Published Date**: February 03, 2023 at 00:00 UTC - **Last Updated**: March 26, 2025 at 18:33 UTC - **Reserved Date**: January 11, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer OverFlow Vulnerability in MojoJson v1.2.3 allows an attacker to execute arbitrary code via the SkipString function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/scottcgi/MojoJson/issues/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2235, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2235 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2235 - **State**: PUBLISHED - **Published Date**: July 17, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:22 UTC - **Reserved Date**: July 17, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unknown vulnerability in Moodle before 1.2 has unknown impact and attack vectors, related to improper filtering of text. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [7711](http://www.osvdb.org/7711) 2. [](http://moodle.org/doc/?file=releaseold.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40503, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40503 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40503 - **State**: PUBLISHED - **Published Date**: April 04, 2023 at 04:46 UTC - **Last Updated**: August 03, 2024 at 12:21 UTC - **Reserved Date**: September 12, 2022 at 09:37 UTC - **Assigned By**: qualcomm ### Vulnerability Description Information disclosure due to buffer over-read in Bluetooth Host while A2DP streaming. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-126: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - 9206 LTE Modem (Status: affected) - APQ8017 (Status: affected) - APQ8064AU (Status: affected) - AQT1000 (Status: affected) - AR8031 (Status: affected) - C-V2X 9150 (Status: affected) - CSRA6620 (Status: affected) - CSRA6640 (Status: affected) - FastConnect 6200 (Status: affected) - FastConnect 6700 (Status: affected) - FastConnect 6800 (Status: affected) - FastConnect 6900 (Status: affected) - FastConnect 7800 (Status: affected) - Flight RB5 5G Platform (Status: affected) - MDM9250 (Status: affected) - MDM9628 (Status: affected) - MDM9650 (Status: affected) - MSM8108 (Status: affected) - MSM8209 (Status: affected) - MSM8608 (Status: affected) - MSM8909W (Status: affected) - MSM8996AU (Status: affected) - QAM8295P (Status: affected) - QCA6174A (Status: affected) - QCA6310 (Status: affected) - QCA6320 (Status: affected) - QCA6335 (Status: affected) - QCA6391 (Status: affected) - QCA6420 (Status: affected) - QCA6426 (Status: affected) - QCA6430 (Status: affected) - QCA6436 (Status: affected) - QCA6554A (Status: affected) - QCA6564 (Status: affected) - QCA6564A (Status: affected) - QCA6564AU (Status: affected) - QCA6574 (Status: affected) - QCA6574A (Status: affected) - QCA6574AU (Status: affected) - QCA6584AU (Status: affected) - QCA6595 (Status: affected) - QCA6595AU (Status: affected) - QCA6696 (Status: affected) - QCA8337 (Status: affected) - QCA9367 (Status: affected) - QCA9377 (Status: affected) - QCM2290 (Status: affected) - QCM4290 (Status: affected) - QCM6125 (Status: affected) - QCM6490 (Status: affected) - QCN7606 (Status: affected) - QCN9011 (Status: affected) - QCN9012 (Status: affected) - QCN9074 (Status: affected) - QCS2290 (Status: affected) - QCS410 (Status: affected) - QCS4290 (Status: affected) - QCS610 (Status: affected) - QCS6125 (Status: affected) - QCS6490 (Status: affected) - QRB5165M (Status: affected) - QRB5165N (Status: affected) - Qualcomm 205 Mobile Platform (Status: affected) - Qualcomm 215 Mobile Platform (Status: affected) - Qualcomm Robotics RB3 Platform (Status: affected) - Qualcomm Robotics RB5 Platform (Status: affected) - SA6145P (Status: affected) - SA6150P (Status: affected) - SA6155P (Status: affected) - SA8145P (Status: affected) - SA8150P (Status: affected) - SA8155P (Status: affected) - SA8195P (Status: affected) - SA8295P (Status: affected) - SD626 (Status: affected) - SD660 (Status: affected) - SD670 (Status: affected) - SD730 (Status: affected) - SD778G (Status: affected) - SD835 (Status: affected) - SD855 (Status: affected) - SD865 5G (Status: affected) - SD888 (Status: affected) - SDM429W (Status: affected) - SDX20M (Status: affected) - SDX55 (Status: affected) - SM4125 (Status: affected) - SM6250 (Status: affected) - SM7250P (Status: affected) - SM7315 (Status: affected) - SM7325P (Status: affected) - Smart Audio 200 Platform (Status: affected) - Smart Audio 400 Platform (Status: affected) - Smart Display 200 Platform (APQ5053-AA) (Status: affected) - Snapdragon 1200 Wearable Platform (Status: affected) - Snapdragon 208 Processor (Status: affected) - Snapdragon 210 Processor (Status: affected) - Snapdragon 212 Mobile Platform (Status: affected) - Snapdragon 4 Gen 1 Mobile Platform (Status: affected) - Snapdragon 429 Mobile Platform (Status: affected) - Snapdragon 460 Mobile Platform (Status: affected) - Snapdragon 480 5G Mobile Platform (Status: affected) - Snapdragon 480+ 5G Mobile Platform (SM4350-AC) (Status: affected) - Snapdragon 625 Mobile Platform (Status: affected) - Snapdragon 626 Mobile Platform (Status: affected) - Snapdragon 660 Mobile Platform (Status: affected) - Snapdragon 662 Mobile Platform (Status: affected) - Snapdragon 665 Mobile Platform (Status: affected) - Snapdragon 670 Mobile Platform (Status: affected) - Snapdragon 675 Mobile Platform (Status: affected) - Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected) - Snapdragon 680 4G Mobile Platform (Status: affected) - Snapdragon 685 4G Mobile Platform (SM6225-AD) (Status: affected) - Snapdragon 690 5G Mobile Platform (Status: affected) - Snapdragon 695 5G Mobile Platform (Status: affected) - Snapdragon 710 Mobile Platform (Status: affected) - Snapdragon 720G Mobile Platform (Status: affected) - Snapdragon 730 Mobile Platform (SM7150-AA) (Status: affected) - Snapdragon 730G Mobile Platform (SM7150-AB) (Status: affected) - Snapdragon 732G Mobile Platform (SM7150-AC) (Status: affected) - Snapdragon 750G 5G Mobile Platform (Status: affected) - Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected) - Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected) - Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected) - Snapdragon 778G 5G Mobile Platform (Status: affected) - Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) (Status: affected) - Snapdragon 780G 5G Mobile Platform (Status: affected) - Snapdragon 782G Mobile Platform (SM7325-AF) (Status: affected) - Snapdragon 8 Gen 1 Mobile Platform (Status: affected) - Snapdragon 820 Automotive Platform (Status: affected) - Snapdragon 835 Mobile Platform (Status: affected) - Snapdragon 845 Mobile Platform (Status: affected) - Snapdragon 855 Mobile Platform (Status: affected) - Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected) - Snapdragon 865 5G Mobile Platform (Status: affected) - Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected) - Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected) - Snapdragon 888 5G Mobile Platform (Status: affected) - Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected) - Snapdragon W5+ Gen 1 Wearable Platform (Status: affected) - Snapdragon Wear 2100 Platform (Status: affected) - Snapdragon Wear 2500 Platform (Status: affected) - Snapdragon Wear 3100 Platform (Status: affected) - Snapdragon X12 LTE Modem (Status: affected) - Snapdragon X20 LTE Modem (Status: affected) - Snapdragon X24 LTE Modem (Status: affected) - Snapdragon X5 LTE Modem (Status: affected) - Snapdragon X50 5G Modem-RF System (Status: affected) - Snapdragon X55 5G Modem-RF System (Status: affected) - Snapdragon XR1 Platform (Status: affected) - Snapdragon XR2 5G Platform (Status: affected) - Snapdragon XR2+ Gen 1 Platform (Status: affected) - SW5100 (Status: affected) - SW5100P (Status: affected) - SXR1120 (Status: affected) - SXR2130 (Status: affected) - Vision Intelligence 100 Platform (APQ8053-AA) (Status: affected) - Vision Intelligence 200 Platform (APQ8053-AC) (Status: affected) - Vision Intelligence 400 Platform (Status: affected) - WCD9326 (Status: affected) - WCD9330 (Status: affected) - WCD9335 (Status: affected) - WCD9340 (Status: affected) - WCD9341 (Status: affected) - WCD9370 (Status: affected) - WCD9375 (Status: affected) - WCD9380 (Status: affected) - WCD9385 (Status: affected) - WCN3610 (Status: affected) - WCN3615 (Status: affected) - WCN3620 (Status: affected) - WCN3660B (Status: affected) - WCN3680 (Status: affected) - WCN3680B (Status: affected) - WCN3910 (Status: affected) - WCN3950 (Status: affected) - WCN3980 (Status: affected) - WCN3988 (Status: affected) - WCN3990 (Status: affected) - WCN6740 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) - WSA8830 (Status: affected) - WSA8835 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0605, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0605 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0605 - **State**: PUBLISHED - **Published Date**: February 10, 2011 at 17:00 UTC - **Last Updated**: August 06, 2024 at 21:58 UTC - **Reserved Date**: January 20, 2011 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [46200](http://www.securityfocus.com/bid/46200) 2. [reader-acrobat-unspec-ce(65308)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65308) 3. [ADV-2011-0337](http://www.vupen.com/english/advisories/2011/0337) 4. [1025033](http://www.securitytracker.com/id?1025033) 5. [oval:org.mitre.oval:def:13890](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13890) 6. [](http://www.adobe.com/support/security/bulletins/apsb11-03.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0208, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0208 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0208 - **State**: PUBLISHED - **Published Date**: October 16, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 00:10 UTC - **Reserved Date**: March 11, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [win-vdm-gain-privilege(16580)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16580) 2. [oval:org.mitre.oval:def:3953](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3953) 3. [oval:org.mitre.oval:def:3161](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3161) 4. [VU#910998](http://www.kb.cert.org/vuls/id/910998) 5. [oval:org.mitre.oval:def:1751](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1751) 6. [20041013 EEYE: Windows VDM #UD Local Privilege Escalation](http://marc.info/?l=bugtraq&m=109772135404427&w=2) 7. [win-ms04032-patch(17658)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17658) 8. [oval:org.mitre.oval:def:4316](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4316) 9. [oval:org.mitre.oval:def:4762](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4762) 10. [MS04-032](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30858, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30858 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30858 - **State**: PUBLISHED - **Published Date**: August 24, 2021 at 18:49 UTC - **Last Updated**: January 29, 2025 at 17:31 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - iOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT212804) 2. [](https://support.apple.com/en-us/HT212807) 3. [20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6](http://seclists.org/fulldisclosure/2021/Sep/27) 4. [20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8](http://seclists.org/fulldisclosure/2021/Sep/25) 5. [20210917 APPLE-SA-2021-09-13-5 Safari 14.1.2](http://seclists.org/fulldisclosure/2021/Sep/29) 6. [[oss-security] 20210920 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0005](http://www.openwall.com/lists/oss-security/2021/09/20/1) 7. [FEDORA-2021-c00e45b6c0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/) 8. [20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8](http://seclists.org/fulldisclosure/2021/Sep/38) 9. [20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6](http://seclists.org/fulldisclosure/2021/Sep/39) 10. [DSA-4975](https://www.debian.org/security/2021/dsa-4975) 11. [DSA-4976](https://www.debian.org/security/2021/dsa-4976) 12. [](https://support.apple.com/kb/HT212824) 13. [20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5](http://seclists.org/fulldisclosure/2021/Sep/50) 14. [FEDORA-2021-edf6957b7d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/) 15. [[oss-security] 20211026 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006](http://www.openwall.com/lists/oss-security/2021/10/26/9) 16. [[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006](http://www.openwall.com/lists/oss-security/2021/10/27/1) 17. [[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006](http://www.openwall.com/lists/oss-security/2021/10/27/2) 18. [[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006](http://www.openwall.com/lists/oss-security/2021/10/27/4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0490, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0490 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0490 - **State**: PUBLISHED - **Published Date**: February 21, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:13 UTC - **Reserved Date**: February 21, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050228 [USN-86-1] cURL vulnerability](http://marc.info/?l=full-disclosure&m=110959085507755&w=2) 2. [CLA-2005:940](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940) 3. [20050221 Multiple Unix/Linux Vendor cURL/libcURL NTLM Authentication Buffer Overflow Vulnerability](http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities) 4. [oval:org.mitre.oval:def:10273](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273) 5. [12616](http://www.securityfocus.com/bid/12616) 6. [12615](http://www.securityfocus.com/bid/12615) 7. [curl-kerberos-bo(19423)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19423) 8. [20050221 Multiple Unix/Linux Vendor cURL/libcURL Kerberos Authentication Buffer Overflow Vulnerability](http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities) 9. [MDKSA-2005:048](http://www.mandriva.com/security/advisories?name=MDKSA-2005:048) 10. [GLSA-200503-20](http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml) 11. [RHSA-2005:340](http://www.redhat.com/support/errata/RHSA-2005-340.html) 12. [SUSE-SA:2005:011](http://www.novell.com/linux/security/advisories/2005_11_curl.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36024, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36024 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36024 - **State**: PUBLISHED - **Published Date**: August 11, 2023 at 00:00 UTC - **Last Updated**: October 09, 2024 at 17:56 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in freedesktop poppler version 20.12.1, allows remote attackers to cause a denial of service (DoS) via crafted .pdf file to FoFiType1C::convertToType1 function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.freedesktop.org/poppler/poppler/-/issues/1016) 2. [[debian-lts-announce] 20230814 [SECURITY] [DLA 3528-1] poppler security update](https://lists.debian.org/debian-lts-announce/2023/08/msg00017.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16884, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16884 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16884 - **State**: PUBLISHED - **Published Date**: December 06, 2017 at 16:00 UTC - **Last Updated**: August 05, 2024 at 20:35 UTC - **Reserved Date**: November 19, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in MistServer before 2.13 allows remote attackers to inject arbitrary web script or HTML via vectors related to failed authentication requests alerts. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/145182/MistServer-2.12-Cross-Site-Scripting.html) 2. [20171201 Mist Server v2.12 Unauthenticated Persistent XSS CVE-2017-16884](http://seclists.org/fulldisclosure/2017/Dec/2) 3. [](http://hyp3rlinx.altervista.org/advisories/MIST-SERVER-v2.12-UNAUTHENTICATED-PERSISTENT-XSS-CVE-2017-16884.txt) 4. [43205](https://www.exploit-db.com/exploits/43205/) 5. [](https://news.mistserver.org/news/78/Stable+release+2.13+now+available%21)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000889, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000889 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000889 - **State**: PUBLISHED - **Published Date**: December 27, 2018 at 18:00 UTC - **Last Updated**: September 16, 2024 at 23:31 UTC - **Reserved Date**: December 27, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Logisim Evolution version 2.14.3 and earlier contains an XML External Entity (XXE) vulnerability in Circuit file loading functionality (loadXmlFrom in src/com/cburch/logisim/file/XmlReader.java) that can result in information leak, possible RCE depending on system configuration. This attack appears to be exploitable via the victim opening a specially crafted circuit file. This vulnerability appears to have been fixed in 2.14.4. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/reds-heig/logisim-evolution/pull/139) 2. [](https://www.kvakil.me/posts/logisim/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27364, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27364 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27364 - **State**: PUBLISHED - **Published Date**: March 07, 2021 at 04:03 UTC - **Last Updated**: August 03, 2024 at 20:48 UTC - **Reserved Date**: February 17, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update](https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html) 2. [[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update](https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html) 3. [](https://www.oracle.com/security-alerts/cpuoct2021.html) 4. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa) 5. [](https://www.openwall.com/lists/oss-security/2021/03/06/1) 6. [](https://bugzilla.suse.com/show_bug.cgi?id=1182717) 7. [](https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html) 8. [](http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html) 9. [](https://security.netapp.com/advisory/ntap-20210409-0001/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16953, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16953 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16953 - **State**: PUBLISHED - **Published Date**: September 18, 2018 at 02:00 UTC - **Last Updated**: August 05, 2024 at 10:39 UTC - **Reserved Date**: September 12, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The AjaxView::DisplayResponse() function of the portalpages.dll assembly in Oracle WebCenter Interaction Portal 10.3.3 is vulnerable to reflected cross-site scripting (XSS). User input from the name parameter is unsafely reflected in the server response. NOTE: this CVE is assigned by MITRE and isn't validated by Oracle because Oracle WebCenter Interaction Portal is out of support. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://seclists.org/fulldisclosure/2018/Sep/22) 2. [105350](http://www.securityfocus.com/bid/105350)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35403, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35403 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35403 - **State**: PUBLISHED - **Published Date**: July 12, 2022 at 21:56 UTC - **Last Updated**: August 03, 2024 at 09:36 UTC - **Reserved Date**: July 08, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Zoho ManageEngine ServiceDesk Plus before 13008, ServiceDesk Plus MSP before 10606, and SupportCenter Plus before 11022 are affected by an unauthenticated local file disclosure vulnerability via ticket-creation email. (This also affects Asset Explorer before 6977 with authentication.) ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.manageengine.com/products/service-desk/cve-2022-35403.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15744, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15744 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15744 - **State**: PUBLISHED - **Published Date**: August 30, 2021 at 09:50 UTC - **Last Updated**: September 17, 2024 at 03:28 UTC - **Reserved Date**: July 14, 2020 at 00:00 UTC - **Assigned By**: Bitdefender ### Vulnerability Description Stack-based Buffer Overflow vulnerability in the ONVIF server component of Victure PC420 smart camera allows an attacker to execute remote code on the target device. This issue affects: Victure PC420 firmware version 1.2.2 and prior versions. ### CVSS Metrics - **CVSS Base Score**: 9.6/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Victure - PC420** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.bitdefender.com/blog/labs/cracking-the-victure-pc420-camera) ### Credits - Bitdefender Labs
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51643, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51643 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51643 - **State**: PUBLISHED - **Published Date**: November 22, 2024 at 20:05 UTC - **Last Updated**: November 25, 2024 at 16:40 UTC - **Reserved Date**: December 20, 2023 at 21:52 UTC - **Assigned By**: zdi ### Vulnerability Description Allegra uploadFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the uploadFile method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-22510. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Allegra - Allegra** Affected versions: - 7.5.0 build 29 (Status: affected) ### References 1. [ZDI-24-103](https://www.zerodayinitiative.com/advisories/ZDI-24-103/) 2. [vendor-provided URL](https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2260, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2260 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2260 - **State**: PUBLISHED - **Published Date**: April 25, 2007 at 17:00 UTC - **Last Updated**: August 07, 2024 at 13:33 UTC - **Reserved Date**: April 25, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple PHP remote file inclusion vulnerabilities in bibtex mase beta 2.0 allow remote attackers to execute arbitrary PHP code via a URL in the bibtexrootrel parameter to (1) unavailable.php, (2) source.php, (3) log.php, (4) latex.php, (5) indexinfo.php, (6) index.php, (7) importinfo.php, (8) import.php, (9) examplefile.php, (10) clearinfo.php, (11) clear.php, (12) aboutinfo.php, (13) about.php, and other unspecified files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [35628](http://osvdb.org/35628) 2. [35624](http://osvdb.org/35624) 3. [35631](http://osvdb.org/35631) 4. [35633](http://osvdb.org/35633) 5. [35629](http://osvdb.org/35629) 6. [35622](http://osvdb.org/35622) 7. [35621](http://osvdb.org/35621) 8. [20070422 bibtex mase Remote File Inclusion](http://www.securityfocus.com/archive/1/466683/100/0/threaded) 9. [35625](http://osvdb.org/35625) 10. [35623](http://osvdb.org/35623) 11. [35632](http://osvdb.org/35632) 12. [2624](http://securityreason.com/securityalert/2624) 13. [35626](http://osvdb.org/35626) 14. [35630](http://osvdb.org/35630) 15. [35627](http://osvdb.org/35627)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45958, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45958 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45958 - **State**: PUBLISHED - **Published Date**: December 31, 2021 at 23:52 UTC - **Last Updated**: August 04, 2024 at 04:54 UTC - **Reserved Date**: December 31, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml) 2. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009) 3. [](https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284) 4. [](https://github.com/ultrajson/ultrajson/issues/501) 5. [](https://github.com/ultrajson/ultrajson/pull/504) 6. [[debian-lts-announce] 20220226 [SECURITY] [DLA 2929-1] ujson security update](https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html) 7. [FEDORA-2022-dbf6e00ba8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/) 8. [FEDORA-2022-569b6b45e2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ULX35TSWLBBIMEH44MUORPXYYRZKEDC6/) 9. [FEDORA-2022-d1452fd421](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O6JUWQTJLA2CMG4CJN7DCUVSOXLZIIXL/) 10. [FEDORA-2022-33e816bc37](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NAU5N4A7EUK2AMUCOLYDD5ARXAJYZBD2/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20532, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20532 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20532 - **State**: PUBLISHED - **Published Date**: December 28, 2018 at 03:00 UTC - **Last Updated**: August 05, 2024 at 12:05 UTC - **Reserved Date**: December 27, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/openSUSE/libsolv/pull/291) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1652605) 3. [USN-3916-1](https://usn.ubuntu.com/3916-1/) 4. [RHSA-2019:2290](https://access.redhat.com/errata/RHSA-2019:2290) 5. [openSUSE-SU-2019:1927](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00057.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5730, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5730 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5730 - **State**: PUBLISHED - **Published Date**: November 19, 2013 at 15:00 UTC - **Last Updated**: August 06, 2024 at 17:22 UTC - **Reserved Date**: September 11, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DSL-2740B Gateway with firmware EU_1.00 allow remote attackers to hijack the authentication of administrators for requests that (1) enable or disable Wireless MAC Address Filters via a wlFltMode action to wlmacflt.cmd, (2) enable or disable firewall protections via a request to scdmz.cmd, or (3) enable or disable remote management via a save action to scsrvcntr.cmd. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.webapp-security.com/wp-content/uploads/2013/09/D-Link-DSL-2740B-Multiple-CSRF-Vulnerabilities1.txt) 2. [](http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10004) 3. [](http://packetstormsecurity.com/files/123200/D-Link-DSL-2740B-Cross-Site-Request-Forgery.html) 4. [](http://www.webapp-security.com/2013/09/d-link-dsl-2740b-multiple-csrf-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4203, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4203 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4203 - **State**: PUBLISHED - **Published Date**: April 15, 2019 at 14:55 UTC - **Last Updated**: September 17, 2024 at 02:47 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM API Connect 5.0.0.0 and 5.0.8.6 Developer Portal can be exploited by app developers to download arbitrary files from the host OS and potentially carry out SSRF attacks. IBM X-Force ID: 159124. ### Affected Products **IBM - API Connect** Affected versions: - 5.0.0.0 (Status: affected) - 5.0.8.6 (Status: affected) ### References 1. [](https://www.ibm.com/support/docview.wss?uid=ibm10880569) 2. [ibm-api-cve20194203-file-include (159124)](https://exchange.xforce.ibmcloud.com/vulnerabilities/159124) 3. [107905](http://www.securityfocus.com/bid/107905)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9981, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9981 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9981 - **State**: PUBLISHED - **Published Date**: August 18, 2017 at 18:00 UTC - **Last Updated**: September 17, 2024 at 01:16 UTC - **Reserved Date**: May 30, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In all Qualcomm products with Android releases from CAF using the Linux kernel, an overflow check in the USB interface was insufficient during boot. ### Affected Products **Qualcomm, Inc. - Snapdragon Mobile** Affected versions: - MDM9625, MDM9635M, SD 400, SD 410/12, SD 615/16/SD 415 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-07-01) 2. [](https://source.android.com/security/bulletin/2018-04-01) 3. [103671](http://www.securityfocus.com/bid/103671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0650, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0650 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0650 - **State**: PUBLISHED - **Published Date**: September 20, 2012 at 21:00 UTC - **Last Updated**: September 16, 2024 at 23:45 UTC - **Reserved Date**: January 12, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Buffer overflow in the DirectoryService Proxy in DirectoryService in Apple Mac OS X through 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2012-09-19-2](http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html) 2. [](http://support.apple.com/kb/HT5501)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1363, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1363 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1363 - **State**: PUBLISHED - **Published Date**: April 25, 2018 at 13:00 UTC - **Last Updated**: September 17, 2024 at 01:05 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Jazz Reporting Service (JRS) 5.0 through 5.0.2 and 6.0 through 6.0.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 137448. ### Affected Products **IBM - Jazz Reporting Service** Affected versions: - 5.0 (Status: affected) - 5.0.1 (Status: affected) - 5.0.2 (Status: affected) - 6.0 (Status: affected) - 6.0.1 (Status: affected) - 6.0.2 (Status: affected) - 6.0.3 (Status: affected) - 6.0.4 (Status: affected) - 6.0.5 (Status: affected) ### References 1. [ibm-jazz-cve20181363-xss(137448)](https://exchange.xforce.ibmcloud.com/vulnerabilities/137448) 2. [](http://www.ibm.com/support/docview.wss?uid=swg22015712) 3. [104014](http://www.securityfocus.com/bid/104014)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4772, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4772 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4772 - **State**: PUBLISHED - **Published Date**: May 16, 2025 at 12:00 UTC - **Last Updated**: May 16, 2025 at 13:05 UTC - **Reserved Date**: May 15, 2025 at 12:52 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in PHPGurukul Online Course Registration 3.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/department.php. The manipulation of the argument department leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **PHPGurukul - Online Course Registration** Affected versions: - 3.1 (Status: affected) ### References 1. [VDB-309073 | PHPGurukul Online Course Registration department.php sql injection](https://vuldb.com/?id.309073) 2. [VDB-309073 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309073) 3. [Submit #572143 | PHPGurukul Online Course Registration V3.1 SQL Injection](https://vuldb.com/?submit.572143) 4. [](https://github.com/FLYFISH567/CVE/issues/5) 5. [](https://phpgurukul.com/) ### Credits - FLYFISH567 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-49142, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-49142 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-49142 - **State**: PUBLISHED - **Published Date**: June 10, 2025 at 15:40 UTC - **Last Updated**: June 10, 2025 at 17:10 UTC - **Reserved Date**: June 02, 2025 at 10:39 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Nautobot is a Network Source of Truth and Network Automation Platform. All users of Nautobot versions prior to 2.4.10 or prior to 1.6.32 are potentially affected. Due to insufficient security configuration of the Jinja2 templating feature used in computed fields, custom links, etc. in Nautobot, a malicious user could configure this feature set in ways that could expose the value of Secrets defined in Nautobot when the templated content is rendered or that could call Python APIs to modify data within Nautobot when the templated content is rendered, bypassing the object permissions assigned to the viewing user. Nautobot versions 1.6.32 and 2.4.10 will include fixes for the vulnerability. The vulnerability can be partially mitigated by configuring object permissions appropriately to limit certain actions to only trusted users. ### Weakness Classification (CWE) - CWE-1336: Security Weakness ### Affected Products **nautobot - nautobot** Affected versions: - < 1.6.32 (Status: affected) - >= 2.0.0, < 2.4.10 (Status: affected) ### References 1. [https://github.com/nautobot/nautobot/security/advisories/GHSA-wjw6-95h5-4jpx](https://github.com/nautobot/nautobot/security/advisories/GHSA-wjw6-95h5-4jpx) 2. [https://github.com/nautobot/nautobot/pull/7417](https://github.com/nautobot/nautobot/pull/7417) 3. [https://github.com/nautobot/nautobot/pull/7429](https://github.com/nautobot/nautobot/pull/7429) 4. [https://docs.djangoproject.com/en/4.2/ref/templates/api/#alters-data-description](https://docs.djangoproject.com/en/4.2/ref/templates/api/#alters-data-description) 5. [https://jinja.palletsprojects.com/en/stable/sandbox](https://jinja.palletsprojects.com/en/stable/sandbox)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12112, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12112 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12112 - **State**: PUBLISHED - **Published Date**: March 18, 2020 at 17:01 UTC - **Last Updated**: August 04, 2024 at 23:10 UTC - **Reserved Date**: May 15, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in ONAP SDNC before Dublin. By executing sla/upload with a crafted filename parameter, an unauthenticated attacker can execute an arbitrary command. All SDC setups that include admportal are affected. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://jira.onap.org/browse/OJSI-199)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25359, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25359 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25359 - **State**: PUBLISHED - **Published Date**: April 09, 2021 at 17:35 UTC - **Last Updated**: August 03, 2024 at 20:03 UTC - **Reserved Date**: January 19, 2021 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description An improper SELinux policy prior to SMR APR-2021 Release 1 allows local attackers to access AP information without proper permissions via untrusted applications. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - Q(10.0), R(11.0) (Status: affected) ### References 1. [](https://security.samsungmobile.com/) 2. [](https://security.samsungmobile.com/securityUpdate.smsb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12081, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12081 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12081 - **State**: PUBLISHED - **Published Date**: July 31, 2020 at 16:55 UTC - **Last Updated**: August 04, 2024 at 11:48 UTC - **Reserved Date**: April 23, 2020 at 00:00 UTC - **Assigned By**: flexera ### Vulnerability Description An information disclosure vulnerability has been identified in FlexNet Publisher lmadmin.exe 11.14.0.2. The web portal link can be used to access to system files or other important files on the system. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://community.flexera.com/t5/FlexNet-Publisher-Knowledge-Base/CVE-2020-12081-Remediated-in-FlexNet-Publisher/ta-p/153505)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46677, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46677 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46677 - **State**: PUBLISHED - **Published Date**: August 05, 2022 at 15:26 UTC - **Last Updated**: September 17, 2024 at 03:08 UTC - **Reserved Date**: February 08, 2022 at 00:00 UTC - **Assigned By**: ARTICA ### Vulnerability Description A XSS vulnerability exist in Pandora FMS version 756 and below, that allows an attacker to perform javascript code executions via the event filter name field. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Artica PFMS - Pandora FMS** Affected versions: - v756 (Status: affected) ### References 1. [](https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/) 2. [](https://www.incibe.es/en/cve-assignment-publication/coordinated-cves)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5860, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5860 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5860 - **State**: PUBLISHED - **Published Date**: June 09, 2025 at 04:00 UTC - **Last Updated**: June 09, 2025 at 13:25 UTC - **Reserved Date**: June 08, 2025 at 13:20 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in PHPGurukul Maid Hiring Management System 1.0. This affects an unknown part of the file /admin/search-booking-request.php. The manipulation of the argument searchdata leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **PHPGurukul - Maid Hiring Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-311619 | PHPGurukul Maid Hiring Management System search-booking-request.php sql injection](https://vuldb.com/?id.311619) 2. [VDB-311619 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311619) 3. [Submit #591910 | PHPGurukul Maid Hiring Management System V1.0 SQL Injection](https://vuldb.com/?submit.591910) 4. [](https://github.com/kakalalaww/CVE/issues/2) 5. [](https://phpgurukul.com/) ### Credits - Jww0KA (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1942, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1942 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1942 - **State**: PUBLISHED - **Published Date**: June 05, 2012 at 23:00 UTC - **Last Updated**: August 06, 2024 at 19:17 UTC - **Reserved Date**: March 30, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Mozilla Updater and Windows Updater Service in Mozilla Firefox 12.0, Thunderbird 12.0, and SeaMonkey 2.9 on Windows allow local users to gain privileges by loading a DLL file in a privileged context. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.mozilla.org/security/announce/2012/mfsa2012-35.html) 2. [](http://www.mozilla.org/security/announce/2013/mfsa2013-45.html) 3. [SUSE-SU-2012:0746](http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html) 4. [oval:org.mitre.oval:def:16951](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16951) 5. [](https://bugzilla.mozilla.org/show_bug.cgi?id=748764)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0900, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0900 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0900 - **State**: PUBLISHED - **Published Date**: April 23, 2024 at 08:32 UTC - **Last Updated**: August 01, 2024 at 18:18 UTC - **Reserved Date**: January 25, 2024 at 19:00 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Elespare – Build Your Blog, News & Magazine Websites with Expert-Designed Template Kits. One Click Import: No Coding Skills Required! plugin for WordPress is vulnerable to unauthorized post creation due to a missing capability check on the elespare_create_post() function hooked via AJAX in all versions up to, and including, 2.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary posts. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Affected Products **elespare - Elespare – Blog, Magazine and Newspaper Addons for Elementor with Templates, Widgets, Kits, and Header/Footer Builder. One Click Import: No Coding Required!** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7f94efa6-b88b-442d-8162-f03efa7f2f65?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3071565%40elespare&new=3071565%40elespare&sfp_email=&sfph_mail=) ### Credits - Lucio Sá
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4822, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4822 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4822 - **State**: PUBLISHED - **Published Date**: October 13, 2013 at 10:00 UTC - **Last Updated**: September 17, 2024 at 03:23 UTC - **Reserved Date**: July 12, 2013 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Branch Intelligent Management System Software Module (aka BIMS) allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1606. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [HPSBGN02929](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03943425) 2. [SSRT101025](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03943425)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29420 - **State**: PUBLISHED - **Published Date**: May 06, 2022 at 16:53 UTC - **Last Updated**: September 16, 2024 at 23:26 UTC - **Reserved Date**: April 18, 2022 at 00:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Adam Skaat Countdown & Clock (WordPress plugin) countdown-builder allows Stored XSS.This issue affects Countdown & Clock (WordPress plugin): from n/a through 2.3.2. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adam Skaat - Countdown & Clock (WordPress plugin)** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/countdown-builder/wordpress-countdown-clock-plugin-2-3-1-authenticated-stored-cross-site-scripting-xss-vulnerability) ### Credits - Jeong Wonjun - Pongchi (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48198 - **State**: PUBLISHED - **Published Date**: November 15, 2023 at 00:00 UTC - **Last Updated**: November 26, 2024 at 20:19 UTC - **Reserved Date**: November 13, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Cross-Site Scripting (XSS) vulnerability in the 'product description' component within '/api/stock/products' of Grocy version <= 4.0.3 allows attackers to obtain a victim's cookies. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/grocy/grocy) 2. [](https://nitipoom-jar.github.io/CVE-2023-48198)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7533, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7533 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7533 - **State**: PUBLISHED - **Published Date**: August 05, 2017 at 16:00 UTC - **Last Updated**: August 05, 2024 at 16:04 UTC - **Reserved Date**: April 05, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions. ### Affected Products **n/a - Linux kernel through 4.12.4** Affected versions: - Linux kernel through 4.12.4 (Status: affected) ### References 1. [DSA-3927](http://www.debian.org/security/2017/dsa-3927) 2. [](https://patchwork.kernel.org/patch/9755757/) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1468283) 4. [100123](http://www.securityfocus.com/bid/100123) 5. [RHSA-2017:2669](https://access.redhat.com/errata/RHSA-2017:2669) 6. [RHSA-2017:2473](https://access.redhat.com/errata/RHSA-2017:2473) 7. [](http://openwall.com/lists/oss-security/2017/08/03/2) 8. [RHSA-2017:2585](https://access.redhat.com/errata/RHSA-2017:2585) 9. [](https://patchwork.kernel.org/patch/9755753/) 10. [](https://github.com/torvalds/linux/commit/49d31c2f389acfe83417083e1208422b4091cd9e) 11. [](https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1408967.html) 12. [DSA-3945](http://www.debian.org/security/2017/dsa-3945) 13. [](https://source.android.com/security/bulletin/2017-12-01) 14. [1039075](http://www.securitytracker.com/id/1039075) 15. [RHSA-2017:2770](https://access.redhat.com/errata/RHSA-2017:2770) 16. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=49d31c2f389acfe83417083e1208422b4091cd9e) 17. [RHSA-2017:2869](https://access.redhat.com/errata/RHSA-2017:2869) 18. [[oss-security] 20190627 Re: linux-distros membership application - Microsoft](http://www.openwall.com/lists/oss-security/2019/06/27/7) 19. [[oss-security] 20190628 Re: linux-distros membership application - Microsoft](http://www.openwall.com/lists/oss-security/2019/06/28/1) 20. [[oss-security] 20190628 Re: linux-distros membership application - Microsoft](http://www.openwall.com/lists/oss-security/2019/06/28/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3411, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3411 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3411 - **State**: PUBLISHED - **Published Date**: August 17, 2020 at 18:01 UTC - **Last Updated**: November 13, 2024 at 18:14 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in Cisco DNA Center software could allow an unauthenticated remote attacker access to sensitive information on an affected system. The vulnerability is due to improper handling of authentication tokens by the affected software. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker access to sensitive device information, which includes configuration files. ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **Cisco - Cisco Digital Network Architecture Center (DNA Center)** Affected versions: - n/a (Status: affected) ### References 1. [20200805 Cisco DNA Center Information Disclosure Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dna-info-disc-3bz8BCgR)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10184, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10184 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10184 - **State**: PUBLISHED - **Published Date**: May 09, 2018 at 07:00 UTC - **Last Updated**: August 05, 2024 at 07:32 UTC - **Reserved Date**: April 17, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in HAProxy before 1.8.8. The incoming H2 frame length was checked against the max_frame_size setting instead of being checked against the bufsize. The max_frame_size only applies to outgoing traffic and not to incoming, so if a large enough frame size is advertised in the SETTINGS frame, a wrapped frame will be defragmented into a temporary allocated buffer where the second fragment may overflow the heap by up to 16 kB. It is very unlikely that this can be exploited for code execution given that buffers are very short lived and their addresses not realistically predictable in production, but the likelihood of an immediate crash is absolutely certain. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://git.haproxy.org/?p=haproxy-1.8.git%3Ba=commit%3Bh=cd117685f0cff4f2f5577ef6a21eaae96ebd9f28) 2. [RHSA-2018:1372](https://access.redhat.com/errata/RHSA-2018:1372) 3. [](http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=3f0e1ec70173593f4c2b3681b26c04a4ed5fc588)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2453, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2453 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2453 - **State**: PUBLISHED - **Published Date**: May 09, 2016 at 10:00 UTC - **Last Updated**: August 05, 2024 at 23:32 UTC - **Reserved Date**: February 18, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description The MediaTek Wi-Fi driver in Android before 2016-05-01 on Android One devices allows attackers to gain privileges via a crafted application, aka internal bug 27549705. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://source.android.com/security/bulletin/2016-05-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18463, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18463 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18463 - **State**: PUBLISHED - **Published Date**: August 02, 2019 at 16:33 UTC - **Last Updated**: August 05, 2024 at 21:20 UTC - **Reserved Date**: July 31, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description cPanel before 62.0.17 allows code execution in the context of the root account via a long DocumentRoot path (SEC-225). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://documentation.cpanel.net/display/CL/62+Change+Log)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51920, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51920 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51920 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:30 UTC - **Last Updated**: November 20, 2024 at 14:26 UTC - **Reserved Date**: November 04, 2024 at 09:59 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in JDev Map Store Locator allows DOM-Based XSS.This issue affects Map Store Locator: from n/a through 1.2.1. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **JDev - Map Store Locator** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/map-store-location/wordpress-map-store-locator-plugin-1-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30350, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30350 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30350 - **State**: PUBLISHED - **Published Date**: May 28, 2023 at 00:00 UTC - **Last Updated**: January 14, 2025 at 18:15 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FS S3900-24T4S devices allow authenticated attackers with guest access to escalate their privileges and reset the admin password. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/172124/FS-S3900-24T4S-Privilege-Escalation.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5396, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5396 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5396 - **State**: PUBLISHED - **Published Date**: April 17, 2017 at 18:00 UTC - **Last Updated**: August 06, 2024 at 01:00 UTC - **Reserved Date**: June 10, 2016 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description Apache Traffic Server 6.0.0 to 6.2.0 are affected by an HPACK Bomb Attack. ### Affected Products **Apache Software Foundation - Apache Traffic Server** Affected versions: - 6.0.0 to 6.2.0 (Status: affected) ### References 1. [](https://issues.apache.org/jira/browse/TS-5019) 2. [97945](http://www.securityfocus.com/bid/97945) 3. [1038275](http://www.securitytracker.com/id/1038275)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17641, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17641 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17641 - **State**: PUBLISHED - **Published Date**: January 24, 2019 at 04:00 UTC - **Last Updated**: August 05, 2024 at 10:54 UTC - **Reserved Date**: September 28, 2018 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the deleteItem method of a TimeField. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6478. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Foxit - Reader** Affected versions: - 9.2.0.9297 (Status: affected) ### References 1. [](https://www.foxitsoftware.com/support/security-bulletins.php) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-18-1221/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20599, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20599 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20599 - **State**: PUBLISHED - **Published Date**: March 24, 2020 at 19:10 UTC - **Last Updated**: August 05, 2024 at 02:46 UTC - **Reserved Date**: March 23, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Samsung mobile devices with N(7.x), O(8.x), and P(9.0) software. Voice Assistant mishandles the notification audibility of a secured app. The Samsung ID is SVE-2018-13326 (May 2019). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37495, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37495 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37495 - **State**: PUBLISHED - **Published Date**: February 20, 2024 at 18:22 UTC - **Last Updated**: November 05, 2024 at 17:56 UTC - **Reserved Date**: July 06, 2023 at 16:11 UTC - **Assigned By**: HCL ### Vulnerability Description Internet passwords stored in Person documents in the Domino® Directory created using the "Add Person" action on the People & Groups tab in the Domino® Administrator are secured using a cryptographically weak hash algorithm. This could enable attackers with access to the hashed value to determine a user's password, e.g. using a brute force attack. This issue does not impact Person documents created through user registration https://help.hcltechsw.com/domino/10.0.1/admin/conf_userregistration_c.html . ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Affected Products **HCL Software - HCL Domino Server** Affected versions: - 9, 10, 11, 12 (Status: affected) ### References 1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107585)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-50951, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-50951 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-50951 - **State**: PUBLISHED - **Published Date**: February 17, 2024 at 16:00 UTC - **Last Updated**: August 02, 2024 at 22:23 UTC - **Reserved Date**: December 16, 2023 at 19:35 UTC - **Assigned By**: ibm ### Vulnerability Description IBM QRadar Suite 1.10.12.0 through 1.10.17.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 in some circumstances will log some sensitive information about invalid authorization attempts. IBM X-Force ID: 275747. ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **IBM - QRadar Suite Software** Affected versions: - 1.10.12.0 (Status: affected) **IBM - Cloud Pak for Security** Affected versions: - 1.10.0.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7118604) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/275747)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4430, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4430 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4430 - **State**: REJECTED - **Published Date**: October 03, 2008 at 22:00 UTC - **Last Updated**: October 10, 2008 at 09:00 UTC - **Reserved Date**: October 03, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14856, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14856 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14856 - **State**: PUBLISHED - **Published Date**: October 21, 2020 at 14:04 UTC - **Last Updated**: September 26, 2024 at 20:10 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N` ### Affected Products **Oracle Corporation - Trade Management** Affected versions: - 12.1.1 - 12.1.3 (Status: affected) - 12.2.3 - 12.2.10 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0063, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0063 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0063 - **State**: PUBLISHED - **Published Date**: September 01, 2004 at 04:00 UTC - **Last Updated**: October 29, 2024 at 14:05 UTC - **Reserved Date**: February 04, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The xterm terminal emulator in XFree86 4.2.0 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-380](http://www.debian.org/security/2003/dsa-380) 2. [RHSA-2003:067](http://www.redhat.com/support/errata/RHSA-2003-067.html) 3. [RHSA-2003:066](http://www.redhat.com/support/errata/RHSA-2003-066.html) 4. [20030224 Terminal Emulator Security Issues](http://marc.info/?l=bugtraq&m=104612710031920&w=2) 5. [RHSA-2003:064](http://www.redhat.com/support/errata/RHSA-2003-064.html) 6. [RHSA-2003:065](http://www.redhat.com/support/errata/RHSA-2003-065.html) 7. [6940](http://www.securityfocus.com/bid/6940) 8. [terminal-emulator-window-title(11414)](http://www.iss.net/security_center/static/11414.php) 9. [20030224 Terminal Emulator Security Issues](http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html) 10. [[oss-security] 20240615 iTerm2 3.5.x title reporting bug](http://www.openwall.com/lists/oss-security/2024/06/15/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1550, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1550 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1550 - **State**: PUBLISHED - **Published Date**: May 06, 2009 at 15:00 UTC - **Last Updated**: August 07, 2024 at 05:20 UTC - **Reserved Date**: May 06, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Zakkis Technology ABC Advertise 1.0 does not properly restrict access to admin.inc.php, which allows remote attackers to obtain the administrator login name and password via a direct request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [8555](https://www.exploit-db.com/exploits/8555) 2. [abcadvertise-admininc-info-disclosure(50183)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50183)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51189, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51189 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51189 - **State**: PUBLISHED - **Published Date**: November 11, 2024 at 00:00 UTC - **Last Updated**: November 12, 2024 at 01:57 UTC - **Reserved Date**: October 28, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TRENDnet TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12 devices contain a Store Cross-site scripting (XSS) vulnerability via the macList_Name_1.1.1.0.0 parameter on the /filters.htm page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.trendnet.com/products/product-detail?prod=245_TEW-652BRU) 2. [](https://www.trendnet.com/products/product-detail?prod=235_TEW-651BR) 3. [](https://www.trendnet.com/products/product-detail?prod=235_TEW-652BRP) 4. [](https://github.com/4hsien/CVE-vulns/blob/main/TRENDnet/TEW-652BRP/XSS_Filter/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1773, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1773 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1773 - **State**: PUBLISHED - **Published Date**: February 28, 2013 at 19:00 UTC - **Last Updated**: August 06, 2024 at 15:13 UTC - **Reserved Date**: February 19, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Buffer overflow in the VFAT filesystem implementation in the Linux kernel before 3.3 allows local users to gain privileges or cause a denial of service (system crash) via a VFAT write operation on a filesystem with the utf8 mount option, which is not properly handled during UTF-8 to UTF-16 conversion. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=916115) 2. [RHSA-2013:0928](http://rhn.redhat.com/errata/RHSA-2013-0928.html) 3. [[oss-security] 20130226 Re: CVE request - Linux kernel: VFAT slab-based buffer overflow](http://www.openwall.com/lists/oss-security/2013/02/26/8) 4. [](https://github.com/torvalds/linux/commit/0720a06a7518c9d0c0125bd5d1f3b6264c55c3dd) 5. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0720a06a7518c9d0c0125bd5d1f3b6264c55c3dd) 6. [23248](http://www.exploit-db.com/exploits/23248/) 7. [RHSA-2013:0744](http://rhn.redhat.com/errata/RHSA-2013-0744.html) 8. [](http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.3.bz2) 9. [58200](http://www.securityfocus.com/bid/58200) 10. [88310](http://www.osvdb.org/88310) 11. [RHSA-2013:1026](http://rhn.redhat.com/errata/RHSA-2013-1026.html)